timestep stochastic simulation of computer networks using

8
Timestep Stochastic Simulation of Computer Networks using Diffusion Approximation Andrzej Kochut IBM T.J. Watson Research Center P.O. Box 704 Yorktown Heights, NY 10598, USA [email protected] A. Udaya Shankar Department of Computer Science University of Maryland College Park, MD 20742 [email protected] Abstract Timestep stochastic simulation (TSS) is a novel method for generating sample paths of computer networks, with low computation cost independent of packet rates. It has accu- racy adequate to evaluate general network and flow con- figurations, including arbitrary flow start times and dura- tions, drop-tail queuing (i.e., does not require RED), and arbitrary state-dependent control mechanisms for conges- tion control and routing. TSS generates the evolution of the system state S(t) on a sample path in time steps of size δ. At each step, S(t + δ) is randomly chosen according to S(t) and the probability distribution Pr[S(t + δ)|S(t)] obtained using the diffusion approximation. Because packet trans- mission and reception events are replaced by time steps, TSS generates sample paths at a fraction of the cost of packet-level simulation. Because TSS generates sample paths, control feedback can be based on sample path met- rics, rather than ensemble metrics, thereby accurately cap- turing the effects of state-dependent control mechanisms. 1 Introduction Performance evaluation is crucial to advancing the state of computer networking. Yet existing evaluation techniques are not adequate for handling the large heterogeneous ar- chitectures and state-dependent control schemes that are in- trinsic to modern computer networking. A state-dependent control scheme is one where control (e.g., source rate or window size, next hop, buffering threshold) is exercised based on the observed state of the network (typically av- eraged over some recent interval). Packet-level simulation (e.g. [32, 30]), currently the most popular technique, is accurate but does not scale with link Work done when author was a graduate student at the University of Maryland, College Park. bandwidth and network size. Purely analytical techniques (e.g. [13, 14]) do not capture the effects of state-dependent control or realistic traffic mix with reasonable accuracy. This current state of affairs has motivated techniques such as fluid approximation models (e.g. [25, 20, 3, 2, 1, 21]), henceforth referred to as “fluid” methods, where the arrival and service times are defined by time-varying means, and a timestep computation yields an evolution of the net- work state. TSS can be viewed as a generalization of fluid approx- imation methods, based on the first two moments rather than only the first moment. In particular, arrival and service times in TSS are defined by time-varying rate and variance, and a TSS computation yields an evolution of the network state. As in stochastic packet-level simulation, repeated exe- cutions of TSS on the same network (including the same arrival and service parameters) yield different evolutions, each possible evolution corresponding to a particular choice of random values (e.g., arrival or service times). The time evolution of the first two moments of desired metrics can be obtained by computing multiple evolutions and averaging (as in stochastic packet-level simulation). It is worthwhile to emphasize the distinction between TSS and fluid approximation methods. Both TSS and fluid methods compute an evolution. Fluid methods use deter- ministic description of both inter-arrival and service pro- cesses. Thus repeated executions of a fluid method on the same network (including the same arrival and service pa- rameters) yield the same evolution. Whereas in the case of TSS (and stochastic packet-level simulation), repeated exe- cutions on the same network yield different evolutions. Ultimately, we are interested not in individual evolu- tions but in the evolution of instantaneous ensemble met- rics, e.g., the evolution of mean queue size. In TSS and in packet-level simulation, this is obtained by computing multiple evolutions and averaging over them. Whereas a Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '06) 0-7695-2573-3/06 $20.00 © 2006

Upload: others

Post on 28-Mar-2022

7 views

Category:

Documents


0 download

TRANSCRIPT

untitledAndrzej Kochut ∗
Yorktown Heights, NY 10598, USA [email protected]
A. Udaya Shankar Department of Computer Science University of Maryland College Park, MD 20742 [email protected]
Abstract
Timestep stochastic simulation (TSS) is a novel method for generating sample paths of computer networks, with low computation cost independent of packet rates. It has accu- racy adequate to evaluate general network and flow con- figurations, including arbitrary flow start times and dura- tions, drop-tail queuing (i.e., does not require RED), and arbitrary state-dependent control mechanisms for conges- tion control and routing. TSS generates the evolution of the system state S(t) on a sample path in time steps of size δ. At each step, S(t+δ) is randomly chosen according to S(t) and the probability distribution Pr[S(t+ δ)|S(t)] obtained using the diffusion approximation. Because packet trans- mission and reception events are replaced by time steps, TSS generates sample paths at a fraction of the cost of packet-level simulation. Because TSS generates sample paths, control feedback can be based on sample path met- rics, rather than ensemble metrics, thereby accurately cap- turing the effects of state-dependent control mechanisms.
1 Introduction
of computer networking. Yet existing evaluation techniques
are not adequate for handling the large heterogeneous ar-
chitectures and state-dependent control schemes that are in-
trinsic to modern computer networking. A state-dependent
control scheme is one where control (e.g., source rate or
window size, next hop, buffering threshold) is exercised
based on the observed state of the network (typically av-
eraged over some recent interval).
Packet-level simulation (e.g. [32, 30]), currently the most
popular technique, is accurate but does not scale with link
∗Work done when author was a graduate student at the University of Maryland, College Park.
bandwidth and network size. Purely analytical techniques
(e.g. [13, 14]) do not capture the effects of state-dependent
control or realistic traffic mix with reasonable accuracy.
This current state of affairs has motivated techniques
such as fluid approximation models (e.g. [25, 20, 3, 2, 1,
21]), henceforth referred to as “fluid” methods, where the
arrival and service times are defined by time-varyingmeans,
and a timestep computation yields an evolution of the net-
work state.
TSS can be viewed as a generalization of fluid approx-
imation methods, based on the first two moments rather
than only the first moment. In particular, arrival and service
times in TSS are defined by time-varying rate and variance, and a TSS computation yields an evolution of the network state.
As in stochastic packet-level simulation, repeated exe-
cutions of TSS on the same network (including the same
arrival and service parameters) yield different evolutions, each possible evolution corresponding to a particular choice
of random values (e.g., arrival or service times). The time
evolution of the first two moments of desired metrics can be
obtained by computing multiple evolutions and averaging
(as in stochastic packet-level simulation).
It is worthwhile to emphasize the distinction between
TSS and fluid approximation methods. Both TSS and fluid
methods compute an evolution. Fluid methods use deter-
ministic description of both inter-arrival and service pro-
cesses. Thus repeated executions of a fluid method on the
same network (including the same arrival and service pa-
rameters) yield the same evolution. Whereas in the case of TSS (and stochastic packet-level simulation), repeated exe-
cutions on the same network yield different evolutions.
Ultimately, we are interested not in individual evolu-
tions but in the evolution of instantaneous ensemble met-
rics, e.g., the evolution of mean queue size. In TSS and
in packet-level simulation, this is obtained by computing
multiple evolutions and averaging over them. Whereas a
Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '06) 0-7695-2573-3/06 $20.00 © 2006
fluid method computes only one evolution. So the question
arises as to when this one evolution adequately represents
all the different possible evolutions. Clearly, this would
hold if the different possible evolutions are all “close” to
each other. While this may be true of certain types of com-
puter networks, it is not true of most computer networks,
especially when the link scheduling is drop-tail as opposed
to a “per-flow” discipline like RED. The nonlinear control
mechanisms present in networks invariably cause small dif-
ferences to lead to vastly different evolutions over time; for
example, a small delay in a packet arrival may trigger a
timeout, after which the evolution would be very different
than if the timeout had not occurred. Section 2 illustrates
the diversity of queue size evolutions and its impact on fluid
approximations using a simple example network.
Timestep Stochastic Simulation (TSS)
Our method computes the evolution of system state S(t) on a sample path at time instants t0, t1, t2, · · ·, where ti+1 − ti = δ for an appropriately small δ (smaller than
the time scale of the end-to-end control) assuming a start-
ing state S(t0). Note that S(t) contains the values of all important system variables at time t, for example queue
sizes of communication links, window sizes of TCP con-
nections, state of TCP connections (i.e., slow start or con-
gestion avoidance), etc. S(ti+1) can be computed based on S(t) and models of congestion control mechanisms. To illustrate the idea consider one of the variables in
S(t), the number of customers N(t) of a queue. We do the following for i = 0, 1, · · ·:
(1) Analytically obtain Pr[N(ti+1)|N(ti)], the probabil- ity distribution of N(ti+1) givenN(ti).
(2) Then randomly choose a value for N(ti+1) based on Pr[N(ti+1)|N(ti)].
Repeating these two steps for successive intervals generates
a sample path of the queue size N(t). Figure 1 depicts this procedure. Assume, that the initial queue size at time t0 equals N(t0) (marked by a black dot). Because of the ran- domness in arrival and service processes the time evolution
of N(t) in the interval [t0, t0 + δ] can follow a multiplicity of paths. Two of these paths originating from (t0, N(t0)) are shown. Each upward transition corresponds to the ar-
rival of the packet to the queue and each downward transi-
tion corresponds to the departure of the packet. The queue
sizeN(t0 + δ) is chosen based on the probability density of queue size at t0 + δ conditioned on N(t0). The probability density is shown as a solid line. The procedure is repeated
for step [t0 + δ, t0 + 2δ], as shown in the figure. The difficulty, of course, is in obtaining an analytical





.......................................... .............................................
..............................................
.....................................................................



........................
.............. ..................
t0 + δ t0 + 2δ time
Figure 1: Computation procedure. At each step, the probability distribution of N(t + δ) given the current value of N(t) is obtained and a new value of N(t + δ) is randomly chosen based on this distribution.
S(ti) and models of control schemes (such as TCP). Even so, exact results for Pr[N(ti+1)|N(ti)] are not known for most queuing systems of interest. However, the diffusion
approximation, first proposed by Kolmogorov [18] and later
extended by Feller [7], provides a very accurate approxima-
tion of this distribution.
First, packet arrival and service distributions can be time-
varying stochastic processes characterized by the first two
instantaneous moments, i.e., mean rate at time t and vari-
ance at time t. This allows realistic modeling of traffic and
service times. In particular, the variation of a source at time
t represents howmuch jitter the source exhibits with respect
to its mean rate at time t. Second, because the diffusion ap-
proximation is based on the law of large numbers, its accu-
racy increases with increasing packet rates (and its compu-
tational cost is not affected).
TSS is a general-purpose network simulator whose com-
putational cost does not increase with increasing bandwidth.
It can be used as a general substitute for packet-level sim-
ulation of high speed networks, for example, not only to
examine special problems like the behavior of many TCP
flows sharing a bottleneck, but also to evaluate P2P net-
works, load balancing, interaction between dynamic routing
and flows, and so on. This paper focuses on handling an ar-
bitrary network topology with drop-tail queuing. However,
TSS can be easily extended to the statistically smoother
AQM disciplines. TSS can handle both the TCP and UDP
flows with arbitrary start times and durations (i.e., both TCP
elephants and mice [21]).
2 Diversity of Sample Paths and its Impact on Deterministic Fluid Approximations
We now present an example that illustrates the diversity
of evolutions found in even simple networks, show how
well TSS handles this diversity, and discuss what are the
implications for fluid modeling.
Figure 2 shows a two-link tandem network with TCP
flow from node N0 to node N2. Both links have equal ser-
Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '06) 0-7695-2573-3/06 $20.00 © 2006
NN0 1 2N
0
300
600
TSS sample path ns sample path
(a) pair of sample paths (b) pair of sample paths forN0 → N1 forN1 → N2
0
400
800
0
300
600
TSS sample path ns sample path
(c) pair of sample paths (d) pair of sample paths forN0 → N1 forN1 → N2
Figure 3: Evolutions of queue size generated by packet-level simulation and by TSS for tandem net- work in Figure 2.
vice rate of 1000 packets/sec, squared coefficient of vari-
ation of service time of 0.05, and buffer capacity of 500
packets. Figures 3a and 3c show two pairs of evolutions
as generated by packet-level simulation and TSS for link
N0 → N1. Similar pairs for link N1 → N2 are shown
in Figures 3b and 3d. Figures 4a and 4c present evolu-
tions of mean queue size and its standard deviation for link
N0 → N1, respectively. Figures 4b and 4d show corre-
sponding evolutions for link N1 → N2.
There are several points to note. First, the individ-
ual evolutions have great diversity, especially those of link
N1 → N2 (due to the first queue being nearly always non-
empty). There is no ”representative” evolution. Second,
TSS is accurate in computing individual evolutions as well
as the evolutions of ensemble metrics, for both links. TSS is
10 times faster than ns [32] for the presented configuration.
The difference increases to nearly 1000 times in case of two
1Gbps links. Third, the instantaneous mean queue size evo-
lution of a link is quite different from any of its individual
evolutions; the cyclical nature of the latter is not present
in the former. A fluid method would not have the random
time shifts that make the mean queue size evolution smooth
(as presented on Figure 4a). Instead, it would yield a cycli-
cal “saw-tooth” behavior that does not decay with time and
that corresponds to only one of the many possible evolu-
tions; the evolution would not be a representative evolution,
say in the example depicted on Figure 3a. This problem
stems from the simplification (used in all fluid approxima-
tions) that the behavior of traffic sources is driven by the
0
300
600
TSS mean ns mean
(a) mean queue size (b) mean queue size ofN0 → N1 ofN1 → N2
0
300
600
0
200
400
TSS std. dev. ns std. dev.
(c) standard deviation (d) standard deviation of queue size ofN0 → N1 of queue size ofN1 → N2
Figure 4: Mean queue size and its standard deviation for link N0 → N1 and for link N1 → N2 of network in Figure 2 as obtained by packet-level simulation and by TSS.
mean system evolution and not the sample system evolu-
tion. The deficiency of fluid models is even more visible
in case of the second queue in tandem. Fluid approxima-
tion predicts that this queue is empty all the time, because
arrival rate never exceeds the service rate of the link. In re-
ality however, randomness in inter-arrival and service pro-
cesses cause the queue to impact the flows’ round-trip time
significantly. TSS predicts this behavior very well as shown
on Figures 4b and 4d. Fourth, TSS yields the evolution not
only of mean values but also of second moments and even
distributions of metrics of interest.
3 TSS for One Queue
We model a communication link by a single-server
queue in the usual way, with service rate equal to the link
bandwidth (in packets/second) and maximum queue size
equal to the link buffer size (in packets). The state of the
link at time t is defined by the number of packets in the
queue at time t, denoted by N(t). We compute a time-stepped evolution of the stochastic
process N(t) given a starting state N(t0) as illustrated in Figure 1. Divide the time axis into intervals defined by time
instants t0, t1, · · · where ti+1 − ti = δ and δ is smaller than
the control time scale Δ. Then do the following iteratively for i = 0, 1, · · ·: compute Pr[N(ti+1)|N(ti)] and choose a randomN(ti+1) with this distribution. In order to compute Pr[N(ti+1)|N(ti)] we use diffusion approximation [18, 7] with holding barriers [10] (with Coxian distributions at the
barriers [4]).
for an unbounded queue, i.e., with only a lower barrier
Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '06) 0-7695-2573-3/06 $20.00 © 2006
N(t) = 0. Similar equations may be obtained for the two- barrier case (N(t) = 0 and N(t) = K), but the details are
omitted here for brevity.
Let us introduce the following notation:
• f(x, t|x0): conditional probability density of N(t) = x givenN(0) = x0.
• λ and cA: mean rate and squared coefficient of varia-
tion of the arrival process.
• μ and cS : mean rate and squared coefficient of varia-
tion of the service process.
• λi and ai: exit rate and probability of entering next
stage, for ith stage of Coxian holding time distribution.
• Pi(t): probability of being in ith stage of Coxian dis-
tribution at time t.
The time evolution of f(x, t|x0) is the solution to the dif- fusion equation, where f(x, t|x0) is replaced with f for
brevity:
∂f
∂t =
α
2
∂2f
where β = λ − μ
α = λcA + μcS . (2)
and initial and boundary conditions are as follows (δ∗(x) is the Dirac delta function):
f(0, t|x0) = 0 t ≥ 0 f(x, 0|x0) = δ∗(x − x0) 0 < x < ∞
∀i Pi(0) =
(3)
We assume that the input parameters (i.e., λ, cA, μ, cS ,
λi, ai) are constant on the interval of interest, which is
valid because δ is small enough compared to Δ. Then the Laplace transform f∗(x, s|x0) of f(x, t|x0) can be com- puted in terms of Laplace transform of the holding time dis-
tribution, denoted by h∗(s). The Stehfest [31] algorithm is used to invert the transform. TSS computational procedure
for a single communication link is presented in Figure 5.
Details are available in [17].
4 TSS for a Network
The previous section described timestep stochastic sim-
ulation of a single link driven by a single flow. We now
initialize internal state of the traffic source;
initialize queue size N(0); for t = 0 to StopT ime with step δ do obtain moments of the arrival process λ(t) and cA(t); obtain probability distribution Pr[N(t + δ)|N(t)] using diffusion approximation (Eqns. 1, 2, and 3);
choose new queue size N(t + δ) according to Pr;
write metrics for time t to the file;
end for;
Figure 5: TSS computational procedure for a single communication link and one traffic flow.
extend this to a network of queues driven by a set of flows.
Each flow represents the traffic generated by a UDP or TCP
source, and is defined by the following quantities: source
node; sink node; path through the network taken by its pack-
ets; and the first two moments of the source’s inter-packet
generation time during each timestep. (The second moment
corresponds to how much jitter the source exhibits with re-
spect to its mean rate.)
The model, of course, allows the source’s moments to
vary over different timesteps. For a time-dependent source,
the moments would depend only on time (e.g., a start and
stop time). For a state-dependent source, the moments
would depend on the evolution of the network state thus
far; for example, a TCP source’s rate would depend on the
recent history of the sizes of the queues along its path. A
model of TCP-Tahoe is discussed in simulation studies in
Section 5. We also implemented and evaluated a state-
dependent UDP source, but we do not report results here
because of the lack of space.
4.1 Departure Process, Splitting and Merging Processes
To extend TSS to a network of queues, we have to be able
to compute the first two moments of the departure process
of a queue as well as that of processes obtained by split-
ting and merging flows. We formulate equations for each
of these cases next. Throughout, we assume that the first
two moments of the arrival and service processes on each
link are constant within each δ interval. This assumption is
valid because we set δ to be smaller than the control time
scale Δ. Following [6, 5, 34] we approximate the transient de-
parture process using the Marshall’s formula [22] with π0
replaced with π0(t) as computed by the diffusion approxi- mation. For inter-departure time φ(t), we obtain:
E[φ(t)] = 1
μ + π0(t)E[h]
E[h]
μ }
(4)
where Vs is the variance of the service process, μ is the
Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '06) 0-7695-2573-3/06 $20.00 © 2006
mean service rate, and E[h] and E[h2] are first two mo- ments of the idle period.
At a node of a network, the incoming traffic flow may be
split into multiple flows (depending on the routing proba-
bilities). Let the inter-arrival time of the process being split
have mean rate λa and squared coefficient of variation ca.
The packets may enter one of n communication links with
probabilities q1, q2, . . . , qn. Let the inter-arrival time of the
ith resulting process have mean rate λi and squared coeffi-
cient of variation ci. Following [13] and [19], the transition
rates and squared coefficients of variation of the ith compo-
nent process are given by:
λi = λa ∗ qi
Consider the merge of independent renewal processes. It
turns out that the first two moments of the merged pro-
cess are not obtainable from just the first two moments of each of the constituent renewal processes. One has to work
with the distributions of the inter-arrival times. We use
the approach described in [19], which substitutes a hypo-
or hyper-exponential distribution (depending on variances
of processes being merged) leading to a closed-form ap-
proximate expression. Details are omitted for space reasons
(available in [19]).
4.2 Network Flows
TSS computes a sample path of the queue size evolution
for each communication link in the network. In order to
complete the description of the system and to model con-
gestion control schemes, we need to specify for each com-
munication link the number of packets of each flow that tra-
versed the link in each timestep.
For each flow j and communication link i we introduce
a series of flow-conservation equations. Denote by N j i (t)
the number of packets of flow j in queue i at time t, by
D j i (t) the number of packets of flow j departing from queue
i during [t, t + δ], by λ j i (t) mean arrival rate of packets of
flow j to queue i during [t, t+δ], and byA j i (t) arrival count
of packets of flow j to link i during [t, t + δ]. Under the assumption that the routing is properly configured and flows
do not have cycles, we have:
A j i (t) =

λ j i (t) ∗ δ if i is the first-hop of flow j
D j k(t) otherwise, where k is the
previous link on the path
of flowj (6)
Denote by Ai(t) = ∑
Ak i (t) the total arrival count to
the link i during [t, t + δ], and by P full i (t) the probability
that a packet arriving during [t, t + δ] finds the queue full.
P full i (t) is computed using the diffusion equation. Total number of packets lost due to the overflow of queue iwithin
time interval [t, t + δ], denoted by Li(t), is determined as:
Li(t) = Ai(t)P full i (t) (7)
Losses are assigned to flows proportionally to the share of a
flow in the aggregate traffic. The number of packets lost by
flow j on link i during [t, t + δ], denoted by L j i (t), is:
L j i (t) = Li(t)
A j i (t)
Denote the mean arrival rate and squared coefficient of vari-
ation of interarrival times to link i during [t, t + δ] by λi(t) and cA,i(t), respectively. These values are computed using techniques presented at the beginning of this section. Mean
service rate and squared coefficient of variation of service
time of queue i during [t, t + δ] are denoted by μi(t) and cS,i(t), respectively. Queue size N(t + δ) is randomly cho- sen according to the probability distribution computed as
described in Section 3 based on N(t), λi(t), cA,i(t), μi(t), and cS,i(t). Departure count of flow j from link i within
[t, t + δ] is determined according to:
D j i (t) = N
j i (t) − N
j i (t) − L
j i (t) (9)
5 TCP Network Simulations
paring its results with that of packet level simulations. We
studied a broad variety of network topologies with various
traffic flow configurations with both TCP and UDP traffic.
The TSS achieves high accuracy while computing the re-
sults orders of magnitude faster than packet level simula-
tor (several thousand times faster for topologies with 1Gbit
links). Due to the lack of space we report on only two ex-
ample network topologies.
We use TCP sources with slow-start, congestion avoid-
ance, and retransmissions driven by timeout (i.e., TCP-
Tahoe sources). To represent a TCP-Tahoe source in TSS,
we augment the state of a TCP source with the following:
(1) congestionwindow size; (2) slow start threshold; (3) last
acknowledged sequence number; (4) RTO timer value, i.e.,
time before which the last sent data segment has to be ac-
knowledged or loss will be assumed. We also extend the
information maintained at each queue for a TCP flow. In
addition to the number of packets, TSS also keeps track of
the lowest and highest sequence numbers, and updates them
based on the arrival, departure, and loss count for the last
hop of the return path. The data arrival count and variability
Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '06) 0-7695-2573-3/06 $20.00 © 2006
N2 N4
(a) 14-node network topology (b) Large network topology
Figure 6: 14-node network topology with 40 TCP flows (a) and 35-node network topology with 180 TCP flows (b).
at the TCP sink is used by the TCP source as representing
the acknowledgment stream. We make the assumption that
the acknowledgments encounter a fixed delay.
The source adjusts its congestion window based on the
statistics of the arriving acknowledgment stream. In par-
ticular, if the congestion window is smaller than the slow-
start threshold, the congestion window gets increased by
the number of received acknowledgments. Otherwise, the
source is in congestion avoidance mode and the congestion
window is expanded by the number of arriving acknowledg-
ments divided by the current size of the congestion window.
5.2 14-node Network
13 communication links (as shown in Figure 6a). The cen-
tral link (N12 → N13) has service rate of 2000 packets/sec
and all other links have service rates of 1000 packets/sec.
Buffering capacity of all links is 1500 packets and squared
coefficient of variation of service time is 0.05. Traffic is
generated by 40 TCP flows with time-dependent start and
stop times. In particular, 10 TCP flows from nodeN0 toN4
and 10 TCP flows from node N2 to N6 are active from the
beginning of the simulation until 300 seconds. Moreover,
10 TCP flows from node N1 to N5 and 10 TCP flows from
node N3 to N7 are active from 100 seconds until 200 sec-
onds. Figure 7 presents comparison of mean queue size and
its deviation as computed by packet-level simulation and
TSS for links N2 → N9, N9 → N12, and N12 → N13.
TSS correctly predicts periods of large queuing for all links
of interest. It also approximates variability of the queue size
very well.
We now examine the quality of TSS approximation for
a 35-node network with 35 communication links and 180
TCP flows shown in Figure 6b. All links have service rate
0
800
1600
TSS std. dev. ns std. dev.
(a) mean queue size (b) standard deviation of queue size ofN2 → N9 ofN2 → N9
0
900
1800
TSS std. dev. ns std. dev.
(c) mean queue size (d) standard deviation of queue size ofN9 → N12 ofN9 → N12
0
150
300
TSS std. dev. ns std. dev.
(e) mean queue size (f) standard deviation of queue size ofN12 → N13 ofN12 → N13
Figure 7: Comparison of mean queue size and its standard deviation as computed by packet-level sim- ulator and TSS for links N2 → N9, N9 → N12, and N12 → N13 of network in Figure 6a.
of 5000 packets/sec, which corresponds to (assuming 1KB
packets) approximately 40 Mbps. Buffer capacities vary
from 1000 to 5000 packets. 10 bulk TCP flows are contin-
uously active for each of the following source-destinations:
N14 → N17, N15 → N18, N16 → N19, N14 → N23,
N15 → N24, N16 → N25, N20 → N23, N21 → N24,
N22 → N25, N20 → N26, N21 → N27, N22 → N28,
N29 → N32, N30 → N33, N31 → N34, N29 → N17,
N30 → N18, N31 → N19. Because this configuration has
multiple interacting TCP flows on a non-trivial topology, it
gives raise to various behaviors and is a good configuration
for presenting the quality of TSS approximation. Figure 8
presents comparison of mean queue size and its deviation
as computed by packet-level simulation and TSS for links
N0 → N1, N12 → N5, and N2 → N3. TSS results match
very closely those of packet-level simulation.
6 Related Work
of the most widely used is packet-level simulation [32, 30],
in which an event is simulated for every packet transmission
and reception. This technique, if used carefully, can provide
Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '06) 0-7695-2573-3/06 $20.00 © 2006
0
500
1000
TSS std. dev. ns std. dev.
(a) mean queue size (b) standard deviation ofN0 → N1 ofN0 → N1
0
3000
6000
TSS std. dev. ns std. dev.
(c) mean queue size (d) standard deviation of queue size ofN12 → N5 ofN12 → N5
0
500
1000
TSS std. dev. ns std. dev.
(e) mean queue size (f) standard deviation of queue size ofN2 → N3 ofN2 → N3
Figure 8: Comparison of mean queue size and its standard deviation as computed by packet-level sim- ulator and TSS for links N0 → N1, N12 → N5, and N2 → N3 of network in Figure 6b.
very high accuracy. However, it becomes prohibitively ex-
pensive for high-speed communication links and large net-
work architectures.
There are many analytical methods to solve for steady-
state metrics of queuing networks, for example, [13, 14],
and, more relevant to our approach, [34, 33, 9, 15, 16, 10,
19]. There is also work on computation of transient met-
rics in networks with time-dependent control schemes, for
example [6, 5]. However, these methods are not effective
for solving networks with complex state-dependent control
schemes (such as TCP’s congestion control and dynamic
adaptive routing).
equations, which are then solved in timestep fashion to ob-
tain time evolutions of the network state. So TSS is similar
to fluid methods in this respect. However, fluid methods
consider the differential equations in only the first moment,
whereas TSS considers them in the first two moments. In
particular, in one class of fluid methods (e.g., [24, 20, 25]),
the set of differential equations is reduced to a set of deter-
ministic differential equations. Consequently, the approach
yields only a single evolution, intended to correspond to
the ensemble-averaged mean of the metrics. The second
group of fluid approximation techniques [2, 1, 21], describe
time evolution of TCP congestion window again assuming
deterministic network behavior. However, they introduce
stochastic description of start and stop times of TCP flows.
There are hybrid approaches that combine stochastic
fluid approximations with packet-level simulation, as in
[11, 3]. These approaches inherit the limitations of stochas-
tic fluid approximation that makes it difficult to properly
capture the effect of state-dependent control causing diverse
sample paths.
directly yield the time evolution of an instantaneous
ensemble-averaged metric of a network. One example
is the Z-iteration [23, 29], which computes instantaneous
ensemble-average metrics of interest (e.g., queue size, loss
rate, source rate) by approximating the relationship be-
tween instantaneous metrics by their steady-state counter-
parts. But it is restricted to networks of M(t)/M(t)/*/*
queues, and so cannot capture the effect of state-dependent
control schemes.
cesses that form the foundation of our TSS approach. There
is a large body of literature devoted to diffusion approxima-
tions for obtaining queue size distributions. The approaches
date back to Kolmogorov [18], who first proposed diffusion
equations. Feller [7] extended his ideas and provided the
framework for solving various problems using diffusion. In
a series of articles devoted to the analysis of road traffic
[27, 26, 28], Newell proposed a set of approximation tech-
niques applicable in low, mild, and heavy traffic conditions.
Similar work also came from Gaver [8] and Kingman [12].
Gelenbe [9, 10] and Kobayashi [15, 16] proposed the use
of diffusion approximations with holding barriers to model
queue size evolution for equilibrium and non-equilibrium
cases. (There are many types of barriers, including absorb-
ing and reflecting.)
Whitt [34], Duda [6], Kuehn [19] and others have studied
the problem of obtaining the statistics of the departure pro-
cess of a queue, building upon the work by Marshall [22]
relating the Laplace transforms of the distributions of ser-
vice time, idle period, and inter-departure time. Whitt [35]
and Kuehn [19] have studied the problem of determining
the statistics of traffic flows obtained by splitting and merg-
ing other traffic flows in the context of communication net-
works.
We presented a novel technique, called timestep stochas-
tic simulation, for fast performance evaluation of computer
networks. Our method generates sample paths of the sys-
tem with very high accuracy. In each step the new state of
the system is chosen randomly based on the current state
Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '06) 0-7695-2573-3/06 $20.00 © 2006
and a probability distribution obtained using diffusion ap-
proximation. The method is much faster than packet-level
simulation and has almost the same accuracy. Because
state-dependent control gets feedback based on sample path
metrics, our method is more suitable for modeling state-
dependent control schemes (such as TCP’s) than fluid ap-
proximations. Our future research plans include extending
the TSS with RED queue model. We also plan to apply it
to various networking problems, such as dynamic routing,
load balancing, or optimal cache placement.
References
[1] F. Baccelli and D. Hong. Flow Level Simulation of Large IP
Networks. In INFOCOM, 2003. [2] F. Baccelli and D. Hong. Interaction of TCP Flows as Bil-
liards. In INFOCOM, 2003. [3] S. Bohacek, J. P. Hespanha, J. Lee, and K. Obraczka. A
Hybrid Systems Modeling Framework for Fast and Accurate
Simulation of Data Communication Networks. In SIGMET- RICS, 2003.
[4] D. R. Cox. A use of Complex Probabilities in the Theory of
Stochastic Processes. In Cambridge Phil. Soc., 1955. [5] A. Duda. Transient Diffusion Approximation for some
Queueing Systems. In SIGMETRICS, 1983. [6] A. Duda. Diffusion Approximation for Time-dependent
Queueing Systems. In IEEE JSAC, pages 905–918, 1986. [7] W. Feller. Diffusion Processes in One Dimension. In Amer. Math. Soc., volume 77, pages 1–31, July 1954.
[8] D. P. Gaver. Diffusion Approximations and Models for Cer-
tain Congestion Problems. In Journal of Applied Probability, volume 5, pages 607–623, 1968.
[9] E. Gelenbe. On Approximate Computer System Models. In
ACM (JACM), volume 22, pages 261–269, April 1975. [10] E. Gelenbe. Probabilistic Models of Computer Systems, Part
II: Diffusion Approximation, Waiting Times and Batch Ar-
rivals. Acta Informatica, vol. 12, pp 285-303, 1979. [11] Y. Guo, W. Gong, and D. Towsley. Time-stepped Hybrid
Simulation (TSHS) for Large Scale Networks. In INFOCOM, 2000.
[12] J. F. C. Kingman. The Heavy Traffic Approximation in the
Theory of Queues. In Symp. on Congestion Theory, Univ. North Carolina Press, Chapel Hill, pages 137–169, 1965.
[13] L. Kleinrock. Queueing Systems - volume I. John Wiley and Sons, 1976.
[14] L. Kleinrock. Queueing Systems - volume II. John Wiley and Sons, 1976.
[15] H. Kobayashi. Application of the Diffusion Approximation
to Queueing Networks I: Equilibrium Queue Distributions. In
ACM (JACM), volume 21, pages 316–328, April 1974. [16] H. Kobayashi. Application of the Diffusion Approximation
to Queueing Networks II: Nonequilibrium Distributions and
Applications to Computer Modeling. In ACM (JACM), vol- ume 21, pages 459–469, July 1974.
[17] A. Kochut. Timestep Stochastic Simulation of Com- puter Networks using Diffusion Approximation. PhD
Dissertation, University of Maryland, College Park.
http://hdl.handle.net/1903/2691, 2005.
[19] P. Kuehn. Approximate Analysis of a General Queuing Net-
works by Decomposition. In IEEE Transactions on Commu- nications, volume 27, pages 113–126, 1979.
[20] Y. Liu, F. L. Presti, V. Misra, D. Towsley, and Y. Gu. Fluid
Models and Solutions for Large-Scale IP Networks. In SIG- METRICS, 2003.
[21] M. Marsan, M. Garetto, P. Giaccone, E. Leonardi, E. Schi-
attarella, and A. Tarello. Using Partial Differential Equations
to Model TCP Mice and Elephants in Large IP Networks. In
INFOCOM, 2004. [22] K. T. Marshall. Some Relationships Between the Distribu-
tions of Waiting Time, Idle Time and Interoutput Time in the
GI/G/1 Queue. SIAM Jour. of Appl. Math., 16, 1968. [23] I. Matta and A. U. Shankar. Z-Iteration: A Simple Method
for Throughput Estimation in Time-Dependent Multi-Class
Systems. In Measurement and Modeling of Computer Sys- tems, pages 126–135, 1995.
[24] V. Misra, W. Gong, and D. Towsley. Stochastic Differential
Equation Modeling and Analysis of TCP-Windowsize Behav-
ior. In SIGMETRICS, 1999. [25] V. Misra, W. Gong, and D. Towsley. Fluid-based Analysis of
a Network of AQM Routers Supporting TCP Flows with an
Application to RED. In SIGCOMM, 2000. [26] G. Newell. Queues with time-dependent arrival rates II: The
Maximum Queue and the Return to Equilibrium. In Journal of Applied Probability, volume 22, pages 579–590, 1968.
[27] G. F. Newell. Queues with Time-Dependent Arrival Rates:
I - The Transition Through Saturation. In Journal of Applied Probability, volume 5, pages 436–451, 1968.
[28] G. F. Newell. Queues with time-dependent arrival rates III:
The mild rush hour. In Journal of Applied Probability, vol- ume 5, pages 591–606, 1968.
[29] C. T. Popescu and A. U. Shankar. Empirical TCP Profiles
and Applications. ICNP, 1999. [30] Scalable Network Technologies. Qualnet.
http://www.scalable-networks.com.
[31] H. Stehfest. Algorithm 368. Numerical inversion of Laplace
transforms. In Communications of the ACM, volume 13, pages 47–49, 1970.
[32] University of Southern California. The Network Simulator -
ns-2. http://www.isi.edu/nsnam/ns.
[33] W. Whitt. Performance of the Queueing Network Analyzer.
In Bell System Technical Journal, volume 62, 1983. [34] W. Whitt. The Queueing Network Analyzer. In Bell System Technical Journal, volume 62, 1983.
[35] W. Whitt. Approximations for Departure Processes and
Queues in Series. In Naval Research Logistics Quarterly, vol- ume 31, pages 499–521, December 1984.
Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '06) 0-7695-2573-3/06 $20.00 © 2006
<< /ASCII85EncodePages false /AllowTransparency false /AutoPositionEPSFiles false /AutoRotatePages /None /Binding /Left /CalGrayProfile (None) /CalRGBProfile (None) /CalCMYKProfile (None) /sRGBProfile (sRGB IEC61966-2.1) /CannotEmbedFontPolicy /Error /CompatibilityLevel 1.3 /CompressObjects /Off /CompressPages true /ConvertImagesToIndexed true /PassThroughJPEGImages true /CreateJDFFile false /CreateJobTicket false /DefaultRenderingIntent /Default /DetectBlends true /DetectCurves 0.1000 /ColorConversionStrategy /LeaveColorUnchanged /DoThumbnails true /EmbedAllFonts true /EmbedOpenType false /ParseICCProfilesInComments true /EmbedJobOptions true /DSCReportingLevel 0 /EmitDSCWarnings false /EndPage -1 /ImageMemory 1048576 /LockDistillerParams true /MaxSubsetPct 100 /Optimize true /OPM 0 /ParseDSCComments false /ParseDSCCommentsForDocInfo false /PreserveCopyPage true /PreserveDICMYKValues true /PreserveEPSInfo false /PreserveFlatness true /PreserveHalftoneInfo true /PreserveOPIComments false /PreserveOverprintSettings true /StartPage 1 /SubsetFonts true /TransferFunctionInfo /Remove /UCRandBGInfo /Preserve /UsePrologue false /ColorSettingsFile () /AlwaysEmbed [ true ] /NeverEmbed [ true ] /AntiAliasColorImages false /CropColorImages true /ColorImageMinResolution 150 /ColorImageMinResolutionPolicy /OK /DownsampleColorImages true /ColorImageDownsampleType /Bicubic /ColorImageResolution 300 /ColorImageDepth -1 /ColorImageMinDownsampleDepth 1 /ColorImageDownsampleThreshold 2.00333 /EncodeColorImages true /ColorImageFilter /DCTEncode /AutoFilterColorImages false /ColorImageAutoFilterStrategy /JPEG /ColorACSImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /ColorImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /JPEG2000ColorACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /JPEG2000ColorImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /AntiAliasGrayImages false /CropGrayImages true /GrayImageMinResolution 150 /GrayImageMinResolutionPolicy /OK /DownsampleGrayImages true /GrayImageDownsampleType /Bicubic /GrayImageResolution 300 /GrayImageDepth -1 /GrayImageMinDownsampleDepth 2 /GrayImageDownsampleThreshold 2.00333 /EncodeGrayImages true /GrayImageFilter /DCTEncode /AutoFilterGrayImages false /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /GrayImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /JPEG2000GrayACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /JPEG2000GrayImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /AntiAliasMonoImages false /CropMonoImages true /MonoImageMinResolution 1200 /MonoImageMinResolutionPolicy /OK /DownsampleMonoImages true /MonoImageDownsampleType /Bicubic /MonoImageResolution 600 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.00167 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict << /K -1 >> /AllowPSXObjects false /CheckCompliance [ /None ] /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox true /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile (None) /PDFXOutputConditionIdentifier () /PDFXOutputCondition () /PDFXRegistryName (http://www.color.org) /PDFXTrapped /False /Description << /JPN <FEFF3053306e8a2d5b9a306f300130d330b830cd30b9658766f8306e8868793a304a3088307353705237306b90693057305f00200050004400460020658766f830924f5c62103059308b3068304d306b4f7f75283057307e305930023053306e8a2d5b9a30674f5c62103057305f00200050004400460020658766f8306f0020004100630072006f0062006100740020304a30883073002000520065006100640065007200200035002e003000204ee5964d30678868793a3067304d307e30593002> /DEU <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> /FRA <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> /PTB <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> /DAN <FEFF004200720075006700200064006900730073006500200069006e0064007300740069006c006c0069006e006700650072002000740069006c0020006100740020006f0070007200650074007400650020005000440046002d0064006f006b0075006d0065006e007400650072002c0020006400650072002000650072002000650067006e006500640065002000740069006c0020007000e5006c006900640065006c006900670020007600690073006e0069006e00670020006f00670020007500640073006b007200690076006e0069006e006700200061006600200066006f0072007200650074006e0069006e006700730064006f006b0075006d0065006e007400650072002e0020005000440046002d0064006f006b0075006d0065006e007400650072006e00650020006b0061006e002000e50062006e006500730020006d006500640020004100630072006f0062006100740020006f0067002000520065006100640065007200200035002e00300020006f00670020006e0079006500720065002e> /NLD <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> /ESP <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> /SUO <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> /ITA <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> /NOR <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> /SVE <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> /ENU <FEFF005500730065002000740068006500730065002000730065007400740069006e0067007300200074006f0020006300720065006100740065002000500044004600200064006f00630075006d0065006e007400730020007300750069007400610062006c006500200066006f007200200049004500450045002000580070006c006f00720065002e0020004300720065006100740065006400200031003500200044006500630065006d00620065007200200032003000300033002e> >> >> setdistillerparams << /HWResolution [600 600] /PageSize [612.000 792.000] >> setpagedevice