Virtual paths networks fast performance analysis

Belzarena, Pablo - Bermolen, Paola - Casas, Pedro - Simon, María

Resumen:

The performance analysis of a link is a well studied problem. However, for a service provider the most interesting issue is the end-to-end quality of serv ice (QoS) evaluation. The focus of this work is to go from the link to the network analysis. This can be done in a complete but complex way or using an approximation to speedup the calculations. We analyse an d compare both methods. Large Deviations Theory applications to Data Networks are m ainly based on the many sources as- ymptotic. This asymptotic is adequate for networks like Int ernet backbones, where the assumption that the network is fed by a large number of sources is reasonable. Recently, Ozturk et al. have proposed a slightly different mo del called many sources and small buffer asymptotic. They give a formula to calculate the link overflo w probability and the end-to-end Loss Ratio of traffic streams in a virtual path feed forward network of gen eral topology. They also define the fictitious network concept. The fictitious network has the same topology than th e real one, but each traffic stream goes across a link on its path without being affected by the ups tream links until that one. So, in the fictitious network each internal link can be analysed as an ex ternal one. Therefore, the fictitious network usage simplifies dramatically the network performance anal ysis. Our main motivation to simplify this task is to allow on-line performance analysis and traffic engi- neering algorithms in virtual path networks as MPLS or ATM. Ozturk et al. show that the fictitious network overestimates the overflow probability and the end to end Loss Ratio. Therefore, decisions based on the fictitious network analysis are safe. However, this overestimation leads to network resources under-utilizat ion. Under certain conditions the real and the fictitious network analysis give the same results (there is no overestimation). In this work we establish sufficient cond itions to assure that this coincidence arises. Those conditions are not necessary, and we give an easy way to check if exact results may be obtained even though sufficient conditions are not met. When the real an d fictitious networks analysis give different results, we find a method to bound the overestimation. Finally, we show some numerical examples to compare the perf ormance analysis in the real vs. the fictitious network, and to validate our main results


Detalles Bibliográficos
2004
TELECOMUNICACIONES
Inglés
Universidad de la República
COLIBRI
https://hdl.handle.net/20.500.12008/21268
Acceso abierto
Licencia Creative Commons Atribución – No Comercial – Sin Derivadas (CC - By-NC-ND)
_version_ 1807522895152283648
author Belzarena, Pablo
author2 Bermolen, Paola
Casas, Pedro
Simon, María
author2_role author
author
author
author_facet Belzarena, Pablo
Bermolen, Paola
Casas, Pedro
Simon, María
author_role author
bitstream.checksum.fl_str_mv 6429389a7df7277b72b7924fdc7d47a9
d41d8cd98f00b204e9800998ecf8427e
4afdbb8c545fd630ea7db775da747b2f
d41d8cd98f00b204e9800998ecf8427e
5bcabdd0fcfe7a7e2317f2f80f362e92
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
bitstream.url.fl_str_mv http://localhost:8080/xmlui/bitstream/20.500.12008/21268/5/license.txt
http://localhost:8080/xmlui/bitstream/20.500.12008/21268/2/license_text
http://localhost:8080/xmlui/bitstream/20.500.12008/21268/3/license_url
http://localhost:8080/xmlui/bitstream/20.500.12008/21268/4/license_rdf
http://localhost:8080/xmlui/bitstream/20.500.12008/21268/1/BBCS04.pdf
collection COLIBRI
dc.creator.none.fl_str_mv Belzarena, Pablo
Bermolen, Paola
Casas, Pedro
Simon, María
dc.date.accessioned.none.fl_str_mv 2019-07-03T16:36:17Z
dc.date.available.none.fl_str_mv 2019-07-03T16:36:17Z
dc.date.issued.es.fl_str_mv 2004
dc.date.submitted.es.fl_str_mv 20190703
dc.description.abstract.none.fl_txt_mv The performance analysis of a link is a well studied problem. However, for a service provider the most interesting issue is the end-to-end quality of serv ice (QoS) evaluation. The focus of this work is to go from the link to the network analysis. This can be done in a complete but complex way or using an approximation to speedup the calculations. We analyse an d compare both methods. Large Deviations Theory applications to Data Networks are m ainly based on the many sources as- ymptotic. This asymptotic is adequate for networks like Int ernet backbones, where the assumption that the network is fed by a large number of sources is reasonable. Recently, Ozturk et al. have proposed a slightly different mo del called many sources and small buffer asymptotic. They give a formula to calculate the link overflo w probability and the end-to-end Loss Ratio of traffic streams in a virtual path feed forward network of gen eral topology. They also define the fictitious network concept. The fictitious network has the same topology than th e real one, but each traffic stream goes across a link on its path without being affected by the ups tream links until that one. So, in the fictitious network each internal link can be analysed as an ex ternal one. Therefore, the fictitious network usage simplifies dramatically the network performance anal ysis. Our main motivation to simplify this task is to allow on-line performance analysis and traffic engi- neering algorithms in virtual path networks as MPLS or ATM. Ozturk et al. show that the fictitious network overestimates the overflow probability and the end to end Loss Ratio. Therefore, decisions based on the fictitious network analysis are safe. However, this overestimation leads to network resources under-utilizat ion. Under certain conditions the real and the fictitious network analysis give the same results (there is no overestimation). In this work we establish sufficient cond itions to assure that this coincidence arises. Those conditions are not necessary, and we give an easy way to check if exact results may be obtained even though sufficient conditions are not met. When the real an d fictitious networks analysis give different results, we find a method to bound the overestimation. Finally, we show some numerical examples to compare the perf ormance analysis in the real vs. the fictitious network, and to validate our main results
dc.description.es.fl_txt_mv Publicado en el libro Kouvatsos, Demetres D. (ed.) Mobility Management and Quality-Of-Service for Heterogeneous Networks. New York : River Publishers, 2009. DOI https://doi.org/10.1201/9781003338840
dc.identifier.citation.es.fl_str_mv Belzarena, P, Bermolen, P, Casas, P., Simón, M. Virtual paths networks fast performance analysis. Publicado en: Kouvatsos, Demetres D. (ed.) Mobility Management and Quality-Of-Service for Heterogeneous Networks. New York : River Publishers, 2009. DOI https://doi.org/10.1201/9781003338840
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.12008/21268
dc.language.iso.none.fl_str_mv en
eng
dc.rights.license.none.fl_str_mv Licencia Creative Commons Atribución – No Comercial – Sin Derivadas (CC - By-NC-ND)
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
dc.source.none.fl_str_mv reponame:COLIBRI
instname:Universidad de la República
instacron:Universidad de la República
dc.subject.other.es.fl_str_mv TELECOMUNICACIONES
dc.title.none.fl_str_mv Virtual paths networks fast performance analysis
dc.type.es.fl_str_mv Capítulo de libro
dc.type.none.fl_str_mv info:eu-repo/semantics/bookPart
dc.type.version.none.fl_str_mv info:eu-repo/semantics/publishedVersion
description Publicado en el libro Kouvatsos, Demetres D. (ed.) Mobility Management and Quality-Of-Service for Heterogeneous Networks. New York : River Publishers, 2009. DOI https://doi.org/10.1201/9781003338840
eu_rights_str_mv openAccess
format bookPart
id COLIBRI_e98d663461312f777f493ed4beb3f602
identifier_str_mv Belzarena, P, Bermolen, P, Casas, P., Simón, M. Virtual paths networks fast performance analysis. Publicado en: Kouvatsos, Demetres D. (ed.) Mobility Management and Quality-Of-Service for Heterogeneous Networks. New York : River Publishers, 2009. DOI https://doi.org/10.1201/9781003338840
instacron_str Universidad de la República
institution Universidad de la República
instname_str Universidad de la República
language eng
language_invalid_str_mv en
network_acronym_str COLIBRI
network_name_str COLIBRI
oai_identifier_str oai:colibri.udelar.edu.uy:20.500.12008/21268
publishDate 2004
reponame_str COLIBRI
repository.mail.fl_str_mv mabel.seroubian@seciu.edu.uy
repository.name.fl_str_mv COLIBRI - Universidad de la República
repository_id_str 4771
rights_invalid_str_mv Licencia Creative Commons Atribución – No Comercial – Sin Derivadas (CC - By-NC-ND)
spelling 2019-07-03T16:36:17Z2019-07-03T16:36:17Z200420190703Belzarena, P, Bermolen, P, Casas, P., Simón, M. Virtual paths networks fast performance analysis. Publicado en: Kouvatsos, Demetres D. (ed.) Mobility Management and Quality-Of-Service for Heterogeneous Networks. New York : River Publishers, 2009. DOI https://doi.org/10.1201/9781003338840https://hdl.handle.net/20.500.12008/21268Publicado en el libro Kouvatsos, Demetres D. (ed.) Mobility Management and Quality-Of-Service for Heterogeneous Networks. New York : River Publishers, 2009. DOI https://doi.org/10.1201/9781003338840The performance analysis of a link is a well studied problem. However, for a service provider the most interesting issue is the end-to-end quality of serv ice (QoS) evaluation. The focus of this work is to go from the link to the network analysis. This can be done in a complete but complex way or using an approximation to speedup the calculations. We analyse an d compare both methods. Large Deviations Theory applications to Data Networks are m ainly based on the many sources as- ymptotic. This asymptotic is adequate for networks like Int ernet backbones, where the assumption that the network is fed by a large number of sources is reasonable. Recently, Ozturk et al. have proposed a slightly different mo del called many sources and small buffer asymptotic. They give a formula to calculate the link overflo w probability and the end-to-end Loss Ratio of traffic streams in a virtual path feed forward network of gen eral topology. They also define the fictitious network concept. The fictitious network has the same topology than th e real one, but each traffic stream goes across a link on its path without being affected by the ups tream links until that one. So, in the fictitious network each internal link can be analysed as an ex ternal one. Therefore, the fictitious network usage simplifies dramatically the network performance anal ysis. Our main motivation to simplify this task is to allow on-line performance analysis and traffic engi- neering algorithms in virtual path networks as MPLS or ATM. Ozturk et al. show that the fictitious network overestimates the overflow probability and the end to end Loss Ratio. Therefore, decisions based on the fictitious network analysis are safe. However, this overestimation leads to network resources under-utilizat ion. Under certain conditions the real and the fictitious network analysis give the same results (there is no overestimation). In this work we establish sufficient cond itions to assure that this coincidence arises. Those conditions are not necessary, and we give an easy way to check if exact results may be obtained even though sufficient conditions are not met. When the real an d fictitious networks analysis give different results, we find a method to bound the overestimation. Finally, we show some numerical examples to compare the perf ormance analysis in the real vs. the fictitious network, and to validate our main resultsMade available in DSpace on 2019-07-03T16:36:17Z (GMT). No. of bitstreams: 5 BBCS04.pdf: 220800 bytes, checksum: 5bcabdd0fcfe7a7e2317f2f80f362e92 (MD5) license_text: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) license_url: 49 bytes, checksum: 4afdbb8c545fd630ea7db775da747b2f (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) license.txt: 4267 bytes, checksum: 6429389a7df7277b72b7924fdc7d47a9 (MD5) Previous issue date: 2004enengLas obras depositadas en el Repositorio se rigen por la Ordenanza de los Derechos de la Propiedad Intelectual de la Universidad De La República. (Res. Nº 91 de C.D.C. de 8/III/1994 – D.O. 7/IV/1994) y por la Ordenanza del Repositorio Abierto de la Universidad de la República (Res. Nº 16 de C.D.C. de 07/10/2014)info:eu-repo/semantics/openAccessLicencia Creative Commons Atribución – No Comercial – Sin Derivadas (CC - By-NC-ND)TELECOMUNICACIONESVirtual paths networks fast performance analysisCapítulo de libroinfo:eu-repo/semantics/bookPartinfo:eu-repo/semantics/publishedVersionreponame:COLIBRIinstname:Universidad de la Repúblicainstacron:Universidad de la RepúblicaBelzarena, PabloBermolen, PaolaCasas, PedroSimon, MaríaTelecomunicacionesAnálisis de Redes, Tráfico y Estadísticas de ServiciosLICENSElicense.txttext/plain4267http://localhost:8080/xmlui/bitstream/20.500.12008/21268/5/license.txt6429389a7df7277b72b7924fdc7d47a9MD55CC-LICENSElicense_textapplication/octet-stream0http://localhost:8080/xmlui/bitstream/20.500.12008/21268/2/license_textd41d8cd98f00b204e9800998ecf8427eMD52license_urlapplication/octet-stream49http://localhost:8080/xmlui/bitstream/20.500.12008/21268/3/license_url4afdbb8c545fd630ea7db775da747b2fMD53license_rdfapplication/octet-stream0http://localhost:8080/xmlui/bitstream/20.500.12008/21268/4/license_rdfd41d8cd98f00b204e9800998ecf8427eMD54ORIGINALBBCS04.pdfapplication/pdf220800http://localhost:8080/xmlui/bitstream/20.500.12008/21268/1/BBCS04.pdf5bcabdd0fcfe7a7e2317f2f80f362e92MD5120.500.12008/212682024-07-24 17:25:45.94oai:colibri.udelar.edu.uy:20.500.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Universidadhttps://udelar.edu.uy/https://www.colibri.udelar.edu.uy/oai/requestmabel.seroubian@seciu.edu.uyUruguayopendoar:47712024-07-25T14:33:02.890484COLIBRI - Universidad de la Repúblicafalse
spellingShingle Virtual paths networks fast performance analysis
Belzarena, Pablo
TELECOMUNICACIONES
status_str publishedVersion
title Virtual paths networks fast performance analysis
title_full Virtual paths networks fast performance analysis
title_fullStr Virtual paths networks fast performance analysis
title_full_unstemmed Virtual paths networks fast performance analysis
title_short Virtual paths networks fast performance analysis
title_sort Virtual paths networks fast performance analysis
topic TELECOMUNICACIONES
url https://hdl.handle.net/20.500.12008/21268