53
Admission Control and Scheduling for QoS Guarantees for Variable- Bit-Rate Applications on Wireless Channels I-Hong Hou P.R. Kumar University of Illinois, Urbana-Champaign

I-Hong Hou P.R. Kumar

  • Upload
    keith

  • View
    15

  • Download
    0

Embed Size (px)

DESCRIPTION

Admission Control and Scheduling for QoS Guarantees for Variable-Bit-Rate Applications on Wireless Channels. I-Hong Hou P.R. Kumar. University of Illinois, Urbana-Champaign. Background: Wireless Networks. - PowerPoint PPT Presentation

Citation preview

Page 1: I-Hong Hou P.R. Kumar

Admission Control and Scheduling for QoS Guarantees for Variable-Bit-Rate Applications on Wireless Channels

I-Hong Hou

P.R. Kumar

University of Illinois,

Urbana-Champaign

Page 2: I-Hong Hou P.R. Kumar

Background: Wireless Networks

There will be increasing use of wireless networks for serving traffic with QoS constraints:

VoIP

Video Streaming

Real-time Monitoring

Networked Control

1/30

Page 3: I-Hong Hou P.R. Kumar

Challenges Wireless Network limitation

Non-homogeneous, unreliable wireless links Client QoS requirements

Specified traffic pattern Delay bound Delivery ratio bound Throughput bound

System perspective Fulfill clients with different QoS requirements

2/30

Page 4: I-Hong Hou P.R. Kumar

Goal of the Paper Prior work [Hou, Borkar, and Kumar]:

All clients generate traffic with the same rate Admission control and packet scheduling policies

Q: How to deal with more complicated traffic patterns? Applications with variable-bit-rate (VBR) traffic

MPEG streaming Clients generate traffic with different rates

This work extends results to arbitrary traffic patterns

3/30

Page 5: I-Hong Hou P.R. Kumar

Client-Server Model A system with N wireless clients and one AP Time is slotted One packet transmission in each slot AP schedules all transmissions

4/30

AP1

2

slot length = transmission duration

3

Page 6: I-Hong Hou P.R. Kumar

Channel Model Unreliable, non-homogeneous wireless channels

successful with probability pn

failed with probability 1-pn

p1,p2,…,pN may be different

5/30

AP1

2p1p2

3

p3

Page 7: I-Hong Hou P.R. Kumar

Uplink Protocol Poll (ex. CF-POLL in 802.11 PCF) Data No need for ACK pn = Prob( both Poll/Data are delivered)

6/30

AP1

2p1p2POLL

Data

3

p3

Page 8: I-Hong Hou P.R. Kumar

Downlink Protocol Data ACK pn = Prob( both Data/ACK are delivered)

7/30

AP1

2p1p2Data

ACK

3

p3

Page 9: I-Hong Hou P.R. Kumar

Traffic Model Group time slots into intervals with τ time slots Clients may generate packets at the beginning of

each interval

8/30

AP1

2

3

p1p2

p3

τ{1,.,3}

{1,.,3}

{1,.,3} {.,2,.}

{.,2,.}

{.,2,.}

{1,2,3}

{1,2,3}

{1,2,3}

Page 10: I-Hong Hou P.R. Kumar

Delay Bound Deadline = Interval Packets are dropped if not delivered by the deadline Delay of successful delivered packet is at most τ

9/30

AP1

2

3

p1p2

p3

{1,.,3}

{1,.,3}

{1,.,3} {.,2,.}

{.,2,.}

{.,2,.}

{1,2,3}

{1,2,3}

{1,2,3}

τ

arrival deadline

Page 11: I-Hong Hou P.R. Kumar

S I

Packet Scheduling

10/30

AP1

2

3

p1p2

p3

SF

F

I

forced idleness{1,.,3}

{1,.,3}

{1,.,3} {.,2,.}

{.,2,.}

{.,2,.}

{1,2,3}

{1,2,3}

{1,2,3}

dropped

Page 12: I-Hong Hou P.R. Kumar

S I

Timely Throughput Timely throughput = avg. # of

delivered packets per interval

11/30

AP1

2

3

p1p2

p3

SF

F

I

Client # Throughput

1 0

2 0.5

3 0.5

{1,.,3}

{1,.,3}

{1,.,3} {.,2,.}

{.,2,.}

{.,2,.}

{1,2,3}

{1,2,3}

{1,2,3}

Page 13: I-Hong Hou P.R. Kumar

S I

Packet Arrivals Distribution of packet

arrivals is specified

12/30

AP1

2

3

p1p2

p3

SF

F

I

{1,.,3}

{1,.,3}

{1,.,3} {.,2,.}

{.,2,.}

{.,2,.}

{1,2,3}

{1,2,3}

{1,2,3}

Arrival Proportion of Occurrences

{1,3} 1/3

{2} 1/3

{1,2,3} 1/3

Page 14: I-Hong Hou P.R. Kumar

S I

QoS Requirements Client n requires timely throughput qn

Delivery ratio requirement of client n

= qn /{arrival prob. of client n}

13/30

AP1

2

3

p1p2

p3

SF

F

I

{1,.,3}

{1,.,3}

{1,.,3} {.,2,.}

{.,2,.}

{.,2,.}

{1,2,3}

{1,2,3}

{1,2,3}

Client # Delivery ratio

1 0

2 1

3 1

Page 15: I-Hong Hou P.R. Kumar

Problem Formulation Admission control

Given τ, packet arrivals, pn, qn, decide whether a set of clients is feasible

Scheduling policy Design a policy that fulfills every feasible set of

clients

14/30

Page 16: I-Hong Hou P.R. Kumar

The proportion of time slots needed for client n is

Work Load

1 nn

n

qw

p

15/30

Page 17: I-Hong Hou P.R. Kumar

The proportion of time slots needed for client n is

Work Load

1 nn

n

qw

p

15/30

expected number of time slots needed for a successful transmission

Page 18: I-Hong Hou P.R. Kumar

The proportion of time slots needed for client n is

Work Load

1 nn

n

qw

p

15/30

number of required successful transmissions in an interval

Page 19: I-Hong Hou P.R. Kumar

The proportion of time slots needed for client n is

Work Load

1 nn

n

qw

p

15/30

normalize by interval length

Page 20: I-Hong Hou P.R. Kumar

The proportion of time slots needed for client n is

We call wn the “work load”

Work Load

15/30

1 nn

n

qw

p

Page 21: I-Hong Hou P.R. Kumar

S I

Necessary Condition for Feasibility Necessary condition from classical queuing theory: But the condition is not sufficient Packet drops by deadline misses cause more idleness than in

queuing theory

16/30

AP1

2

3

p1p2

p3

SF

F

I

11

N

nnw

{1,.,3}

{1,.,3}

{1,.,3} {.,2,.}

{.,2,.}

{.,2,.}

{1,2,3}

{1,2,3}

{1,2,3}

Page 22: I-Hong Hou P.R. Kumar

Stronger Necessary Condition Let IS = Expected proportion of the idle time when

the server only works on S IS decreases as S increases

Theorem: the condition is both necessary and sufficient

Admission control checks the condition

1, {1,2,..., }n Sn S

w I S N

17/30

Page 23: I-Hong Hou P.R. Kumar

Largest Debt First Scheduling Policies

Give higher priority to client with higher “debt”

18/30

AP1

2

3

p1p2

p3

{1,2,3}

{1,2,3}

{1,2,3}F F S

F S

F

Page 24: I-Hong Hou P.R. Kumar

Two Definitions of Debt The time debt of client n

time debt = wn – actual proportion of transmission time given to client n

The weighted delivery debt of client n weighted delivery debt = (qn – actual timely throughput)/pn

Theorem: Both largest debt first policies fulfill every feasible set of clients Feasibility Optimal Policies

19/30

Page 25: I-Hong Hou P.R. Kumar

Evaluation Methodology

Evaluate five policies: DCF Enhanced DCF (EDCF) by 802.11e PCF with randomly assigned priorities (random) Time debt first policy Weighted-delivery debt first policy

Metric: Shortfall in Timely Throughput

20/30

Page 26: I-Hong Hou P.R. Kumar

Evaluated Applications VoIP

Generate packets periodically Duplex traffic Clients may generate packets by different period

MPEG Generate packets probabilistically Only downstream traffic Clients may generate packets by different probability

21/30

Page 27: I-Hong Hou P.R. Kumar

VoIP Traffic ITU-T G.729.1

Bit rates between 8 kb/s to 32 kb/s Different bit rates correspond to different periods

8kb/s – 32 kb/s bit rates 20 ms interval length

160 Byte packet 11 Mb/s transmission rate

610 μs time slot 32 time slots in an interval

22/30

Page 28: I-Hong Hou P.R. Kumar

VoIP Clients Two groups of clients:

Feasible set: 6 group A clients, 5 group B clients Infeasible set: 6 group A clients, 6 group B clients

Group A Group B

60 ms (3 intervals) period 40 ms (2 intervals) period

21.3 kb/s traffic 32 kb/s traffic

require 99% delivery ratio require 80% delivery ratio

Starting times evenly spaced

Channel reliabilities range from 61% to 67%

23/30

Page 29: I-Hong Hou P.R. Kumar

VoIP Results: A Feasible Set

24/30

0

1

2

3

4

5

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut Weighted-

delivery

Page 30: I-Hong Hou P.R. Kumar

0

1

2

3

4

5

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut Weighted-

delivery

Time-based

VoIP Results: A Feasible Set

fulfilled

24/30

Page 31: I-Hong Hou P.R. Kumar

VoIP Results: A Feasible Set

24/30

0

1

2

3

4

5

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut Weighted-

delivery

Time-based

Random

Page 32: I-Hong Hou P.R. Kumar

VoIP Results: A Feasible Set

24/30

0

1

2

3

4

5

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut Weighted-

delivery

Time-based

Random

DCF

Page 33: I-Hong Hou P.R. Kumar

VoIP Results: A Feasible Set

24/30

0

1

2

3

4

5

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut Weighted-

delivery

Time-based

Random

DCF

EDCF

Page 34: I-Hong Hou P.R. Kumar

VoIP Results: An Infeasible Set

25/30

0

1

2

3

4

5

6

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut

Weighted-delivery

Page 35: I-Hong Hou P.R. Kumar

0

1

2

3

4

5

6

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut

Weighted-delivery

Time-based

VoIP Results: An Infeasible Set

small shortfall

25/30

Page 36: I-Hong Hou P.R. Kumar

VoIP Results: An Infeasible Set

25/30

0

1

2

3

4

5

6

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut

Weighted-delivery

Time-based

Random

Page 37: I-Hong Hou P.R. Kumar

VoIP Results: An Infeasible Set

25/30

0

1

2

3

4

5

6

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut

Weighted-delivery

Time-based

Random

DCF

Page 38: I-Hong Hou P.R. Kumar

VoIP Results: An Infeasible Set

25/30

0

1

2

3

4

5

6

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut

Weighted-delivery

Time-based

Random

DCF

EDCF

Page 39: I-Hong Hou P.R. Kumar

MPEG Traffic Model MPEG VBR traffic by a Markov chain

consisting of three activity states (Martin et al)

MAC: 802.11a

6 ms interval length 1500 Bytes packet

54 Mb/s transmission rate 9 time slots in an interval

Activity Great High Regular

Arrival probability 1 0.8 0.75

26/30

Page 40: I-Hong Hou P.R. Kumar

MPEG Clients Two groups of clients

Group A generates traffic according to Martin et al and requires 90% delivery ratio

Group B generates traffic half as often as A and requires 80% delivery ratio

The nth client in each group has (60+n)% channel reliability

Feasible set: 4 group A clients, 4 group B clients Infeasible set: 5 group A clients, 4 group B clients

27/30

Page 41: I-Hong Hou P.R. Kumar

MPEG Results: A Feasible Set

28/30

0

0.2

0.4

0.6

0.8

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut Weighted-

delivery

Page 42: I-Hong Hou P.R. Kumar

0

0.2

0.4

0.6

0.8

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut Weighted-

delivery

Time-based

MPEG Results: A Feasible Set

fulfilled

28/30

Page 43: I-Hong Hou P.R. Kumar

MPEG Results: A Feasible Set

28/30

0

0.2

0.4

0.6

0.8

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut Weighted-

delivery

Time-based

Random

Page 44: I-Hong Hou P.R. Kumar

MPEG Results: A Feasible Set

28/30

0

0.2

0.4

0.6

0.8

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut Weighted-

delivery

Time-based

Random

DCF

Page 45: I-Hong Hou P.R. Kumar

MPEG Results: A Feasible Set

28/30

0

0.2

0.4

0.6

0.8

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut Weighted-

delivery

Time-based

Random

DCF

EDCF

Page 46: I-Hong Hou P.R. Kumar

MPEG Results: An Infeasible Set

29/30

0

0.2

0.4

0.6

0.8

1

1.2

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut

Weighted-delivery

Page 47: I-Hong Hou P.R. Kumar

0

0.2

0.4

0.6

0.8

1

1.2

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut

Weighted-delivery

Time-based

MPEG Results: An Infeasible Set

small shortfall

29/30

Page 48: I-Hong Hou P.R. Kumar

MPEG Results: An Infeasible Set

29/30

0

0.2

0.4

0.6

0.8

1

1.2

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut

Weighted-delivery

Time-based

Random

Page 49: I-Hong Hou P.R. Kumar

MPEG Results: An Infeasible Set

29/30

0

0.2

0.4

0.6

0.8

1

1.2

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut

Weighted-delivery

Time-based

Random

DCF

Page 50: I-Hong Hou P.R. Kumar

MPEG Results: An Infeasible Set

29/30

0

0.2

0.4

0.6

0.8

1

1.2

0 1 2 3 4 5 6

Time (sec)

Sh

ort

fall

in T

imel

y T

hro

ug

hp

ut

Weighted-delivery

Time-based

Random

DCF

EDCF

Page 51: I-Hong Hou P.R. Kumar

Conclusion Extend a framework for QoS to deal with traffic

patterns, deadlines, throughputs, delivery ratios, and channel unreliabilities

Characterize when QoS is feasible

Provide efficient scheduling policies

Address implementation issues

30/30

Page 52: I-Hong Hou P.R. Kumar
Page 53: I-Hong Hou P.R. Kumar

Backup Slides An example:

Two clients, τ = 3 p1=p2=0.5 q1=0.876, q2=0.45 w1=1.76/3, w2=0.3 I{1}=I{2}=1.25/3, I{1,2}=0.25/3

w1+I{1}=3.01/3 > 1 However, w1+w2+I{1,2}=2.91/3 < 1