Modeling of Measurement Based Admission Control

advertisement
Modeling of Measurement-Based Admission Control Algorithm Using OPNET
A. Asars1, M. Kulikovs2, E. Petersons3
1
TET Department, ETF Faculty, RTU
Riga, Lomonosova str. 1, LV-1019, E-Mail: a.asars@inbox.lv
2
TET Department, ETF Faculty, RTU
Riga, Lomonosova str. 1, LV-1019, E-Mail: mike@dimir.lv
3
TET Department, ETF Faculty, RTU
Riga, Lomonosova str. 1, LV-1019, E-Mail: ernests.petersons@rtu.lv
The present paper aim was to analyze effectiveness of admission
control algorithm in the environment with self-similar traffic.
For this purpose we introduced the model of measurement based
admission control (MBAC) algorithm of network node. Decision
making process in the MBAC algorithm is based on the analysis
of input flow and anticipate the impact of new connection on the
whole system performance. The results of entropy analysis
approach are used to link measurements to the forecasting model
of network node performance.
Our simulation results show that by using classical methods
methods to avoid buffer overflow are not suitable for self-similar
traffic.
Keywords: QoS, measurement-based admission control,
performance evaluation.
I. INTRODUCTION
Real network systems have limited capacity, limited
bandwidth and quality. Total performance of a system can
be increased by means of Quality of Service (QoS)
mechanism. QoS can provide different priorities to different
users or groups of users, as well as for different kinds of
data flow, e.g. VoIP or WWW. In order provide such
service the mechanism should have two main
functionalities. The ability of the mechanism to estimate the
level of QoS that a new user session will need. And the
ability to confirm that there is enough bandwidth available
to service the session.
It means that there will be a competition among
sessions and flows for network bandwidth. The mechanism
that manages the decision whether a new connection should
be admitted to network or not is called “admission control”.
The easiest admission control method is to serve flows
basing on arrival time.
An alternative is parameters-based admission
control where decision is being made taking into account
the parameters of the traffic. A well known parameter-based
admission control is measurement-based admission control
(MBAC) which makes decision based on parameters
obtained from existing traffic measuring. Every MBAC
consists of two components: a measurement procedure and
an admission decision algorithm. The measurement
procedure should be designed taking into account two
principles. Firstly, the procedure should measure traffic as
often as possible to have enough data to make the right
decision. Secondly, the measurements should not overload
the system with themselves.
Different algorithms were presented in previous works.
The aim of the present work is first, to express MBAC
admission controls method in terms of OPNET simulation
tool. And the second aim is the evaluation of the efficiency
of MBAC algorithms in two scenarios, e.g. data flow with
Poisson and self-similar characteristics. The paper presents
the evaluation of the admission decision algorithm, based
on buffer overflow probability for GI/M/1 model. The
evaluation is done based on the OPNET simulation results.
The chapter of theoretical background describes
the OPNET model that is studied in the paper. It consists
of four sections: description of the model, description of
the traffic generator in terms of OPNET model, description
of parameters. The last section in the chapter presents the
description of MBAC model used in the paper. Moreover,
the section presents the MBAC model in terms of the
OPNET.
Further, the results gained during the simulation
for Poisson and self-similar data flow are presented. We
use simulation on several network scenarios, with and
without admission control.
The discussion and analysis of the results,
conclusion and our vision of further possibilities for
studies of a current problem are presented in the final part
the paper.
II. Theoretical Background
A. Description of The Model.
In the present paper we evaluate algorithm
effectiveness for an admission control for different types of
data flow using OPNET software tool. Admission control,
presented in this paper, is applied for two types of data
flow, Poisson and self-similar. The Poisson data flow is
modeled based on the assumption that the size of packets
and interarrival time are distributed by exponential
distribution low. The self-similar data flow is modeled
based on assumption that packet size and interarrival time
are distributed by Pareto distribution law.
Data flow model that is used in the paper is the
following. In the paper we have four data flow generators.
Each data flow consists of, so called, sessions. The session
is the batch of packets with predefined average arrival
intensity (λ). Different sessions of the one data flow
generator can have different λ. In our model of the
measurement-based admission control the parameter λ is
used to make decision grant or devote a new session
connection. The algorithm is described in the following part.
B. Traffic Generator.
The data flow generator consists of tree units. It gives us
flexibility to simulate different types of data. These nodes in
some sense are similar to simplified OSI model and
correspond to different layers. At the Fig.1 a simplified
network model, in terms of OPNET, is presented.
admission control (AC) mechanism is represented there.
This model presents a well known model, called M/M/1.
The model consists of four data generators,
network buffer and a data channel. Network queue (the
queue unit) and network (processor unit) are depicted on
Fig.1.
a)
b)
L(x)=pdf
c)
λ= pdf
Fig. 2. Data flow creation method in OPNET. a) file creation; b) data
packets creation; 3) data packet with delays
Fig. 1. The network model without admission control
The first unit of the data flow generator is a
processor unit that is responsible for a session creation. The
unit generates a big data array, for instance, the file. That is
why the name of the unit was chosen as “file_generator”. At
the Fig.1 it is the first unit in the row. The file size, in terms
of this paper, is one of the parameters that define the
duration of the session. The size of the file can be generated
using different distribution laws. In our model for file
generation we used exponential distribution law with 10240
mean values.
After the file is generated, it flows through packet
creator unit. In terms of OPNET this unit is presented with
processor. The unit divides the file for packets. Packet size
distributed based on the distribution law and is promoted to
process node from the higher layer – network node. In the
model two different distribution lows for size of the packets
we promoted. We used exponential and Pareto distributions.
The last unit in the data flow generator is packet
queue. This unit, in terms of OPNET is presented as a queue
and adds the delay between the packets. The delay between
the packets is defined in the same way as the size of the
packet, i.e. is promoted from higher level. The delay
between two packets in OPNET is implemented as service
time that the first packet spent in the queue to be treated.
The Fig. 2 presents an instance of the output of the
data flow generator. It presents the file, generated by
file_generator unit. The Fig. 2 b. presents the job of the
packet creator unit. At the bottom of the Fig. 2 the delays
between the packets that add a packet queue unit are shown.
To compare efficiency of the algorithm, two
models of the network were used. Returning to the Fig.1, it
is seen, that the simplified model of the network without
There are two big differences in our model
between packet queue and network queue units. The packet
queue is implemented as an infinite size queue, while
network queue is designed as a queue with limited packets
capacity. Such a difference can be logically explained.
Packet queue represents the client side of transaction,
where information before transaction can be stored in any
kind of storages. The network_queue represents network
equipment, where there is only one kind of storage place.
Usually, the client side has much more storage capacity
than network equipment. That is why infinite and finite
models of the queue were chosen.
The second difference between queues is the
following. The service rate parameter for the
network_queue unit is the constant value, while service
rate of packet_queue unit is defined by distribution law
which depends on the kind of simulated traffic (either
Poisson or self-similar traffic).
In this part of the present paper the model
structure was described in terms and notation of OPNET
simulation software. It was shown, how M/M/1 model cam
be simulated using OPNET. In the following parts we
describe the parameters for the model.
C. Description of Parameters
As it was mentioned above the model should be flexible
and scalable. The model should be designed so that it could
be used within bigger models, collaborate with other
models and with different kinds of scenarios.
The model was designed according to the rule
mentioned above. Units of the model are supposed to get
parameters from the higher level of abstraction. This
principle is implemented in the model using a build-in
functionality, which is called promote parameters.
The example of the model could be as the
following. The model should simulate two different kinds
of traffic: Poisson and self-similar. It means that two
different distribution laws need to be used. There are two
possibilities. The first one is a direct definition of the
distribution law for each unit within model domain. It
means that the distribution law of the packet_generator
unit, described in the previous part of the chapter, should
be defined in the node domain. And what is worse, that
parameters of the packet_queue should be changed in the
process domain. Does this approach provide us with
comfortable work? Does it satisfy the rules mentioned in the
first paragraph? There could be some scenarios where there
is no other possibility than direct definition of the
parameters for the units. In all other cases the second
approach should be used.
The second approach to define parameters for the
units is the promotion of parameters from the higher level of
the model abstraction to the lower one. It means that as
much as possible parameters should be defined in the
network domain of the model. Units, defined in the model
before the simulation, get the necessary parameters from the
higher level of the abstraction. For the model described
above it means that the packet_generator processor would
divide the file according to the distribution law. i.e. it will
receive from the network domain. In the same way the
packet_queue would get definition of the distribution for
making delays between packets and would transfer the
definition to process domain of the packet_queue unit.
Such a promotion of the parameters provides the
model with greater flexibility and gives an opportunity to
use this model for the other bigger, more difficult models
and scenarios.
An example of parameters promotion is presented
on Fig 3. At the Fig. 3.a. promoted parameters for the
Poisson data flow simulation are shown. For simulation of
the Poisson data flow the size of the transferred packets are
defined by exponential distribution with the mean value of
512 bit. At the figure such a definition is represented by the
attribute “packet_creator.Packet Size” and the value
“exponential (512)”. Another necessary requirement for
Poisson data flow simulation is that the delays between two
packets should be distributed according to exponential
distribution law. The Fig 3.a. presents the promotion of
exponential distribution for the delays with the mean value
if
the
delay
equals
6600.
An
attribute
“packet_queue.Service Rate” and the value “exponential
(6600)” promote delays parameters to the packet_queue
unit.
flow, simulated and presented in the paper, with selfsimilar characteristic has the following parameters. Packet
size is distributed according to Pareto distribution size. The
delay between two packets was defined according to Pareto
distribution law.
As we mentioned above, for self-similar traffic
simulation the Pareto distribution law is used. The Pareto
distribution has two parameters for the definition. They are
α – the shape parameter and κ - the parameter referred to a
scale. The Pareto distribution is used in application to the
self-similar traffic model description because one of the
properties of the Pareto distribution is one of the most
common heavy-tailed distributions. And the self-similar
traffic has heavy-tailed characteristic and can be modeled
with a heavy-tailed distribution. Informally, self-similar
traffic means that the shape of the traffic is invariant with
respect to the time scale.
Fig. 3b. Parameters promotion for self-similar data flow simulation.
The model, described in the paper, for the self-similar
traffic description uses the following parameters. These
parameters are represented on Fig. 3, b. and are the
following. For the creation of the packet Pareto distribution
with κ–512 and α–128 is used. And for the delay providing
between packets Pareto distribution with κ–512 and α–128
is used.
C. MBAC Algorithm
Fig. 3a. Parameters promotion for Poisson data flow simulation.
The Fig. 3, b. represents promotion of the
parameters for self-similar data flow simulation. The data
As we discussed before, the main idea of the model
presented in the paper is evaluation of the buffer overflow
for Poisson and self-similar traffic. The evaluation consists
of two scenarios. In the first scenario the traditional
network model is used for the simulation. While the
second scenario supposes to have admission control
mechanism for decreasing buffer overflows probability.
This part presents the algorithm of the admission
control mechanisms. It is important to emphasize that the
admission control mechanism described in the paper is
measurement-based admission control. The paper presents
the simpliest measurement admission control algorithm. It
was used as a first step to find out how do self-similar
characteristics of the traffic impact on the buffer overflow.
Taking into account that the simplest measurementbased admission control is going to be implemented, the
algorithm of the traffic measurement was not used.
Measurements of the traffic intensity are simply recorded
every five time units and in terms of admission decision
correspond to the real current traffic intensity ( current ).
The theoretical session intensity (  new _ sesion ) is
defined during packet creation procedure and is used by
admission control mechanism for making a decision. If the
acceptance of the new session influences the total traffic in
the way such a threshold of the decision border is lower
than the defined one, the new connection will be accepted.
Otherwise it will be rejected.
An algorithm of making the decision, used in the
paper, is the following. The total intensity 
of traffic
 - interarrival intensity;  - service intensity; 
– utilization;  k – probability, that there are exactly „k”
where
jobs in the system.
In the term of the admission control mechanism, if
the probability, that there are exactly K jobs, where K
equal to the size of buffer, is higher than 0.7 a new
connection establishment will be rejected.
For the simulation and effectiveness evaluation of
this method the following model is introduced. In the Fig.
4. the OPNET model of the network with AC is shown. As
you can see, there is addition node comparing to usual
network model presented in Fig.1. This node is called AC.
Exactly this node realizes the admission control
mechanism.

equals the sum of the real intensity of the traffic
current
and a traffic intensity of the new session  new _ sesion :


 current  new _ sesion
In the paper a threshold of the new connection acceptance is
based on buffer overflow probability. It means that
admission control mechanism will accept a new connection
if the buffer overflows probability with intensity of the
traffic equals to 
will be lower that defined level. In

the paper the level of acceptance based buffer overflows
probability is 0.7. It means that a new connection will be
established only if the probability of buffer overflow is
smaller that 0.7, otherwise the connection will not be
established.
The well known algorithm for buffer overflow probability
calculation is defined by M/M/1/K model. In the model,
described in the paper, admission decision is taken based on
this buffer overflow probability calculation method. In
M/M/1/K model first M means that interarrival time
distributed according to exponential distribution law. The
second M means that service time correspond to exponential
distribution also. 1 in the model description means that we
have a single server. K in the mentioned notation means that
the system can handle only K jobs. This corresponds to the
limited buffer with length of K cells. It is clear seen that the
Fig.1 represents exactly M/M/1/K model. The limitation of
the buffer means, that if there are already „k” jobs in the
queue, the next job will be rejected and the buffer overflow
counter increases.
In the [8] the steady-state probabilities that in the
system are exactly K jobs are obtained and can be written as
follow:
k

  
 k   0     1     

  
or
k
 k  1      k ,
Fig. 4. The model of a network infrastructure with admission control
mechanism.
In the Fig. 4. there are represented two
communication links between dataflow generator and
admission control unit. The communication link from
packet generator to AC node can send two types of the
packets. Before the establishment of a new connection
packet generator sends defined intensity of the flow as an
acknowledgment packet. Receiving the packet to establish
a new connection, AC node calculates current probability
of the overflow. If the probability is less or equal to
defined so, the connection will be established and AC node
sends a packet to packet generator with acceptance of the
session. Otherwise, the connection will be rejected, and
AC node sends rejection packets and initiator of the
session should wait another moment to try to establish the
communication session.
To create an admission control node it was
necessary to define a new object – process. For definition
of the process in OPNET process node is used. Any
process in OPNET is defined by Final State Machine
(FSM). OPNET has two defined kind of state. They are
forced and unforced states. An unforced state is one that
returns control of the simulation to the Simulation Kernel
after executing its entering executives. A forced state is
one that does not return control, but instead immediately
executes the exit executives and transitions to another
state.
The Fig. 5 presents the AC node defined in OPNET
with FSM notations. Green states correspond to forced
states, while red one corresponds to unforced states.
7
6
5
4
3
2
1
3492
3276
3060
2844
2628
2412
2196
1980
1764
1548
1332
900
1116
684
468
36
252
0
Fig. 6b line) the buffer overflow in Poisson data flow in logarithmic
scale; discreet line) buffer overflow in self-similar data flow logarithmic
scale.
B. Buffer Overflow with Admission Control
Fig. 5. AC node definition by FSM notation
In the following chapter results analyze of the described
admission control mechanism are presented.
IV. RESULTS
Statistics about rejected packet was collected using OPNET
software for the Poisson and self-similar traffic. Based on
the results some analysis of admission control efficiency is
given. The first part presents the data for the model without
admission control, while the second part presents buffer
overflow statistics with admission control mechanism.
A. Buffer Overflow without Admission Control
In Fig. 6 charts of the buffer overflow with Poisson and
Self-Similar data flow are presented. Fig. 6.a presents the
buffer overflow chart using a normal scale, while Fig. 6, b
presents the same data using logarithmic scale.
The continuous line shows buffer overflow in Poisson data
flow and the dashed line shows buffer overflow in selfsimilar data flow. As you can see, buffer overflow in selfsimilar traffic if much higher than in case of Poisson traffic.
600000
500000
The Fig. 7 presents buffer overflow statistics. For the vivid
in the chart statistic for both scenarios (with and without
admission control) are presented. Fig. 7, a presents charts
in normal scale, while Fig. 7, b presents in logarithmic
scale.
In the figure, the continuous lines present buffer
overflow for scenario with admission control. The dashed
lines correspond to buffer overflow for scenario without
admission control.
Using the graph it is clearly seen, that the
admission control mechanisms, which was presented in the
paper, gives good result and decreases the number of
rejected packet. The numbers of rejected packets without
and with admission control differ approximately for 20%.
C. Analysis
An advantage of the simplest admission control
mechanism is around 20%. It means that the efficiency of
the admission control algorithm based on traditional model
for the buffer overflow probability shows good result for
both Poisson and self-similar traffic. On the other side, it is
still not enough to reduce buffer overflow to accepted
level.
V. CONCLUSIONS
400000
300000
200000
100000
3492
3276
3060
2844
2628
2412
2196
1980
1764
1548
1332
900
1116
684
468
36
252
0
Fig. 6a line) the buffer overflow in Poisson data flow; discreet line) buffer
overflow in self-similar data flow.
The Fig. 6 specifies that self-similar traffic with heavytailed characteristics of the traffic has great impact on
network parameters, e.g. buffer overflow.
The paper presents an example of the data flow simulation
based on OPNET software tool. Two types of data flow
were simulated. They are Poisson and self-similar data
flows. The buffer overflow dependence on the traffic
characteristic is presented in the paper. It is shown that
heavy-tailed characteristics of the self-similar traffic have
crucial influence of the network parameters, e.g. buffer
overflow. Traditional network models are using
assumption that traffic has to be Poisson-like traffic. The
current paper presents uselessness of the traditional model
for the meantime traffic description.
Simulation of the measurement-based admission
control mechanism, based on buffer overflow probability
calculation algorithm presented in the paper. For the
simulation of the admission control OPNET software was
used. Uselessness of the traditional models, constant
growing variety and difficulty of the network protocols push
to use simulation software for network researches and
development.
7
6
5
4
3
2
1
3492
3276
3060
2844
2628
2412
2196
1980
1764
1548
1332
900
1116
684
468
36
252
0
Fig. 7. Continuous line corresponds to scenario with AC. Dashed lines
correspond to scenario without AC. The two lines on the bottom
correspond to Poisson data flow. The two lines on the top correspond to
self-similar data flow.
VI. FUTHER WORK
The current paper presents the evaluation of the simplest
admission control mechanism. Extension of the admission
control algorithms is the future work. There are two
directions that should be improved. The traffic measurement
algorithm should be traffic dependent. It means, that the
algorithm should be able to analyze the characteristics of the
traffic and to provide optimal measurements of the traffic
based on these parameters. The same algorithm should
provide information about the optimal quantity of
information that is necessary to collect for traffic analyze
and prediction.
The second direction is the development of the
effective decision making algorithm for the admission
control.
REFERENCES
[1] Nong Ye., Toni Farley and Dipti Aswath,
APPLICATION
OF
MAXIMUM
ENTROPY
TECHNIQUE FOR PERFORMING NETWORK NODES
IN SELF-SIMILAR TRAFFIC ENVIRONMENT
[2]Asars A., Petersons E. A “Maximum Entropy Analysis of
Self-Similar Data Flow”, Scientific Proceedings of Riga
Technical University in series 7: "Telecommunications and
Electronics", vol. 3, 2003.
[3]Asars A., Petersons E. A Maximum Entropy Analysis of
Single Server queuing system with self-similar input
traffic// Scientific Proceedings of Riga Technical University
in series: "Telecommunications and Electronics". - 2002. vol. 2.
[4]Asars A., Petersons E. Analysis of Performance of
Queuing system with Self-Similar input traffic, using
Maximum Entropy Approach traffic// Proceedings of the
International Conference "Modern Mathematical Methods
of Analysis and Optimization of Telecommunication
Networks". - September, 2003.
[5]Asars A., Petersons E. Informational Theory Approach
for Studying Self-Similar Traffic// Proceedings of the
International Conference "Modern Mathematical Methods
of Analysis and Optimization of Telecommunication
Networks" -February, 2005.
[6]Asars A., Petersons E. Self-Similar Traffic Control,
Using Maximum Entropy Approach// Submitted to
publication in Scientific Proceedings of Riga Technical
University in series: "Telecommunications and
Electronics". - 2005.
[8] M.Aramudhan & V.Rhymend Uthaiaraj, Admission
Control Schemes for Web Server Models and its
Timeliness Performance
[10] Lee Breslau Edward W. Knightly, Scott Shenker Ion
Stoica, Hui Zhang, and Endpoint Admission Control:
Architectural Issues and Performance
[11] Harrick M. Vin, Pawan Goyal, Alok Goyal, and
Anshuman Goyal: A Statistical Admission Control
Algorithm for Multimedia Server
[12] Kun Wu, Yan Ma, and Ljiljana Trajkovic, OPNET
Implementation of Endpoint Admission Control
Algorithms
[13] E. Lerzan Ormeci, Apostolos Burnetas, Admission
control with batch arrivals
[14] Gunter Bolch, Stefan Greiner, Hermann de Meer,
Kishor S. Trivedi, Queueing Networks and Markov Chains
[11] Xinjie Chang, NETWORK SIMULATIONS WITH
OPNET
[14] HIROYUKI MASUYAMA and TETSUYA TAKINE,
Analysis of an Infinite-Server Queue with Batch
Markovian Arrival Streams
[15] Nawaporn Wisitpongphan, Jon M. Peha, Effect of
TCP on Self-Similarity of Network Traffic
[17] Raghuveer Rao and Seungsin Lee, Self-similar
Network Traffic Characterization through Linear ScaleInvariant System Models
[19] Jing WU, Jian MA, Shiduan CHENG, Modeling and
Simulation of New TCP Traffic Control Method by
OPNET
Download