Chapter 6 Telephone - Traffic
Chapter 6 Telephone - Traffic
Telephone Traffic
6.1 Network Traffic load and parameters
6.4 Routing
Time
Looking at call arrivals
» Average call interval Call Arrivals/Interval
(I=2sec/call)
» Number of calls per unit 1 min Interval
Available tools:
» Mathematical tools
– Equations and formulas / Statistical tools
» Simulation tools
What is Blocking?
Call
Calls arriving Blocked
randomly ! No
Blocking
Call !
Center Trunk Call Duration
Trunk
We need to figure out statistically Call
what the probability of blocking is! Center
What is the grade of service! Trunk
The challenge
Traffic Model Tool
Calls arrive randomly
All calls are independent
Traffic models
» Idea: telephone usage and sizing the network
» Difference: What to do when blocking happens
» Objective: calculate the Grade of Service (GOS)
– If GOS is 0.01 (P.01) 1 call will be blocked out of 100 attempted calls!
– Defined formally as the number of lost calls over offered calls
Two common models
» Erlang C
– Call arrival behavior follows a Poisson distribution
– blocked calls may be retried at anytime
» Erlang B Model
– When a call is blocked it is cleared and will only be tried later
– The load does not consider blocked calls
Traffic Characteristics
It is all about sharing effectively:
» Telephone traffic is the aggregate of
telephone calls over a group of circuits or
trunks with regard of the number and
duration of calls.
Units:
» Call arrival rate / hour (A) Switch 1 Switch 2
500 Users 500 Users
» Average service time or hold time (tm) /
hour Trunks
busy”:
PBlocking s s! k
» E is the mean of the offered traffic E
[Erlangs], s is the number of trunks
k 0 k!
Using Erlang B Formula
Example: Suppose our expected Trunks P=0.001 P=0.005 P=0.01 P=0.05
traffic in the busy hour is 10 erlangs 1 .001 .005 .01 .05
A birth-death process is a
continuous-time stochastic
process for which the
system’s state at any time
is a nonnegative integer.
subsequently use birth-death processes to answer
questions about several different types of queuing
systems.
define the number of people present in any queuing
system at time t to be the state of the queuing
systems at time t.
πi the steady state, or equilibrium probability, of
state i.
The behavior of Pij(t) before the steady state is
reached is called the transient behavior of the
queuing system.
The User Datagram Protocol (UDP) is one of the
core members of the Internet protocol suite (the set
of network protocols used for the Internet). With
UDP, computer applications can send messages, in
this case referred to as datagrams, to other hosts
on an Internet Protocol (IP) network without prior
communications to set up special transmission
channels or data paths. The protocol was designed
by David P. Reed in 1980 and formally defined
in RFC 768.
For Poisson processes the property is often
referred to as the PASTA property (Poisson
Arrivals See Time Averages) and states that the
probability of the state as seen by an outside
random observer is the same as the probability
of the state seen by an arriving customer. The
property also holds for the case of a doubly
stochastic Poisson process where the rate
parameter is allowed to vary depending on the
state.
In probability theory, a Cox process, also
known as a doubly stochastic Poisson
process or mixed Poisson process, is a
stochastic process which is a generalization
of a Poisson process where the time-
dependent intensity λ(t) is itself a stochastic
process. The process is named after
the statistician David Cox, who first published
the model in 1955
Queuing system
Customer Departure of
arrivals served customers
Departure of impatient
customers
• Service time
• Service discipline
• Service capacity
• If the arrivals are grouped in lots, use the notation T[X] where X
is the random variable indicating the number of customers at each
arrival epoch
– P{X=k} = P{k customers arrive at the same time}
Capacity K
Size of the population
T/X/C/K/P/Z
W(T)
• A(T) : number of customers arrived from 0 to T
• D(T) : number of departures between 0 to T
• THe(T) = A(T)/T : average arrival rate between 0 to T
• THs(T) = D(T)/T : average departure rate between 0 to T
• L(T) : average number of customers between 0 to T
• Wk: sojourn time of k-th customer in the system
A T
1
• W T
A T k 1
Wk average sojourn time between 0 to T
Stability of the queuing system
Implication of D T
lim 1
the stability: T A T
Little's law
For a stable and ergodic queuing system,
L = TH×W Queuing system
TH TH
L
where W
• L : average number of customers in the
system
• W : average response time
• TH : average throughput rate
Single stage queuing systems
Single stage queuing systems
M/M/1 queue
N(t) : number of customers
in the system
l
Poisson
Exponentially distributed
arrivals
service time
Stability condition of M/M/1 queue
or equivalently r<1
where
r l/m is called the traffic ratio or traffic
intensity.
The number of customers in the system is
unlimited and hence there is no steady state when
the system is not stable.
Markov chain of the M/M/1 queue
Let n lim P N t n , n 0
t
Steady state distribution of M/M/1 queue
state 0 : 1m 0l
state 0-1: 2 m 1l
Balance equations
state 0-1-...-n: n 1 m n l
Normalization equations: n 1
n=0
With r l/m,
0 1 - n = rn 0
Performance measures of M/M/1 queue
(online proof and figures)
l
Poisson
N(t) : number of customers
arrivals
in the system
m 2m 2m 2m
0 1 2 3
l l l l
U = Waiting probability
= C + C+1 + ...
= C/(1-r/C)
M/M/C with impatient customers
0 1 2
l l
Service time Ts
Poisson arrival
M/G/1 queue: Pollaczek-Khinchin formula
A2 Var An
• Service time Tn of customer n :
E[Tn] = 1/m
Var Tn
2
T
E W
2
A T r 1
2
2 1- r m
Variability Utilization Time
Queuing networks
Definition of queuing networks
Open network
N customers
Closed network
Multi-class network
A production line
Raw Finished
parts parts
Open Jackson Network
as the
departure
process of
M/M/1 queue
is Poisson.
Feedback
keeps
memory.
Open Jackson Network
State of the queueing network
Attention: Some
transitions are not
possible when ni = 0, for
some i
Open Jackson Network
Stationary distribution - Product form solution
mi
i
TH i li
Performance ri
Lsi
measures of each 1 - ri
M/M/1 queue ri
Wsi
mi 1 - ri
TH l
M
Performance Ls Lsi
measures of the i 1
queuing network Ws M e Ws Ls
i i i 1 TH
Open Jackson Network
Extension to multi-server stations
• p
j 1
ij 1, i 1,..., M
• n t N , t 0
i 1
i
Closed Queuing Network
Arrival rates
where
• ri = li/mi with li obtained from the solution of the flow
balance equations with a free constant chosen arbitrarily
• C(N) is a normalizing constant such that the sum of
probability equals 1, i.e.
C N - 1
1 - i 0 ri
CN
rik
P ni k C N - k - ri C N - k - 1
CN
N CN - k
E ni r k
CN
i
k 1
Closed Queuing Network
Mean Value Analysis (MVA)
• Suppose we are only interested in throughput THi and mean number of customers at
station i Li (i.e. Lsi)and mean system time Wi (i.e. Wsi)
• The MVA method of Reiser and Lavenberg (1980) bypasses te computation of C(N).
• It relies on the following simple relations :
1 1
Wi Li
mi mi
where TH i aN li
Wi is the average system time experienced by a customer arriving at i
(2) Li 0 0, i 1,..., M
N
(3) N Li N , N
i 1
p m2
m1
1- m3
p
p = 0.5, m1 = 4, m2 = 1, m3 = 2
N= 2, 3, 4
Routing
&
flow control
Routing Algorithms
–Virtual Circuit:
routing decision are made only when a new virtual circuit is
being set up.
–Session Routing:
data packets follow the same routing for the entire session.
» Routing vs. Forwarding:
–Routing:
Filling and Updating routing tables
–Forwarding:
making the decision which routes to use based on routing tables.
–Adaptive Algorithms:
Change their routing decisions to reflect changes in the topology
and traffic.
Shortest Path Routing
Optimization criterion:
» Distance,
» Bandwidth,
» Average Traffic
» Communication cost,
» Measured Delay, …
Distance Vector Routing
Static Routing Algorithms
» Do not take into account actual network load.
F 6 E 1
B 2 C
4 3
D D E F
5 4 C 3 A 5 B 6
F 4 C 1 D 4
E 8 F F 8 E 8
Packets easily built – problem with knowing when to built
them.
Hierarchical Routing
Large Networks:
» Proportionally large routing tables are required for each
router
» However, router does not have any information regarding the topology of the network
of other regions.
2C 1B 3 4 1C 3
2D 1B 4 5 1C 4
3A 1C 3
3B 1C 2
5B
4A 1C 3
4B 1C 4
3A 3B 5A 5C
4A
4C 1C 4
5A 1C 4
Region 3 Region 44C Region 5 5B 1C 5
5E
5C 1B 5
4B
5D
5D 1C 6
5E 1C 5
Broadcast Routing
Sending a packed to all destinations simultaneously is called
Broadcasting.
» Direct Method: Source sends a distinct packet to each destination
routers in the subnet:
1. Wasteful of the bandwidth.
» Flooding:
– Ordinarily ill suited for point-to-point communication:
Generates to many packets, and
Generates a new copy of the packed for each output line to be used and includes in each
packet only those destinations that are to use the line.
After a sufficient number of hops, each packed will carry only one destination and can be
treated as normal packet.
» Each router knows which of its lines belong to the spanning tree, it can
copy an incoming broadcast packet onto all the spanning tree lines
except the one it arrived on.
– Makes excellent use of bandwidth (generates absolute minimum number of
packets necessary to do the job)
– Must have knowledge of some spanning tree for the method to be applicable.
Information available in some instances (e.g., link state routing)
J
J H
H L
L
N
O
N
O
K
K
M
M
2 1
2 1
1,2 1,2
1,2 1,2 2
2
2 2
2 1
1 1
1 Spanning Tree for the leftmost Router
Network
1 2
1 1 2 2
2
2
1
1
A Multicast Tree for group 1 A Multicast Tree for group 2
Routing for Mobile Hosts
Increasing number of users of Portable
Computers and Personal Computer Devices.
They require access to:
» E-mail
» File System, etc.
In order to route a packet to a mobile host, the
network first has to find it.
World Model of communication network:
» WAN consisting of routers and hosts,
» LAN’s connected to WAN, and
» MAN’s connected to WAN.
Routing for Mobile Hosts …
A WAN to which LAN’s, MAN’s and wireless cells are attached:
Wireless cell
Home Agent
Mobile
Host
Home LAN
Foreign
Agent
Foreign LAN
WAN MAN
Routing for Mobile Hosts …
Stationary Hosts:
» Hosts that never move.
Migratory Hosts:
» Stationary hosts who move from one fixed site to another from
time to time but use the network only when they are physically
connected to it.
Roaming Hosts:
» Need to maintain their connections as they move around.
Mobile Hosts:
» Migratory and Roaming Hosts – that is all host that are away from
home and still want to be connected.
Routing for Mobile Hosts …
3. The foreign agent contact the mobile host’s home agent and informs it about a mobile
host in his area. This message contains:
The foreign agent’s network address,
Security information (“to convince the home agent that the mobile host is really there”).
Checking out when done (typically mobile hosts just turn-off their computers).
Packet Routing for Mobile Hosts
» Packets sent to the mobile host on its home LAN in Kathmandu are intercepted by the
home agent (step 1).
» Home agent looks up mobile host’s new (temporary) location and finds the address of
the foreign agent handling the mobile host (i.e., Pokhara.)
» Home agent does:
1. It encapsulates the packet in the payload field of an outer packet and sends the
latter to the foreign agent (step 2). This mechanism is called tunneling.
After getting the encapsulated packet, the foreign agent removes the original
packet from the payload field and sends it to the mobile host as a data link frame.
2. The home agent tells the sender to henceforth send packet to the mobile host by
encapsulating them in the payload of packets explicitly addressed to the foreign
agent instead of just sending them to the mobile host's home address (step 3.)
Subsequent packets can now be routed directly to the host via foreign agent (step
4.), bypassing the home agent entirely.
Routing in Ad Hoc Networks
Ad Hoc networks refers to the extreme case of mobility
where not only the hosts are mobile but routers as well.
Examples:
Route Discovery
» Ad-hoc network can be described by a graph of the nodes
(routers + hosts).
A A A A
B C B C B C B C
D D D D
E E E E
F G F G F G F G
H I H I H I H I
Range of A’s Broadcast After B and D have received of A’s After C,F and G have received of After E,H and I have received of
Broadcast A’s Broadcast A’s Broadcast
Congestion Control
Algorithms
The situation when to many packets are present in subnet it is
called congestion.
1.2
0.8
Desirable Performance
0.6
Congested Performance
Ideal
0.4
0.2
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Slow Processors:
» Queue build up due to routers slow CPU’s at performing bookkeeping task:
– Queueing buffers,
Typically the problem is that upgrading one part of the system shifts the bottleneck to the other
someplace else. The real problem frequently is a mismatch parts of the system. The problem will
persist until all components of the system are in balance.
Congestion Control vs. Flow Control
Congestion Control has to due with making sure the subnets are able to
carry the offered traffic. Thus it is a global issue involving the behavior of
» all the hosts,
» all the other factors that tend to diminish the carrying capacity of the subnet.
Charging Plans
Numbering
Network
Network Conveyance
Charge = 100
Shared cost Services
Code (0)800
Network
Network Conveyance
Charge = 100
Freephone services
Code = (0)800
Network
Network Conveyance
Charge = 100
Before liberalization
• Conflict of interest
Format:-
NDC=Area Code
Format:-
Prefix Designation
00 International Code
01
02
03
04
05
06
07 Mobile Services
08 Special Services (Free Phone, Fixed Cost and Shared Cost)
09 Premium Rate Services (PRS)
Key Elements/ Guidelines
Implementation principles
Assessment of applications
Key Elements/ Guidelines ...
Appeals procedure