IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001

351

Connection Admission Control for Capacity-Varying Networks with Stochastic Capacity Change Times J. Siwko and I. Rubin, Fellow, IEEE

Abstract—Many connection-oriented networks, such as low Earth orbit satellite (LEOS) systems and networks providing multipriority service using advance reservations, have capacities which vary over time. Connection admission control (CAC) policies which only use current capacity information may lead to intolerable dropping of admitted connections whenever network capacity decreases. We present the admission limit curve (ALC) for capacity-varying networks with random capacity change times. We prove the ALC is a constraint limiting the conditions under which any connection-stateless CAC policy may admit connections and still meet dropping guarantees on an individual connection basis. The ALC also leads to a lower bound on the blocking performance achievable by any connection-stateless CAC policy which provides dropping guarantees to individual connections. In addition, we describe a CAC policy for stochastic capacity change times which uses knowledge about future capacity changes to provide dropping guarantees on an individual connection basis and which achieves blocking performance close to the lower bound. Index Terms—Call admission control, capacity-varying network, communication system control, communication systems, multi-access communication, multimedia communication, satellite communication, traffic control (communication).

I. INTRODUCTION

M

ANY networks have capacities which vary over time for many reasons. For example, consider a low Earth orbit satellite (LEOS) system where a given geographic area is served by a succession of beams and satellites. The capacity available to serve the area varies over time due to the power distribution of beams within a satellite, the reuse pattern of channels, the number of satellites and beams visible to the area, and whether the area is currently served by a central beam with a small footprint or an edge beam with a large footprint. These capacity variations in a LEOS system are cyclic, recurring as the same sequence of satellites complete their orbits to serve the area once again. Due to the different interactions listed above, the periodicity of the capacity variation sequence may be considerably longer than the periodicity of a satellite’s orbit, but nonetheless the capacity variations are periodic and thus known in advance.

Manuscript received July 19, 1999; revised January 19, 2000; approved by IEEE/ACM TRANSACTIONS ON NETWORKING Editor I. Akyildiz. This work was supported in part by ARO Grant DAAG55-98-1-0338, and by University of California MICRO Project and Nortel Bay Networks Grant 98-131 and SBC Pacific Bell Grant 98-130. J. Siwko was with the Department of Electrical Engineering, University of California, Los Angeles, CA 90095 USA. He is now with Contronautics, Inc., Hudson, MA 01749 USA (e-mail: [email protected]). I. Rubin is with the Department of Electrical Engineering, University of California, Los Angeles, CA 90095 USA. Publisher Item Identifier S 1063-6692(01)04733-1.

For a second example, consider a network with multiple priority levels. High-priority connections, such as an executive videoconference, may be reserved in advance to assure availability of network resources. The actual start time of the connection, however, may vary somewhat from the reserved start time. The network resources available to serve other, lower priority users will decrease at the actual start time of the high-priority connection, and thus constitute a future capacity change from the perspective of these lower priority users. Many other examples exist of networks whose capacities change with some amount of stochastic advance knowledge. Due to scarcity of resources such as spectrum, connection admission control (CAC) policies are vital in a network’s ability to guarantee quality of service (QOS) to connection-oriented services. CAC policies protect a network from overloading by determining whether incoming connection requests should be accepted or rejected. As befits a subject of such importance, CAC policies have been the subject of considerable study (see [2]–[6] and the many references found in [1] ). Many of these proposed CAC policies can be described as making admission decisions by comparing the resources required by an incoming connection request with the resources currently available in the network. By only considering currently available resources, these policies implicitly assume that the network’s capacity will remain constant over the time frame of any admitted connection, that is, the network is fixedcapacity. In capacity-varying networks, such as the examples listed earlier, a reduction in network capacity may affect connections in progress at that time. Under a CAC policy which considers only currently available resources, connections may be accepted prior to the known capacity change only to be dropped once the capacity decreases. A more intelligent CAC policy, aware of the upcoming capacity change, might block connections instead of accepting them and then dropping them. Dropping a connection is generally considered a less desirable result than blocking a connection request, since dropping a connection involves breaching QOS guarantees made upon connection acceptance, guarantees which were not made in blocking the connection request. A CAC policy for a LEOS network was proposed in [7]. This policy assumes fixed direction satellite antennas. Consequently, the beam footprints move with respect to earth in a continuous fashion. In contrast, when applied to LEOS networks, our work is applicable to satellites with dynamically steerable antennas. With these satellites, the antennas are constantly shifted in order to serve the same geographic region for longer periods of time [8]. After the satellite moves out of position, the antennas are

1063–6692/01$10.00 ©2001 IEEE

352

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001

then swung to serve an entirely different geographic region. Thus, the beam footprints move with respect to earth in a discrete manner. CAC policies for variable capacity networks have been proposed in [9], [10], and in an advance-reservation network context in [12]. However, all these policies assume deterministic capacity change times. In this paper, we consider CAC policies for stochastic capacity change times which still provide dropping guarantees on an individual connection basis. We present a fundamental limit, the admission limit curve (ALC), and prove that it is applicable to the class of conforming, connection-stateless CAC policies in a variable-capacity network. A CAC policy is conforming if it provides dropping guarantees on an individual connection basis, and is connection-stateless if it does not keep track of a connection’s age. The ALC forms a boundary on the conditions under which any conforming, connection-stateless CAC policy may accept a connection request. As a result, using the ALC for admission decisions results in a lower bound on the blocking performance of any conforming CAC policy. This paper also reviews random capacity change time (RCCT), a conforming connection-stateless CAC policy presented in [11]. The admission curve of RCCT is compared to the ALC, and the blocking performance of RCCT is found to be close to the lower bound in many practical cases we studied. II. MODEL DESCRIPTION Consider a multiple access network whose communication resources are shared among a multitude of stations. The network is connection oriented, so stations desiring to use the network must first submit a connection request to the network access controller. These connection requests may be accepted or rejected. Each connection request accepted by the controller results in the allocation of some network resources to service the newly made connection. For a constant-bit-rate packet-switched connection or a circuit-switched call, these resources could include bandwidth, power, and buffer space. For a variable-bit-rate (VBR) packet-switched connection with guaranteed QOS, such as VBR connections in an ATM network or certain IP flows, these resources could incorporate statistical multiplexing effects through methods such as effective bandwidth. Consider a class of homogeneous connections subject to variations in the amount of resources available to serve the class. The class may consist of a subset of connections, such as nonreserving connections in a network which accepts reservations, or may consist of all connections. To support connections of of resources, this class simultaneously requires an amount is a monotone nondecreasing function. We also dewhere fine the inverse function for a given amount of resources as . Define the capacity of the system at a given time as the maximum amount of resources available to service new and existing connections, and the system size as the number of active connections. Connection requests arrive at the system according to a Poisson process with mean arrival rate . A CAC policy decides whether a connection request is to be admitted or rejected. Connections whose requests are rejected by the CAC policy are

said to be blocked and are lost. A CAC policy must block a connection request if the connection’s admission would cause the allocated resources to exceed the capacity. Holding times of connections are independent random variables with cumulative distribution function and mean holding time of . Capacity change times are assumed to occur sufficiently far apart that the probability of more than one capacity decrease occurring during any given connection’s lifetime is negligible.1 For a given time , define the following variables: next capacity change time (CCT); probability density function (PDF) of ; cumulative distribution function (CDF) of ; inf lower limit of support of ; sup upper limit of support of ; system capacity at ; system capacity at , i.e., just after ; maximum active connections at ; maximum active connections at ; dropping probability threshold; set of connections active at , i.e., just before ; system size at . To decide whether a connection request arriving at a time should be admitted or rejected, we generally need to consider the possible future events conditioned on the admission of this connection request at , and then determine whether this conditional future will result in dropping probabilities exceeding the threshold . Therefore, we define the following variable for a connection request arrival time :2 the connection arriving at If there is no connection request arrival at , then equals . We also define the following symbols for operations: cardinality of set , i.e., the number of elements in set . ) is straightThe case of a capacity increase at (i.e., forward, since any connection admitted before will continue to have adequate resources after . The interesting case is a ca). If the system size at pacity decrease at (i.e., is larger than , then the system will no longer have the resources to support all the admitted connections and must drop , some. Any connection dropping is assumed to occur at just after the capacity change. For many applications, dropping a connection after admission is considered much more disruptive and much less desirable than blocking the connection, and thus it is imperative to carefully regulate connection dropping. In particular, we assume the existence of a dropping probability threshold which forms part of the QOS guaranteed by the network to every admitted connection. In other words, the network guarantees dropping probabilities on an individual connection 1CAC policies, like any other connection-level mechanism, are most effective on events occurring on the timescale of connection holding times. Capacity changes occurring more frequently may be more effectively controlled by lower layers, such as physical layer mechanisms. 2Technically, if multiple connection requests arrive at the same time , then for a given request being considered, define ( ) = set of admitted connections active at , and ^ ( ) = ( )[ {the connection under admittance consideration}.

t

Nt

Nt

Nt

t

SIWKO AND RUBIN: CONNECTION ADMISSION CONTROL FOR CAPACITY-VARYING NETWORKS

basis, just as it guarantees other common QOS parameters such as packet loss, delay, and jitter. A. Dropping Policies The choice of which connections are dropped at a capacity change time is determined by a dropping policy. A dropping policy is any set of rules, possibly probabilistic, which select specific connections to drop out of the connections active at . Given a set of connections ,a dropping policy induces a dropping probability distribution of size . From on the space of all subsets of this probability distribution, one can find for each connection the marginal probability that connection is one of the connections chosen to be dropped. Due to their underlying probability space, these marginal probabilities have the property that (1) . The last-comeFor example, suppose first-dropped (LCFD) policy , which drops connections in reverse order of acceptance, results in the marginal distributions if connection is one of the recently admitted in otherwise

353

thus guarantees dropping probabilities on an individual connection basis, not just for the average of all connections. Given a dropping policy , a CAC policy is said to be conforming is conforming. Finally, a CAC policy is said w.r.t. if to be conforming if there exists some dropping policy such is conforming. that To design a conforming CAC policy , one must be able to calculate the connection dropping probability at any time .3 The dropping probability for a particular connection will depend on the dropping policy used. The dropping probability as calculated at may also depend on the composition of the connections active at , which in turn depends on admissions after by the CAC . Therefore, in its most general form, the dropping probability for a particular connection as calculated at a time is

(3) Since a CAC policy conforming w.r.t. must guarantee the dropping probability threshold is met for all connections at any time that a connection request is admitted, the conformity requirement in order to be able to admit a connection at can be stated as (4)

most

The uniform random dropping (URD) policy , which assigns each connection active at an equal dropping probability, results in marginal distributions (2)

B. Connection Admission Control (CAC) Policies A CAC policy is a set of rules which determine whether any given connection request is to be admitted or blocked. In general, this decision may depend on any past or current information such as system size, connection ages, interarrival times, etc. and The decision may also depend on the parameters describing the future capacity change, the connection holding , and the parameter determining the time distribution dropping service guarantee. The primary goal of a CAC policy is to meet the specified dropping criteria. Once the dropping criteria have been met, the secondary goal of a CAC policy is to maximize throughput. In the case where all connections are statistically identical, maximizing throughput is equivalent to minimizing connection blocking. Given the connection holding time and CCT distributions, a CAC policy is said to be connection-stateless if the only data used in its admission decisions (aside from the fact that a connection request occurs) are the future capacity , the current ca. A connection-stateless CAC pacity , and the system size is said to be conforming if policy/dropping policy pair the CAC policy never admits any connection request when, given the dropping policy , the probability of dropping that connection, or any currently active connection, is greater than the dropping probability threshold . A conforming pair

III. ADMISSION LIMIT CURVE (ALC) A. Definition of ALC and , and the parameters Given the distributions , and , a point with is said to be adsuch that a missible if there exists some conforming pair connection request arriving at with the system size can be adwith which mitted by CAC policy . Points are not admissible, i.e., points such that there is no combination of dropping policy and CAC policy such that a connection can be admitted at with active connections without violating the dropping probability threshold for at least one connection, are said to be inadmissible. The set of all inadmissible points is called the inadmissible region, and the set of all admissible points is called the admissible region. Under a connection-stateless CAC policy, there are two possible types of connections at any time . Define a new connection request arriving at and under admittance consideration as a Type 0 connection. Define a Type 1 connection as a previously admitted connection that is still active at . Given the CCT , then define the conditional connection survival probabilities for each connection type as (5) (6) Equation (6) is the limiting forward recurrence time CDF for the corresponding renewal point process of holding times under steady state. 3Note that this does not imply that the implementation of the policy must calculate dropping probabilities.

354

To find the boundary between the admissible and inadmisa sible regions, we begin by developing for each point optimized for , which minimizes dropping policy under the assumptions that a con. Since the objective nection request arrives at and , the -opis to minimize only among connections in timal dropping policy should favor these connections over other (future) connections. , any dropping Given a set of connections , say that favors the policy can be modified into a new policy will first connections in by dropping them last. Policy choose a set of connections in the same way that would choose a set of connections to drop. This set is then checked to see whether it contains any members of the favored set . will replace these favored connecIf it does, then policy tions with other connections that are not members of , if any are available. After as many such replacements as possible are made, the resulting group is dropped. There may be several possible modified dropping policies for and a set , each differing in the a single original policy choices of favored connections to replace and nonfavored connections to replace them with. For our purposes, however, such can be any of the possible details are not important, and so modified policies. By noting that modifying the dropping policy does not change and that the modification never adds a the composition of member of into a set of connections that would have been dropped under , the following is immediately obvious. Lemma 1: Let be any set of connections, be any CAC be any modification policy, be any dropping policy, and of as described above. Then,

To determine the dropping policy for connections in , we use the following lemma, which is easily proved by induction on . , Lemma 2: Let be a positive integer, and be positive constants with , and be a function on subject to the following constraints: 1) 2) . Let be the set of all such functions. Then

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001

dropping probability as calculated at of the Type 0 connection . Thus, in order for the to be 1 for all values of equalization to be possible, the holding time distribution must be such that the probability as calculated at of the Type 0 connection being dropped at is greater than or equal to the maximum probability of any Type 1 connection being dropped, given that the Type 0 connection is always dropped first. One can therefore show that such an equalization is realizable if the holding time distribution satisfies the following condition, : where represents

(7) This condition is satisfied by all holding time distributions with increasing failure rate (or hazard) functions (IFR), such , and halfas the uniform, exponential, gamma- with with a denGaussian distributions.4 For any distribution , the failure rate function is defined as sity . If is a nondecreasing function of , then the distriis said to be IFR. Depending on the parameters, the bution condition (7) may also be satisfied by a holding time distribution with a decreasing failure rate function. is to Assuming that (7) holds, one approach to find perform an equalization term by term for different values of . This approach results in the following marginal dropping probais the marginal dropping probability bilities, where as calculated at for a Type 1 connection active at given that , , the connection is active at , and that the Type 0 connection request is not active at ; is similar except given that the Type 0 connection is similar for the Type 0 connecis active at ; and tion:

(8) and this minimum is achieved by . In accordance with Lemma 2, is minimized when all connections in have equal at . From (3), we see that values of consists of the sum of products of two terms. As a result of the different connection survival probabilities and , the values of are different for the Type 0 connection and the Type 1 connections. Therefore, should counterbalance these differences with different . The maximum marginal dropping probabilities counterbalancing that can be performed is to set the marginal

(9) (10) Using these precepts, we define a dropping policy which first drops any connection admitted after in any arbitrary 4The half-Gaussian random variable is the absolute value of a zero-mean Gaussian random variable.

SIWKO AND RUBIN: CONNECTION ADMISSION CONTROL FOR CAPACITY-VARYING NETWORKS

order, e.g., reverse order of acceptance. If additional connections still need to be dropped, then a subset of size is randomly chosen. The probability distribution for choosing this subset is such that the marginal probabilities of the connections satisfy (8)–(10). The conditions of , and is deLemma 2 are satisfied by signed to fulfill the optimality requirements given in Lemmas 1 for connections in . Noting that Lemma 1 imand 2 at should be dropped before plies that all connections not in is dropped, and noting that Lemma 2 any connection in implies that dropping probabilities as computed at for connecshould be equal, and noting that both these contions in , the following lemma can then ditions are satisfied by be proven. be any dropping policy, Lemma 3: Let be any CAC, be defined as above. Suppose and a and connection request occurs at . Then

355

satisfying the conformity criterion (4) for its optimal CAC/drop. Thus ping policy pair

integer

(12) is called the admission limit The locus of points curve (ALC). The importance of the ALC lies in the following theorem. Theorem 1: No conforming CAC policy may admit a conis such nection request arriving at a time if its system size . that Proof: Suppose a connection request arrives at a time such that the system size is and . Let be any dropping policy. Then

Given and any CAC , the connection dropping probability can be computed for a connection request (Type 0) as arriving at with

CCT occurs in

given that

CCT has not occured by connection active at given and connection active at

connection 0 dropped given

(11) Due to the equalization constructed into the dropping policy , the connection dropping probability as calculated at for Type 1 connections is equal to that of the Type 0 connection.5 This integral can be calculated analytically for a number of holding time and CCT distributions, and can be solved numerically for other distributions. In addition, it can readily be proven that (11) is monotonically increasing with . , define as the value of which minFor each imizes blocking of connections at (by maximizing ) while ) would require a only for this specific t and n. A different point ( n; t ). different policy ( n; t 5But

D

where the first inequality is by Lemma 3, the equality is true for , the second inequality is due to monotonicity, and all . Thus, in order for the last inequality is by the definition of the CAC policy to be conforming, it must reject the connection request. In other words, all points with are inadmissible. By the following corollary, all other points are admissible, and thus the ALC is the boundary of the admissible region. with are admissible. Corollary 1: All points as Proof: Given a time , define the CAC policy admitting a connection request arriving at a time iff and . Note that, given and , all points with have due to the monotonicity in of (11) and the definition of . in which a connection request would be Thus every point will have dropping probabilities meeting the admitted by is conforming w.r.t. . threshold, and thus Thus the ALC acts as a fundamental boundary on all conforming CAC policies under all dropping policies. B. Additional Properties of the ALC for expoFig. 1 displays example ALC boundary curves nential holding time distributions and uniform, exponential, and two-term hyperexponential CCT distributions. Vertical axis is in

356

Fig. 1.

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001

ALC boundaries.

connections, while horizontal axis is in arbitrary time units. The , and . parameters in this example are The mean CCT is zero, and the lower bound of the CCT distribu. Viewing time backward from , tion support is the ALC boundary curves rise rapidly, with more variable CCT distributions leading to more conservative ALC curves but all reaching infinity in a finite time. The various CCT distributions , with have more visible effect on the ALC’s in the region monotonically decreasing for the uniform, remaining constant for the exponential, and increasing to a (possibly infinite) constant for the hyperexponential CCT distribution. Viewing time backward from , the ALC approaches infinity which is a finite distance from . It can be readily at a time shown that (13) . The variable can be considered an where upper bound on the prior notice (with respect to the lower CCT support limit) which must be given of a future capacity decrease in order to be able to initiate the execution of a CAC policy to meet the connection dropping requirement. Note that may be positive or negative. The bound is typically a few average holding times long. However, advance notice of only a single average holding time is generally sufficient for most practical capacity levels. The ALC could be used as the basis of a CAC policy , which admits a connection request at a time iff . Essentially, this policy uses the curve as its admission boundary, unless the current system resource is lower. restriction The appeal of policy lies in the following theorem. Theorem 2: The expected blocking under CAC policy is less than or equal to the expected blocking under any conforming CAC policy. Proof: Suppose two systems, identical except for their CAC policies, are both fed by the same Poisson arrival process. Let System A use the CAC policy , and System B use any and be their conforming CAC policy, and let

respective system sizes. Assume that at time 0 both systems begin with identical connections (or no connections). For any arrival process, time can be divided into periods when and periods when . , the expected throughput In any period with will exceed the expected throughput of of System A System B. Since these periods always begin with both system sizes equal, then the expected time-average blocking over these periods is lower for System A. Since the arrival process is Poisson, the expected blocking is also lower. . If System B admits Suppose now that a connection at some time , then by Theorem 1 we have . Therefore, policy in System A will also admit this connection. Since policy admits every connection admitted by System B during these periods, the expected blocking for System A is less than or equal to the expected blocking for System B during these periods as well. Thus the overall expected blocking for System A is less than or equal to the expected blocking for System B for every period. Unfortunately, policy is not conforming, as has been further confirmed through simulation. In essence, the ALC is constructed through the assumption of multiple dropping policies for different points , whereas a real system can only use one dropping policy.6 Thus, while results in a lower bound on connection blocking, it cannot be used to guarantee dropping performance. IV. RANDOM CAPACITY CHANGE TIME (RCCT) CAC POLICY A. Definition of RCCT Since the CAC policy based on the ALC is not conforming, this section reviews a conforming CAC policy for increasing failure rate (IFR) holding time distributions first presented in [11]. The RCCT CAC policy is summarized below. Its admission curve is found to be close to the ALC, and its blocking performance is found to be close to that attained by policy in many practical cases we have studied. The dropping policy assumed in development of the RCCT CAC policy is the LCFD policy of dropping connections in reverse order of acceptance. minimizes the amount of wasted effort by protecting connections that have been “invested” with greater amounts of service. As a result of this dropping policy, if a connection is admitted at a time , then this connection’s eventual dropping at depends only on the behavior of connections in the system at and is independent of the behavior of any connection requests, whether admitted or not, arriving after time . In particular, it is independent of the CAC policy after time . Let be a connection request arriving at some time (i.e., a Type 0 connection at time .) Under and under any CAC policy , since the holding time distribution is IFR, then at occurs for connection . Because connection dropping is performed in reverse order of arrival, the dropping of connection depends only on these three factors: 1) the distribution of the capacity change time , given that ; 6This dropping policy can treat calls differently depending on time, but it is still only one policy.

SIWKO AND RUBIN: CONNECTION ADMISSION CONTROL FOR CAPACITY-VARYING NETWORKS

Fig. 2.

CAC boundaries.

357

Fig. 3. CCT dropping probabilities.

2) whether connection is still active at ; of the Type 1 3) the departure process during connections. Since connections are dropped in reverse order of acceptance, for . For , by conditioning on the above three factors we obtain

and thus plays a disproportionate role, compared to the region , in the relative blocking performance between RCCT and tend to converge closer as and . In addition, becomes tighter. As a result, RCCT achieves blocking performance reasonably close to the blocking lower limit achieved by the nonconforming policy in many practical cases studied. B. Simulation Results

(14) This integral can be calculated analytically for a number of connection holding time and CCT distributions, and solved numerically for others [11]. Define the CAC boundary curve by (15) The RCCT CAC policy is then to accept a connection admission . request at a time iff Fig. 2 displays example RCCT CAC boundary curves for exponential holding times and for uniform, exponential, and two-term hyperexponential CCT distributions. For comparison, are also shown. The paramthe corresponding ALC curves , and . The eters in this example are mean CCT is zero, and the lower bound of the CCT distribution . support is is fairly close to for , and As is seen in Fig. 2, . the two curves diverge more in the CCT support region and for each time Recall, however, that the values assume that the capacity change has not yet occurred by . As becomes larger and larger than , this assumption is less and less and likely to continue to hold, and thus the divergence of becomes more and more likely to end due to the occur, where rence of the capacity change. In contrast, the region and are closer together, occurs in every realization,

Simulations have been performed of systems implementing the RCCT CAC policy and, for comparison, of systems using and using the naive “No CAC” the nonconforming policy policy of always admitting connections up to current available capacity. All simulations begin with a random number of active connections determined by the stationary Erlangian distribution queue. Sample results comparing dropping of an probabilities are shown in Fig. 3, while blocking performance appears in Figs. 4–6. Each data point in these graphs is the average of 1 million simulations. Dropping probabilities are obtained by dividing the number of connections dropped by the plus the number number of connections admitted during of initial active connections at time 0. Blocking probabilities are obtained by dividing the number of connections blocked by the . number of connection requests arriving during , Figs. 3 and 4 use the following parameters: , and . Connection holding times are exponen. The CCT distributially distributed with parameter . Results similar to these figures tions are uniform over were obtained for exponential and hyperexponential distributions as well. The independent variable is the connection request arrival rate expressed as an Erlang load. As can be seen in Fig. 3, the dropping probability threshold is consistently met by the RCCT CAC policy, even at quite high offered loads. In contrast, the “No CAC” system only meets the dropping probability threshold at low offered loads, and at higher loads generally has a dropping probability exceeding the threshold by orders of magnitudes. The CAC policy also fails to meet the dropping probability threshold at higher offered loads, thus illustrating its

358

Fig. 4.

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001

CCT blocking probabilities.

Fig. 5. Blocking probabilities versus mean CCT.

nonconformity. However, does achieve much better dropping performance than the “No CAC” policy does. As shown in Fig. 4, the blocking probability is low for all three policies at low offered loads. At higher loads, blocking will always be somewhat higher using the RCCT CAC policy than the comparison policies. However, RCCT results in blocking performance reasonably close to the lower blocking bound supplied by the nonconforming policy while still remaining conforming. Although blocking under RCCT, and under any conforming CAC policy for that matter, is higher than blocking without a CAC, this increased blocking is generally quite acceptable for the vastly improved dropping performance of the RCCT CAC policy. The influence of the CCT distribution and parameters can be seen in Figs. 5 and 6. The mean CCT is the independent variable in Fig. 5. The offered load is kept constant at 300 Erlangs and the lower bound of the CCT support is always at 10 time units. As can be seen, the time-average blocking probability for

Fig. 6. Blocking probabilities versus CCT standard deviation.

both and RCCT decreases as the mean CCT increases, rapidly at first and then leveling off. Blocking under the “No CAC” policy, as expected, remains constant regardless of the mean CCT. Although the time-average blocking may decrease for and RCCT as increases, this blocking is also incurred for a .) longer period of time (since blocking is measured over Note that there is relatively little difference in blocking under different CCT distributions when the mean CCT is small, while the difference becomes more apparent for larger mean CCT. We also note that, while the RCCT policy yields blocking close to the lower blocking bound of the ALC when the mean CCT is small, as the mean CCT increases there is certainly some room for future development of even better CAC policies. Fig. 5 thus also serves to demonstrate the value of the ALC in evaluating candidate CAC policies. In Fig. 6, the standard deviation of the CCT distribution is varied while the mean CCT, lower CCT support, and offered load are all kept constant at 100 time units, 10 time units, and 200 Erlangs respectively. The CCT distribution is the two term hyperexponential. As can be seen, blocking under RCCT and remains nearly constant for “reasonable” variance (up to about the same order of magnitude as the mean). Blocking then begins to decrease for very large variances. The explanation for this behavior is due to the fact that the only way to increase the standard deviation while keeping both the mean and the lower support bound constant is to increase the probability that the CCT occurs further and further in the future. In the examples plotted for a two term hyperexponential CCT distribution, if a CCT does not occur fairly soon after the lower support bound , then both the ALC and RCCT admission controllers start to assume that the larger time constant exponential component is more probable, and thus begin admitting more connections (see Figs. 1 and 2.) C. Optimality The primary goal of any CAC policy is to meet the specified dropping criterion, i.e., to form part of a conforming pair. By

SIWKO AND RUBIN: CONNECTION ADMISSION CONTROL FOR CAPACITY-VARYING NETWORKS

design, the RCCT CAC policy forms a conforming pair with the LCFD policy . Once the dropping criterion has been met, the next goal of a CAC policy is to maximize throughput. In the case where all connections are statistically identical, maximizing throughput is equivalent to minimizing the number of blocked connections. We prove that the RCCT CAC policy is optimal in the following sense. Theorem 3: Suppose the holding time distribution is IFR. Then the expected blocking under the RCCT CAC policy is less than or equal to the expected blocking under any connection-stateless CAC policy which is conforming w.r.t. the LCFD dropping policy . Proof: Suppose a connection request arrives at a time with . Then, by definition of , no CAC policy conforming w.r.t. could admit the connection request. divides space into regions of points In other words, “admissible” and “inadmissible” by the set of CAC policies conforming w.r.t. . The rest of the proof follows similarly to Theorem 2. V. CONCLUSION Several existing and emerging networks, such as LEOS, mobile satellite personal communications networks, and multipriority reservation networks, have capacities which vary over time for some or all types of connections carried by these networks. With each capacity decrease having the potential to result in dropped connections, it is reasonable to include stochastic connection dropping performance as part of the QOS guaranteed by the network to accepted connections. It then becomes one of the duties of the CAC policy to ensure that these connection dropping guarantees are met. The naive use of existing CAC policies which make admittance decisions using only the currently available capacity may lead to intolerable connection dropping in capacity-varying networks, and thus novel CAC policies are required for these networks. In this paper, we investigate using stochastic knowledge of future capacity changes to trade off some additional connection blocking in order to meet any desired connection dropping guarantee. We present the admission limit curve (ALC) and prove that it offers a tight constraint limiting the conditions under which any conforming CAC policy may admit connection requests in a capacity-varying network. The ALC forms the basis of a CAC policy which, although nonconforming, is useful nonetheless because its blocking performance represents a tight lower bound on the blocking performance achievable by conforming CAC policies. In addition, we review a CAC policy (RCCT) whose blocking performance is nearly as good as that achieved by the ALCbased policy in many practical cases studied, while still meeting the dropping requirements. We verify these results through simulations. Finally, we also outline a proof that the RCCT CAC policy is optimal in the sense that it blocks the fewest connections and thus achieves the highest throughput of any policy that meets, on an individual connection basis, a given dropping probability threshold under the LCFD dropping policy and any capacity change time distribution.

359

This paper has introduced the key models and provided solutions for the homogeneous class case. Future work includes the extension of the techniques provided here to the case of heterogeneous connection classes. Heterogeneous classes introduce the additional complexity of permitting tradeoffs between classes. For example, admitting a connection of class A may now lead to the future blocking of a connection of the more desirable class B later on. In addition, to simplify network operations and billing, network providers may only permit a small number of service classes, with each class having specific flow control and resource parameters, rather than permitting arbitrary selection of these parameters for every connection. In this case, although the underlying connections could have somewhat differing characteristics, they would all be lumped together as one class. REFERENCES [1] H. Perros and K. Elsayed, “Call admission control schemes: A review,” IEEE Commun. Mag., vol. 34, pp. 82–91, Nov. 1996. [2] Z. Liu and M. El Zarki, “SIR-based call admission control for DS-CDMA cellular systems,” IEEE J. Select. Areas Commun., vol. 12, pp. 638–644, May 1994. [3] R. Ramjee, R. Nagarajan, and D. Towsley, “On optimal call admission control in cellular networks,” in Proc. IEEE INFOCOM, vol. 1, 1996, pp. 43–50. [4] I. Rubin and S. Shambayati, “Performance evaluation of a reservation random access scheme for packetized wireless systems with call control and hand-off loading,” Wireless Networks, vol. 1, no. 2, pp. 147–160, 1995. [5] M. Naghshineh and M. Schwartz, “Distributed call admission control in mobile/wireless networks,” IEEE J. Select. Areas Commun., vol. 14, pp. 711–717, May 1996. [6] D. Levine, I. Akyildiz, and M. Naghshineh, “A resource estimation and call admission algorithm for wireless multimedia networks using the shadow cluster concept,” IEEE/ACM Trans. Networking, vol. 5, pp. 1–12, Feb. 1997. [7] H. Uzunalio˘glu, J. Evans, and J. Gowens, “A connection admission control algorithm for low earth orbit satellite networks,” in Proc. IEEE ICC, vol. 2, 1999, pp. 1074–1078. [8] W. Wu, E. Miller, W. Pritchard, and R. Pickholtz, “Mobile satellite communications,” Proc. IEEE, vol. 82, pp. 1431–1448, Sept. 1994. [9] J. Siwko and I. Rubin, “Call admission control for non-geostationary orbit satellite networks and other capacity-varying networks,” Int. J. Satellite Commun., vol. 18, no. 2, pp. 87–106, Mar. 2000. [10] J. Siwko and I. Rubin, “Call admission control for capacity-varying networks,” Telecommun. Syst., vol. 16, no. 1-2, pp. 15–40, Jan. 2001, to be published. [11] , “Call admission control policy for capacity-varying networks with stochastic capacity change times,” in Proc. IEEE Globecom, vol. 2, 2000, pp. 1150–1155. [12] A. Greenberg, R. Srikant, and W. Whitt, “Resource sharing for bookahead and instantaneous-request calls,” IEEE/ACM Trans. Networking, vol. 7, pp. 10–22, Feb. 1999.

J. Siwko recieved the Ph.D. degree in electrical engineering from the University of California, Los Angeles (UCLA). He is with Contronautics, Inc., Hudson, MA. His research interests are in telecommunications and data communications networks, particularly in capacity-varying networks. Dr. Siwko was a co-recipient with Dr. Rubin of the Best Paper Award at the 1999 Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS ’99), organized by the Society for Computer Simulation (SCS).

360

I. Rubin (F’87) received the B.Sc. and M.Sc. degrees from the Technion—Israel Institute of Technology, Haifa, Israel, and the Ph.D. degree from Princeton University, Princeton, NJ, all in electrical engineering. Since 1970, he has been with the faculty of the University of California, Los Angeles (UCLA) School of Engineering and Applied Science, where he is currently a Professor in the Electrical Engineering Department. He has had extensive research, publications, consulting, and industrial experience in the design and analysis of commercial and military computer communications and telecommunications systems and networks. At UCLA, he is leading a large research group. He also serves as President of IRI Computer Communications Corporation, a leading team of computer communications and telecommunications experts engaged in software development and consulting services. Dr. Rubin served as Co-Chairman of the 1981 IEEE International Symposium on Information Theory, Program Chairman of the 1984 NSF-UCLA Workshop on Personal Communications, Program Chairman for the 1987 IEEE INFOCOM conference, and Program Co-Chair of the IEEE 1993 Workshop on Local and Metropolitan Area Networks. He was elected as a Fellow of IEEE for his contributions to the analysis and design of computer communications networks. He has served as Editor of the IEEE TRANSACTIONS ON COMMUNICATIONS, of the ACM/Baltzer Journal on Wireless Networks, of the Kluwer Journal on Photonic Network Communications and of the Wiley InterScience International Journal on Communications Systems.

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001

Connection admission control for capacity-varying ... - Semantic Scholar

ations and billing, network providers may only permit a small number of ... tions experts engaged in software development and consulting services. Dr. Rubin ...

199KB Sizes 2 Downloads 222 Views

Recommend Documents

Rethinking Connection Security Indicators - Semantic Scholar
Jun 22, 2016 - Opera for Android) do not display EV information. Older .... 40.7%. 33.9%. Age 35-44. 18.3%. 20.0%. Age 45-54. 6.9%. 10.1%. Age 55-64. 2.7%.

Rethinking Connection Security Indicators - Semantic Scholar
Jun 22, 2016 - Opera for Android) do not display EV information. Older literature suggests that .... tory for Chrome apps and extensions. We encouraged down-.

VISION-BASED CONTROL FOR AUTONOMOUS ... - Semantic Scholar
invaluable guidance and support during the last semester of my research. ..... limits the application of teach by zooming visual servo controller to the artificial ... proposed an apple harvesting prototype robot— MAGALI, implementing a spherical.

VISION-BASED CONTROL FOR AUTONOMOUS ... - Semantic Scholar
proposed an apple harvesting prototype robot— MAGALI, implementing a ..... The software developed for the autonomous robotic citrus harvesting is .... time network communication control is established between these computers using.

Counteractive Self-Control - Semantic Scholar
mained in the distance? ... tempt individuals to stray from otherwise dominant long-term ... bach, University of Chicago, Booth School of Business, 5807 South.

Neurocognitive mechanisms of cognitive control - Semantic Scholar
Convergent evidence highlights the differential contributions of various regions of the prefrontal cortex in the service of cognitive control, but ..... Presentation of a stop-signal yields a rapid increase in activity in FEF gaze-holding neurons and

Cooperative Control and Potential Games - Semantic Scholar
Grant FA9550-08-1-0375, and by the National Science Foundation under Grant. ECS-0501394 and Grant ... Associate Editor T. Vasilakos. J. R. Marden is with the ... J. S. Shamma is with the School of Electrical and Computer Engineer- ing, Georgia ......

predictive control of drivetrains - Semantic Scholar
GPS and road maps containing information about road bends, speed limits and topogra- phies. ¯ traffic information obtained by external sour- ces. ¯ on-board ... optimization problem. However, this leads to an extraordinary high computational effort

Cooperative Control and Potential Games - Semantic Scholar
However, we will use the consensus problem as the main illustration .... and the learning dynamics, so that players collectively accom- plish the ...... obstruction free. Therefore, we ..... the intermediate nodes to successfully transfer the data fr

Maximum principle for optimal control of ... - Semantic Scholar
Feb 19, 2007 - E-mail: [email protected], ...... A. A., BANGA, J. R. & PEREZ-MARTIN, R. (1998) Modeling and adaptive control of a batch steriliza-.

Iterative learning control and repetitive control in ... - Semantic Scholar
shown in Figure 1 where VCM (voice coil motor), spindle motor, disk (media), ...... Proceedings of the IEEE International Conference on Decision and Control ...

Joint Scheduling and Power Control for Wireless ... - Semantic Scholar
This is further aggravated in ad-hoc networks since all nodes are mobile ..... Go to next slot i = i + 1 .... We compare the structure of the power control problem.

Topology and Control Innovation for Auxiliary ... - Semantic Scholar
LED lighting applications will require forced-air convection because of the high intensity of light needed such as recessed light, spot light and track light. Regular fans, however, introduce life time and reliability concern and for indoor applicati

Optimized Gain Control for Single-Frequency ... - Semantic Scholar
amplify-and-forward single-frequency relay link in which loop interference from the relay transmit ... The authors are with the Department of Signal Processing and Acoustics,. Helsinki University of Technology, P.O. ... with the amplify-and-forward p

A Multi-Agent System for Airline Operations Control - Semantic Scholar
(Eds.): 7th International Conference on PAAMS'09, AISC 55, pp. 159-168 ... Operations control is one of the most important areas in an airline company. Through ...

Optimal Hybrid Control For Structures ∗ 1 ... - Semantic Scholar
Phone: (937)455-6458. Robert E. ... Phone: (619)-822-1054. ...... Those are active controller configurations to save active control energy consumption and at the.

an adaptive parameter control strategy for aco - Semantic Scholar
Aug 16, 2006 - 1College of Computer Science and Engineering, South China University of Technology, Guangzhou, P. R. ... one of the best performing algorithms for NP-hard problems ..... program tools, systems and computing machines.

Experiments in learning distributed control for a ... - Semantic Scholar
Aug 28, 2006 - Institute for Aerospace Studies, University of Toronto, 4925 Dufferin .... This may be done by way of a set of basis behaviours ..... We call the modified .... ings of IEEE International Conference on Evolutionary Computation,.

Iterative learning control and repetitive control in ... - Semantic Scholar
sophisticated HDD servo controls, Messner and Ehrlich [1] presented a nice tutorial on controls for disk ... Electrical and Computer Engineering, 4160 Old Main Hill, Utah State ... For example, a disk drive product in the year 2000 ... simple words,

Anesthesia for ECT - Semantic Scholar
Nov 8, 2001 - Successful electroconvulsive therapy (ECT) requires close collaboration between the psychiatrist and the anaes- thetist. During the past decades, anaesthetic techniques have evolved to improve the comfort and safety of administration of

Considerations for Airway Management for ... - Semantic Scholar
Characteristics. 1. Cervical and upper thoracic fusion, typically of three or more levels. 2 ..... The clinical practice of airway management in patients with cervical.