Per-Flow Performance Guarantees in Networked Systems with Complex Feedback Structures
Abstract
Many modern networked real-time systems encompass complex feedback structures and require stringent timing guarantees, especially bounds on the network delay. Network Calculus (NC) is a versatile methodology to compute such performance guarantees per individual flow; in particular, some fundamental results on how to deal with feedback exist. Yet, these are restricted to simple feedback structures and are mostly constrained to an analysis at the aggregate level (not per flow). In our work, we analyze more complex feedback structures than previously investigated by reducing them to canonical structures. We transform these closed-loop systems (with feedback) into open-loop systems (without feedback) and, subsequently, perform a per-flow analysis exploiting very recent NC results on per-flow performance guarantees. In a numerical experiment, we compare our new method to the current state-of-the-art which only allows for an aggregate FIFO analysis. We also compute how feedback constraints need to be allocated to ensure that a feedback system provides the same service as the system without feedback, in a sense providing for an optimal control. Furthermore, we compare different allocation strategies under a fixed budget for the feedback constraints.
Keywords and phrases:
Real-Time Networks, Network Calculus, Feedback ControlCopyright and License:
2012 ACM Subject Classification:
Networks Network architectures ; Networks Network performance evaluation ; Computer systems organization Real-time systemsEditors:
Renato MancusoSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
Traffic control is an important issue for networked systems with stringent QoS requirements, such as packet loss and deadlines. This control can be realized through various feedback mechanisms signaling between components in a system. The signaling can take different shapes. It can be used to model some type of acknowledgement for a sender to adjust its sending rate (window flow control). Finite memory buffers are another interesting concern, as generally in real-time systems lossless packet transfer is assumed. In this scenario, exceeding a buffer’s capacity would inevitably lead to packet loss in the system. Consequently, some form of feedback is required, such that a receiving node can signal to its predecessor in the system that its output has to be paced down to not cause packet loss at the receiving node. Such feedback mechanisms are found in different application areas, for instance, in Network-on-Chip (NoC) [24], networked control systems [3] and manufacturing systems [11, 21, 23].
There are different ways to conduct the timing analysis of feedback systems. For NoCs, deterministic [27, 35, 34] as well as stochastic [18, 22, 17] modeling can be applied. We can also optimize buffer allocations to reduce the impact of an existing feedback control [13, 20]. For manufacturing systems, the predominant modeling and analysis is done with stochastic models [10, 28, 38]. A comprehensive review of existing analysis methods for manufacturing systems is found in [29].
Another interesting option is to use Network Calculus (NC) to conduct a worst-case performance analysis of systems with feedback structures. NC is a versatile analytical methodology which is directly related to the real-time calculus [36] and has a formal link to response time analysis [31]. NC has been utilized to analyze a variety of systems, for instance, again NoCs [30, 4, 26, 9]. The basic framework resulted from the seminal work of Cruz [14, 15] and has been further developed by Chang [12] and Le Boudec [6]. An up-to-date overview of the framework is found in [7]. At its core, traffic is upper-bounded by maximal arrival curves and lower-bounded by minimal arrival curves, while server capacities are lower-bounded by service curves. Using these curves, performance bounds can be derived. These bounds are either computed per-flow, i.e., only a single flow of interest is considered, or on the aggregate, where all traffic along a given network path is considered.
Initial work on NC analysis of systems with feedback constraints has been done in [2, 16, 1]. Here, hop-by-hop and end-to-end window flow control was considered, where only a finite amount of unacknowledged packets can be sent. The initial work on feedback structures was extended for systems with bounded buffers in [12] for a system with multiple nodes; and in [37], where methods to model and analyze systems with finite buffers that cause system-wide back-pressure are explored. Based on [12], the technique was mapped to manufacturing blocking systems [5] and further analyzed to generalize the formulas for stream processing systems that deal with complex state dependencies in [8]. In [40], the authors compared the computation times of different end-to-end service curves for such systems. In [1, 12], the minimal window size for a single feedback loop to have no impact on a service curve is determined.
Despite these fundamental results, the current state-of-the-art NC analysis for systems with feedback control is still limited. While we can analyze systems on an aggregate level, per-flow performance bounds can only be calculated when assuming network-wide FIFO scheduling [30]. For non-FIFO scheduling (e.g. static priority), however, we encounter the inherent need of strict service curves. This special type of service curve enables the scheduling-agnostic subtraction of arrival curves. However, the concatenation of multiple of such curves generally destroys their strictness property [7, Prop. 6.2]. Yet, the concatenation of servers is crucial for an accurate end-to-end analysis.
In [19], an alternative to obtaining a per-flow service curve is presented, where the existing NC framework was extended to not require a strict service curve to calculate a residual service curve even under non-FIFO scheduling disciplines. In return, the existence of a minimal arrival curve is assumed. Exploiting this result, we are able to derive a general end-to-end service curve for a system with feedback structures while maintaining the ability to calculate per-flow performance bounds under non-FIFO scheduling. To this end, we make the following contributions in this paper:
-
We generalize existing NC results for the transformation of an arbitrarily large closed-loop system, having a single feedback constraint, into an open-loop system.
-
We study all possible types of canonical interdependence types between two feedback constraints and show how the interdependency is resolved. We derive a transformed service curve for each type, as well as an end-to-end service curve.
-
We show how to resolve the transformation of a closed-loop system with arbitrarily many feedback constraints using the previously derived results. We present a method to calculate per-flow end-to-end performance bounds for arbitrary cross flows and feedback structures in tandem networks.
-
We show how the optimal buffer dimensioning for arbitrary tandem networks and feedback structures without any adverse effects on the performance bounds can be calculated.
-
We study different resource allocation schemes for the feedback constraints in a network. We evaluate their effects on per-flow delay bounds in comparison to optimal feedback resource allocations.
The remaining paper is structured as follows. We introduce the NC framework and important results in Section 2. Afterwards, we present the state-of-the-art NC results on systems with feedback structures in Section 3.1. In Section 3.2, we show that strict service curves are not suitable in the modelling of feedback systems. We conclude in Section 3.3 with a discussion on what is missing to perform a NC analysis for a general tandem network with arbitrary, potentially nested, feedback structures. In Section 4, we first derive an end-to-end service curve for a single feedback constraint in a general tandem. Then, we turn to general feedback tandems with many potentially interdependent feedback constraints. Here, we investigate different interdependence types between feedback constraints and show how to derive transformed service curves for their canonical versions. Finally, we discuss how to deal with cross flows and obtain per-flow performance bounds. In Section 5, we evaluate our new results against the existing NC analysis under FIFO scheduling. We demonstrate how the existing result for calculating optimal window sizes can be generalized for feedback constraints with interdependencies. At the end, we compare various resource allocation strategies for the feedback constraints to minimize delay bounds.
2 Network Calculus Background
We proceed with a brief overview of the relevant NC results that are used throughout the paper. Let be the set of non-negative real numbers. We define the set of (min, plus) functions as . Based on , we let be the set of non-decreasing functions , and be the set of functions in with . We define some basic operators that are the basis for other NC results.
Definition 1 (Basic Operators [7, Chapter 2]).
Let . The min-plus convolution of and is defined as , the min-plus deconvolution is defined as . The max-plus deconvolution is defined as . We define the operator as .
The neutral element of is defined as We define the lower non-decreasing closure as . We further make note of several properties of the and operators:
Remark 2 (Distributivity, Commutativity, Associativity [12, Chapter 2.1.1]).
Let . Then, it holds that
Remark 3 (Isotonicity of [6, Thm. 3.1.7]).
Let . If and , then .
Next, we define various notions that are used to model a network and derive its performance bounds. Let be the cumulative arrival and departure process of a flow in the network, assuming causality . Furthermore, we assume all systems to be lossless. We define the most important performance measures for such a system:
Definition 4 (Backlog at Time [6, Def. 1.1.1]).
The backlog of system at time is the vertical distance between arrival process and departure process at time ,
Definition 5 (Virtual Delay at Time [6, Def. 1.1.1]).
The virtual delay of data arriving at system at time is the time until this data would be served, assuming FIFO-per-flow order of service,
Arrival and service curves are essential elements of the performance analysis using NC.
Definition 6 (Maximal and Minimal Arrival Curve [7, Def. 5.1,5.2]).
Let . We say that is a maximal arrival curve for arrival process , and is a minimal arrival curve for , if it holds for all that
Definition 7 (Min-Plus Service Curve [7, Def 5.3]).
Let a flow with arrival process and departure process traverse a system . The system offers a min-plus service curve to the flow if and it holds for all that
An example of a maximal arrival curve is the token-bucket arrival curve, given by for , and . A frequently employed function for both minimal arrival curves and service curves is the rate-latency curve . An illustration of a token-bucket arrival, a rate-latency service curve, as well as the corresponding arrival and departure process, is given in Figure 1.
The following definition provides a stricter notion of a service curve.
Definition 8 (Strict Service Curve [7, Def. 5.5]).
A system offers a strict service curve to a flow if, during any backlogged period (i.e. ), it holds that
The difference between a min-plus and a strict service curve is depicted in Figure 2. It can be observed that whenever the system is backlogged, the strict service curve offers rate to the backlogged arrivals until they have been served. On the contrary, the min-plus service curve offers a minimal guarantee of , independent of the amount of backlog in the system.
Now consider a system that arbitrarily multiplexes two flows constrained by arrival curves and a server guaranteeing a strict service to the aggregate of the flows. A so-called residual service curve for a specific flow, i.e., the fraction of the full service a server offers that is guaranteed to this specific flow can be calculated by [6]
A larger residual service curve, under FIFO multiplexing, is given and applied in Section 5.1 (see Equation (15)).
We define two characteristic distances between two given functions.
Definition 9.
Let . The vertical deviation between and is defined as
and the horizontal deviation between and is defined as
Using these concepts, one can derive performance bounds for the measures defined previously[7, p. 115],[6, p. 118].
Theorem 10 (Performance Bounds).
Assume an arrival process , constrained by maximal arrival curve , traverses a system . Let the system offer a service curve . The virtual delay satisfies for all t
The backlog satisfies for all t
In Figure 1, an example on where the performance bounds are measured for the token-bucket arrival and rate-latency service curve is given.
A central result of NC is the concatenation theorem. It is crucial in order to calculate accurate end-to-end performance bounds.
Theorem 11 (Concatenation Theorem [12, Thm. 4.3.2]).
Let a flow with arrival process traverse systems and , offering service curves , in sequence. Then, the concatenation of the two systems, offers an end-to-end service curve to the arrival process.
In the context of the modeling of feedback mechanisms, an important concept is the so-called sub-additive closure. It transforms a curve such that the sub-additive property holds.
Definition 12 (Sub-additive Functions [6, Def. 3.1.11]).
Let . Then is sub-additive if for all
Definition 13 (Sub-additive Closure [6, Def. 3.1.12]).
Let . The sub-additive closure of is defined by
where is the -fold self-convolution of , i.e., , and for
An example of the result obtained through the sub-additive closure is illustrated in Figure 5. We state some useful properties of the sub-additive closure.
Lemma 14 (Properties of Sub-Additive Closure [12, Lem. 2.1.5]).
Let , it holds that
| (1) | |||
| (2) | |||
| (3) |
3 Simple Feedback Systems
We divide this section into three parts. We first cover the state of the art on the feedback system analysis using NC in Section 3.1. In Section 3.3, we discuss how we extend the state of the art to deal with general feedback tandem networks with arbitrary length and number of feedback constraints in the system, including interdependencies between feedback structures. In Section 3.2, we show that, assuming strict service curves, existing feedback constraints would have no effect on the system, and, thus, strict service curves are not suitable for modelling feedback systems.
3.1 State of the Art
We first consider a basic system with a feedback structure as in Figure 3 on the left. We assume that the server has a finite buffer that holds incoming packets of the arrivals . After processing, some departures leave the server. To ensure that there are no more arrivals to the node than the buffer can hold at a time, the node signals to the sender (or previous node) whether space is still left in the buffer. This feedback is modeled by some function that depends on the departures. If there is no more space in the buffer, the sender throttles its sending rate accordingly and buffers the data itself until it is allowed to send again, essentially performing a blocking write. This mechanism is represented by the gray backwards loop in Figure 3. The effect of the throttling adjusts to , which we call the effective arrivals to the server.
The analysis of the system is then done in several steps. We call the model in Figure 3 on the left a closed-loop system, i.e., the system has (feedback) edges that form a closed loop. The closed-loop system is min-plus non-linear [6, p. xix], and consequently cannot be directly analyzed using NC, as the framework is tailored to min-plus linear systems. It is hence the first step to resolve this feedback loop by transforming the closed-loop into a min-plus linear open-loop system. The general idea here is that we “encode” the flow control into the node at which the control signal is fed back into the data flow. The feedback is then effectively exerted by the server itself by adjusting the service it can offer to incoming arrivals. The resulting open-loop system is min-plus linear, and can be analyzed using NC. Since the transformation is a safe operation, any performance bounds we obtain for the open-loop system are also valid bounds for the closed-loop system. There is, however, generally no equivalence between the two systems, i.e., the open-loop system is an upper bound on the closed-loop system.
For us to be able to transform the closed-loop system for a NC analysis, we perform the transformation of the example system in Figure 3 from the left to the right. To this end, we introduce some preliminaries. We let be a feedback constraint or loop, where is the server in front of which the feedback is entering the data path, is the server behind which the feedback loop starts. represents the cumulative feedback at time , and represents the type of feedback that is employed, as discussed previously. We call with a feedback curve when . By abuse of notation, we also write interchangeably with . In most existing NC work on flow control, a fixed window size is assumed that cannot be exceeded by incoming traffic, i.e., , . The feedback curve for this fixed window size is part of the general model presented in [7, Chapter 6.2.2] and is defined as
| (4) |
since (see also [12, p. 79]). Further, we specify the effective arrivals as
| (5) |
Through the usage of the minimum () as a throttle, we ensure that the arrivals can never exceed the allowed maximum size to not violate the feedback control.
Besides causality in the system, i.e., , it is further assumed that the server offers a min-plus service curve to
| (6) |
where we also used Equation (5). Based on Equation (6), the next step is to transform the closed-loop into an open-loop system (see also Figure 4). We restate the central result from [12, Theorem 2.1.6]:
Theorem 15.
Let an arrival process traverse a system offering service curve . The system is subject to a feedback curve . If
then
Using this result, we effectively encode the feedback constraint into by calculating a transformed service curve (also called equivalent service curve in [40]). Here, the transformed service curve of is . The transformation of the example closed-loop into open-loop system is illustrated in Figure 4. Here, the feedback loop is replaced by the transformed service curve. Recalling the definition of the sub-additive closure in Definition 13, we illustrate its effects in the transformed service curve. Assuming that is a rate-latency service curve and , the transformed service curve is depicted as the red curve in Figure 5. The grey curves illustrate the sub-additive closure operation . Here, each curve represents the result of another self-convolution of . The illustrated two different scenarios depend on the relation between the service curve parameters and and the size of the feedback constraint . If we have for the so-called bandwidth-delay product [1] that , the feedback constraint has no effect on the system, and (see Figure 5(b)). This stems from the fact that is always smaller than . If , calculating the sub-additive closure leads to a reduction of the transformed service curve, and consequently . This can be observed in Figure 5(a). This reduction stems from the fact that quickly becomes larger than . Hence, follows the sub-additive closure .
To recapitulate, we are given a closed-loop system, similar to the system we have examined in the introductory example. We use Theorem 15 to encode the feedback constraint existing in the closed-loop system into the service curve directly, resulting in an open-loop system that has no feedback any more, but a transformed service curve . This new system constitutes a min-plus linear upper bound to the original system and can be analyzed with respect to performance bounds using NC.
We introduce another aspect of feedback constraints that will be subject to analysis in the paper. Assuming a static window flow control using for some , we can obtain the optimal size of such that holds by
This is studied in detail in [1, 12, 7]. Looking again at Figure 5, the optimal would be attained if , since all the grey curves would then lie on the red curve, or, more formally, . We will expand on this result in Section 5.2.
We note that Theorem 15 makes no assumption about the type of service curve that is required to perform the transformation to an open-loop system, i.e., it only requires a min-plus service curve. In fact, we can show that this is the only relevant type of service curve we have to consider. We will discuss this in more detail in the next section.
3.2 The Issue of Strict Service Curves
Here, we show that, assuming strict service curves, feedback constraints would have no effect on closed-loop systems. We prove this observation for the special case of fixed window flow control, i.e. . To this end, we first show that a backlogged period of a system without feedback is contained in the backlogged period of a closed-loop system.
Lemma 16.
Let an arrival process traverse a server offering a strict service curve . The feedback constraint in the system has a fixed size . Let . It holds that
| (7) |
Proof.
We prove by contradiction. Assume that , but (due to causality is impossible). Then,
| (8) |
But, as per assumption it holds that and also with . Hence, Equation (8) does not hold and thus Equation (7) must hold.
This shows that, under strict service, any backlogged period for the original arrivals is also a backlogged period for the effective arrivals and therefore we have:
Proposition 17.
Let an arrival process traverse a server offering a strict service curve . The system has a feedback constraint of size . Let . If is a strict service curve for the closed-loop system, it is also a strict service curve for the open-loop system, i.e., for any backlogged period for the arrivals , we have that
Proof.
Let be a backlogged period for the arrivals . From Lemma 16, it holds that is also a backlogged period for . It follows that for both the closed- and open-loop system
The reason behind this somewhat surprising observation is that the latency of a strict service curve does not model a physical propagation delay (as the service curve). As such, we are never facing the case that the bandwidth delay product [1] is larger than the feedback constraint , and thus the feedback constraint has no impact on a system with a strict service curve. In other words, this renders strict service curves meaningless in the context of feedback system modelling.
3.3 Extending the State of the Art
So far, we only treated the basic case of a single feedback constraint. However, what we try to achieve is to be able to transform a closed-loop system with arbitrary many flow control mechanisms into an open-loop system. This has not been done in literature, previously. We have results for a feedback constraint spanning up to two nodes [12, 5, 8, 7, 19], but there are no existing results for feedback constraints spanning an arbitrary number of nodes. This is desirable, however, as we can have systems that employ different kinds of feedback mechanisms, such as an end-to-end window flow control or more complex signaling mechanisms for finite buffers that span over more than two nodes. This inevitably leads to feedback constraints that have interdependencies with other feedback constraints, where the transformed service curve of one feedback constraint is part of another feedback constraint. In Section 4, we identify all of these interdependence types, and how to transform them into corresponding open-loop systems. This, in return, enables the NC analysis for any kind of feedback structure in a tandem network, regardless of the existing interdependencies between feedback constraints in the network.
4 Complex Feedback Systems
In the following, we extend existing results for analyzing more complex feedback systems using NC. We first provide a straightforward generalization of Theorem 15, allowing us to analyze a single feedback constraint spanning an arbitrary number of nodes. Then, we study the different canonical interdependence structures systems with multiple feedback constraints can exhibit, and how to transform them into open-loop systems. Here, we show how to obtain transformed service curves for all relevant service curves in the closed-loop system, as well as an end-to-end service curve for the open-loop system. Finally, we discuss how we can obtain per-flow performance bounds using the respective open-loop systems despite the open-loop system consisting of min-plus servers.
4.1 Single Feedback Systems of Arbitrary Length
We assume a network as in Figure 6, where we have nodes as well as one feedback constraint in the system. To that end, we first generalize some of the equations introduced in the previous section. We define the effective arrivals at server as
The departures at server are characterized by
Theorem 15 can then be generalized as follows:
Proposition 18.
Let a flow traverse a tandem of nodes, each offering a service curve , with a single feedback constraint . The tandem offers an end-to-end service curve to the flow
| (9) |
and a transformed service curve at node
| (10) |
Proof.
Let be the arrival and departure process at each node . First, using Theorem 11, we calculate respective service curves for the subsystems from node to node , node to node 111If , we assume as usual that the empty convolution becomes the neutral element ., and node to node :
The arrivals at node can then be characterized by
For the departures at node we have that
Consequently, the feedback loop at node can be transformed into an open-loop system using Theorem 15:
proving Equation (10). Then, using Theorem 11 again, the final output of the tandem is bounded by
where . This proves Equation (9).
Equipped with Proposition 18, we can deal with single feedback loops of arbitrary length. Next, we proceed with an analysis of closed-loop systems that have multiple feedback loops.
4.2 Feedback Interdependence Types
Figure 7 illustrates the general feedback tandem network that we aim to be able to analyze. Here, we consider nodes in a network, as well as an arbitrary number of feedback constraints . In Figure 7, all possible interdependence types between feedback constraints that may occur are shown. In addition, a general flow aggregate consisting of multiple flows that may interfere with the flow of interest in any possible way across the nodes is illustrated (in colors). We point out again that the transformation of a closed-loop into an open-loop system is done before we consider any existing flows in the system.
In the following, we assume an ordered set of feedback constraints . The feedback loops are lexicographically ordered by the data path entering node as first criterion in ascending order, and the starting node of the control signal as second criterion in descending order. Let and be two feedback constraints with . If , then the two feedback loops are not interdependent with each other and can be evaluated independently from each other using Proposition 18. If, however, , then they are interdependent and their respective evaluation needs to take that into account.
There are different types of interdependence. First, let us assume that , i.e., the second feedback enters the data path at a strictly later point in the tandem than the first one. If also , we have a so-called contained interdependency between the constraints and (see also Figure 8 for an example). If, on the other hand, , then we call it an overlapping interdependency between and (see also Figure 9 for an example). Now let us assume , i.e., both feedback loops enter the data path at the same point in the tandem (see also Figure 10(a) for an example). Due to the lexicographical ordering of the feedback constraints we have that . While this configuration is similar to the contained interdependence type, the treatment of this special case justifies a separate type called compounded interdependency.
Figures 8-10 illustrate canonical versions of these three interdependence types, i.e., minimal tandem networks that exhibit each of the previously classified interdependence types. We note that we can adjust these structures to a larger size by making use of Proposition 18. In the following, we derive transformed service curves as well as an end-to-end service curve for each canonical interdependence type.
4.2.1 Contained Feedback
As illustrated in Figure 8, we have an arrival process , and each node offers a service curve . We also have feedback constraints and . We first transform into an open-loop system, as none of the servers it spans are subject to the feedback constraint . We have for that
Applying Theorem 15 to this, we obtain
| (11) |
and hence .
Turning to the feedback constraint , with Equation (11) and starting from the final departures , we derive
In the third line, the service curve property of is used and that . We have the effective arrivals , and can apply Proposition 18 to obtain
where we used Lemma 14, Equation (1) in line 2 and Equation (2) in line 3, as well as the commutativity of the min-plus convolution (see Remark 2). From this, we directly obtain the end-to-end service curve for the flow aggregate as
and from Proposition 18, we have that
It can be observed that we can effectively “open the loop” for before using it to open the loop for . For the analysis of larger feedback structures this ordering relation is important to take into account.
4.2.2 Overlapping Feedback
Let and be the two feedback constraints as illustrated in Figure 9. We first focus on only and transform the corresponding subsystem (node 2 and 3) into an open-loop system using Proposition 18 to obtain
and hence . Turning to now and using , we have a single loop feedback system for which we can apply Proposition 18 again to obtain
where we used Lemma 14, Equation (1) in line 3, and Equations (2) and (3) in line 4, as well as the commutativity of . So, the end-to-end service curve is given by
From Proposition 18, we also have that
These results have been previously stated and proven in [5, Theorem 3.18], [12, p. 82-83], but they are included in this paper for completeness.
Again, it can be observed that we effectively open the loop for before .
4.2.3 Compounded Feedback
The canonical compounded feedback pattern illustrated in Figure 10(a) is structurally different from the others as the feedback loops enter the data path at the same point in the tandem. In order to ease deriving an end-to-end service curve for compounded feedback, we first observe that both feedback structures in Figures 10a and 10b are equivalent. Let and be the two feedback constraints. For the system in Figure 10(a), the effective arrivals are given as
| (12) |
For the system in Figure 10(b), they are
| (13) |
As Equations (12) and (13) are equivalent and each characterizes the respective feedback structure, we can also use the pattern in Figure 10(b) to evaluate the canonical compounded interdependence pattern. To that end, we transform the inner feedback first. The partial open-loop system immediately follows from Theorem 15:
For the outer feedback loop , we can use Proposition 18 again to obtain
where we used Lemma 14 again in line 2.
Therefore, is the end-to-end service curve for the flow aggregate and the transformed service curve for is obtained as
Again, we observe that is evaluated before .
Note that in the case of and , i.e., the extreme case of compounded feedback spanning the same set of nodes, we only need to evaluate a single feedback loop, however, with feedback constraint . For instance, assuming in Figure 10(a) that started behind the second server (like ), we would have that (using the distributivity from Remark 2)
4.3 Order of Evaluation in the Feedback Tandem
It is left to discuss in which order the closed-loop systems have to be transformed into open-loop systems to deal with the complex feedback structure of a general tandem as in Figure 7. In fact, the lexicographic order defined in Section 4.2 is instrumental for that purpose. As we have observed for all interdependence types, had to be evaluated before , i.e., we need to proceed in reverse lexicographic order to transform the canonical cases into open-loop systems.
This directly generalizes for the feedback tandem. Given a network with feedback constraints in lexicographic order, the last feedback constraint does not depend on any other constraint , . More specifically, since , cannot overlap ; also, in case that , then and thus is not contained in . At most we could have the special case of a compounded interdependency where and . Yet, as discussed at the end of the previous subsection, we can combine them into a single feedback constraint. Hence, we first open the loop for , then apply the same reasoning for the remaining feedback constraints until we have reached a completely open-loop tandem network.
We point out that even more general feedback networks than a tandem could be analyzed, based on the evaluation precedence rules as we obtain them from the different interdependence types. We can build a (directed) precedence graph with the feedback constraints as vertices; determining the interdependence type between two constraints and would then govern whether an edge between vertex and exists and its direction. If this precedence graph had no cycles, i.e. it is a directed acyclic graph, then we could perform a topological sort to find a feasible evaluation order of the feedback loops. The cyclic case we leave for future work as it is out of scope for this paper.
4.4 Network Analysis
In principle, after we have dealt with all feedback loops and have arrived at an open-loop system, we seem to face a classical NC problem: We consider to be the flow of interest (foi), and to be cross flows interfering with the flow of interest at different sub-paths of the tandem (see again Figure 7, especially the lower part); each flow is constrained by a maximal arrival curve . Yet, for the servers , classically we would need to assume strict service curves in order to make use of existing network analyses like, e.g. PMOO [33, 32] (the only exception being FIFO scheduling). However, the transformed service curves in the open-loop tandem are not strict but just min-plus service curves (see Section 3.2 on why strict service curves are generally not useful in the modelling of feedback systems).
Instead, we make use of recent results in [19] where a residual service curve is calculated from a min-plus service curve as
| (14) |
where is the aggregate maximal arrival curve of all cross flows at node . This is still a min-plus service curve (see also [7, Theorem 7.3]) and can be used to calculate a valid residual service curve for any scheduling policy. Yet, in general, it is partially negative and decreasing and thus not in . Therefore, we cannot apply Theorem 10 to compute performance bounds anymore. However, in [19] we find a replacement for Theorem 10 when a service curve can be partially negative, enabled by the assumption of a minimal arrival curve for the foi:
Theorem 19.
Let an arrival process traverse a system . Further, let the arrivals be constrained by maximal arrival curve , and minimal arrival curve , and let the system offer a min-plus service curve , with its lower non-decreasing closure. The backlog q(t) satisfies for all t
The virtual delay d(t) satisfies for all
Here, the -distance is defined as . Consequently, we can make use of network analysis algorithms like PMOO again, despite not having a strict service curve, also when scheduling is not just FIFO. This makes feedback systems in general an interesting application for the new results. In fact, in [19] feedback systems are an application example, yet only a very simple instance with just a single server and two competing flows is treated. The following numerical experiments use our new insights in much more complex feedback systems.
5 Numerical Experiments
By means of numerical experiments we illustrate the application of the proposed method to deal with complex feedback systems as well as provide some quantitative comparison against state-of-the art techniques. We consider the sample feedback tandem network in Figure 11. Here, we have two application types of feedback constraints: - are bounded buffers requiring a feedback signalling to prevent packet loss; and are due to local window flow control mechanisms, and is due to an end-to-end flow control in order not to overwhelm the final receiver. With these feedback applications we cover all types of interdependence. All feedback curves are modelled by , where is defined as in Equation (4). As such they all signal a fixed upper bound to preceding nodes that must not be exceeded by incoming traffic. This fixed upper bound is either the size of a finite buffer or the amount of unacknowledged packets that can be in transit at a time.
First, we calculate delay bounds using a state-of-the-art FIFO analysis for feedback systems and compare it to the analysis of a Static Priority (SP) scheduling for sub-flows of our flow of interest. The latter is only possible with our new method. Afterwards, we determine the optimal feedback size for each to avoid any adverse effects of the feedback constraints on the delay analysis. Finally, under the assumption of a limited total budget for all feedback constraints, we compare different strategies to allocate the budget to each of the feedback constraints.
5.1 System Modeling and Delay Analysis for FIFO and SP Scheduling
In the following, we have five flows , where is the flow of interest. We also assume that consists of four sub-flows with different priorities, where has the highest priority and the lowest. Application-wise, we interpret the highest priority as absolutely time-critical, for instance, sensor data, while represents Best-Effort (BE) traffic.
In a first step, we derive transformed service curves that turn the closed-loop system from Figure 11 into an open-loop system. To this end, the feedback constraints are evaluated in the reverse lexicographic order . Thus,
with ,
with ,
with and ,
with and .
This takes us to the open-loop network in Figure 12, where are replaced by their transformed service curves . We observe that there are no feedback constraints left in the open-loop system, but the respective feedback properties are effectively contained within the transformed service curves.
Next, we calculate the FIFO residual end-to-end service curve for our flow of interest in the open-loop system. This is done using the PMOO analysis following the principle to always concatenate as many nodes as possible before computing residual service curves [33, 32]. For instance, in our case we first compute the concatenation of node and by convoluting the respective service curves and , and then calculate the residual service curve with respect to cross flow . For the calculation of the residual service curves we apply the well-known FIFO result [7, Theorem 7.5]
| (15) |
where we choose . This choice for minimizes the length of the interval over which , .
This choice for minimizes the latency (period for which it is 0) of the residual service curve under token-bucket arrival and rate-latency service curves [6].
| Parameter | Value | |
|---|---|---|
| Service curve: | ||
| Feedback: | ||
| Cross flows: | ||
| Flow of interest: | ||
| Sub-flows: | ||
For the FIFO analysis of , we can now directly calculate performance bounds based on Theorem 10. For the SP analysis of the sub-flows of , we use Equation (14) to calculate their respective residual service curves, taking into account sub-flows with higher priorities as crossflows. We note that, since we assume to be min-plus service curves, we cannot make use of the residual service curve calculation in [7, Theorem 7.6], as this requires to be a strict service curve. Rather, we use Theorem 19 to calculate the sub-flow specific delay bounds.
We point out that the residual service curves calculated using Equation (15) are always positive and non-decreasing, while the residual curves calculated with Equation (14) are partially negative and decreasing. This is also shown in Figure 13.
The parameters used in our experiments are given in Table 1. Here, means that each feedback constraint has a fixed size . Also note that the burst of the maximal arrival curve of the foi is the sum of the bursts of its sub-flows and , as it holds that the sum of token-bucket arrival curves is again a token-bucket arrival curve for the aggregate. All experiments are conducted using the network calculus library Nancy [39]. We examine two different factors: bottleneck utilization and burstiness of BE traffic . First, we compare the delay bounds for the FIFO and SP analyses against the utilization of the bottleneck node . The results are illustrated in Figure 14. We see that the delay bounds for the FIFO analysis lie between the SP bounds of and . This exhibits the inherent issue of FIFO scheduling, not being able to protect time-critical traffic from BE. We remark that, except for , all SP delay bounds were calculated using the -value of Theorem 19, explaining the constant behavior of the delay bounds for some periods as the -distance does not react directly to a decreasing bottleneck capacity. On a similar note, due to the residual service curve shapes as shown in Figure 13, we see several utilizations where the bounds are increasing sharply. This stems from the fact that changing the utilization also affects the creation and periods of these functions, resulting in fluctuations of the bounds.
Next, we explore the effects of increasing the burst size of the BE traffic . We use the default parameter set from Table 1, but let run from to , instead. The results are illustrated in Figure 15. This scenario reinforces what we discussed in the previous paragraph. As the FIFO analysis is an aggregate analysis, increasing the burst size of a lower priority class also increases the delay bounds for more time-critical traffic. For the SP analysis, we do not observe this behavior other than for flow , as SP isolates the other flows from the “bad behavior” of and we can still calculate good per-flow delay bounds.
5.2 Optimal Feedback to Avoid Adverse Feedback Effects
We have seen how to deal with existing feedback mechanisms in a complex feedback system. However, depending on the application, it may not be desirable to have adverse effects from feedback control on the performance bounds of the system, at all. From a system design perspective, we can try to achieve this by providing enough resources, such as buffer space, for instance. But how do we determine the required resources that are needed in the system? We briefly restate the previously presented result from Section 3.1. For a feedback curve , and for a single feedback constraint, we obtain the optimal such that as
| (16) |
Indeed, even with more complex feedback structures, Equation (16) can still be applied. To that end, we make use of the same (lexicographic) order of feedback resolutions as discussed in Section 4.3 and proceed as follows: Assuming we have feedback loops in the network, we calculate the optimal window size for feedback loop and transform this closed loop into an open loop system with . Next, we can apply Equation (16) again to obtain and transform . We proceed in this manner for all remaining feedback loops until we have obtained a transformed service curve for all existing closed-loop feedback constraints. Essentially, since we only consider a single feedback constraint at a time, we can iteratively apply Equation (16). This procedure results in a network that has no adverse effects on performance bounds from feedback constraints. Indeed, we can interpret this as the minimal cost of the system (in terms of resource requirements) at wich we have no adverse effects of the feedback, and thus view this as optimal feedback. We can further calculate performance bounds for the system and confirm whether the system still meets existing timing requirements.
Applying this procedure to the example network, we obtain the optimal as . Comparing the optimal values to the ones we (arbitrarily) picked in Section 5.1, we realize that the feedback constraints spanning more nodes () are under-provisioned, while to were already given their optimal values.
5.3 Quantitative Analysis of Fixed Budget Allocation
While calculating the optimal feedback is possible, network design usually has inherent restrictions on the budget that is available to dimension buffers. As a consequence, a required resource budget is usually higher than an available resource budget . In the following, we study different strategies for resource allocations for the feedback constraints and compare them to each other and the optimal allocation from the previous subsection with respect to delay bounds.
5.3.1 Uniform Allocation
We divide the available budget by the number of feedback constraints in the network and assign the result to each . This is exactly the allocation that was used in Section 5.1. This may be a sensible allocation strategy when there is not enough information about the network to use one of the following strategies, as they require knowledge of and the optimal values for the feedback constraints.
| Available Budget | |||||||
|---|---|---|---|---|---|---|---|
| Opt. | Max-Min | Prop. | Unif. | Max-Min | Prop. | Unif. | |
| FIFO | |||||||
| SP | |||||||
| SP | |||||||
| SP | |||||||
| BE | |||||||
| Max-Min | Prop. | Uniform | |
|---|---|---|---|
| FIFO | |||
| SP | |||
| SP | |||
| SP | |||
| BE | |||
5.3.2 Proportional Allocation
Under the assumption that we know and the optimal , and have an available budget , we can make an allocation that is proportional to the optimal allocation by setting
5.3.3 Max-Min Fair Allocation
We again assume that we have knowledge of and the optimal . We make use of the water-filling algorithm from [25], which results in a max-min fair allocation. Here, we fill all constraints equally until we reach the optimal value for some . We remove all such from the set, then repeat the previous step until the available budget is exhausted (or all optimal values are reached).
5.3.4 Evaluation
We use the same parameter set as given in Table 1, as well as with as as calculated in Section 5.2. We set to be either or of and determine the resulting delay bounds for the three allocation schemes for the FIFO and SP analyses. The results are given in Table 2, where the most accurate delay bound for each analysis and proportion is marked in gray. We make some interesting observations regarding the different allocations. We find that the max-min allocation provides the most accurate bounds for the SP analysis for and of . If is only of , the allocation degenerates into the uniform allocation, as we have already used the whole budget during the first iteration of the water-filling algorithm. For the FIFO analysis, the proportional allocation provides the most accurate delay bounds across all three budgets. Expectedly, the uniform allocation provides the most inaccurate delay bounds for both analyses, as it does not take into account any knowledge about the system under study.
6 Conclusion
In this paper, we have tackled the issue of analyzing per-flow timing characteristics in networked systems with complex feedback structures for scheduling policies other than FIFO. We have generalized existing results for single feedback constraints and shown how to deal with different interdependence types between feedback constraints. We have presented a method to determine the order in which closed-loop systems can be transformed into open-loop systems for arbitrary tandem networks, as well as discussed how more general network topologies can be analyzed. In a numerical experiment, we have shown how the new approach performs in comparison to a FIFO analysis and showed that it is now possible to obtain per-flow delay bounds for non-FIFO scheduling policies. We showed how the optimal window size for a feedback constraint can be iteratively applied in the case of multiple interdependent feedback constraints. We also explored different resource allocation schemes for the feedback constraints to minimize delay bounds. Here, we have seen that the optimal scheme depends on the scheduling policy.
References
- [1] Rajeev Agrawal, Rene L. Cruz, Clayton Okino, and Rajendran Rajan. Performance bounds for flow control protocols. IEEE/ACM Trans. Netw., 7(3):310–323, 1999. doi:10.1109/90.779197.
- [2] Rajeev Agrawal and Rajendran Rajan. Performance bounds for guaranteed and adaptive services, volume 20649. Citeseer, 1996.
- [3] John Baillieul and Panos J. Antsaklis. Control and communication challenges in networked real-time systems. Proc. IEEE, 95(1):9–28, 2007. doi:10.1109/JPROC.2006.887290.
- [4] Mohamed Bakhouya, Suboh A. Suboh, Jaafar Gaber, and Tarek A. El-Ghazawi. Analytical modeling and evaluation of on-chip interconnects using network calculus. In Third International Symposium on Networks-on-Chips, NOCS 2009, May 10-13 2009, La Jolla, CA, USA. Proceedings, pages 74–79. IEEE, IEEE Computer Society, 2009. doi:10.1109/NOCS.2009.5071447.
- [5] Amit Bose, Xiaoyue Jiang, Bin Liu, and Gang Li. Analysis of manufacturing blocking systems with network calculus. Perform. Evaluation, 63(12):1216–1234, 2006. doi:10.1016/j.peva.2005.12.001.
- [6] Jean-Yves Le Boudec and Patrick Thiran. Network Calculus: A Theory of Deterministic Queuing Systems for the Internet, volume 2050 of Lecture Notes in Computer Science. Springer, 2001. doi:10.1007/3-540-45318-0.
- [7] Anne Bouillard, Marc Boyer, and Euriell Le Corronc. Deterministic Network Calculus: From Theory to Practical Implementation. John Wiley & Sons, 2018.
- [8] Anne Bouillard, Linh T. X. Phan, and Samarjit Chakraborty. Lightweight modeling of complex state dependencies in stream processing systems. In 15th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2009, San Francisco, CA, USA, 13-16 April 2009, pages 195–204. IEEE, IEEE Computer Society, 2009. doi:10.1109/RTAS.2009.27.
- [9] Marc Boyer, Amaury Graillat, Benoît Dupont de Dinechin, and Jörn Migge. Bounding the delays of the MPPA network-on-chip with network calculus: Models and benchmarks. Perform. Evaluation, 143:102–124, 2020. doi:10.1016/j.peva.2020.102124.
- [10] Alexandre Brandwajn and Yung-Li Lily Jow. An approximation method for tandem queues with blocking. Oper. Res., 36(1):73–83, 1988. doi:10.1287/opre.36.1.73.
- [11] John A. Buzacott and J. George Shanthikumar. Stochastic models of manufacturing systems. Prentice Hall Englewood Cliffs, 1993.
- [12] Cheng-Shang Chang. Performance Guarantees in Communication Networks. Telecommunication Networks and Computer Systems. Springer, 2000. doi:10.1007/978-1-4471-0459-9.
- [13] Martijn Coenen, Srinivasan Murali, Andrei Radulescu, Kees Goossens, and Giovanni De Micheli. A buffer-sizing algorithm for networks on chip using TDMA and credit-based end-to-end flow control. In Reinaldo A. Bergamaschi and Kiyoung Choi, editors, Proceedings of the 4th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2006, Seoul, Korea, October 22-25, 2006, pages 130–135. ACM, 2006. doi:10.1145/1176254.1176287.
- [14] Rene L. Cruz. A calculus for network delay, part I: network elements in isolation. IEEE Trans. Inf. Theory, 37(1):114–131, 1991. doi:10.1109/18.61109.
- [15] Rene L. Cruz. A calculus for network delay, part II: network analysis. IEEE Trans. Inf. Theory, 37(1):132–141, 1991. doi:10.1109/18.61110.
- [16] Rene L Cruz and CM Okino. Service guarantees for window flow control. In Proceedings of the Annual Allerton Conference on Communication Control and Computing, volume 34, pages 10–21. Citeseer, 1996.
- [17] Sahar Foroutan, Yvain Thonnart, Richard Hersemeule, and Ahmed Jerraya. Analytical computation of packet latency in a 2d-mesh noc. In Joint IEEE North-East Workshop on Circuits and Systems and TAISA Conference, pages 1–4. IEEE, 2009.
- [18] Wei-Jing Guan, Wei Kang Tsai, and Douglas M. Blough. An analytical model for wormhole routing in multicomputer interconnection networks. In The Seventh International Parallel Processing Symposium, Proceedings, Newport Beach, California, USA, April 13-16, 1993, pages 650–654. IEEE, IEEE Computer Society, 1993. doi:10.1109/IPPS.1993.262804.
- [19] Anja Hamscher, Vlad-Cristian Constantin, and Jens B. Schmitt. Extending network calculus to deal with min-plus service curves in multiple flow scenarios. In 30th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2024, Hong Kong, May 13-16, 2024, pages 95–107. IEEE, IEEE, 2024. doi:10.1109/RTAS61025.2024.00016.
- [20] Jingcao Hu, Ümit Y. Ogras, and Radu Marculescu. System-level buffer allocation for application-specific networks-on-chip router design. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 25(12):2919–2933, 2006. doi:10.1109/TCAD.2006.882474.
- [21] Manjunath Kamath and N. Viswanadham. Applications of petri net based models in the modelling and analysis of flexible manufacturing systems. In Proceedings of the 1986 IEEE International Conference on Robotics and Automation, San Francisco, California, USA, April 7-10, 1986, volume 3, pages 312–317. IEEE, IEEE, 1986. doi:10.1109/ROBOT.1986.1087700.
- [22] Abbas Eslami Kiasari, Zhonghai Lu, and Axel Jantsch. An analytical latency model for networks-on-chip. IEEE Trans. Very Large Scale Integr. Syst., 21(1):113–123, 2013. doi:10.1109/TVLSI.2011.2178620.
- [23] Y. Koren, U. Heisel, F. Jovane, T. Moriwaki, G. Pritschow, G. Ulsoy, and H. Van Brussel. Reconfigurable manufacturing systems. CIRP Annals, 48(2):527–540, 1999.
- [24] Shashi Kumar, Axel Jantsch, Mikael Millberg, Johnny Öberg, Juha-Pekka Soininen, Martti Forsell, Kari Tiensyrjä, and Ahmed Hemani. A network on chip architecture and design methodology. In 2002 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2002), 25-26 April 2002, Pittsburgh, PA, USA, pages 117–124. IEEE, IEEE Computer Society, 2002. doi:10.1109/ISVLSI.2002.1016885.
- [25] Jean-Yves Le Boudec. Rate adaptation, congestion control and fairness: A tutorial. Web page, November, 4, 2005.
- [26] Zhonghai Lu, Mikael Millberg, Axel Jantsch, Alistair C. Bruce, Pieter van der Wolf, and Tomas Henriksson. Flow regulation for on-chip communication. In Luca Benini, Giovanni De Micheli, Bashir M. Al-Hashimi, and Wolfgang Müller, editors, Design, Automation and Test in Europe, DATE 2009, Nice, France, April 20-24, 2009, pages 578–581. IEEE, IEEE, 2009. doi:10.1109/DATE.2009.5090731.
- [27] Milos Panic, Carles Hernández, Eduardo Quiñones, Jaume Abella, and Francisco J. Cazorla. Modeling high-performance wormhole nocs for critical real-time embedded systems. In 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), Vienna, Austria, April 11-14, 2016, pages 267–278. IEEE, IEEE Computer Society, 2016. doi:10.1109/RTAS.2016.7461342.
- [28] HT Papadopolous, Cathal Heavey, and Jimmie Browne. Queueing theory in manufacturing systems analysis and design. Chapman and Hall, 1993.
- [29] Chrissoleon T. Papadopoulos, Jingshan Li, and Michael E. J. O’Kelly. A classification and review of timed markov models of manufacturing systems. Computers & Industrial Engineering, 128:219–244, 2019. doi:10.1016/j.cie.2018.12.019.
- [30] Yue Qian, Zhonghai Lu, and Wenhua Dou. Analysis of worst-case delay bounds for best-effort communication in wormhole networks on chip. In Third International Symposium on Networks-on-Chips, NOCS 2009, May 10-13 2009, La Jolla, CA, USA. Proceedings, pages 44–53. IEEE, IEEE Computer Society, 2009. doi:10.1109/NOCS.2009.5071444.
- [31] Pierre Roux, Sophie Quinton, and Marc Boyer. A formal link between response time analysis and network calculus. In Martina Maggio, editor, 34th Euromicro Conference on Real-Time Systems, ECRTS 2022, July 5-8, 2022, Modena, Italy, volume 231 of LIPIcs, pages 5:1–5:22, Modene, Italy, July 2022. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ECRTS.2022.5.
- [32] Jens B. Schmitt, Frank A. Zdarsky, and Markus Fidler. Delay bounds under arbitrary multiplexing: When network calculus leaves you in the lurch. In INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pages 1669–1677. IEEE, IEEE, 2008. doi:10.1109/INFOCOM.2008.228.
- [33] Jens B. Schmitt, Frank A. Zdarsky, and Ivan Martinovic. Improving performance bounds in feed-forward networks by paying multiplexing only once. In Falko Bause and Peter Buchholz, editors, Proceedings 14th GI/ITG Conference on Measurement, Modelling and Evaluation of Computer and Communication Systems (MMB 2008), March 31 - April 2, 2008, Dortmund, Germany, pages 13–28. VDE, VDE Verlag, 2008.
- [34] Zheng Shi and Alan Burns. Real-time communication analysis for on-chip networks with wormhole switching. In Second International Symposium on Networks-on-Chips, NOCS 2008, 5-6 April 2008, Newcastle University, UK. Proceedings, pages 161–170. IEEE, IEEE Computer Society, 2008. doi:10.1109/NOCS.2008.11.
- [35] Sundararajan Sriram and Shuvra S Bhattacharyya. Embedded Multiprocessors: Scheduling and Synchronization, Second Edition. CRC press, 2009.
- [36] Lothar Thiele, Samarjit Chakraborty, and Martin Naedele. Real-time calculus for scheduling hard real-time systems. In IEEE International Symposium on Circuits and Systems, ISCAS 2000, Emerging Technologies for the 21st Century, Geneva, Switzerland, 28-31 May 2000, Proceedings, volume 4, pages 101–104. IEEE, IEEE, 2000. doi:10.1109/ISCAS.2000.858698.
- [37] Lothar Thiele and Nikolay Stoimenov. Modular performance analysis of cyclic dataflow graphs. In Samarjit Chakraborty and Nicolas Halbwachs, editors, Proceedings of the 9th ACM & IEEE International conference on Embedded software, EMSOFT 2009, Grenoble, France, October 12-16, 2009, pages 127–136. ACM, 2009. doi:10.1145/1629335.1629353.
- [38] Fatih Tüysüz and Cengiz Kahraman. Modeling a flexible manufacturing cell using stochastic petri nets with fuzzy parameters. Expert Syst. Appl., 37(5):3910–3920, 2010. doi:10.1016/j.eswa.2009.11.026.
- [39] Raffaele Zippo and Giovanni Stea. Nancy: an efficient parallel network calculus library. SoftwareX, 19:101178, 2022. doi:10.1016/j.softx.2022.101178.
- [40] Raffaele Zippo and Giovanni Stea. Computationally efficient worst-case analysis of flow-controlled networks with network calculus. IEEE Transactions on Information Theory, 69(4):2664–2690, 2023. doi:10.1109/TIT.2023.3244276.
