13,234 research outputs found
Spatial Fluid Limits for Stochastic Mobile Networks
We consider Markov models of large-scale networks where nodes are
characterized by their local behavior and by a mobility model over a
two-dimensional lattice. By assuming random walk, we prove convergence to a
system of partial differential equations (PDEs) whose size depends neither on
the lattice size nor on the population of nodes. This provides a macroscopic
view of the model which approximates discrete stochastic movements with
continuous deterministic diffusions. We illustrate the practical applicability
of this result by modeling a network of mobile nodes with on/off behavior
performing file transfers with connectivity to 802.11 access points. By means
of an empirical validation against discrete-event simulation we show high
quality of the PDE approximation even for low populations and coarse lattices.
In addition, we confirm the computational advantage in using the PDE limit over
a traditional ordinary differential equation limit where the lattice is modeled
discretely, yielding speed-ups of up to two orders of magnitude
Elastic Multi-resource Network Slicing: Can Protection Lead to Improved Performance?
In order to meet the performance/privacy requirements of future
data-intensive mobile applications, e.g., self-driving cars, mobile data
analytics, and AR/VR, service providers are expected to draw on shared
storage/computation/connectivity resources at the network "edge". To be
cost-effective, a key functional requirement for such infrastructure is
enabling the sharing of heterogeneous resources amongst tenants/service
providers supporting spatially varying and dynamic user demands. This paper
proposes a resource allocation criterion, namely, Share Constrained Slicing
(SCS), for slices allocated predefined shares of the network's resources, which
extends the traditional alpha-fairness criterion, by striking a balance among
inter- and intra-slice fairness vs. overall efficiency. We show that SCS has
several desirable properties including slice-level protection, envyfreeness,
and load driven elasticity. In practice, mobile users' dynamics could make the
cost of implementing SCS high, so we discuss the feasibility of using a simpler
(dynamically) weighted max-min as a surrogate resource allocation scheme. For a
setting with stochastic loads and elastic user requirements, we establish a
sufficient condition for the stability of the associated coupled network
system. Finally, and perhaps surprisingly, we show via extensive simulations
that while SCS (and/or the surrogate weighted max-min allocation) provides
inter-slice protection, they can achieve improved job delay and/or perceived
throughput, as compared to other weighted max-min based allocation schemes
whose intra-slice weight allocation is not share-constrained, e.g., traditional
max-min or discriminatory processor sharing
Applying Mean-field Approximation to Continuous Time Markov Chains
The mean-field analysis technique is used to perform analysis of a systems with a large number of components to determine the emergent deterministic behaviour and how this behaviour modifies when its parameters are perturbed. The computer science performance modelling and analysis community has found the mean-field method useful for modelling large-scale computer and communication networks. Applying mean-field analysis from the computer science perspective requires the following major steps: (1) describing how the agents populations evolve by means of a system of differential equations, (2) finding the emergent
deterministic behaviour of the system by solving such differential equations, and (3) analysing properties of this behaviour either by relying on simulation or by using logics. Depending on the system under analysis, performing these steps may become challenging. Often, modifications
of the general idea are needed. In this tutorial we consider illustrating examples to discuss how the mean-field method is used in different application areas. Starting from the application of the classical technique,
moving to cases where additional steps have to be used, such as systems with local communication. Finally we illustrate the application of the simulation and
uid model checking analysis techniques
Two-Hop Connectivity to the Roadside in a VANET Under the Random Connection Model
We compute the expected number of cars that have at least one two-hop path to
a fixed roadside unit in a one-dimensional vehicular ad hoc network in which
other cars can be used as relays to reach a roadside unit when they do not have
a reliable direct link. The pairwise channels between cars experience Rayleigh
fading in the random connection model, and so exist, with probability function
of the mutual distance between the cars, or between the cars and the roadside
unit. We derive exact equivalents for this expected number of cars when the car
density tends to zero and to infinity, and determine its behaviour using
an infinite oscillating power series in , which is accurate for all
regimes. We also corroborate those findings to a realistic situation, using
snapshots of actual traffic data. Finally, a normal approximation is discussed
for the probability mass function of the number of cars with a two-hop
connection to the origin. The probability mass function appears to be well
fitted by a Gaussian approximation with mean equal to the expected number of
cars with two hops to the origin.Comment: 21 pages, 7 figure
- …