Versatile Stochastic Models for Networks with Asymmetric TCP Sources

N.D. van Foreest, Boudewijn R.H.M. Haverkort, M.R.H. Mandjes, Willem R.W. Scheinhardt

Research output: Contribution to journalArticleScientificpeer-review

3 Citations (Scopus)

Abstract

In this paper we use stochastic Petri nets (SPNs) to study the interaction of multiple TCP sources that share one or two buffers. No analytical nor numerical results have been presented for such cases yet. We use SPNs in an unconventional way: the tokens in the SPN do not represent the packets being sent in the network, but merely model fractions of buffer occupancy and the congestion window sizes. In this way, we use the SPNs to obtain a discretisation of a fluid model for TCP dynamics. Thus, we pair the modelling flexibility of SPNs with the modelling efficiency of fluid models. In doing so, our approach also avoids the (numerical) solution of partial differential equations; instead, just the steady-state solution of a (large) continuous-time Markov chain is required. We first consider two TCP sources sharing a single buffer and evaluate the consequences of two popular assumptions for the loss process in terms of fairness and link utilization. The results obtained with this model are in agreement with existing analytic models. A comparison with (more costly) simulations in ns2 shows that the real loss process is somewhere in between the two loss models. Secondly, we consider a network consisting of three sources and two buffers and study how the sources share the capacity of the links. This leads to an interesting conjecture on fairness in large TCP networks.
Original languageEnglish
Pages (from-to)507-523
Number of pages17
JournalPerformance Evaluation
Volume64
Issue number1
DOIs
Publication statusPublished - 2007
Externally publishedYes

Keywords

  • Stochastic Petri Nets
  • TCP
  • Fluid flow model
  • Fairness analysis
  • IR-63631
  • METIS-241579
  • EWI-7869

Fingerprint

Dive into the research topics of 'Versatile Stochastic Models for Networks with Asymmetric TCP Sources'. Together they form a unique fingerprint.

Cite this