Next Article in Journal
A Polar Robust Kalman Filter Algorithm for DVL-Aided SINSs Based on the Ellipsoidal Earth Model
Previous Article in Journal
A General Neural Network Model for Complex Refractive Index Extraction of Low-Loss Materials in the Transmission-Mode THz-TDS
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Impact of the Dropping Function on Clustering of Packet Losses

by
Andrzej Chydzinski
Department of Computer Networks and Systems, Silesian University of Technology, Akademicka 16, 44-100 Gliwice, Poland
Sensors 2022, 22(20), 7878; https://doi.org/10.3390/s22207878
Submission received: 20 August 2022 / Revised: 27 September 2022 / Accepted: 13 October 2022 / Published: 17 October 2022
(This article belongs to the Section Communications)

Abstract

:
The dropping function mechanism is known to improve the performance of TCP/IP networks by reducing queueing delays and desynchronizing flows. In this paper, we study yet another positive effect caused by this mechanism, i.e., the reduction in the clustering of packet losses, measured by the burst ratio. The main contribution consists of two new formulas for the burst ratio in systems with and without the dropping function, respectively. These formulas enable the easy calculation of the burst ratio for a general, non-Poisson traffic, and for an arbitrary form of the dropping function. Having the formulas, we provide several numerical examples that demonstrate their usability. In particular, we test the effect of the dropping function’s shape on the burst ratio. Several shapes of the dropping function proposed in the literature are compared in this context. We also demonstrate, how the optimal shape can be found in a parameter-depended class of functions. Finally, we investigate the impact of different system parameters on the burst ratio, including the load of the system and the variance of the service time. The most important conclusion drawn from these examples is that it is not only the dropping function that reduces the burst ratio by far; simultaneously, the more variable the traffic, the more beneficial the application of the dropping function.

1. Introduction

The basic queueing mechanism used commonly for packet queueing in Internet routers, i.e., the tail-drop FIFO queue, has several important drawbacks. First of all, it causes the infamous bufferbloat effect, meaning that there are long queues of packets in a significant fraction of buffers in the Internet. This not only adds substantial delays to packet delivery times but has also other negative consequences, such as the synchronization of TCP control loops among flows, unfair bandwidth allocation for flows with long RTT times, and others [1].
Recently, yet another disadvantage of simple tail-drop queueing was discovered and described. Namely, when the router’s buffer is full, several incoming packets can be dropped in a row, forming a sequence of losses [2,3]. Such sequences of losses are particularly bad for multimedia streams of real-time character, e.g., voice or video calls.
The solution of the bufferbloat problem, advocated strongly by the Internet Engineering Task Force, is the application of active queue management (AQM) in Internet routers [1]. In AQM, contrary to the tail-drop mechanism, an incoming packet can be dropped even if the router’s buffer is not full. Actually, it can be dropped even if the buffer occupancy is rather low. Moreover, the decision of whether an incoming packet should be accepted or dropped is probabilistic in nature, i.e., each packet can be accepted with some, dynamically changing, probability. Such randomization is supposed to mitigate the synchronization of TCP flows.
There are many active queue management algorithms proposed to date (see, e.g., [4,5,6,7,8] and the references given there). The main difference between them is how the dropping probability is computed based on current and past system parameters, such as the queue length and its dynamics, the packet loss events, the empty-system events, and others. In some AQM algorithms, advanced methods are exploited to compute the dropping probability, including neural networks [9,10], genetic algorithms [11], and fuzzy logic [12].
An important subclass of AQM algorithms is based on the dropping function. In such algorithms, the packet dropping probability is a function of the length of the queue of packets in the buffer. In fact, historically, the first AQM algorithm, RED [13], belongs to this class. In RED, a simple linear dropping function was used. After that, several other shapes of the dropping function have been tested, including the doubly linear shape [14], negative-exponential shape [15], quadratic shape [16], a mixture of third-degree polynomials and linear functions [17], and a product of logarithmic and linear functions [18].
The dropping function mechanism may not provide such excellent results as the mentioned methods based on machine learning techniques. It is, however, still worth our attention for at least two reasons. Firstly, it is very simple to implement in a networking device, contrary to advanced algorithms. Secondly, it still provides great improvements, if compared to the tail-drop mechanism.
There are no commercially available networking devices with the built-in dropping function mechanism. However, the mechanism has been recently implemented in an experimental device and tested in a real network [19]. Namely, the dropping function has been implemented in an ×86-multi-core server with DPDK cards and software, which enabled packet processing and forwarding speeds exceeding those required by the network itself. Then, the device was tested for over a month in the network of a large university, operating as usual. During this period, several thousands of performance measurements were gathered, at different times of the day and night and at different days within the week and weekend, i.e., under different traffic intensities and types. As shown in [19], various shapes of the dropping function provide significant shortening of queues and improvements in their stability while maintaining the packet loss rate at a similar level, as in the tail-drop case. Yet another observation made in [19] is a significant reduction in the burst ratio parameter by the dropping function. The burst ratio is a parameter that expresses how many times an average sequence of losses in the observed stream of packets is longer than an average sequence of losses in a hypothetical stream, in which all losses are uncorrelated. Therefore, the burst ratio characterizes the strength of the tendency of losses to form long sequences, which are particularly unwelcome in real-time multimedia transmissions.
It is intuitive and easy to understand why the burst ratio can be elevated in a network exploiting tail-drop queues in its nodes. Namely, several packets can be dropped in a row during continuous periods of time when the buffer is full (buffer overflow periods). This phenomenon was confirmed by direct measurements in a lab and in a real network, [2,3]. It was also explained theoretically, by the derivation of the burst ratio for tail-drop queueing models with various arrival stream types [20,21,22]. It is equally easy to understand why the dropping function mechanism can decrease the burst ratio. When this mechanism is used, the buffer overflow period occurs but is extremely rare or never occurs. In other words, there are no periods of time during which all arriving packets are lost. Instead, every packet can be randomly accepted or dropped, which makes it is much harder to form a sequence of consecutive losses.
Therefore, the state-of-the-art finding can be summarized as follows. It has been shown in networking experiments with a prototype device that the dropping function reduces the burst ratio significantly. Intuitively, this is expected. Thus far, however, there has been no deep mathematical analysis of this effect and no way to predict the extent of this effect precisely using numbers.
The purpose of this paper is to feel this gap, i.e., to make possible the calculation of the burst ratio in advance for a given parameterization of the traffic and a given form of the dropping function. The main contribution of this paper consists of explicite formulas for the burst ratio parameter in queueing models with the dropping function (Theorem 1) and without the dropping function (Theorem 2). What is important is that a general type of traffic, with the interarrival time distribution having an arbitrary form, is assumed. Having proven the formulas, we first study the impact of the dropping function on the burst ratio depending on the shape of the dropping function. Several shapes of the dropping function proposed in the literature are compared. We also demonstrate how the optimal shape can be found in a parameter-dependent class of functions. Then, we investigate the influence of other system parameters on the burst ratio, including the load of the system and the standard deviation of the service time.
To the author’s best knowledge, the results of this papers are new. Previously, the analysis of the burst ratio in a system with the dropping function was carried out only under the assumption that the traffic is Poisson in nature [23]. Such an assumption simplifies the analysis but renders the model less useful. Namely, it is well-known that the traffic in networks is far from Poisson and using Poisson approximation leads to optimistic underestimations of performance characteristics. Therefore, to obtain precise results, we have to to use the general distribution of the interarival time, as stated here. Other previous studies on the burst ratio, e.g., [20,21,22,24,25], do not incorporate the dropping function, which is the crucial component herein.
The remainder of the article is organized as follows. In Section 2, the formal description of the queueing model is given, as well as the definition and some properties of the burst ratio. In Section 3, two main theorems on the burst ratio are proven, and they are devoted to systems with and without the dropping function, respectively. In Section 4, numerical results are presented and discussed. They are divided into a few subsections, in which impacts of the shape of the dropping function, the load of the system, and the interarrival time distribution are studied. At the end of Section 4, results of simulations performed to verify the theoretical results are shown. Finally, some concluding remarks are provided in Section 5.

2. The Model

2.1. Queueing System

We deal with the single-server queueing model with the addition of the dropping function. Namely, packets arrive to the buffer, where they are stored before service (transmission) in the arrival order. The interarrival time distribution has distribution function G ( t ) , which can have any form. We assume only that the average intararrival time is finite.
E G = 0 t d G ( t ) < .
Systems with infinite interarrival times are not interesting; they have an average queue length of zero. The buffer size (system capacity) is finite and equals K, which means that the total number of packets that is present in the system cannot exceed K, including the service position. When the system is full upon a packet arrival, the newly arriving packet is dropped (deleted).
Moreover, the dropping function mechanism is applied, which means that an arriving packet can be dropped upon arrival even if the buffer is not full. This happens with probability d ( n ) , where n is the queue length upon the arrival of the new packet, including the service position. Function d ( n ) is called the dropping function and can assume an arbitrary form, if only 0 d ( n ) 1 for every 0 < n < K , d ( 0 ) < 1 and d ( n ) = 1 for n K . Assumption d ( 0 ) < 1 excludes an uninteresting system with d ( 0 ) = 1 in which every arriving packet is deleted, and the queue is always empty. Assumption d ( n ) = 1 for n K is equivalent to the final-buffer assumption, as stated above.
The service time is exponentially distributed with parameter μ . Standard independence assumptions are made, i.e., all interarrval times and service times are mutually independent. The queue length at time t is denoted by X ( t ) , which includes the service position, if occupied. We use the convention that the queue length process is left continuous, X ( u ) = X ( u ) . The load of the system is defined traditionally as follows.
ρ = 1 μ E G .
It is easy to see that the presented model is equivalent to the G / M / 1 / K model in Kendall’s notation, but with the addition of the dropping function mechanism.

2.2. Clustering of Losses

The main characteristic studied in this paper is the burst ratio, which is introduced in [24].
Consider a stream of packets, some of them being deleted. The burst ratio, B, is the ratio of the average length of the sequence of packets deleted in a row in the considered stream to the average length of the sequence of losses in a hypothetical stream in which all deletions happen independently, with some probability L. Denoting the average length of the loss sequence in the observed stream by G ¯ while in the hypothetical stream it is denoted by K ¯ , we have by definition the following.
B = G ¯ K ¯ .
It is a simple matter to compute K ¯ using the geometric series. We obtain K ¯ = 1 / ( 1 L ) . Therefore, (3) yields the following:
B = ( 1 L ) G ¯ ,
where L is the overall packet loss probability.
In practice, we compute the burst ratio in two steps regardless of whether it is performed in experimental or theoretical studies. Firstly, we compute (or measure) the average length of the sequence of losses, G ¯ . Secondly, we compute (or measure) the loss probability, L. Then, B is obtained from Formula (4).
Note that the two numbers, L and B, provide compact yet very informative characterization of the loss process. L informs us about the overall ratio of losses, while B informs us about their tendency to cluster together in sequences. If B = 1 , then there is no such tendency—the losses are random and uncorrelated. The greater B is above 1, the stronger the clustering of losses. In contemporary TCP/IP networks, B is typically significantly greater than 1 (see experimental studies of [2,3]). As it was explained in Section 1, this is caused by the tail-drop queueing mechanism.
Elevated values of both L and B have negative impact on real-time multimedia transmissions. In some cases, this effect can be measured precisely by using a strict formula. For instance, in [26], we can find a formula for the deterioration of the quality of IP voice calls as a function of L and B (see formula (7)–(29) of [26]).

3. Analysis

We will prove now two theorems on the burst ratio in systems with and without the dropping function, respectively.
Theorem 1.
The burst ratio in the G/M/1/K system with dropping function d ( n ) is equal to the following:
B = 1 n = 0 K p n d ( n ) j = 0 K r j H ¯ j j = 0 K r j ,
where
r 0 = i = 0 K 1 p i 1 d ( i ) c i + 1 d ( 0 ) ,
r j = i = j 1 K 1 p i 1 d ( i ) b i + 1 j d ( j ) , j 1 ,
b j = 1 j ! 0 e μ t ( μ t ) j d G ( t ) , c j = 1 i = 0 j 1 b i ,
H ¯ n is obtained recursively as follows:
H ¯ 0 = 1 1 d ( 0 ) ,
H ¯ 1 = 1 1 d ( 1 ) b 0 1 + d ( 0 ) c 1 1 d ( 0 ) ,
H ¯ n = 1 1 d ( n ) b 0 1 + m = 1 n 1 d ( m ) H ¯ m b n m + d ( 0 ) c n 1 d ( 0 ) , n 2 ,
while
( p 0 , , p K ) = ( 1 , 0 , , 0 ) · A 1 ,
where matrix A has the form:
A = [ a i j ] i , j = 0 , , K , a i j = 1 , if 0 i K , j = 0 , b i j + 1 ( 1 d ( i ) ) + b i j d ( i ) , if 0 < i K , 0 < j < i , b 1 ( 1 d ( i ) ) + b 0 d ( i ) 1 , if 0 < i K , j = i , b 0 ( 1 d ( i ) ) , if 0 i K 1 , j = i + 1 , 0 , otherwise .
Proof. 
Proof of Theorem 1. Let t 1 , t 2 , denote consecutive arrival times and X l = X ( t l ) , l = 1 , 2 , . Sequence { X l } constitutes a discrete-time Markov chain. This follows from the memorylessness property of the exponential distribution; namely, the remaining service time and the packet arrival are exponentially distributed with parameter μ no matter how much time the current service has already taken.
Take an arbitrary k > 1 and assume that the queue length is n at time t k . Let H ¯ n denote the average number of consecutive losses from time t k under the condition that the packet arriving at time t k is lost. It must hold H ¯ n 1 , because the packet lost at time t k is included in H ¯ n . Moreover, due to the fact that { X l } is a Markov chain, the evolution of the system from time t k depends only on the queue length at time t k and does not depend on previous queue’s lengths. Therefore, H ¯ n depends only on n and does not depend on k.
In the first part of the proof, we will prove Formulas (9)–(11) for H ¯ n . If n > 0 , then we have the following.
H ¯ n = 1 + m = 1 n d ( m ) H ¯ m 0 e μ t ( μ t ) n m ( n m ) ! d G ( t ) , + d ( 0 ) H ¯ 0 i = n 0 e μ t ( μ t ) i i ! d G ( t ) , 0 < n K .
Equation (14) can be explained as follows. Number 1 stands for the packet loss at time t k . Let m be the queue length upon the next arrival time, t k + 1 . If m 1 , then the probability of having the queue length m at time t k + 1 is given by the first integral in (14). This integral is obtained by conditioning on the duration of the interarrival time and using the Poisson formula for the probability of n m completed services by time t k + 1 . Then, the packet arriving at time t k + 1 can be lost with probability d ( m ) and the average number of consecutive losses from time t k + 1 is then H ¯ m . This explains the first row of (14). The second row corresponds to the case m = 0 . The probability of having queue length 0 at time t k + 1 is expressed now by the sum of integrals. Then, the packet arriving at time t k + 1 can be lost with probability d ( 0 ) and the average number of consecutive losses from time t k + 1 is H ¯ 0 .
If n = 0 , then we obtain the following:
H ¯ 0 = 1 + d ( 0 ) H ¯ 0 .
Again, 1 stands for the packet loss at time t k . The queue length just before the next arrival time must be 0; thus, the packet arriving at time t k + 1 is lost with probability d ( 0 ) and the average number of consecutive losses from time t k + 1 is H ¯ 0 again.
From (15), we immediately obtain (9). Exploiting (9) and notation (8), Equation (14) can be rewritten as follows:
H ¯ n = 1 + m = 1 n d ( m ) H ¯ m b n m + d ( 0 ) c n 1 d ( 0 ) , 0 < n K ,
which for n = 1 , gives the following:
H ¯ 1 = 1 + d ( 1 ) H ¯ 1 b 0 + d ( 0 ) c 1 1 d ( 0 ) ,
while for n 2 , the following is obtained.
H ¯ n = 1 + d ( n ) H ¯ n b 0 + m = 1 n 1 d ( m ) H ¯ m b n m + d ( 0 ) c n 1 d ( 0 ) .
Finally, from (17) and (18), we obtain (10) and (11), respectively.
In the second part of the proof, we will derive the overall loss probability, L.
We start with computing the transition matrix for the Markov chain { X l } . Firstly, the probability of the transition from non-zero state i to non-zero state j i is equal to the following. ( 1 d ( i ) ) b i j + 1 + d ( i ) b i j .
Indeed, such a transition can happen in two ways—either the first packet is accepted and i j + 1 services are completed by the next arrival time, or the first packet is dropped and i j services are completed by the next arrival time. Secondly, the probability of the transition from state i < K to state i + 1 equals the following. ( 1 d ( i ) ) b 0 .
Indeed, the first packet must be accepted and no service can be completed by the next arrival time in this case. Finally, the probability of the transition from any state to state 0 is as follows.
( 1 d ( i ) ) 1 j = 0 i b j + d ( i ) 1 j = 0 i 1 b j .
Other transitions are not possible. Summarizing these considerations, we obtain the transition matrix Q in the following form:
Q = [ q i j ] i , j = 0 , , K , q i j = c i + 1 ( 1 d ( i ) ) + c i d ( i ) if 0 i K , j = 0 , b i j + 1 ( 1 d ( i ) ) + b i j d ( i ) , if 0 < i K , 0 < j i , b 0 ( 1 d ( i ) ) , if 0 i K 1 , j = i + 1 , 0 , otherwise .
The stationary vector p = ( p 0 , , p K ) for this chain can be obtained in the standard method by solving the system of equations:
p Q = p , j = 0 K p j = 1 .
Matrix Q is known to be linearly dependent; thus, the Equation in (20) corresponding to the first column of Q can be removed. Then, rearranging the remaining equations and grouping ( p 0 , , p K ) on the left side, we obtain an explicit solution of (20) in (12) and (13).
Now, due to the fact that p n is the stationary probability that the queue length upon a packet arrival is n, we can compute the loss probability as follows.
L = n = 0 K p n d ( n ) .
In the third part of the proof, we will derive the average length of the sequence of consecutive losses, G ¯ , using H ¯ n . Note first that it is not quite trivial to obtain G ¯ from H ¯ n , because in the definition of H ¯ n , it is not assumed that the sequence of losses begins at time t k —it may begin before t k .
To overcome this, consider a sequence of losses that begins at arrival time t k , when the system is in the stationary regime and X k = j . Such a sequence can be initiated only if the previous packet was accepted to the buffer. In particular, the previous packet must have arrived to the buffer at time t k 1 , when the queue length was i and j 1 i < K , it must have been accepted with probability 1 d ( i ) , and the queue length must have changed from i to j during the interarrival time. It is easy to see that for j > 0 , such a series of events happens with the following probability:
p i 1 d ( i ) b i + 1 j d ( j ) ,
while for j = 0 , such a series of events happens with the following probability.
p i 1 d ( i ) c i + 1 d ( 0 ) .
Now, define r j as the probability that, at an arbitrary arrival time, the queue length is j and a sequence of losses begins at that time. From the considerations of the previous paragraph and (22) and (23), we obtain Formulas (7) and (6) for r j , respectively. The probability that a sequence of losses begins at arbitrary arrival time is then j = 0 K r j . Therefore, we can conclude that the average length of a sequence of losses, which begins at arbitrary arrival time, is as follows.
G ¯ = j = 0 K r j H ¯ j j = 0 K r j .
Finally, combining (4) with (21) and (24), we arrive at (5), which completes the proof. □
Now we can prove an analog of Theorem 1 but for the system without the dropping function.
Theorem 2.
The burst ratio in the G/M/1/K system is equal to the following:
B = 1 p K 1 b 0 ,
where b j is given in (8) while the following is the case:
( p 0 , , p K ) = ( 1 , 0 , , 0 ) · A 1 ,
and matrix A is provided as follows:
A = [ a i j ] i , j = 0 , , K , a i j = 1 , if 0 i K , j = 0 , b i j + 1 , if 0 < i < K , 0 < j < i , b K j , if i = K , 0 < j < K , b 1 1 , if 0 < i < K , j = i , b 0 1 , if i = j = K , b 0 , if 0 i K 1 , j = i + 1 , 0 , otherwise .
Proof. 
Proof of Theorem 2. This theorem can be proven at least in two different ways.
In one proof, we can use Theorem 1 and apply a trivial dropping function, i.e., d ( n ) = 0 for n < K and d ( n ) = 1 otherwise. Obviously, such a dropping function renders the system equivalent to the system without the dropping function, but with a finite buffer. Using this trivial dropping function, we obtain the following from (6) and (7):
r j = 0 , 0 j < K ,
while from (9) to (11), the following is obtained
H ¯ n = 1 , 0 n < K ,
H ¯ K = 1 1 b 0 ,
and from (21), we have the following.
L = p K .
Formulas (28)–(31) combined with (5) lead to (25), where matrix A in (27) is just a simplified matrix (13).
Alternatively, the proof can be conducted without references to Theorem 1 using probabilistic arguments. We have to notice two facts. Firstly, a sequence of losses in the system can occur only during the buffer’s overflow period. Secondly, the duration of the buffer’s overflow period is exponentially distributed with parameter μ . This is a consequence of the memorylessness property of the exponential distribution, i.e., no matter when the buffer is overflowed, the remaining service time is exponentially distributed. On the other hand, the buffer overflow period is equal to the remaining service time upon the buffer’s overflow. Now, consider the beginning of the overflow period, i.e., the arrival time, when the queue length jumps from K 1 to K. With probability b 0 , the next arrival will happen before the end of the overflow period. In this case, the new packet is lost and the sequence of losses is extended by 1. What is more, the probability of having yet another arrival before the end of the overflow period is again b 0 due to the memorylessness property of the exponential distribution. Therefore, we have in fact a series of Bernoulli experiments, in which the probability of a failure (loss) in a single experiment is b 0 . Therefore, the average length of a sequence of failures (losses) is equal to 1 1 b 0 . This, combined with the obvious relation L = p K and (4), gives (25), while matrix A can be easily obtained by using transition probabilities of chain { X l } . □

4. Examples

In the numerical examples, we use the following forms of the dropping function.
d 1 ( n ) = 0 , if n < 20 , 0.005 n 0.1 , if 20 n < 40 , 0.09 n 3.5 , if 40 n < 50 , 1 , if n 50 ,
d 2 ( n ) = 0 , if n < 20 , ( n 20 ) 2 900 , if 20 n < 50 , 1 , if n 50 ,
d 3 ( n ) = 0 , if n < 20 , n 20 30 , if 20 n < 50 , 1 , if n 50 ,
d 4 ( n ) = 0 , if n < 20 , ( n 20 ) 3 3000 , if 20 n < 30 , n 20 30 , if 30 n < 40 , ( n 50 ) 3 3000 + 1 , if 40 n < 50 , 1 , if n 50 ,
d 5 ( n ) = 0 , if n < 20 , 1.055 ( 1 e ( n 20 ) / 10 ) , if 20 n < 50 . 1 , if n 50 .
They are also depicted in Figure 1. As observed, the doubly linear, quadratic, linear, combined cubic, and negative exponential shapes of the dropping function are used. Such shapes of the dropping function are not new. They were proposed in the literature by the authors of [13,14,15,16,17]. In none of these papers, however, was there a study of the impact of the dropping function on the burst ratio carried out. The particular parameterizations are based on the assumption that the dropping function operates roughly at the second half of the buffer size. Assuming a buffer size of 50 packets, the dropping function operates herein on interval [20,50]. In every case, the dropping begins with zero probability at point (20,0), and ends with the probability of 1 at point (50,1). This enables obtaining sample parameterizations of the dropping function as presented above.
As it was already mentioned, in every case with the dropping function, the buffer size is K = 50 . The same buffer size is used in examples with no dropping function. If not stated otherwise, the interarrvial time distribution is gamma with parameters α = β = 0.25 , i.e., with the mean of 1 and the standard deviation of 2. This is altered in Section 4.3, where the impact of the interarrival time on the burst ratio is studied and in simulations shown in Section 4.4. Similarly, if not stated otherwise, the service rate is μ = 1 , resulting in ρ = 1 . This is altered in Section 4.2, where the influence of the system load is investigated and in simulations in Section 4.4.

4.1. Impact of d ( n ) Shape

In this subsection, we will check the influence of the shape and aggressiveness of the dropping function on the burst ratio.
In Table 1, burst ratios B 1 B 5 computed for functions d 1 ( n ) d 5 ( n ) are presented, as well as the burst ratio computed without the dropping function, B 0 . Additionally, every B i is presented as a percentage of B 0 . The numbers were obtained using Theorems 1 and 2.
The following conclusions can be drawn from Table 1. Firstly, a high burst ratio is observed in the case with no dropping function. Secondly, the application of the dropping function reduces its value significantly. Namely, B 0 is reduced to 44–50% of its original value, when the dropping function is used. There are some differences among d 1 d 5 , but all of them provide a great improvement.
To analyze in detail the impact of particular shape of the dropping function, we note first that d 1 d 5 are numbered roughly from the less aggressive, d 1 , to the most aggressive, d 5 (see Figure 1). The best burst ratio is obtained for a rather mild function d 2 . The general picture is, however, rather complicated. Function d 1 performs worse than d 2 , even though d 1 is less aggressive in general. One can argue that this is because d 1 is more aggressive in the initial interval [20,23]. On the other hand, d 4 is even less aggressive than d 2 in this interval, but it provides worse B. It is also interesting to compare the results computed for d 3 and d 4 , because the latter is less aggressive in the interval [20,30] than the former, the same in the interval [30,40], and more aggressive in the interval [40,50]. As we see in Table 1, d 3 performs better than d 4 .
To study the impact of the dropping function shape more systematically, we can use a class of functions d 3 v , where exponent v is a parameter. A few selected shapes of function d 3 v , for v from 0.1 to 20, are presented in Figure 2.
In Figure 3 and Table 2, the burst ratio as a function of parameter v is shown.
It is easy to observe that if v , then function d 3 v ( n ) converges to the unit-step function with the step at n = 50 . Therefore, we can see in Figure 3 that the burst ratio approaches a limit when v . The limiting value is 2.8764 (see Table 2), and it is equal to the burst ratio in a system without the dropping function and the buffer of size 50. Similarly, if v 0 + , then function d 3 v ( n ) converges to the unit-step function with the step at n = 20 . Therefore, if v 0 + , then the burst approaches the value for a system without the dropping function and the buffer of size 20. This value is 2.6906; see Table 2.
What is important is that we can observe a minimum for v = 1.5 in Figure 3. The optimal value of the burst ratio, achieved for v = 1.5 , is equal to 1.2674 (see Table 2). The shape of the dropping function that provides the minimal value of the burst ratio is depicted in Figure 2 in red.
Now, it is hard to explain why this particular dropping function in class d 3 v provides the best burst ratio. In Theorem 1, we see that the burst ratio depends in a very complicated way on the dropping function. The form of this function influences the stationary distribution of the queue length, the loss probability and the structure of losses, each of them having impact on each other and on the resulting burst ratio. Fortunately, we can always use Theorem 1 to find the optimal shape of the dropping function with respect to the burst ratio in a parameter-dependent class of functions, as shown above.

4.2. Impact of ρ

In the next set of numerical results, we study the influence of the system load on the burst ratio. By varying the service rate, μ , we change the load of the system from a severely underloaded one ( ρ = 0.5 ) to a severely overloaded one ( ρ = 2.0 ) and check how it influences the burst ratio when dropping functions d 1 d 5 are applied, as well as when there is no dropping function.
The results are presented in Figure 4 and Table 3. As we can notice, a high value of the burst ratio is achieved in a system with no dropping function, in the entire interval of the load, from 0.5 to 2.0. Moreover, there is a maximum on the black curve in Figure 4 close to ρ = 1 . When any form of the dropping function is applied, the burst ratio is reduced hlsignificantly, again in the entire interval, which is clearly seen in both Figure 4 and Table 3.
In Table 4, B i as a percentage of B 0 is presented. As we can see, the application of the dropping reduces the burst ratio to 43–58% of its original value, depending on the dropping function form and the system load.
Two more interesting observations can be made.
Firstly, the curves for d 1 d 5 in Figure 4 intersect a few times. This means that it depends on the system load, and when shaped among d 1 d 5 , it performs better; otherwise, it performs worse. For ρ = 0.5 , in particular, d 1 is the best, followed by d 2 , d 3 , d 4 , and d 5 . For ρ = 1 , d 2 is the best, followed by d 3 , d 1 , d 4 , and d 5 . For ρ = 2 , d 3 is the best, followed by d 4 , d 2 , d 5 , and d 1 . Therefore, we cannot say that one form of the dropping function is better than the other in general—their performance may vary with ρ , which may change in TCP/IP networks. Fortunately, all functions d 1 d 5 provide similarly low values of B when compared to the system with no dropping function in the entire range of ρ . Hence, which particular shape is applied is not that important. It is important to apply one of them.
Second, if the dropping function is applied, then the local maximum of the burst ratio can be assumed for ρ and not necessarily close to 1. For instance, we see in Figure 4 that in the case of d 5 , the maximum is achieved for ρ < 1 , while in the case of d 1 , for ρ > 1 . Similarly, in Table 3 we see that the burst ratio for ρ = 1.25 is greater than for ρ = 1 .
Finding analytically the maximum of the burst ratio as a function of ρ seems to be very hard. Fortunately, this maximum does not have a great practical meaning, because all curves for dropping functions d 1 d 5 are rather flat. Moreover, in practice, we do not have such large loads, such as 2. Thus, the interval of interest is shorter, making the curves even flatter. Finally, there is no need to analyze the burst ratio for a very small load, e.g., 0.1. In such cases, losses are very rare, so the value of the burst ratio is practically insignificant.

4.3. Impact of D G

In this set of numerical results, we study the impact of the interarrival time distribution on the burst ratio. We focus on the value of the standard deviation of the interarrival time, D G (varying the average interarrival time, E G , changes the system load, for which its influence was already studied).
Therefore, we use the gamma distribution of the interarrival time, with α = β = w , where w > 0 is a parameter. Hence, E G = 1 for every w, while D G is a function of w, namely D G = w 1 / 2 .
The results are presented in Figure 5 and Table 5. They were obtained by varying w in such a way that the resulting D G varied from 0 to 10.
As we can see in Figure 5, the burst ratio depends strongly on the standard deviation of the interarrival time. In the case with no dropping function and highly variable traffic, large values of the burst ratio are obtained above 12.3 (see Table 5). This means that the average sequence of losses is 12.3-times longer than in the case of uncorrelated losses.
Fortunately, every considered dropping function decreases the burst ratio significantly. Moreover, the larger the D G , the greater the relative improvement of the burst ratio. This is demonstrated in Figure 6, in which B i as a percentage of B 0 is depicted. For instance, if D G = 2 , then the burst ratio is reduced to 43–58% of its original value depending on the dropping function form. For D G = 4 , the burst ratio is reduced to 24–28% of its original value, while for D G = 10 , the burst ratio is reduced to 15–24% of its original value, depending on the dropping function form.

4.4. Verification via Simulations

To make sure that the theoretical results of Theorems 1 and 2 are error free, they were also verified using simulations. For this purpose, Omnet++ discrete-event simulator was exploited [27]. Tens of simulation runs were carried out, with different forms of the dropping function, interarrival time distributions and system loads. In every simulation run, 100 million simulated packets passed through the system. In every case, a high agreement between simulated and theoretical result was obtained.
In Table 6, a few of these results are presented, obtained for dropping functions d 1 d 5 and no dropping function; the interarrival time is parameterized as in Section 4.3, and the load varied from 0.9 to 1.4. As we can see, the simulated and theoretical values are very close to each other. A slightly worse result for ρ = 0.9 can be associated with the fact that there were relatively few losses observed in this simulation run for an obvious reason. Nonetheless, the resulting relative error is still less than 1 / 10 4 .

5. Conclusions

In this paper, an analysis of the burst ratio parameter in a queueing system with the dropping function was carried out.
The study was motivated by two facts. Firstly, the dropping function is one of the important tools of choice in active queue management, which is recommended by IETF to reduce queueing delays and to desynchronize TCP control loops in the Internet. Secondly, it has been observed in recent experiments that the application of the dropping function reduces the burst ratio as well, which is a nice side effect. The burst ratio reflects the tendency of packet losses to form long sequences, which are especially bad for real-time multimedia transmissions.
The main contribution of this paper consists of two new theorems on the value of the burst ratio. They enable an easy calculation of the burst ratio value in systems with an arbitrary distribution of the interarrival time, an arbitrary form of the dropping function, and with no dropping function. They enable also finding the optimal shape of the dropping function, in terms of the minimal burst ratio, in a parameter-dependent class of functions.
Theoretical results were illustrated with numerical examples based on several dropping function types proposed in the literature. In particular, the influence of the dropping function shape, the system load, and the standard deviation of the service time on the burst ratio was investigated.
At least three important observations were made.
First, the application of the dropping function reduced the burst ratio significantly in all considered scenarios. In most scenarios, with moderate variability of the interarrival time, the reduced burst burst ratio was about 50% smaller than the original burst ratio obtained without the dropping function (see Table 1 and Table 4).
Second, the worse was the traffic in terms of the variability of the interarrival time: the more variable the interarrival time, the more beneficial the application of the dropping function, i.e., the greater the reduction. For instance, when the coefficient of variation was 10, the burst ratio reduced to 15–24% of its original value (see Figure 6).
Third, the differences in the performance offered by different shapes of the dropping function, proposed in the literature, were not significant—all of them provided a similar, high reduction of the burst ratio when compared to no dropping function.

Funding

This research was funded by National Science Centre, Poland, grant number 2020/39/B/ ST6/00224.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Internet Engineering Task Force. Request for Comments 7567; Baker, F., Fairhurst, G., Eds.; 2015; ISSN 2070-1721. Available online: https://datatracker.ietf.org/doc/pdf/rfc7567 (accessed on 18 August 2022).
  2. Samociuk, D.; Chydzinski, A.; Barczyk, M. Experimental Measurements of the Packet Burst Ratio Parameter. In Communications in Computer and Information Science, Poznan, Poland, 18–20 September 2018; Springer: Cham, Switzerland, 2018; Volume 928, pp. 455–466. [Google Scholar]
  3. Samociuk, D.; Chydzinski, A.; Barczyk, M. Measuring and Analyzing the Burst Ratio in IP Traffic. Broadband Commun. Netw. Syst. 2019, 303, 86–101. [Google Scholar]
  4. Khoshnevisan, L.; Salmasi, F.R. A robust and high-performance queue management controller for large round trip time networks. Int. J. Syst. Sci. 2016, 47, 1–12. [Google Scholar] [CrossRef]
  5. Wang, P.; Zhu, D.; Lu, X. Active queue management algorithm based on data-driven predictive control. Telecommun. Syst. 2017, 64, 1–9. [Google Scholar] [CrossRef]
  6. Kahe, G.; Jahangir, A.H. A self-tuning controller for queuing delay regulation in TCP/AQM networks. Telecommun. Syst. 2019, 71, 215–229. [Google Scholar] [CrossRef]
  7. Bisoy, S.K.; Pattnaik, P.K.; Sain, M.; Jeong, D.U. A Self-Tuning Congestion Tracking Control for TCP/AQM Network for Single and Multiple Bottleneck Topology. IEEE Access 2021, 9, 27723–27735. [Google Scholar] [CrossRef]
  8. Menacer, O.; Messai, A.; Kassa-Baghdouche, L. Improved Variable Structure Proportional-Integral Controller for TCP/AQM Network Systems. J. Electr. Eng. Technol. 2021, 16, 2235–2243. [Google Scholar] [CrossRef]
  9. Chrost, L.; Chydzinski, A. On the deterministic approach to active queue management. Telecommun. Syst. 2016, 63, 27–44. [Google Scholar] [CrossRef]
  10. Wang, C.; Chen, X.; Cao, J.; Qiu, J.; Liu, Y.; Luo, Y. Neural Network-Based Distributed Adaptive Pre-Assigned Finite-Time Consensus of Multiple TCP/AQM Networks. IEEE Trans. Circuits Syst. 2021, 68, 387–395. [Google Scholar] [CrossRef]
  11. Al-Faiz, M.Z. Optimal linear quadratic controller based on genetic algorithm for TCP/AQM router. In Proceedings of the International Conference on Future Communication Networks (ICFCN), Niagara Falls, ON, Canada, 9–11 August 2022; pp. 78–83. [Google Scholar]
  12. Chen, J.V.; Chen, F.C.; Tarn, J.M.; Yen, D.C. Improving network congestion: A RED-based fuzzy PID approach. Comput. Stand. Interfaces 2012, 34, 426–438. [Google Scholar] [CrossRef]
  13. Floyd, S.; Jacobson, V. Random early detection gateways for congestion avoidance. IEEE/Acm Trans. Netw. 1993, 1, 397–413. [Google Scholar] [CrossRef]
  14. Rosolen, V.; Bonaventure, O.; Leduc, G. A RED discard strategy for ATM networks and its performanceevaluation with TCP/IP traffic. Acm Sigcomm Comput. Commun. Rev. 1999, 29, 23–43. [Google Scholar] [CrossRef]
  15. Athuraliya, S.; Li, V.H.; Low, S.H.; Yin, Q. REM: Active Queue Management. IEEE Netw. 2001, 15, 48–53. [Google Scholar] [CrossRef] [Green Version]
  16. Zhou, K.; Yeung, K.L.; Li, V. Nonlinear RED: A simple yet efficient active queue management scheme. Comput. Netw. 2006, 50, 3784–3794. [Google Scholar] [CrossRef]
  17. Feng, C.; Huang, L.; Xu, C.; Chang, Y. Congestion Control Scheme Performance Analysis Based on Nonlinear RED. IEEE Syst. J. 2017, 11, 2247–2254. [Google Scholar] [CrossRef]
  18. Patel, S.; Karmeshu. A New Modified Dropping Function for Congested AQM Networks. Wirel. Pers. Commun. 2019, 104, 37–55. [Google Scholar] [CrossRef]
  19. Barczyk, M.; Chydzinski, A. AQM based on the queue length: A real-network study. PLoS ONE 2022, 17, e0263407. [Google Scholar] [CrossRef] [PubMed]
  20. Chydzinski, A.; Samociuk, D. Burst ratio in a single-server queue. Telecommun. Syst. 2019, 70, 263–276. [Google Scholar] [CrossRef] [Green Version]
  21. Chydzinski, A.; Samociuk, D.; Adamczyk, B. Burst ratio in the finite-buffer queue with batch Poisson arrivals. Appl. Math. Comput. 2018, 330, 225–238. [Google Scholar] [CrossRef]
  22. Chydzinski, A. Burst ratio for a versatile traffic model. PLoS ONE 2022, 17, e0272263. [Google Scholar] [CrossRef] [PubMed]
  23. Chydzinski, A.; Barczyk, M.; Samociuk, D. The Single-Server Queue with the Dropping Function and Infinite Buffer. Math. Probl. Eng. 2018, 2018, 3260428. [Google Scholar] [CrossRef]
  24. McGowan, J.W. Burst Ratio: A Measure of Bursty Loss on Packet-Based Networks. U.S. Patent 6,931,017, 2005. [Google Scholar]
  25. Rachwalski, J.; Papir, Z. Analysis of Burst Ratio in Concatenated Channels. J. Telecommun. Inf. Technol. 2015, 65–73. [Google Scholar]
  26. Bergstra, J.A.; Middelburg, C.A. ITU-T Recommendation G.107: The E-Model, a Computational Model for Use in Transmission Planning; Technical Report number G.107; International Telecommunication Union: Geneva, Switzerland, 2014. [Google Scholar]
  27. OMNeT++ Discrete Event Simulator. Available online: www.omnetpp.org (accessed on 26 September 2022).
Figure 1. Dropping functions d 1 d 5 .
Figure 1. Dropping functions d 1 d 5 .
Sensors 22 07878 g001
Figure 2. Dropping functions d 3 v ( n ) for v from 0.1 to 20.
Figure 2. Dropping functions d 3 v ( n ) for v from 0.1 to 20.
Sensors 22 07878 g002
Figure 3. Burst ratio versus parameter v when dropping function d 3 v ( n ) is applied.
Figure 3. Burst ratio versus parameter v when dropping function d 3 v ( n ) is applied.
Sensors 22 07878 g003
Figure 4. Burst ratio versus the system load for dropping functions d 1 d 5 and no dropping function.
Figure 4. Burst ratio versus the system load for dropping functions d 1 d 5 and no dropping function.
Sensors 22 07878 g004
Figure 5. Burst ratio versus the standard deviation of the interarrival time for dropping functions d 1 d 5 and no dropping function.
Figure 5. Burst ratio versus the standard deviation of the interarrival time for dropping functions d 1 d 5 and no dropping function.
Sensors 22 07878 g005
Figure 6. B i as a percentage of B 0 versus the standard deviation of the interarrival time.
Figure 6. B i as a percentage of B 0 versus the standard deviation of the interarrival time.
Sensors 22 07878 g006
Table 1. Burst ratio B i for i-th dropping function in the first row. In the second row, B i is a percentage of B 0 .
Table 1. Burst ratio B i for i-th dropping function in the first row. In the second row, B i is a percentage of B 0 .
Dropping FunctionNone d 1 ( n ) d 2 ( n ) d 3 ( n ) d 4 ( n ) d 5 ( n )
B i 2.87641.32361.27461.28391.36341.4389
B i / B 0 100%46%44%45%47%50%
Table 2. Burst ratio for selected values of parameter v.
Table 2. Burst ratio for selected values of parameter v.
v00.10.51.551050100
B2.69062.0151.39531.26741.40471.63602.56222.81862.8764
Table 3. Burst ratio for selected values of the system’s load.
Table 3. Burst ratio for selected values of the system’s load.
ρ = 0.5 ρ = 0.75 ρ = 1 ρ = 1.25 ρ = 1.5 ρ = 1.75 ρ = 2
no drop. fun.2.36602.70292.87642.64842.40362.22122.0819
d 1 ( n ) 1.03831.14991.32361.33901.29041.24421.2064
d 2 ( n ) 1.09471.19891.27461.23611.17941.14121.1160
d 3 ( n ) 1.15661.24551.28391.22871.16161.11671.0888
d 4 ( n ) 1.20061.31741.36341.29031.20491.14771.1122
d 5 ( n ) 1.29991.41041.43891.36331.27001.19871.1488
Table 4. Burst ratio B i as a percentage of B 0 for different values of the system load.
Table 4. Burst ratio B i as a percentage of B 0 for different values of the system load.
ρ = 0.5 ρ = 0.75 ρ = 1 ρ = 1.25 ρ = 1.5 ρ = 1.75 ρ = 2
B 1 / B 0 44%43%46%51%54%56%58%
B 2 / B 0 46%44%44%47%49%51%54%
B 3 / B 0 49%46%45%46%48%50%52%
B 4 / B 0 51%49%47%49%50%52%53%
B 5 / B 0 55%52%50%51%53%54%55%
Table 5. Burst ratio for selected values of the standard deviation of the interarrival time.
Table 5. Burst ratio for selected values of the standard deviation of the interarrival time.
D G = 0 D G = 2 D G = 4 D G = 6 D G = 8 D G = 10
no drop. fun.1.56622.87645.30327.860810.224012.3063
d 1 ( n ) 1.06291.32361.81122.27062.66522.9969
d 2 ( n ) 1.09871.27461.56211.84002.08362.2907
d 3 ( n ) 1.13131.28391.47611.63771.77161.8832
d 4 ( n ) 1.15691.36341.60101.82182.00982.1609
d 5 ( n ) 1.20711.43891.66851.80431.88371.9317
Table 6. Simulated versus theoretical burst ratios for different dropping functions, loads, and interarrival time standard deviations.
Table 6. Simulated versus theoretical burst ratios for different dropping functions, loads, and interarrival time standard deviations.
System ParametersSimulationTheory
no drop. f., ρ = 0.9 , D G = 4.0 5.37245.3719
d 1 ( n ) , ρ = 1.0 , D G = 3.0 1.56491.5647
d 2 ( n ) , ρ = 1.1 , D G = 2.0 1.26891.2688
d 3 ( n ) , ρ = 1.2 , D G = 1.0 1.13161.1316
d 4 ( n ) , ρ = 1.3 , D G = 0.5 1.09721.0972
d 5 ( n ) , ρ = 1.4 , D G = 0.25 1.09241.0924
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Chydzinski, A. Impact of the Dropping Function on Clustering of Packet Losses. Sensors 2022, 22, 7878. https://doi.org/10.3390/s22207878

AMA Style

Chydzinski A. Impact of the Dropping Function on Clustering of Packet Losses. Sensors. 2022; 22(20):7878. https://doi.org/10.3390/s22207878

Chicago/Turabian Style

Chydzinski, Andrzej. 2022. "Impact of the Dropping Function on Clustering of Packet Losses" Sensors 22, no. 20: 7878. https://doi.org/10.3390/s22207878

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop