A Calculus for End-to-end Statistical Service Guarantees

Similar documents
solutions:, and it cannot be the case that a supersolution is always greater than or equal to a subsolution.

Event Based Sequential Program Development: Application to Constructing a Pointer Program

ÈÖÓÚ Ò Ò ÁÑÔÐ Ø ÓÒ È É Ï Ö Ø ÐÓÓ Ø Û Ý ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Á È Ø Ò É ÓÖ È É Ì ÓÐÐÓÛ Ò ÔÖÓÓ ØÝÔ Ò Ð Ó Ù ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Ü È Üµ É Üµµ Ý ÔÔ

Extensional Equality in Intensional Type Theory

Improved Boosting Algorithms Using Confidence-rated Predictions

A procedure to compute a probabilistic bound for the maximum tardiness using stochastic simulation

Refinement in Requirements Specification and Analysis: a Case Study

ishares Core Composite Bond ETF

Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types

LET Õ Ò µ denote the maximum size of a Õ-ary code

Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP

Hoboken Public Schools. Algebra II Honors Curriculum

Randomized Pursuit-Evasion in Graphs

Nominal Techniques in Isabelle/HOL

ÙÒØ ÓÒ Ò Ø ÓÒ ÙÒØ ÓÒ ÖÓÑ ØÓ ÒÓØ Ö Ð Ø ÓÒ ÖÓÑ ØÓ Ù Ø Ø ÓÖ Ú ÖÝ Ü ¾ Ø Ö ÓÑ Ý ¾ Ù Ø Ø Ü Ýµ Ò Ø Ö Ð Ø ÓÒ Ò Ü Ýµ Ò Ü Þµ Ö Ò Ø Ö Ð Ø ÓÒ Ø Ò Ý Þº ÆÓØ Ø ÓÒ Á

Two-Way Equational Tree Automata for AC-like Theories: Decidability and Closure Properties

DYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS

MSR, Access Control, and the Most Powerful Attacker

Approval Voting Theory with Multiple Levels of Approval

Implementing Domain Specific Languages using Dependent Types and Partial Evaluation

Chapter. Estimating the Value of a Parameter Using Confidence Intervals Pearson Prentice Hall. All rights reserved

The Nominal Datatype Package in Isabelle/HOL

Domain, Range, Inverse

Topics on the Border of Economics and Computation December 18, Lecture 8

Manipulative Voting Dynamics

Estimating the Margin of Victory for Instant-Runoff Voting

Randomized Pursuit-Evasion in Graphs

P(x) testing training. x Hi


Biogeography-Based Optimization Combined with Evolutionary Strategy and Immigration Refusal

38050 Povo (Trento), Italy Tel.: Fax: e mail: url:

Batch binary Edwards. D. J. Bernstein University of Illinois at Chicago NSF ITR

Arrow s Impossibility Theorem on Social Choice Systems

CMD MDS Recovery DLD

Priority Queues & Heaps


Infinite-Horizon Policy-Gradient Estimation

Liveness: The Readers / Writers Problem

Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks

Political Economics II Spring Lectures 4-5 Part II Partisan Politics and Political Agency. Torsten Persson, IIES

Ë ÁÌÇ ÌÓ Ó ÍÒ Ú Ö Øݵ Ç ¼ Ô Û Ö ÙÒÓ Ø Ò Ð Ä Ò ÙÖ ÖÝ ÓÒ ÒÓØ Ý ÛÓÖ Û Ø Ã ÞÙ ÖÓ Á Ö Ó ÒØ Ë Ò ÝÓ ÍÒ Ú Ö Øݵ Ç

Priority Queues & Heaps

A New Method of the Single Transferable Vote and its Axiomatic Justification

THE EFFECT OF OFFER-OF-SETTLEMENT RULES ON THE TERMS OF SETTLEMENT

Hoboken Public Schools. College Algebra Curriculum

Estimating the Margin of Victory for an IRV Election Part 1 by David Cary November 6, 2010

Accept() Reject() Connect() Connect() Above Threshold. Threshold. Below Threshold. Connection A. Connection B. Time. Activity (cells/unit time) CAC

Regression. Linear least squares. Support vector regression. increasing the dimensionality fitting polynomials to data over fitting regularization

A Formal Architecture for the 3APL Agent Programming Language

A New Proposal on Special Majority Voting 1 Christian List

Ò ÓÛ Æ ØÛÓÖ Ð ÓÖ Ø Ñ ÓÖ ¹ ÙÐ Ö ÓÒ

É ÀÓÛ Ó Ý Ò ² Ö Ò ÁÒ Ö Ò «Ö ÓØ ÑÔ Ù ÔÖÓ Ð ØÝ ØÓ Ö ÙÒ ÖØ ÒØÝ ÙØ Ø Ý ÓÒ Ø ÓÒ ÓÒ «Ö ÒØ Ø Ò º Ü ÑÔÐ ÁÑ Ò Ð Ò Ð ØÖ Ð Û Ø Ò ½ Ñ Ø Ô Ö Ó Ù Ø º ÁÒ Ô Ö ÓÒ Ù Ø

Contact 3-Manifolds, Holomorphic Curves and Intersection Theory

Last Time. Bit banged SPI I2C LIN Ethernet. u Embedded networks. Ø Characteristics Ø Requirements Ø Simple embedded LANs

Hoboken Public Schools. AP Calculus Curriculum

ONLINE APPENDIX: Why Do Voters Dismantle Checks and Balances? Extensions and Robustness

Real-Time Scheduling Single Processor. Chenyang Lu

Sequential Voting with Externalities: Herding in Social Networks

Handcuffs for the Grabbing Hand? Media Capture and Government Accountability by Timothy Besley and Andrea Prat (2006)

CS 5523: Operating Systems

How hard is it to control sequential elections via the agenda?

½º»¾¼ º»¾¼ ¾º»¾¼ º»¾¼ º»¾¼ º»¾¼ º»¾¼ º»¾¼» ¼» ¼ ÌÓØ Ð»½ ¼

ECE250: Algorithms and Data Structures Trees

Computational Inelasticity FHLN05. Assignment A non-linear elasto-plastic problem

Midterm Review. EECS 2011 Prof. J. Elder - 1 -

Strong normalization of lambda-bar-mu-mu-tilde-calculus with explicit substitutions

Æ ÛØÓÒ³ Å Ø Ó ÐÓ Ì ÓÖÝ Ò ËÓÑ Ø Ò ÓÙ ÈÖÓ ÐÝ Ò³Ø ÃÒÓÛ ÓÙØ Ú º ÓÜ Ñ Ö Ø ÓÐÐ

Approval Voting and Scoring Rules with Common Values

CS 5523 Operating Systems: Synchronization in Distributed Systems

A representation theorem for minmax regret policies

Sampling Equilibrium, with an Application to Strategic Voting Martin J. Osborne 1 and Ariel Rubinstein 2 September 12th, 2002.

United States District Court, D. Delaware. LUCENT TECHNOLOGIES, INC. Plaintiff. v. NEWBRIDGE NETWORKS CORP. and Newbridge Networks, Inc. Defendants.

An Algebraic Semantics for Duration Calculus. August 2005 ß ½ ß ESSLLI 2005 Student Session

An Integer Linear Programming Approach for Coalitional Weighted Manipulation under Scoring Rules

arxiv: v1 [cs.gt] 11 Jul 2018

Deadlock. deadlock analysis - primitive processes, parallel composition, avoidance

VOTING ON INCOME REDISTRIBUTION: HOW A LITTLE BIT OF ALTRUISM CREATES TRANSITIVITY DONALD WITTMAN ECONOMICS DEPARTMENT UNIVERSITY OF CALIFORNIA

Tensor. Field. Vector 2D Length. SI BG cgs. Tensor. Units. Template. DOFs u v. Distribution Functions. Domain

The cost of ruling, cabinet duration, and the median-gap model

½ Ê Ú Û Ó ÆÒ ÕÙÓØ ÒØ ¾ ÇÖØ Ó ÓÒ Ð ÒÚ Ö ÒØ ÓÙ Ð Ö Ø ÓÒ Ý ÕÙÓØ ÒØ Ñ Ô ÇÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ó ÓÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ø Ò ÓÖ ÔÖÓ ÙØ Ü ÑÔÐ ÓÒØÖ Ø ÓÒ Ñ Ô ÇÔ Ò

Communications Network Design: lecture 20 p.1/29

Contents. Bibliography 121. Index 123

Tengyu Ma Facebook AI Research. Based on joint work with Yuanzhi Li (Princeton) and Hongyang Zhang (Stanford)

Communications Network Design: lecture 19 p.1/32

Version-Based Recovery DLD

Verification. Lecture 3. Bernd Finkbeiner

Priority Queues & Heaps

The Effectiveness of Receipt-Based Attacks on ThreeBallot

Game theoretical techniques have recently

Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case

Mathematical Theory of Democracy

Real- Time Wireless Control Networks for Cyber- Physical Systems

Supporting Information Political Quid Pro Quo Agreements: An Experimental Study

Chapter. Sampling Distributions Pearson Prentice Hall. All rights reserved

COULD SIMULATION OPTIMIZATION HAVE PREVENTED 2012 CENTRAL FLORIDA ELECTION LINES?

Homework 4 solutions

HOTELLING-DOWNS MODEL OF ELECTORAL COMPETITION AND THE OPTION TO QUIT

Thema Working Paper n Université de Cergy Pontoise, France

Real-Time Wireless Control Networks for Cyber-Physical Systems

CS269I: Incentives in Computer Science Lecture #4: Voting, Machine Learning, and Participatory Democracy

Transcription:

A Calculus for End-to-end Statistical Service Guarantees Technical Report: University of Virginia, CS-2001-19 (2nd revised version) Almut Burchard Ý Jörg Liebeherr Stephen Patek Ý Department of Mathematics Department of Computer Science Department of Systems and Information Engineering University of Virginia Charlottesville, VA 22904 Abstract The deterministic network calculus offers an elegant framework for determining delays and backlog in a network with deterministic service guarantees to individual traffic flows. This paper addresses the problem of extending the network calculus to a probabilistic framework with statistical service guarantees. Here, the key difficulty relates to expressing, in a statistical setting, an end-to-end (network) service curve as a concatenation of per-node service curves. The notion of an effective service curve is developed as a probabilistic bound on the service received by an individual flow. It is shown that per-node effective service curves can be concatenated to yield a network effective service curve. Key Words: Quality-of-Service, Service Differentiation, Statistical Service, Network Calculus. 1 Introduction The deterministic network calculus recently evolved as a fundamental theory for quality of service (QoS) networks, and has provided powerful tools for reasoning about delay and backlog in a network with service guarantees to individual traffic flows. Using the notion of arrival envelopes and service curves [12], several recent works have shown that delay and backlog bounds can be concisely expressed in a min-plus algebra [1, 5, 8]. However, the deterministic view of traffic generally overestimates the actual resource requirements of a flow and results in a low utilization of available network resources. This motivates the search for a statistical network calculus that can exploit statistical multiplexing, while preserving the algebraic aspects of the deterministic calculus. The problem of developing a probabilistic network calculus has been the subject of several studies. Kurose [16] uses the concept of stochastic ordering and obtains bounds on the distribution of delay and buffer occupancy of a flow in a network with FIFO scheduling. Chang [7] presents probabilistic bounds This work is supported in part by the National Science Foundation through grants ANI-9730103, ECS-9875688 (CAREER), ANI-9903001, DMS-9971493, and ANI-0085955, and by an Alfred P. Sloan research fellowship. This report was revised in December 2001, and majorly revised in April 2002.

on output burstiness, backlog and delays in a network where the moment generating functions of arrivals are exponentially bounded. Different bounds for stochastically bounded arrivals are derived by Yaron and Sidi [22] and Starobinski and Sidi [21]. The above results can be used to determine stochastic end-to-end performance bounds. Results on statistical end-to-end delay guarantees in a network have been obtained for specific scheduling algorithms, such as EDF [19, 20], and GPS [15], and a class of coordinated scheduling algorithms [2, 17]. Several researchers have considered probabilistic formulations of service curves. Cruz defines a probabilistic service curve which violates a given deterministic service curve according to a certain distribution [13]. Chang (see [9], Chp. 7) presents exercises which hint at a statistical network calculus for the class of dynamic F-servers. Finally, Knightly and Qiu [18] derive statistical service envelopes as time-invariant lower bounds on the service received by an aggregate of flows. With exception of ([9], Chp. 7), none of the cited works express statistical end-to-end performance bounds in a min-plus algebra, and it has been an open question whether a statistical network calculus can be developed in this setting. The contribution of this paper is the presentation of a statistical network calculus that uses the min-plus algebra [1, 5, 8]. The advantage of using the min-plus algebra is that end-to-end guarantees can be expressed as a simple concatenation of single node guarantees, which, in turn, can be exploited to achieve simple probabilistic bounds. We define an effective service curve, which is, with high certainty, a probabilistic bound on the service received by a single flow. We will show that the main results of the deterministic network calculus carry over to the statistical framework we present. Our derivations reveal a difficulty that occurs when calculating probabilistic service guarantees for multiple nodes. We show that the problem can be overcome by revising the definition of the effective service curve. The results in this paper are set in a continuous time model with fluid left-continuous traffic arrival functions, as is common for network delay analysis in the deterministic network calculus. A node represents a router (or switch) in a network. Packetization delays and other effects of discrete-sized packets, such as the non-preemption of packet transmission, are ignored. We refer to [9] for the issues involved in relaxing these assumptions for the analysis of packet networks. When analyzing delays in a network, all processing overhead and propagation delays are ignored. As in the deterministic network calculus, arrivals from a traffic flow to the network satisfy deterministic upper bounds, which are enforced by a deterministic regulator. The remaining sections of this paper are structured as follows. In Section 2, we review the notation and key results of the deterministic network calculus. In Section 3 we introduce effective service curves and present the results for a statistical network calculus in terms of effective service curves. In Section 4 we provide a discussion that motivates our revised definition of an effective service curve. In Section 5, we present brief conclusions. 2 Network Calculus Preliminaries The deterministic network calculus, which was created in [10, 11] and fully developed in the last decade, provides concise expressions for upper bounds on the backlog and delay experienced by an individual flow at one or more network nodes. An attractive feature of the network calculus is that end-to-end bounds can often be easily obtained from manipulations of the per-node bounds. In this section we review some notation and results from the deterministic network calculus. This section is not a comprehensive summary of the network calculus and we refer to [1, 6, 9] for a complete discussion. 2

2.1 Operators Much of the formal framework of the network calculus can be elegantly expressed in a min-plus algebra [3], complete with convolution and deconvolution operators for functions. Generally, the functions in this paper are non-negative, non-decreasing, and left-continuous, defined over time intervals ¼ Ø. We assume for a given function that ص ¼ if Ø ¼. The convolution of two functions and, is defined as ص The deconvolution «of two functions and is defined as Ò Ø µ µ (1) ¾ ¼ Ø «Øµ ÙÔ Ø µ µ (2) ¼ For ¼, the impulse function Æ is defined as ½ Æ Øµ ¼ If is nondecreasing, we have the formulas if Ø if Ø (3) Ø µ Æ Øµ (4) Ø µ «Æ ص (5) We refer to [3, 6, 9] for a detailed discussion of the properties of the min-plus algebra and the properties of the convolution and deconvolution operators. 2.2 Arrival functions and Service Curves Let us consider the traffic arrivals to a single network node. The arrivals of a flow in the time interval ¼ ص are given in terms of a function ص. The departures of a flow from the node in the time interval ¼ ص are denoted by ص, with ص ص. The backlog of a flow at time Ø, denoted by ص, is given by ص ص ص (6) The delay at time Ø, denoted as Ï Øµ, is the delay experienced by an arrival which departs at time Ø, given by Ï Øµ Ò ¼ Ø µ ص (7) We will use Ü Ýµ and Ü Ýµ to denote the arrivals and departures in the time interval Ü Ýµ, with Ü Ýµ ݵ ܵ and Ü Ýµ ݵ ܵ. We make the following assumptions on the arrival functions. (A1) Non-Negativity. The arrivals in any interval of time are non-negative. That is, for any Ü Ý, we have ݵ ܵ ¼. 3

... A=A 1 Node D 1= A 2 Node D 2 A H Node D H =D 1 2 H S 1 S 2 S H Figure 1: Traffic of a flow through a set of À nodes. Let and denote the arrival and departures at the -th node, with ½, ½ for ¾ À and À. (A2) Upper Bound. The arrivals of a flow are bounded by a subadditive 1 function, called the arrival envelope, 2 such that Ø µ ص µ for all Ø ¼. A minimum service curve for a flow is a function Ë which specifies a lower bound on the service given to the flow such that, for all Ø ¼, ص Ë Øµ (8) A maximum service curve for a flow is a function Ë which specifies an upper bound on the service given to a flow such that, for all Ø ¼, ص Ë Øµ (9) Minimum service curves play a larger role in the network calculus since they provide service guarantees. Therefore, we, as the related literature, often refer to a minimum service curve simply as a service curve. If no maximum service curve is explicitly given, one can use Ë Øµ Ø, where is the link capacity. The following two theorems summarize some key results of the deterministic network calculus. These results have been derived in [1, 5, 8]. We follow the notation used in [1]. Theorem 1 Deterministic Calculus [1, 5, 8]. Given a flow with arrival envelope and with minimum service curve Ë, the following hold: 1. Output Envelope. The function «Ë is an envelope for the departures, in the sense that, for all Ø ¼, ص Ø µ µ (10) 2. Backlog Bound. An upper bound for the backlog, denoted by Ñ Ü, is given by Ñ Ü «Ë ¼µ (11) 3. Delay Bound. An upper bound for the delay, denoted by Ñ Ü, is given by Ñ Ü Ò ¼ Ø ¼ Ø µ Ë Øµ (12) The next theorem states that the service curves of a flow at the nodes on its route can be concatenated to define a network service curve, which expresses service guarantees offered to the flow by the network as a whole. 1 A function is subadditive if Ü Ýµ ܵ ݵ, for all Ü Ý ¼, or, equivalently, if ص ص. 2 A function is called an envelope for a function if Ø µ µ ص for all Ø ¼, or, equivalently, if ص ص, for all Ø ¼. 4

Theorem 2 Concatenation of Deterministic Network Service Curves [1, 5, 8]. Suppose a flow passes through À nodes in series, as shown in Figure 1, and suppose the flow is offered minimum and maximum service curves Ë and Ë, respectively, at each node ½ À. Then, the sequence of nodes provides minimum and maximum service curves Ë Ò Ø and Ë Ò Ø, which are given by Ë Ò Ø Ë ½ Ë ¾ Ë À (13) Ë Ò Ø Ë ½ Ë ¾ Ë À (14) Ë Ò Ø and Ë Ò Ø will be referred to as network service curves, and Eqs. (13) (14) will be called the concatenation formulas. With Theorems 1 and 2 network service curves can be used to determine bounds on delay and backlog for individual flows in a network. There are many additional properties and refinements that have been derived for the deterministic calculus. However, in this paper we will concern ourselves only with the results above. 3 Statistical Network Calculus We now approach the network calculus in a probabilistic framework. Arrivals and departures from a flow to the network in the time interval ¼ ص are described by random processes ص and ص satisfying assumptions (A1) and (A2). The random processes are defined over an underlying joint probability space that we suppress in our notation. The statistical network calculus makes service guarantees for individual flows, where each flow is allocated a probabilistic service in the form of an effective service curve. Given a flow with arrival process, a (minimum) effective service curve is a nonnegative function Ë that satisfies for all Ø ¼, È Ö Øµ Ë Øµ ½ (15) Note that the effective service curve is a non-random function. We omit the corresponding definition of a maximum effective service curve. The following theorem is a probabilistic counterpart to Theorem 1. Theorem 3 Statistical Calculus. Given a flow with arrival process satisfying assumptions (A1) (A2), and given an effective service curve Ë, the following hold: 1. Output Envelope. The function «Ë is a probabilistic bound for the departures on ¼ Ø, in the sense that, for all Ø ¼, È Ö Ø Ø µ «Ë µ ½ (16) 2. Backlog Bound. A probabilistic bound for the backlog is given by Ñ Ü «Ë ¼µ, in the sense that, for all Ø ¼, È Ö Øµ Ñ Ü ½ (17) 3. Delay Bound. A probabilistic bound for the delay is given by, Ñ Ü Ò ¼ Ø ¼ Ø µ Ë Øµ (18) 5

in the sense that, for all Ø ¼, È Ö Ï Øµ Ñ Ü ½ (19) By setting ¼ in Theorem 3, we can recover the bounds of Theorem 1 with probability one. Proof. The proof uses on several occasions that the inequality Ø µ ص «µ (20) holds for any nonnegative function and for all Ø ¼. To see this inequality, we compute Ø µ ص Ø µ Ò Ø Üµ ܵ ܾ ¼ Ø ÙÔ Ø Ü Ø µ ܵ ܾ ¼ Ø ÙÔ Ü ¼ (21) (22) ܵ ܵ (23) «µ (24) Eqn. (21) expands the convolution operator. Eqn. (22) takes Ø µ inside the infimum and uses that Ø µ Ø Üµ Ø Ü Ø µ. Eqn. (23) uses that Ø Ü Ø µ Ü µ for all Ü Ø by definition of an arrival envelope, and extends the range of the supremum. Finally, Eqn. (24) uses the definition of the deconvolution operator. 1. Proof of the Output Bound. For any fixed Ø ¼, we have ½ È Ö Øµ Ë Øµ (25) È Ö Ø Ø µ Ø µ Ë Øµ (26) È Ö Ø Ø µ Ø µ Ë Øµ (27) È Ö Ø Ø µ «Ë µ (28) Eqn. (25) holds by the definition of the effective service curve Ë. Eqn. (26) uses that Ø Ø µ Ø µ ص. Eqn. (27) uses that departures in ¼ ص cannot exceed arrivals, that is, ص ص for all Ø ¼. Finally, Eqn. (28) uses that Ø µ Ë Øµ «Ë µ by Eqn. (20). 2. Proof of the Backlog Bound. Since ص ص ص and with the definition of the effective service curve, we can write ½ È Ö Øµ Ë Øµ (29) È Ö Øµ ص Ë Øµ (30) È Ö Øµ «Ë ¼µ (31) Eqn. (29) holds by definition of the effective service curve. Eqn. (30) uses that ص ص Eqn. (31) uses that ص Ë Øµ «Ë ¼µ by Eqn. (20). ص, and 6

3. Proof of the Delay Bound. The delay bound is proven by estimating the probability that the output ص exceeds the arrivals Ø Ñ Ü µ. ½ È Ö Øµ Ë Øµ (32) È Ö Øµ Æ Ñ Ü µ ص (33) È Ö Øµ µ Æ Ñ Ü µ ص (34) È Ö Øµ Ø Ñ Ü µ (35) Eqn. (32) uses the definition of the effective service curve Ë. Eqn. (33) uses the definition of the impulse function in Eqn. (4) and the definition of Ñ Ü in Eqn. (18). Eqn. (34) follows from the associativity of the convolution, and Eqn. (34) uses the definition of an arrival envelope. ¾ A probabilistic counterpart to Theorem 2 can be formulated as follows. Theorem 4 Concatenation of Effective Service Curves. Consider a flow that passes through À network nodes in series, as shown in Figure 1. Assume that effective service curves are given by nondecreasing functions Ë at each node ( ½ À). Then, for any Ø ¼, Ó È Ö Ò Øµ Ë ½ Ë À Æ À ص ½ À Ø (36) where ¼ is an arbitrary parameter. Again, we can can recover the deterministic result from Theorem 2. By setting ¼, the results in Eqn. (36) hold with probability one. Then by letting ¼, we obtain Theorem 2 almost surely. Proof. We proceed in three steps. In the first step, we modify the effective service curve to give lower bounds on the departures simultaneously for all times in the entire interval ¼ Ø. In the second step, we perform a deterministic calculation. The proof concludes with a simple probabilistic estimate. Step 1: Uniform probabilistic bound on ¼ Ø. Suppose that Ë is a nondecreasing effective service curve, that is Ü ¾ ¼ Ø È Ö Üµ Ë Üµ ½ (37) We will show that then, for any choice of ¼, È Ö Ü ¾ ¼ Ø Üµ Ë Ü µ ½ Ø (38) To see this, fix ¼, set Ü, and consider the events Ü µ Ë Ü µ ½ Ò (39) where Ò is the smallest integer no larger than Ø. By Eqn. (37), Ò Ó È Ö ½ Ò (40) ¼ Ò Let Ü ¾ ¼ Ø be arbitrary, and let the largest integer with Ü Ü. By construction, Ü occurs, then Ü. If ܵ Ü µ Ë Ü µ Ë Ü µ (41) 7

where we have used the fact that Ë is nondecreasing in the last step. It follows that È Ö Ü ¾ ¼ Ø Üµ Ë Ü µ È Ö ½ Ò Ü µ Ë Ü µ (42) Ò Ó È Ö (43) which proves Eqn. (38). Thus, the assumptions of the theorem imply that ¼ Ò ½ Ò (44) ½ À È Ö Ü ¾ ¼ Ø Üµ Ë Ü µ ½ Ø (45) for any ¼. Adding the violation probabilities, we see that È Ö Ü ¾ ¼ Ø ½ À ܵ Ë Ü µ ½ À Ø (46) Step 2: A deterministic argument. Suppose that, for a particular sample path, Ü ¾ ¼ Ø ½ À ܵ Ë Ü µ (47) Consider for a moment the case where the path through the network consists of only two nodes, À ¾. By Eqn. (47) with À ¾ and Ü Ø, we have ¾ ص By Eqn. (47) with ½, we have for all Ü ¾ ¼ Ø, ½ ܵ Ò ¾ ܵ Ë ¾ Ø Ü µ (48) ܾ ¼ Ø Ò ½ ݵ Ë ½ Ü Ý µ (49) ݾ ¼ Ü Setting ¾, ¾ ½, ½, and inserting Eqn.(49) into Eqn.(48) yields Ò Ó Øµ Ò Ò Ýµ Ë ½ Ü Ý µ Ë ¾ Ø Ü µ ܾ ¼ Ø Ý¾ ¼ Ü Ë ½ Ë ¾ Æ ¾ ص (51) An induction over the number of nodes shows that Eqn. (47) implies (50) ص Ë ½ Ë À Æ À ص (52) Step 3: Conclusion. The proof is completed by estimating È Ö Øµ Ë ½ Ë À Æ À ص (53) È Ö Ü Ø ½ À ܵ Ë Ü µ (54) ½ À Ø (55) The first inequality follows from the fact that Eqn. (47) implies Eqn. (52). The second inequality merely uses Eqn. (46). ¾ 8

traffic arrivals B(t 0 ) departures D(t 0 ) 0 t 0 t time Figure 2: Illustration for the modified convolution operator. The operator ؼ uses the backlog at time Ø ¼ and the arrivals in the interval Ø ¼ Ø. 4 Strengthening the Statistical Calculus with Adaptive Service Guarantees Since the bound in Eqn. (36) deteriorates as Ø becomes large, Theorem 4 is of limited practical value. To explain why Eqn. (36) deteriorates, consider a network as shown in Figure 1, with À ¾ nodes. An effective service curve Ë ¾ in the sense of Eqn. (15) at the second node guarantees that, for any given time Ø, the departures from this node are with high probability bounded below by ¾ ص ¾ Ë ¾ ص Ò ¾ Ø µ Ë ¾ µ (56) Ø Suppose that the infimum in Eqn. (56) is assumed at some value Ø. Since the departures from the first node are random, even if the arrivals to the first node satisfy the deterministic bound, is a random variable. An effective service curve Ë ½ at the first node guarantees that for any arbitrary but fixed time Ü, the arrivals ¾ ܵ ½ ܵ to the second node are with high probability bounded below by ½ ܵ ½ Ë ½ ܵ (57) Since is a random variable, we cannot simply evaluate Eqn. (57) for Ü Ø and use the resulting bound in Eqn. (56). Furthermore, there is, a priori, no time-independent bound on the distribution of. Note that the above issue does not arise in the deterministic calculus, since deterministic service curves make service guarantees that hold for all values of Ü. We conclude that, in a probabilistic setting, additional assumptions are required to establish time-independent bounds on the range of the infimum, and, in that way, obtain probabilistic network service curves that do not deteriorate with time. We next define a class of effective service curves where the range of the infimum is bounded independently of time, and then give conditions under which these service curves are also effective service curves in the sense of Eqn. (15). The resulting effective service curves are valid without adding assumptions on a specific arrival distribution or service discipline. 9

4.1 (Deterministic) Adaptive Service Curves We define a modified convolution operator by setting, for any Ø ¼ Ø, Ò Ø¼ ص Ñ Ò Ø Ø ¼ µ Ø ¼ µ Ò Ø µ Ó µ (58) Ø Ø ¼ ؼ The essential property of this modified operator is that the range over which the infimum is taken is limited to the interval Ø ¼ Ø. Note that the function ؼ ص depends on the backlog at time Ø ¼ as well as on the arrivals in the interval Ø ¼ Ø. It can be written equivalently as Ò Ó Ø¼ ص Ñ Ò Ø Ø ¼ µ Ò µ µ Ø ¼ µ (59) Ø Ø ¼ Ø The usual convolution operator is recovered by setting Ø ¼ ¼. We now reconsider the definition of a service curve in a deterministic regime. We introduce a revised definition of a (deterministic) service curve, which is presented in [1, 14], and is referred to as adaptive service curve in [6]. A (minimum) adaptive service curve is defined as a function Ë which specifies a lower bound on the service given to a flow such that, for all Ø Ø ¼ ¼, with Ø ¼ Ø, Ø ¼ ص ؼ Ë Øµ (60) A maximum adaptive service curve can be defined accordingly. 3 Eqn. (60) is equivalent to requiring that Ë satisfies Eqn. (8) for the time-shifted arrivals and departures ܵ Ø ¼ µ Ø ¼ Ø ¼ ܵ ܵ Ø ¼ Ø ¼ ܵ (61) Figure 2 illustrates the time-shifted arrivals. Many service curves with applications in packet networks, such as shapers, schedulers with delay guarantees, and rate-controlled schedulers such as GPS, can be expressed in terms of adaptive service curves. By setting Ø ¼ ¼, one can see that each adaptive service curve is a service curve. However, the converse does not hold [6]. We next define a (minimum) -adaptive service curve, denoted by Ë, as a function for which Eqn. (60) is satisfied whenever Ø Ø ¼. If ½, we obtain an adaptive service curve, and drop the superscript in the notation. The difference between a service curve according to Eqn. (8) and an -adaptive service curve is that the former involves arrivals over the entire interval ¼ Ø, while the latter uses information about arrivals and departures in intervals Ø ¼ Ø whose length does not depend on Ø. Performing a time shift as in Eqn. (61) and applying Theorem 2 shows that the convolution of -adaptive service curves yields an -adaptive network service curve. The following lemma shows that for sufficiently large, but finite, an -adaptive service curve is a service curve in the sense of Eqn. (8). In particular, the conclusions of Theorems 1 and 2 hold for such service curves. Lemma 1 Suppose that the arrival function of a flow has arrival envelope. Let Ë be an -adaptive service curve. If Ø ¾ ¼ ص Ë Øµ (62) then Ë Ë is an adaptive service curve for intervals of arbitrary length. In particular, Ë satisfies Eqn. (8) for all Ø ¼. The proof of the lemma is given in the appendix. 3 We note that the adaptive service curve in [6] is more general and is defined using Ø ¼ ص Ñ Ò Ò Ø Ø¼ ؼ Ø µ µ Ó. In our context we set. Ò Ø Ø ¼µ Ø ¼µ 10

4.2 Effective Adaptive Service Curves Next we introduce a probabilistic version of the -adaptive service curve. We define an effective -adaptive service curve to be a nonnegative function Ë such that È Ö Ø ¼ ص ؼ Ë Øµ ½ (63) for all Ø ¼ Ø ¼ with Ø Ø ¼. If ½, we call the resulting function an effective adaptive service curve, and drop the superscript. Note that the infimum in the convolution on the right hand side of Eqn. (63) ranges over an interval of length at most. With this bound on the range of the infimum, we derive the following effective network service curve. Theorem 5 Concatenation of -Adaptive Effective Service Curves. Consider a flow that passes through À network nodes in series. Let the functions Ë define effective -adaptive service curves at each node ( ½ À). Assume that the Ë are nondecreasing. Then Ë Ò Ø À ص Ë ½ Ë À Æ À ص (64) is an effective -adaptive network service curve for any choice of ¼, with violation probability given by À. Proof. We need to show that, for any Ø ¼ Ø with Ø Ø ¼ and any choice of the parameter, we have È Ö Ø ¼ ص ؼ Ë Ò Ø À ص ½ À (65) Fix Ø ¼ Ø with Ø Ø ¼. Performing a time shift as in Eqn. (61), we may assume without loss of generality that Ø ¼ ¼ and Ø ¾ ¼. The claim now follows immediately from Theorem 4. ¾ The following lemma gives a sufficient conditions for an effective -adaptive curve to be an effective service curve in the sense of Eqn. (15). Lemma 2 Given a flow with arrival process, and an effective -adaptive service curve Ë. 1. If È Ö Ø ¼ ¾ Ø Ø Ø ¼ µ ¼ ½ ½ (66) for all Ø ¼, then, for any choice of ¼, Ë ½ Ë Æ is an effective adaptive service curve for intervals of arbitrary length, with violation probability ½. In particular, for all Ø ¼. 2. If the arrival process has arrival envelope and È Ö Øµ Ë Æ Øµ ½ ½ µ (67) È Ö Øµ Ë µ µ ½ ½ (68) for all Ø ¼, then Ë ½ Ë is an effective adaptive service curve for intervals of arbitrary length, with violation probability ½. In particular, for all Ø ¼. È Ö Øµ Ë Øµ ½ ½ µ (69) 11

Lemma 2 should be compared with Lemma 1, as both provide sufficient conditions under which service guarantees on intervals of a given finite length imply service guarantees on intervals of arbitrary length. While the condition on in Eqn. (62) involves only the deterministic arrival envelope and the service curve, Eqs. (66) and (68) represent additional assumptions on the backlog process. This points out a fundamental difference between the deterministic and the statistical network calculus. Proof. The proof consists of four steps. If the second condition of the lemma holds, the first two steps can be omitted. In the first step, we estimate the change in the modified convolution ؼ Ë as Ø ¼ is increased. In the second step, we modify a given effective -adaptive service curve to give uniform probabilistic lower bounds on the departure of all intervals of the form Ø ¼ Ø, where Ø is fixed and Ø ¼ ¾ Ø Ø. This is analogous to the first step in the proof of Theorem 4. The third step contains a deterministic argument. We conclude with a probabilistic estimate in Step 4. Step 1: A property of the modified convolution operator ؼ. Let be a nondecreasing function, let Ø ½ ¾ Ø ¼ Ø, and set Ø ½ Ø ¼. Then Ø ½ ص ؽ ص (70) implies Ø ¼ ص ؼ Æ Øµ (71) To see this, note that Eqn. (70) implies that either or If Eqn. (72) holds, then clearly Ø ½ ص Ø Ø ½ µ (72) Ø ½ ص Ø ½ µ Ò Ø ½ Ø µ µ (73) Ø Ø ½ Ø ¼ ص Ø ½ ص Ø Ø ½ µ Æ Ø Ø ¼ µ ؼ Æ Øµ (74) where we have used that is nondecreasing in the third inequality. If Eqn. (73) holds, then Ø ¼ ص Ø ¼ Ø ½ µ Ø ½ ص (75) Ø ¼ Ø ½ µ Ø ½ µ Ò Ø Ø ½ ؽ Ø µ µ (76) Ø ¼ µ Ò Ø Ø ½ ؼ Ø µ µ (77) ؼ Æ µ ص (78) In Eqn. (76) we have used Eqn. (73). In Eqn. (77), we have used the definitions of Ø ¼ µ and Ø ½ µ and taken Ø ¼ Ø ½ µ under the infimum. In Eqn. (78) we have applied the definition of, and used that Æ because is nondecreasing. Step 2: Uniform probabilistic bounds. curve, that is, for any Ø ¼, Suppose that Ë is a nondecreasing effective -adaptive service Ø ¼ ¾ Ø Ø È Ö Ø ¼ ص ؼ Ë Øµ ½ (79) 12

We will show that then, for any choice of ¼, È Ö Ø ¼ ¾ Ø Ø Ø ¼ ص ؼ Ë Ø µ ½ (80) To see this, assume without loss of generality that Ø, and consider the events Ü Øµ Ü Ë Øµ ¼ Ò (81) By Eqn. (79), we have Using Step 1, we arrive at Ò È Ö ¼ Ò Ó ½ Ò (82) which proves Eqn. (80) in the case Ø. È Ö Ø ¼ ¾ ¼ ص ؼ Ë Ø µ (83) È Ö ¼ Ò ½ Ü µ Ü Ë Ü µ (84) Ò Ó È Ö (85) ¼ Ò ½ Ò (86) Step 3: Deterministic argument. Fix Ø ¼, and suppose that for a particular sample path, we have and either Ü ¾ Ø Ø Ü Øµ Ü Ì Øµ (87) ½ Ø ¼ ¾ Ø Ø Ø ¼ µ ¼ or (88) ¾ Ø µ Ë µ µ where is an arrival envelope. (89) In the first case, we can set Ü Ø ¼ in Eqn. (87) to obtain ¾ Ø ¼ ¾ Ø Ø This implies that Ø ¼ µ ¼ and ص Ø ¼ µ Ñ Ò Ë Ø Ø ¼ µ Ø ¼ µ Ò Ø Ø¼ Ø ¼ Ø µ Ë µ ص In the second case, we note that from Eqn. (89) it follows that which implies that (90) Ò Ø µ Ë µ (91) Ø Ø ¼ Ø µ Ò Ø Ø µ Ë µ Ë µ µ Ø Øµ Ë µ (92) Ø Øµ Ø µ Ò Ø µ Ë µ (93) Inserting this into Eqn. (87) with Ü Ø yields again Eqn. (91). 13

Step 4: Probabilistic estimate. If the first condition of the lemma holds, we use Step 3 to see that È Ö Øµ Ò Ø µ µ (94) Ò È Ö Ü ¾ Ø Ø Ü Øµ Ü Ì Øµ Ó and Ø ¼ ¾ Ø Ø Ø ¼ µ ¼ (95) ½ ½ µ (96) where we have used the result of Step 2 in the second line. If the second condition of the lemma holds, È Ö Øµ Ò Ø µ µ (97) Ò È Ö Ø Øµ Ø Ì Øµ Ó and Ø µ Ë µ µ (98) ½ ½ µ (99) where we have used the definition of Ë in the second line. ¾ 4.3 Strong Effective Adaptive Service Curves Even though the concatenation formula in Theorem 5 results in a significant improvement over Theorem 4, a drawback of Theorem 5 is that the construction of the network service curve results in a degradation of the violation probability to À and introduces a time shift Æ À. As becomes large, for any choice of ¼, either the violation probability À or the time shift À grow significantly. The conversion of an effective -adaptive to an effective adaptive service curve in Lemma 2 introduces additional losses. To avoid this successive degradation of the service guarantees, we further strengthen the effective service curve. We define a strong effective adaptive service curve for intervals of length to be a function Ì which satisfies for any interval Á of length, È Ö Ø ¼ Ø Á Ø ¼ ص ؼ Ì Øµ ½ (100) This definition differs from the definition of an effective service in Eqn. (15) in two ways: it uses the modified convolution operator, and it provides lower bounds on the departures simultaneously in all subintervals of an interval Á. With the strong effective adaptive network service curve, we obtain a probabilistic version of a network service curve, with a similar concatenation formula as in the deterministic calculus. This is the content of the following theorem. Theorem 6 Concatenation of Strong Effective Adaptive Service Curves. Consider a flow that passes through À network nodes in series. Assume that the functions Ì define strong effective adaptive service curves for intervals of length at each node ( ½ À). Then is a strong effective adaptive service curve for intervals of length. Ì Ò Ø À ص Ì ½ Ì À ص (101) Note the similarity of the convolution formula in Eqn. (101) with the corresponding expression in the deterministic calculus. Thus, in the statistical calculus, obtaining a statistical end-to-end service curve via 14

a simple convolution operation comes at the price of significant modifications to the definition of a service curve. Proof. We need to show that Ì Ò Ø À Ì ½ Ì À satisfies for any interval Á of length È Ö Ø ¼ Ø Á Ø ¼ ص ؼ Ì Ò Ø À ص ½ À (102) The proof is analogous to the proof of Theorem 4. Step 1. Uniform probabilistic bound on Á. Since each Ì is a strong effective service curve by assumption, we have È Ö Ø ¼ Ü Á ½ À Ø ¼ ܵ ؼ Ì Üµ ½ À (103) Step 2. A deterministic argument. Suppose that, for a particular sample path, Ø ¼ Ü Á ½ À Ø ¼ ܵ ؼ Ì Üµ (104) Fix Ø ¼ and Ø and consider the time-shifted arrivals and departures defined by Eqn. (61). Eqn. (104) implies Ü Ø Ø ¼ ½ À ܵ Ì Üµ (105) We argue as in Step 2 of the proof of Theorem 4 that this implies ص Ì ½ Ì À ص (106) Reversing the time shift and using that Ø ¼ Ø Á was arbitrary, we arrive at Step 3 : Conclusion. We conclude that Ø ¼ Ø Á ص ؼ Ì ½ Ì À ص (107) È Ö Ø ¼ Ø Á Ø ¼ ص ؼ Ì Ò Ø À ص (108) È Ö Ø ¼ Ü Á ½ À Ø ¼ ܵ ؼ Ì Üµ (109) ½ À (110) The first inequality follows from the definition of Ì Ò Ø À and the fact that Eqn. (104) implies Eqn. (107), and the second inequality is just Eqn. (103). ¾ It is possible to recover an effective service curve in the sense of Eqn. (15) from a strong effective adaptive service curve, provided that additional information on the backlog is available. This is stated in the following lemma. Lemma 3 Given a flow with arrival process, and a strong effective adaptive service curve Ì on intervals of length. Assume that for every Ø ¼, at least one of the following two conditions is satisfied. ½ È Ö Ø ¼ ¾ Ø Ø Ø ¼ µ ¼ ½ ½ or (111) ¾ È Ö Øµ Ì µ µ ½ ½ where is an arrival envelope. (112) Then, for any Ø ¼ and any Ø ½ Ø, È Ö Ø ½ ص ؽ Ì Øµ ½ ½ µ (113) In particular, for Ø ½ ¼, Ë ½ Ì is an effective service curve in the sense of Eqn. (15). 15

The proof will show that either of the two conditions in the lemma guarantees the stronger statement that È Ö Øµ Ò Ø µ Ì µ ½ ½ µ (114) for any Ø ¼, thus, yielding a time independent bound on the range of the convolution. Proof. We need to show that under the assumptions of the lemma, we have for any Ø ¼ and any Ø ½ Ø È Ö Ø ½ ص ؽ Ì Øµ ½ ½ µ (115) By considering time-shifted arrivals and departures as in Eqn. (61), we may assume without loss of generality that Ø ½ ¼. Step 1.: Deterministic argument. Fix Ø ¼, and suppose that for a particular sample path, we have and either Ü Ý Ø Ø Ü Ýµ Ü Ì Ýµ (116) ½ Ø ¼ ¾ Ø Ø Ø ¼ µ ¼ or (117) ¾ Ø µ Ì µ µ where is an arrival envelope. (118) The first step in the proof of Lemma 2 shows that this implies Step 2: Probabilistic estimate. By Step 1, we have ص Ò Ø µ Ì µ (119) as claimed. È Ö Øµ Ò Ø µ µ (120) Ü Ý Ø Ø Ü Ýµ Ü Ì Üµ È Ö and either Ø ¼ ¾ Ø Ø Ø ¼ µ ¼ or Ø µ Ì µ µ (121) ½ ½ µ (122) ¾ Combining Theorem 6 with Lemma 3 yields an effective network service curve, which by Theorem 3 guarantees probabilistic bounds on output, backlog, and delay. A comparison of the definition of the strong effective adaptive service curve in Eqn. (100) with Eqn. (63) shows that a strong effective adaptive service curve is an effective -adaptive service curve which provides service guarantees simultaneously on all subintervals of an interval of length. A comparison of Theorem 6 and Lemma 3 with Theorem 5 and Lemma 3 shows that the more stringent strong effective adaptive service curve expresses the statistical calculus more elegantly. We believe that, unless additional assumptions are made on the arrival processes and the service curves, the network calculus with strong effective adaptive service curves offers the preferred framework. Our final result shows how to construct a strong effective adaptive service curve from an effective adaptive service curve. The lemma indicates that the choice of working with a strong effective adaptive service curve rather than an effective adaptive service curve is purely a matter of technical convenience. 16

Lemma 4 Let Ë be an effective -adaptive service curve for a flow and assume that Ë Øµ is a nondecreasing function of Ø. Let ¼ be arbitrary, and set where ¾ is the smallest integer no less than. Then the function ¼ ¾ ¾ ¾ (123) Ì ¼ Ë Æ (124) is a strong effective service curve for intervals of length, with violation probability given by ¼. Proof. We will show that for any interval Á of length, Ø ¼ Ø Á È Ö Ø ¼ ص ؼ Ë Øµ ½ (125) implies È Ö Ø ¼ Ø Á Ø ¼ ص ؼ Ì ¼ ص ½ ¼ (126) where ¼ and Ì ¼ are as given in the statement of the lemma. By performing a suitable time shift as in Eqn. (61), we may assume without loss of generality that Á ¼. The strategy is similar to the construction of strong effective envelopes from effective envelopes in [4], and uses the same techniques as the first step in the proof of Theorem 4 and the first two steps in the proof of Lemma 2. We first use the fact that the departures satisfy the positivity assumption (A1) to translate service guarantees given on a subinterval into a service guarantee on a longer interval. In the second step, we establish probabilistic bounds for the departures simultaneously in a finite number of subintervals Á of Á, and then bound the departures in general subintervals of Á from below in terms of the departures in the Á. Step 1: A property of the modified convolution. Let be a nondecreasing function, let Ø ½ Ø ¾ Ø ¼ Ø, and set ½ Ø ½ Ø ¼, ¾ Ø Ø ¾, ½ ¾. If, for a particular sample path, then Ø ½ Ø ¾ µ ؽ Ø ¾ µ (127) Ø ¼ ص Ø ¼ Ø ¾ µ (128) ؼ Æ ½ ؾ µ (129) ؼ Æ Øµ (130) Here, Eqn. (129) follows from the first step in the proof of Lemma 2. Eqn. (130) follows since is nondecreasing and ½ ¾. Step 2: Uniform probabilistic bounds on Á. Fix ¼, set Ü ¾, and consider the intervals Á Ü Ü ¼ Ò (131) 17

where Ò ¾ is the smallest integer no less than ¾. The total number of these intervals is given by Ò Ò ½µ ¾. Let be the event Ü Ü µ Ü Ë Ü µ (132) Since Ë is an effective -adaptive service curve, we have that È Ö ½ for each, and consequently the probability that all of the occur simultaneously is bounded below by Ò Ó È Ö ½ Ò ¾ ¾ (133) ¼ Ò Let now Ø ¼ Ø ¼ be arbitrary, and choose Á Ø ¼ Ø be as large as possible. If occurs, we apply Step 1 with Ø ½ Ü and Ø ¾ Ü, and use that Ü Ø ¼ µ Ø Ü µ to see that ص ؼ Ë Æ Øµ (134) It follows that as claimed. È Ö Ø ¼ Ø ¼ Ø ¼ ص ؼ Ë Ø µ È Ö ¼ Ò Ü Ü µ Ü Ë Ü µ (135) Ò Ó È Ö (136) ¼ Ò ½ Ò ¾ ¾ (137) ¾ 5 Conclusions We have presented a network calculus with probabilistic service guarantees where arrivals to the network satisfy a deterministic arrival bound. We have introduced the notion of effective service curves as a probabilistic bound on the service received by individual flows in a network. We have shown that some key results from the deterministic network calculus can be carried over to the statistical framework by inserting appropriate probabilistic arguments. We showed that the deterministic bounds on output, delay, and backlog from Theorem 1 have corresponding formulations in the statistical calculus (Theorem 3). We have extended the concatenation formula of Theorem 2 for network service curves to a statistical setting (Theorems 4, 5, and 6). We showed that a modified effective service curve, called strong effective adaptive service curve yields the simplest concatenation formula. In order to connect the different notions of effective service curves, we have made an additional assumption on the backlog in Lemmas 2 and 3. While the question is open whether one can dispense with this additional assumption, we have made an attempt to justify the need for it. Acknowledgments We thank Rene Cruz for pointing out problems in earlier versions of the effective network service curve. The authors gratefully acknowledge the valuable comments from Chengzhi Li. 18

References [1] R. Agrawal, R. L. Cruz, C. Okino, and R. Rajan. Performance bounds for flow control protocols. IEEE/ACM Transactions on Networking, 7(3):310 323, June 1999. [2] M. Andrews. Probabilistic end-to-end delay bounds for earliest deadline first scheduling. In Proceedings of IEEE Infocom 2000, pages 603 612, Tel Aviv, March 2000. [3] F. L. Baccelli, G. Cohen, G. J. Olsder, and J.-P. Quadrat. Synchronization and Linearity: An Algebra for Discrete Event Systems. John Wiley and Sons, 1992. [4] R. Boorstyn, A. Burchard, J. Liebeherr, and C. Oottamakorn. Statistical service assurances for traffic scheduling algorithms. IEEE Journal on Selected Areas in Communications. Special Issue on Internet QoS, 18(12):2651 2664, December 2000. [5] J. Y. Le Boudec. Application of network calculus to guaranteed service networks. IEEE/ACM Transactions on Information Theory, 44(3):1087 1097, May 1998. [6] J. Y. Le Boudec and P. Thiran. Network Calculus. Springer Verlag, Lecture Notes in Computer Science, LNCS 2050, 2001. [7] C. S. Chang. Stability, queue length, and delay of deterministic and stochastic queueing networks. IEEE Transactions on Automatic Control, 39(5):913 931, May 1994. [8] C. S. Chang. On deterministic traffic regulation and service guarantees: a systematic approach by filtering. IEEE/ACM Transactions on Information Theory, 44(3):1097 1110, May 1998. [9] C. S. Chang. Performance Guarantees in Communication Networks. Springer Verlag, 2000. [10] R. L. Cruz. A calculus for network delay, Part I : Network elements in isolation. IEEE Transaction of Information Theory, 37(1):114 121, 1991. [11] R. L. Cruz. A calculus for network delay, Part II : Network analysis. IEEE Transactions on Information Theory, 37(1):132 141, January 1991. [12] R. L. Cruz. Quality of service guarantees in virtual circuit switched networks. IEEE Journal on Selected Areas in Communications, 13(6):1048 1056, August 1995. [13] R. L. Cruz. Quality of service management in integrated services networks. In Proceedings of the 1st Semi-Annual Research Review, CWC, UCSD, June 1996. [14] R. L. Cruz and C. Okino. Service gurantees for flow control protocols. In Proceedings of the 34th Allerton Conference on Communications, Control and Computating, October 1996. [15] A. Elwalid and D. Mitra. Design of generalized processor sharing schedulers which statistically multiplex heterogeneous QoS classes. In Proceedings of IEEE INFOCOM 99, pages 1220 1230, New York, March 1999. [16] J. Kurose. On computing per-session performance bounds in high-speed multi-hop computer networks. In ACM Sigmetrics 92, pages 128 139, 1992. 19

[17] C. Li and E. Knightly. Coordinated network scheduling: A framework for end-to-end services. In Proceedings of IEEE ICNP 2000, Osaka, November 2000. [18] J. Qiu and E. Knightly. Inter-class resource sharing using statistical service envelopes. In Proceedings of IEEE Infocom 99, pages 36 42, March 1999. [19] V. Sivaraman and F. M. Chiussi. Statistical analysis of delay bound violations at an earliest deadline first scheduler. Performance Evaluation, 36(1):457 470, 1999. [20] V. Sivaraman and F. M. Chiussi. Providing end-to-end statistical delay guarantees with earliest deadline first scheduling and per-hop traffic shaping. In Proceedings of IEEE Infocom 2000, pages 603 612, Tel Aviv, March 2000. [21] D. Starobinski and M. Sidi. Stochastically bounded burstiness for communication networks. IEEE Transaction of Information Theory, 46(1):206 212, 2000. [22] O. Yaron and M. Sidi. Performance and stability of communication networks via robust exponential bounds. IEEE/ACM Transactions on Networking, 1(3):372 385, June 1993. 20

APPENDIX A Proof of Lemma 1 Let Ë be an -adaptive service curve. We need to show that Ø ½ ص ؽ Ë Øµ (138) holds for all Ø Ø ½ ¼ with Ø ½ Ø. By considering the time-shifted arrivals and departures as in Eqn. (61), we may assume without loss of generality that Ø ½ ¼. Consider intervals Á ½µ, where ¼ is an integer. We will show by induction, that for any integer ¼, Ø ¾ Á ص Ë Øµ (139) Applying the definition of an -adaptive network service curve with Á ¼, we see that Eqn. (139) clearly holds for ¼. For the inductive step, suppose that Eqn. (139) holds for some integer ¼. Fix Ø ¾ Á ½, and let Ø ¼ Ø ¾ Á. By the inductive assumption, Ø ¼µ Ë Ø ¼ µ. Eqn. (60) says that either Ø ¼ ص Ë Ø Ø ¼ µ (140) or If Eqn. (140) holds, then Ø ¼ ص Ø ¼ µ Ò Ø¼ Ø µ Ë Ø Ø ¼ Ø µ (141) ص Ø ¼ ص Ø ¼ µ (142) Ë Ø Ø ¼ µ Ò µ Ë µ (143) Ø ¼ ؼ Ë Ø Ø ¼ µ Ø Ø ¼ µ Ò µ Ë µ (144) Ø ¼ Ø Ë Øµ (145) In Eqn. (143), we have used Eqn. (140) and the inductive assumption. In Eqn. (144), we have used that Ø ¼ Ø µ Ø Ø ¼ µ and pulled Ø Ø ¼ µ out of the infimum. In Eqn. (145), we have inserted Ø Ø ¼, used the assumption that µ Ë µ, and extended the range of the infimum. If Eqn. (141) holds, then ص Ø ¼ µ Ø Ø ¼ µ (146) Ø ¼ µ Ò Ø µ Ë µ (147) Ø Ø ¼ ؼ Ò µ Ë µ (148) Ø Ø ¼ Ø Ë Øµ (149) In Eqn. (147), we have used Eqn. (141), and the fact that Ø ¼ µ Ø ¼ µ Ø ¼ µ. In Eqn. (148), we have taken Ø ¼ µ under the infimum and used that Ø ¼ µ Ø ¼ Ø µ Ø µ. In Eqn. (149), we have extended the range of the infimum and used the definition of the convolution. Since Ø ¾ Á ½ was arbitrary, this proves the inductive step, and the lemma. 21