In this section, we study a subsystem with two multiplexors, the topology for this subsystem is illustrated in Figure 1. An integrated method for the delay analysis in this system is presented. Although the approach is generic in nature, we will assume that the multiplexors are use a FIFO scheduling policy.
Figure 1: A Subsystem with two Multiplexors.
To evaluate the worst-case delay suffered by traffic, the description for network traffic is needed. We give the following definitions and notations for this purpose.
Similarly, we define the amount of traffic leaving the server as follows:
Referring to the two-server subsystem depicted in
Figure 1, we use to denote the set of
all connections that traverse both Server 1 and Server 2. We use
to denote the set of all connections that traverse
Server 1 only and then leave the subsystem. We use
to
denote the set of all connections that join the subsystem after
Server 1 and traverse Server 2 only.
Throughout this paper, we will assume that the traffic of every
connection is controlled at the source by a token bucket, that is, for
or
The delay at a server can be determined once the output traffic at that server is known. The following lemma, which was first presented in [1], addresses this.
Once we know the output traffic of a server, we also know the arrival time for the data leaving at any particular point in time. The following lemma gives the relationship between the output traffic and the data arrival time.
The lemma follows from the definition of function .
Q.E.D
Similarly, we can formulate when the arriving data will leave the server, as the following lemma shows.
The lemma follows from the definition of function .
Q.E.D
We can now apply these results to accurately determine the end-to-end delay suffered by traffic as it traversed the two-server subsystem depicted in Figure 1.
During the time interval [0,t), the total amount of traffic arriving
at Server 2 is . According to Lemma 3, the
-th bit leaves Server 2 at time
.
Furthermore, these
contains
bits coming from
Server 1. According to Lemma 2, the
-th bit
arrives at Server 1 at time
. Therefore, the delay
suffered at time t by connections traversing both servers is given
as
. So we have
Q.E.D
Unfortunately, Equation (8) is only of theoretical value.
This is because it requires the knowledge of internal network traffic
(in form of ). Since the only information we assume are the
traffic constraint functions at the sources, and the traffic is not
reshaped internally, the internal network traffic is difficult, if not
impossible, to describe. In order to provide a useful integrated
method for delay analysis in this subsystem, we need to deeply analyze
Equation (8).
The following central theorem in this paper provides an estimation for
in Lemma 4
To streamline the presentation of the theorem, we define the following
auxiliary notations:
See Appendix. Q.E.D
We note that, according to Theorem 1, the end-to-end
delay of connections traversing both servers can be
computed using only bounding functions for the traffic entering the
subsystem. This eliminates the problems described earlier with
Equation (8) and provides a practical method to analyze
end-to-end delays, as we proceed to describe below.