[6] Chen, M.; Georganas, N.D., A fast algorithm for multi-channel/port traffic scheduling

Size: px
Start display at page:

Download "[6] Chen, M.; Georganas, N.D., A fast algorithm for multi-channel/port traffic scheduling"

Transcription

1 94 References [] Akata, M.; Karube, S.-I.; Sakamoto, T.; Saito, T.; Yoshida, S.; Maeda, T. A 250 Mb/s 32x32 CMOS crosspoint LSI for ATM switching systems, IEEE J. Solid-State Circuits, Vol.25, No.6, pp , Dec [2] Ali, M.; Nguyen, H. A neural network implementation of an input access scheme in a highspeed packet switch, Proc. of GLOBECOM 989, pp [3] Anderson, T.; Owicki, S.; Saxe, J.; and Thacker, C. High speed switch scheduling for local area networks, ACM Trans. on Computer Systems. Nov 993 pp [4] Anick, D.; Mitra, D.; Sondhi, M.M. Stochastic theory of a data-handling system with multiple sources, Bell System Technical Journal, Vol.6, pp , 982. [5] Brown, T.X; Liu, K.H. Neural network design of a Banyan network controller, IEEE J. Selected Areas Communications, Vol.8, pp , Oct [6] Chen, M.; Georganas, N.D., A fast algorithm for multi-channel/port traffic scheduling Proc. IEEE Supercom/ICC 94, pp [7] Cruz, R., A calculus for network delay, part I: network elements in isolation, IEEE Trans. Information Theory, Vol. 37, No., pp.4-2, 99. [8] Demers, A.; Keshav, S.; Shenker, S. Analysis and simulation of a fair queueing algorithm. Internetworking: Research and Experience, Sept. 990, vol., (no.:3-26. [9] Dinic, E.A. Algorithm for solution of a problem of maximum flow in a network with power estimation, Soviet Math. Dokl. Vol., pp , 970. [0] Elwalid, A.I.; Mitra, D. Effective bandwidth of general Markovian traffic sources and admission control of high speed networks, IEEE/ACM Trans. Networking, June 993, vol., (no.3): [] Eng, K.; Hluchyj, M.; and Yeh, Y. Multicast and broadcast services in a knockout packet switch, INFOCOM 88, 35(2) pp [2] Even, S.; Tarjan, R.E. Network flow and testing graph connectivity, SIAM J. Comput., 4 (975), pp [3] Gale, D.; Shapley, L.S.; College Admissions and the stability of marriage, American Mathematical Monthly, Vol.69, pp9-5, 962.

2 [4] Giacopelli, J.; Hickey, J.; Marcus, W.; Sincoskie, D.; and Littlewood, M. Sunshine: A high-performance self-routing broadband packet switch architecture, IEEE J. Selected Areas Communications, Vol.9, No.8, pp , Oct 99. [5] Gusfield, D; Irving, R; The Stable Marriage Problem: Structure and Algorithms, The MIT Press, Cambridge, MA, USA [6] Heffes, H.; Lucantoni, D. M., A Markov modulated characterization of packetized voice and data traffic and related statistical multiplexer performance, IEEE J. Selected Areas in Communications, 4, 986, pp [7] Hopcroft, J.E.; Karp, R.M. An n 5/2 algorithm for maximum matching in bipartite graphs, Society for Industrial and Applied Mathematics J. Comput., 2 (973), pp [8] Hopfield, J.J. Neural networks and physical systems with emergent collective computational abilities, Proc. National Academy of Science, Vol. 79 pp , 982. [9] Huang, A.; Knauer, S. Starlite: A wideband digital switch, Proc. GLOBECOM 84 (984), pp [20] Hui, J.; Arthurs, E. A broadband packet switch for integrated transport, IEEE J. Selected Areas Communications, 5, 8, Oct 987, pp [2] Jain, R.; Routhier, S.A. Packet Trains: measurements and a new model for computer network traffic, IEEE J. Selected Area Communications, Vol.4, pp , 986. [22] Karol, M.; Hluchyj, M.; and Morgan, S. Input versus output queueing on a space division switch, IEEE Trans. Communications, 35(2) (987) pp [23] Karol, M.; Hluchyj, M. Queueing in high-performance packet-switching, IEEE J. Selected Area Communications, Vol.6, pp , Dec [24] Karol, M.; Eng, K.; Obara, H. Improving the performance of input-queued ATM packet switches, INFOCOM 92, pp.0-5. [25] Karp, R.; Vazirani, U.; and Vazirani, V. An optimal algorithm for on-line bipartite matching, Proc. 22nd ACM Symp. on Theory of Computing, pp Maryland, 990. [26] Knuth, D.E; Marriages Stables, Les Presses de l Université de Montréal, Montréal, 976. [27] Kumar, P.R.; Meyn, S.P.; Stability of Queueing Networks and Scheduling Policies, IEEE Transactions on Automatic Control, Vol.40, No.2, Feb [28] Low, S.; Varaiya, P. Burstiness bounds for some burst reducing servers, Proc. INFO- COM 93, pp.2-9, March 993. [29] Kelly, F.P.. Effective bandwidths at multiclass queues, Queueing Systems Theory and Applications, Oct. 99, vol.9, (no.-2):5-5. [30] Keshav, S. On the efficient implementation of fair queueing, Internetworking: Research and Experience, Sept. 99, vol.2, (no.3): [3] Kesidis, G.; Walrand, J.; Chang, C.-S. Effective bandwidths for multiclass Markov fluids and other ATM sources. IEEE/ACM Transactions on Networking, Aug. 993, vol., (no.4): [32] Leland, W.E.; Willinger, W.; Taqqu, M.; Wilson, D. On the self-similar nature of Ethernet traffic, Proc. of Sigcomm, San Francisco, 993, pp [33] Li, S.-Y. Theory of periodic contention and its application to packet switching, Proc. of INFOCOM 988, pp [34] Marrakchi, A.; Troudet, T.P. A neural net arbitrator for large crossbar packet switches, IEEE Trans. Circuits and Systems, Vol.CAS-36, pp , July 989. [35] Matsunaga, H.; Uematsu, H. A.5Gb/s 8x8 cross-connect switch using a time reservation algorithm, IEEE J. Selected Area Communications, Vol.9, No.8, pp , Oct. 99. [36] Neuts, M. Matrix Geometric Solutions in Stochastic Models: An Algorithmic Approach, Johns Hopkins University Press, Baltimore, 98. [37] Obara, H. Optimum architecture for input queueing ATM switches, IEE Electronics Letters, pp , 28th March 99. [38] Obara, H.; Hamazumi, Y. Parallel contention resolution control for input queueing ATM switches, IEE Electronics Letters, Vol.28, No.9, pp , 23rd April

3 [39] Obara, H.; Okamoto, S.; and Hamazumi, Y. Input and output queueing ATM switch architecture with spatial and temporal slot reservation control IEE Electronics Letters, pp.22-24, 2nd Jan 992. [40] Tamir, Y.; Frazier, G. High performance multi-queue buffers for VLSI communication switches, Proc. of 5th Ann. Symp. on Comp. Arch., June 988, pp [4] Tarjan, R.E. Data structures and network algorithms, Society for Industrial and Applied Mathematics, Pennsylvania, Nov 983. [42] Troudet, T.P.; Walters, S.M. Hopfield neural network architecture for crossbar switch control, IEEE Trans. Circuits and Systems, Vol.CAS-38, pp.42-57, Jan.99. [43] Wolff, R.W. Stochastic modeling and the theory of queues, Prentice Hall Intl., New Jersey, 989. [44] Zhang, H.; Keshav, S. Comparison of rate-based service disciplines, Computer Communication Review, Sept. 99, vol.2, (no.4):3-2. [45] Zhang, L. Virtual Clock: A New Traffic Control Algorithm for Packet Switching Networks, ACM Transactions on Computer Systems, Vol 9. No.2, pp.0-24, May

4 97 APPENDIX Arbiter Synchronization for Single-Iteration SLIP In this appendix, we find an approximate expression for the expected number of synchronized output schedulers, E [ St ()]. We partition the set of switch inputs I {,, N} into two subsets at time t: A() t, the set of inputs that are matched and Bt (), the set of inputs that are not matched. If the arrival rate averaged across all inputs is λ, then for a sustainable and stationary ergodic arrival process the expected match size is λn and on average, λn inputs will send a cell. Clearly then, the expected size of At () and Bt () are E[ At ()] λn, E[ B() t ] ( λ)n λn. ( Similarly, we partition the set of switch inputs O {,, N} into two subsets at time t: A O (t)and B O (t). A O (t) is the set of outputs that are matched to inputs in A(t), and B O (t) are the outputs not matched at time t. As a result of the matching at time t, the set A() t is transformed into the set Ãt ( +, the set of inputs that the outputs in A O (t) point to at time t+. Each element in A() t is unique, and because

5 APPENDIX Arbiter Synchronization for Single-Iteration SLIP 98 I A() t Bt () B 0 () t B () t Ã( t + B ( t + FIGURE A. Mapping of matched and unmatched inputs at time t, to modified sets at time t+. they were matched at time t, each element mapped from A() t into Ãt ( + is also unique. The expected size of Ã( t+ is E[ Ã( t+ ] E[ Ã() t ] E[ A() t ] λn. (2) Because none of its elements are matched, the set B() t is unchanged, i.e. B ( t+ B() t. To determine E[ St ( + ], the expected number of synchronized output arbiters at time t+, we must find the number of elements in Ã( t+ that are still unique and the number that clash with elements mapped from B() t. Without loss of generality, and to simplify our calculations, we assume that a one-to-one mapping is applied to Ãt ( + such that Ã( t + A() t and hence B ( t+ B() t. As before, the elements of Ãt ( + are unique, and we can think of the elements of B ( t + as randomly distributed over I. This is shown in Figure A.. To find E[ St ( + ], we partition B() t into B 0 () t elements that are mapped into Ãt ( +, and B () t elements that are mapped into B ( t+.

6 APPENDIX Arbiter Synchronization for Single-Iteration SLIP 99 Finally, we define U A ( t + and U B ( t + as the number of unique elements in Ã( t + and B ( t+ respectively, and E[ St ( + ] N E[ U A ( t+ ] E[ U B ( t + ]. (3) If we assume that under the mapping the elements of B() t are uniformly distributed in I, then E U A ( t+ Ã( t +, B 0 () t Ãt ( + E[ U A ( t+ B() t, B () t] ( N B() t ) Ã( t B 0 () t Ã( t+ ( N B() t ) B() t B () t ( N B() t ) (4) and, E U B ( t+ B () t, B () t B () t E U B ( t+ B() t, B () t B () t B ( t B () t B ( t + Bt () B () t Bt () (5) Hence, E S( t+ B() t, B () t N ( N B() t ) ( N B() t ) B() t B () t ( N B() t ) B () t Bt () B () t Bt (). (6) To find E[ St ( + ] we need to know the distributions of B() t and B () t. Unfortunately, both random variables depend on the traffic arrival pattern. Furthermore, we cannot use Jensen s inequality to bound Eq. 6 from below or above. This is because Eq. 4 is a concave function of Bt () and B () t whereas Eq. 5 is convex. However, simulations with a variety of arrival patterns indicate that E[ St ( + ] is relatively insensitive to traffic statistics. We therefore approximate the random variables with B() t E[ Bt ()] λn and B () t E[ B () t] λ 2 N.

7 APPENDIX Arbiter Synchronization for Single-Iteration SLIP 00 This leads us to the approximation, E [ St ()] N λn λn λλn λn λ 2 N λn λ2 N λn. (7)

8 0 APPENDIX 2 Stability of Single-Iteration SLIP Algorithm L(n) λ ε FIGURE A2. 2x2 switch with a single queue. Single-Step Drift Analysis of 2x2 Switch with Queue. First Approximation Consider the switch in Figure A2.. All three arrival processes are i.i.d. Bernoulli. We wish to find the values of λ, ε and for which the switch is stable. Define Lˆ to be the expected value of Ln ( + (the occupancy of Q(, at time n+ conditioned on Ln () and Ln ( ) > 0 Lˆ E[ Ln ( + Ln ()Ln, > 0]. (

9 APPENDIX 2 Stability of Single-Iteration SLIP Algorithm 02 If Lˆ Ln () > 0 then Ln ( ) has a single-step positive drift which means that E[ L( n) ] and the switch is unstable. This system may be described as a discrete-time Markov chain (DTMC) with state X L ( g, a ) (2) where L is the occupancy of Q(, ), the value of the pointer g at output, and the value of the pointer a at input. The evolution of state for the switch using the SLIP algorithm, conditioned on Ln () > 0and λ 0is shown below g a ε ε L (0, 0) L (0, L (, 0) L (, ε ε ε ε2 ε L- (0, 0) L- (0, L- (, 0) L- (, λ 0 where ε ε,. The state transition matrix, P conditioned on L( n) > 0 and is P ε 0 0 ε 0 0 (3) ε ε ε ε from which we obtain the steady-state distribution π(, ) ε + ε + ε ( + ε + ) π( 0, ) ε π( L,, ) π( 0, ) ε π( L,, ) π( 00, ) [ ε ( + ε + )] π( L,, ) (4) From π we find

10 APPENDIX 2 Stability of Single-Iteration SLIP Algorithm 03 Lˆ Ln () ε + ε + ε ( + ε + ) which if we consider the arrivals at rate λ gives J, the expected single-step increase function J λ (6) + 2ε+ 2ε 3 where we define ε ε because of the symmetric and identical dependence on ε and. The unstable region of operation is given by (5) λ> ε+ 2ε 3. (7) We can find the maximum positive drift J max (the most unstable operating point ) by defining λ ε δ, δ < (8) From Eq. 6 we find that J max which tells us that the drift can be positive for any δ 0 value of δ < 0.098, or alternatively J > 0 λ + ε > (9).2 Second Approximation The first approximation assumes that cells arriving at rates ε and are discarded if they are not successfully scheduled. However, if unsuccessful cells are queued rather than discarded, they will affect the service rate of Q(, ) over multiple cell times. We model this effect by approximating the busy and idle cycles of input queues Q( 2, ) and Q( 2, ) with a 2-state Markov process, shown in Figure A2.2. The behavior of Q( 2, ) and Q( 2, ) may be modelled by an M/G/ queue with an arrival rate λ 2 and service rate -- λ. From [43] the expected duration of the busy and idle cycles 2 E [ B ] E[] I λ 2 λ 2 q λ 2 q p p (0) (

11 APPENDIX 2 Stability of Single-Iteration SLIP Algorithm 04 L(n) λ Μ(n) Μ(n) (a) p λ 2 M/G/ -p busy -q M(n) idle M(n)0 (b) q (c) FIGURE A2.2 (a) Approximation of arrivals as an on-off process modulated by a 2-state discrete-time Markov chain, M(n). (b) The arrival process models the busy/idle cycles of input queues Q(,2) and Q(2,. (c) The Markov chain alternates between the busy and idle states. In the busy state, the arrival rate is. In the idle state the arrival rate is 0. from which we obtain p and q as functions of λ and λ 2. To find Lˆ E [ Ln ( + Ln ( ), Ln () > 0] (2) we model the evolution of the system using a DTMC with state X ( g, a, s, s 2 ) (3)

12 APPENDIX 2 Stability of Single-Iteration SLIP Algorithm 05 where s i is the state (busy or idle) of the 2-state DTMC modulating the arrival process at input i. The state 6x6 transition matrix is P s, s 2 ( BB, ) ( BI, ) ( IB, ) ( II, ) p 2 pp pp pp p 2 pp pp pp p 2 p 2 pp pp pp pp pp pp ( II, ) ( IB, ) ( BI, ) ( BB, ) q 2 q 2 q 2 q 2 qq qq qq qq qq qq qq qq q 2 q 2 q 2 q 2 (4) from which we find the steady-state distribution π ( π( BB00,,, ) πii, (,,, )). (5) For brevity, we show an example of just one element of the distribution π( BB00,,, ) p( q 2 ( p 2 q p 3 q 3qp q p 3 + p 2 3p + 2) ( q 2 p 3 + p 2 q 2 3q 2 p + q 2 + p 4 q p 3 q p 3 q 2qp q p 4 + p 3 + 2p 2 3p + 3) ( q 2+ p) 2 (6) We find Lˆ from π and the expression Lˆ Ln ( ) [ π( BB00,,, ) + π( BI00,,, ) + π( IB00,,, ) + π( II00,,, ) + π( BI0,,, ) + π( IB0,,, ) + π( II0,,, ) + π( II0,,, ) + π( II,,, )] (7) This leads to an expression for the single-step drift function J as the ratio of two 0th degree polynomials. As a result, we have only been able to find the conditions on λ and λ 2 numerically such that J is negative and the switch is stable.

13 APPENDIX 2 Stability of Single-Iteration SLIP Algorithm 06 2 Matrix Geometric Solution for 2x2 Switch with Queue Consider again the switch in Figure A2.. In this section, we find the steady-state distribution function for the queue occupancy, L and find the values of λ and ε necessary for stability. To do this, we use the matrix-geometric technique of Neuts [36]. We define the state X [ X 0, X, X 2, ] (8) where X L { ( Lg,, a ); g { 0, }, a { 0, }} and wish to solve the infinite system of linear equations Π ΠP, Πe (9) where Π [ Π 0, Π, Π 2, ], Π i steady-state distribution of X i, (20) e is the column vector with all its elements equal to, and the transition probability matrix is of the form B 0 A 0 0 P B A A 0 B 2 A 2 A. (2 In this example, P is most easily understood when separated into two parts, conditioned on whether or not an arrival occurs P λp λ + λp λ (22)

14 APPENDIX 2 Stability of Single-Iteration SLIP Algorithm 07 where P λ and P are λ P λ P λ ε ε ε ε εεεε 00 ε 0 ε 0 ε ε εεεε 00 ε 0 ε 0 ε ε L0 L L ε ε ε ε εεεε ε ε ε ε εε εε ε ε ε ε εεεε εεεε Clearly, P is of the form of Eq. 2. To find the steady state distribution Π, we use Lemma.2.3 and Theorem.2. of [36]. If P is positive recurrent, then we can find (using a method outlined on page 9 of [36]) a unique matrix R which satisifies the equation R R k A k, where A k is as shown in Eq. 2. (23) k 0 such that Π i+ Π i R for i 0, the spectral radius of R, sp(r)<, the matrix B[ R] R k B k k 0 (24)

15 APPENDIX 2 Stability of Single-Iteration SLIP Algorithm 08 is stochastic, Π 0 ( I R) e, and (25) Π 0 Π 0 B[ R]. (26) Alternatively, for the Markov chain to be positive recurrent (i.e. for the system to be stable) it is necessary that the spectral radius of R be less than. Solving for R and B[R] we obtain R g( ελ, ) ελ + 2 λ ( ε)ελ ( ε)ελ λ λ 2ελ 2 λ + λ ( ε)ελ ( ε)ελ λ ε ( 3 2ε 2λ + 2ελ) ε ε λ( 2+ ε 2 2ελ + 2 λ) λ (27) B[ R] λ 0 0 λ ε( λ) ε λ + ελ 0 λ ε( λ) 0 ε λ+ ελ λ ( λ) ( ε)ε( λ) ( ε)ε( λ) 2ε + + 2ελ λ, (28) where g( ελ, ) The spectral radius ελ (29) ( 2ελ λ + 2ε 3 λ + 2 λ 2 2ε 3 λ 2 ) sp ( R) < λ< ε+ 2ε 3 which is identical to the stability requirement of Eq. 7. (30) We can also solve Eq. 25 and Eq. 26 above to find Π 0. The resulting expression is a vector of elements, each of which is the ratio of two 6th order polynomials in ε and λ from which we can successively generate Π, Π 2, Π 3,. We do not repeat these (long) expressions here.

16 09 APPENDIX 3 Stability of 2x2 Switch Stability of 2x2 Switch with 3 Active Flows (Theorem 4.2) In this section, we find sufficient conditions on a scheduling algorithm for a 2x2 switch with 3 active flows such that the switch is stable under all admissible, arrival processes with i.i.d. interarrival times. The switch is illustrated in Chapter 4 Figure Definitions Define the vector of queue occupancies Ln () ( L, ()L n, 2, ()L n, 2, () n). ( We now consider the single-step change in Ln () conditioned on whether the switch is in configuration A or B, as shown in Chapter 4 Figure 4.6:

17 APPENDIX 3 Stability of 2x2 Switch 0 L, ( n+ [ L, ( n) ] + + η L 2, ( n+ L 2, ( n) + η 2 L 2, ( n + L 2, ( n) + η Configuration A 3 L, ( n+ L, ( n) + η L, 2 ( n + [ L 2, ( n) ] + + η 2 L 2, ( n+ [ L 2, ( n) ] + + η Configuration B 3 (2) where, if an arrival occurs at queue i, w.p. λ η i i 0, else We define the quadratic Lyapunov function (3).2 Problem statement V( L( n) ) Ln () T QL( n) 0, where Q [ q ij ], q ij 0. (4) If we can find a Q such that E [ V( L( n + ) V( L( n) ) Ln ()] < 0, then the queue occupancy has a downward drift and the switch is said to be stable..3 Solution As there is no systematic method for finding Qwe must guess its form. We assume that Qis symmetric, i.e. [ q ij ] [ q ji ]. Further, we guess that if the switch is stable under all admissible offered loads, then it will be marginally stable when λ 2 λ 3 and λ 0. i.e. E[ V( L( n + ) V( L() n ) Ln ()λ, 2 λ 3, λ 0] 0. (5) This leads us to the guess Q a , for any integer, a. (6) This matrix Q leads to a stable switch under the following conditions.

18 APPENDIX 3 Stability of 2x2 Switch Conditioned on L, () n> 0L, 2, () n> 0, L 2, () n> 0: E[ V( L( n + ) V( L() n ) Ln ()A, ] ( 2+ 2λ + λ 2 + λ 3 ) ( 2+ 2λ + λ 2 + λ 3 + 4L, () n+ 2L 2, () n+ 2L 2, () n) <0 E[ V( L( n + ) V( L() n ) Ln ()B, ] ( 2+ 2λ + λ 2 + λ 3 ) ( 2+ 2λ + λ 2 + λ 3 + 4L, () n+ 2L 2, () n+ 2L 2, () n) <0 (7) (8) Similarly, conditioned on either L 2, () n 0or L 2, () n 0: E[ V( L( n + ) V( L() n ) Ln ()A, ] < 0 (9) whereas E[ V( L( n+ ) V( L( n) ) Ln ()B, ] maybe greater than 0. Finally, conditioned on L, () n 0: E[ V( L( n + ) V( L() n ) Ln ()B, ] < 0 (0) whereas E[ V( L( n+ ) V( L( n) ) Ln ()A, ] >0..4 Stable Algorithms The value of Q above enables us to define the following algorithm that will be stable under all admissible traffic with i.i.d. arrivals for a 2x2 switch with three active flows:. If L, () n 0, set crossbar to configuration B. 2. Else, if either L 2, () n 0or L 2, () n 0, set crossbar to configuration A. 3. Else, set crossbar configuration to either A or B. 2 Relative Queue Sizes (Theorem 4.3) In this section we prove that if or any arrival process to a 2x2 switch, if for some n { L, () n+ L 22, () n} { L 2, () n+ L 2, () n} 3 (

19 APPENDIX 3 Stability of 2x2 Switch FIGURE A3. All possible single-step increases in D( n). Arrows marked: require two arrivals, which means that both queues in L M ( n) are non-empty in the next cell time. then for all n n { L, ( n ) + L 22, ( n )} { L 2, ( n ) + L 2, ( n )} 4. (2) For convenience, define L A () n L, () n+ L 22, () n, L B ( n) L 2, ( n) + L 2, ( n) (3) and assume without loss of generality that L A ( n) L B ( n), i.e. L A ( n) L B ( n) + Dn () (4) for some Dn () 0. Finally, define L M ( n) max( L A ( n), L B ( n) ) (5) L m () n L A () n ifl M () n L B () n L B () n ifl M () n L A () n. (6) Theorem A3.: All possible single step increases in Dn ( ) are shown in Figure 3.. Proof:

20 APPENDIX 3 Stability of 2x2 Switch 3 Case (i): D( n) 0. First we consider all possible values of Dn ( + when Dn ( ) 0, i.e. L A ( n) L B ( n). We shall assume, without loss of generality that the two queues that contribute to L A ( n) are served at time n. At most two cells can arrive to the switch in a cell time, which means that L B ( n+ L B () n + 0 : 0 arrivals : arrival 2 : 2 arrivals (7) and that at most two cells can depart from the switch in a cell time, which means that L A ( n + L A () n 2 : (2 dep. and 0 arr.), : (2 dep. and arr.), or ( dep and 0 arr.) + 0 : (2 dep. and 2 arr.), or ( dep and arr.) : ( dep. and 2 arr.), or (0 dep and arr.). (8) Note that there can only be 0 departures if L A () n 0and only departure if either L, () n 0or L 22, () n 0. From Eq. 7 and Eq. 8 we find the following possible increases Dn () when Dn () 0. Dn ( + : ( L A () n L A () n, ( L B () n L B () n) 2: ( L A () n L A () n, ( L B () n L B () n+ 3: ( L A () n L A () n 2), ( L B () n L B () n+ 4: ( L A () n L A () n 2), ( L B () n L B () n+ 2) (9) Note that Dn () 4if and only if two arrivals occur. This means that both queues that contribute to L M ( n+ are non-empty. Case (ii)-(iv): Dn () 23,,. By enumerating all transitions, as for Dn () 0, we find the transitions from, 2, 3 in Figure 3.. Case (v): Dn () 4. In cases (i)-(iv) we found that transitions into Dn () 4require that two arrivals occur and that both of the queues that contribute to L M () n when Dn () 4are non-empty. As a result, the matching at time n serves two queues, hence

21 APPENDIX 3 Stability of 2x2 Switch 4 L M ( n + L M () n. (20) L m () nis not served and so cannot decrease, therefore, Finally, L m ( n+ L m () n. (2 Dn ( + 4 (22). The transitions in Figure 3. indicate. For any queue occupancy such that Dn () 3, the next state is bounded by Dn ( If Dn ( + 4, then both queues in L M ( n+ are non-empty. 3. If both queues in L M () n are non-empty and Dn () 4, then Dn ( + 4. Hence, if for some n, Dn () 3, then for all n n, Dn ( ) 4which proves the theorem.

22 5 APPENDIX 4 Stability of NxN Switch with i.i.d. Arrivals Definitions In this appendix we use the following definitions for an NxN switch:. The state vector, representing the occupancy of each queue at time n: Ln () ( L, () L n,, N, () L n,, N, () L n,, NN, () n). ( 2. The (constant) arrival rate matrix: Λ N N [ λ ij, ], where: λ ij,, λ ij, i j λ, ij, 0 (2) and associated rate vector: λ ( λ,, λ, N,, λ, N,, λ, NN, ). (3) 3. The arrival matrix, representing the sequence of arrivals into each queue: A() n [ A ij, () n ], where: A ij, () n if arrival occurs at Qi (, j) at time n { (4) 0 else and associated arrival vector:

23 APPENDIX 4 Stability of NxN Switch with i.i.d. Arrivals 6 An () ( A, () A n,, N, () A n,, N, () A n,, NN, () n). (5) 4. The service matrix, indicating which queues are served at time n: S( n) [ S ij, () n ], where: S ij, ( n) if Qi (, j) is served at time n { 0 else (6) and S( n) S, the set of service matrices. Note that: N i S ij, () n N S ij, () n j and hence S( n) S is a permutation matrix. We define the associated service vector: Sn () ( S, () S n,, N, () S n,, N, () S n,, NN, () n), (7) hence Sn () 2 N. 5. The approximate next-state vector: L n ( + Ln () Sn () + An (), (8) which approximates the exact next-state of each queue L ij, ( n+ [ L ij, () n S ij, () n] + + A ij, () n. (9) 2 Main Theorem Theorem A4.: An NxN switch is stable for the LQF algorithm under i.i.d. arrivals. 3 Proof Before proving this theorem, we first prove the following theorems.

24 APPENDIX 4 Stability of NxN Switch with i.i.d. Arrivals 7 Theorem A4.2: The doubly stochastic matrices, Λ, form a convex set, C, with the set of extreme points equal to permutation matrices, S. Proof: The set C is clearly convex: for all rate matrices Λ, Λ 2 C and for every real number α, 0 < α <, the point αλ + ( α)λ 2 C. A permutation matrix S is doubly stochastic and is therefore a member of the set C. Furthermore, there are no two distinct matrices Λ, Λ 2 C such that αλ + ( α)λ 2 S, for real α, 0 < α <. Hence, a permutation matrix is an extreme point of C. Theorem A4.3: L T ()λ n S * () n 0, ( Ln ()λ, ), where S * ( n) max( L T ()Sn n ( )), the service matrix selected by the LQF algorithm to maximize L T ()S n ( n). Proof: Consider the linear programming problem: max( L T ( n)λ) s.t. N N λ ij,, λ ij, λ, ij, 0 i j (0) which has a solution equal to an extreme point of the convex set, C. Hence, max( L T ( n)λ) max( L T ()Sn n ) ( and so L T ( n)λ max( L T ( n)sn ()) 0. Theorem A4.4: E[ L T ( n + L ( n+ L T ()Ln n Ln ()] 2N, λ. Proof: L T ( n + L ( n + L T ()Ln n ( Ln () Sn () + An ( )) T ( Ln ( ) Sn ( ) + An ()) L T ()Ln n 2L T () n( An () Sn ()) + ( Sn () An ()) T ( Sn () An ()) 2L T () n ( An () Sn ()) + k, (2) where 0 k 2N. k 0 because Sn () An () is a real vector, and k 2Nbecause Sn () An () 2 2N.

25 APPENDIX 4 Stability of NxN Switch with i.i.d. Arrivals 8 Taking the expected value: E[ L T ( n+ L ( n + L T ()Ln n Ln ()] E[ 2L T () n ( An () Sn ( ))] + 2N 2L T ( n) ( λ S * ( n) ) + 2N. (3) From Theorem 4.4 we know that 2L T () n ( λ S * () n) 0, proving the theorem. Theorem A4.5: E[ L T ( n + L ( n+ L T ()Ln n Ln ()] ε Ln () + 2N, ε > 0, λ ( β)λ m, 0 < β <, where λ m is any rate vector such that λ 2 m N. Proof: L T () n ( λ S * () n) L T ( n) { λ m S * ( n) } L T ( n) ( βλ m ) 0 β L( n) λ m cosθ (4) where θ is the angle between Ln () and λ m. We now show that cosθ> δ for some δ > 0 whenever Ln () 0. First, we show that cosθ> 0. We do this by contradiction: suppose that cosθ 0, i.e. Ln () and λ m are orthogonal. This can only occur if Ln () 0, or if for some ij,, both λ ij, 0and L ij, () n> 0, which is not possible: for arrivals to have occurred at queue Qi (, j), λ ij, must be greater than zero. Therefore, cosθ> 0 unless Ln () 0. Now we show that cosθis bounded away from zero, i.e. that cosθ > δ for some δ > 0. Because λ ij, > 0 wherever L ij, () n> 0, and because λ N, L cosθ T ()λ n L max ( n)λ min , (5) Ln ( ) λ Ln ( ) N where λ min min( λ ij,, ij, N) and L max ( n) max( L ij, () n, ij, N). Also, Ln ( ) N 2 L2 max () n 2 / NL max ( n), (6) and so cosθis bounded by λ min cosθ N N (7)

26 APPENDIX 4 Stability of NxN Switch with i.i.d. Arrivals 9 Therefore E [ L T ( n + L ( n + L T ()Ln n Ln ()] βλ min Ln () + 2N. (8) N Theorem A4.6: E[ L T ( n + Ln ( + L T ()Ln n Ln ()] ε Ln () + N 2 + 2N, ε> 0 λ ( β)λ m ( n), 0< β<. Proof: L ij, ( n+ L ij,( n+ + if L ij, () n 0S, ij, () n 0 else, (9) therefore L T ( n + Ln ( + L T ( n+ L ( n+ N 2, (20) and so E[ L T ( n + Ln ( + L T ( n)ln () Ln ()] E[ L T ( n + L ( n + L T ( n)ln ( ) Ln ()] + N 2. (2 Using Theorem 4.5 this concludes the proof. Theorem A4.7: There exists a VLn ( ()) s.t. E[ VLn ( ( + ) VLn ( ()) Ln ( )] ε Ln () + k, where kε, > 0. Proof: VLn ( ( )) L T ( n)ln ( ) and k N 2 + 2N in Theorem 4.6. We are now ready to prove the main theorem. Proof of Main Theorem: VLn ( ( )) in Theorem 4.7 is a quadratic Lyapunov function and, according to the argument of Kumar and Meyn [27], it follows that the switch is stable.

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch A Starvation-free Algorithm For Achieving 00% Throughput in an Input- Queued Switch Abstract Adisak ekkittikul ick ckeown Department of Electrical Engineering Stanford University Stanford CA 9405-400 Tel

More information

Stability of the Maximum Size Matching

Stability of the Maximum Size Matching Stability of the Maximum Size Matching Mohsen Bayati Dept. of Electrical Engineering Stanford University Stanford, CA 9405-950 bayati@stanford.edu Neda Beheshti Dept. of Electrical Engineering Stanford

More information

Scheduling Algorithms for Input-Queued Cell Switches. Nicholas William McKeown

Scheduling Algorithms for Input-Queued Cell Switches. Nicholas William McKeown Scheduling Algorithms for Input-Queued Cell Switches by Nicholas William McKeown B.Eng (University of Leeds) 986 M.S. (University of California at Berkeley) 992 A thesis submitted in partial satisfaction

More information

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads Operations Research Letters 37 (2009) 312 316 Contents lists available at ScienceDirect Operations Research Letters journal homepage: www.elsevier.com/locate/orl Instability of FIFO in a simple queueing

More information

Sensitivity Analysis for Discrete-Time Randomized Service Priority Queues

Sensitivity Analysis for Discrete-Time Randomized Service Priority Queues Sensitivity Analysis for Discrete-Time Randomized Service Priority Queues George Kesidis 1, Takis Konstantopoulos 2, Michael Zazanis 3 1. Elec. & Comp. Eng. Dept, University of Waterloo, Waterloo, ON,

More information

Advanced Networking Technologies

Advanced Networking Technologies Advanced Networking Technologies Chapter Routers and Switches - Inputbuffered switches and matchings This chapter is heavily based on material by Holger Karl (Universität Paderborn) and Prof. Yashar Ganjali

More information

I. INTRODUCTION. This work was supported by a Wakerly Stanford Graduate Fellowship and by the Powell Foundation.

I. INTRODUCTION. This work was supported by a Wakerly Stanford Graduate Fellowship and by the Powell Foundation. Analysis of scheduling algorithms that provide 100% throughput in input-queued switches Isaac Keslassy, Nick McKeown Computer Systems Laboratory, Stanford University Stanford, CA 94305-9030 {keslassy,

More information

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent

More information

Input-queued switches: Scheduling algorithms for a crossbar switch. EE 384X Packet Switch Architectures 1

Input-queued switches: Scheduling algorithms for a crossbar switch. EE 384X Packet Switch Architectures 1 Input-queued switches: Scheduling algorithms for a crossbar switch EE 84X Packet Switch Architectures Overview Today s lecture - the input-buffered switch architecture - the head-of-line blocking phenomenon

More information

Resource Allocation for Video Streaming in Wireless Environment

Resource Allocation for Video Streaming in Wireless Environment Resource Allocation for Video Streaming in Wireless Environment Shahrokh Valaee and Jean-Charles Gregoire Abstract This paper focuses on the development of a new resource allocation scheme for video streaming

More information

On the static assignment to parallel servers

On the static assignment to parallel servers On the static assignment to parallel servers Ger Koole Vrije Universiteit Faculty of Mathematics and Computer Science De Boelelaan 1081a, 1081 HV Amsterdam The Netherlands Email: koole@cs.vu.nl, Url: www.cs.vu.nl/

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

A discrete-time priority queue with train arrivals

A discrete-time priority queue with train arrivals A discrete-time priority queue with train arrivals Joris Walraevens, Sabine Wittevrongel and Herwig Bruneel SMACS Research Group Department of Telecommunications and Information Processing (IR07) Ghent

More information

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING Applied Probability Trust (7 May 2015) STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING RAMTIN PEDARSANI and JEAN WALRAND, University of California,

More information

[4] T. I. Seidman, \\First Come First Serve" is Unstable!," tech. rep., University of Maryland Baltimore County, 1993.

[4] T. I. Seidman, \\First Come First Serve is Unstable!, tech. rep., University of Maryland Baltimore County, 1993. [2] C. J. Chase and P. J. Ramadge, \On real-time scheduling policies for exible manufacturing systems," IEEE Trans. Automat. Control, vol. AC-37, pp. 491{496, April 1992. [3] S. H. Lu and P. R. Kumar,

More information

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS MOHAMMED HAWA AND DAVID W. PETR Information and Telecommunications Technology Center University of Kansas, Lawrence, Kansas, 66045 email: {hawa, dwp}@ittc.ku.edu

More information

Regular Sparse Crossbar Concentrators

Regular Sparse Crossbar Concentrators Regular Sparse Crossbar Concentrators Weiming Guo and A. Yavuz Oruç Electrical Engineering Department College Park, MD 20742 ABSTRACT A bipartite concentrator is a single stage sparse crossbar switching

More information

Efficient Nonlinear Optimizations of Queuing Systems

Efficient Nonlinear Optimizations of Queuing Systems Efficient Nonlinear Optimizations of Queuing Systems Mung Chiang, Arak Sutivong, and Stephen Boyd Electrical Engineering Department, Stanford University, CA 9435 Abstract We present a systematic treatment

More information

SDL Constructions of FIFO, LIFO and Absolute Contractors

SDL Constructions of FIFO, LIFO and Absolute Contractors SDL Constructions of FIFO, LIFO and Absolute Contractors Cheng-Shang Chang, Jay Cheng, Duan-Shin Lee Institute of Communications Engineering National Tsing Hua University Hsinchu 3003, Taiwan, R.O.C. Email:

More information

Fairness and Optimal Stochastic Control for Heterogeneous Networks

Fairness and Optimal Stochastic Control for Heterogeneous Networks λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping

More information

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 3, MARCH

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 3, MARCH IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 3, MARCH 1998 315 Asymptotic Buffer Overflow Probabilities in Multiclass Multiplexers: An Optimal Control Approach Dimitris Bertsimas, Ioannis Ch. Paschalidis,

More information

Greedy weighted matching for scheduling the input-queued switch

Greedy weighted matching for scheduling the input-queued switch Greedy weighted matching for scheduling the input-queued switch Andrew Brzezinski and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {brzezin,modiano}@mit.edu

More information

Analysis of Discrete-Time Server Queues with Bursty Markovian Inputs

Analysis of Discrete-Time Server Queues with Bursty Markovian Inputs INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATIONS AND CONTROL, RHODES, GREECE, JUNE 1993. 1 Analysis of Discrete-Time Server Queues with Bursty Markovian Inputs Panagiotis Mavridis George V. Moustakides

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally

More information

Introduction This paper is motivated by the question of whether a predictor of future packet arrivals could improve switch performance. This is a two-

Introduction This paper is motivated by the question of whether a predictor of future packet arrivals could improve switch performance. This is a two- Future Information in Input Queueing Timothy X Brown Electrical & Computer Engineering timxb@colorado.edu Hal Gabow Computer Science hal@cs.colorado.edu University of Colorado Boulder, CO 80309-0425 Abstract

More information

Introduction to Markov Chains, Queuing Theory, and Network Performance

Introduction to Markov Chains, Queuing Theory, and Network Performance Introduction to Markov Chains, Queuing Theory, and Network Performance Marceau Coupechoux Telecom ParisTech, departement Informatique et Réseaux marceau.coupechoux@telecom-paristech.fr IT.2403 Modélisation

More information

Inequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers

Inequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers IEEE Proceedings of the International Conference on Communications, 2000 Inequality Comparisons and raffic Smoothing in Multi-Stage AM Multiplexers Michael J. Neely MI -- LIDS mjneely@mit.edu Abstract

More information

Dynamic Matching Models

Dynamic Matching Models Dynamic Matching Models Ana Bušić Inria Paris - Rocquencourt CS Department of École normale supérieure joint work with Varun Gupta, Jean Mairesse and Sean Meyn 3rd Workshop on Cognition and Control January

More information

Fast Matching Algorithms for Repetitive Optimization: An Application to Switch Scheduling

Fast Matching Algorithms for Repetitive Optimization: An Application to Switch Scheduling Fast Matching Algorithms for Repetitive Optimization: An Application to Switch Scheduling Supratim Deb Bell Labs Research India Bangalore-5607, INDIA Email: supratim@lucent.com Devavrat Shah Massachusetts

More information

Markov Chain Model for ALOHA protocol

Markov Chain Model for ALOHA protocol Markov Chain Model for ALOHA protocol Laila Daniel and Krishnan Narayanan April 22, 2012 Outline of the talk A Markov chain (MC) model for Slotted ALOHA Basic properties of Discrete-time Markov Chain Stability

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Equivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues

Equivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues Proceedings of the 38th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2000. Equivalent Models and Analysis for Multi-Stage ree Networks of Deterministic Service ime Queues Michael

More information

A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case. 1

A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case. 1 A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case 1 Abhay K Parekh 2 3 and Robert G Gallager 4 Laboratory for Information and Decision Systems

More information

TWO PROBLEMS IN NETWORK PROBING

TWO PROBLEMS IN NETWORK PROBING TWO PROBLEMS IN NETWORK PROBING DARRYL VEITCH The University of Melbourne 1 Temporal Loss and Delay Tomography 2 Optimal Probing in Convex Networks Paris Networking 27 Juin 2007 TEMPORAL LOSS AND DELAY

More information

N.G.Bean, D.A.Green and P.G.Taylor. University of Adelaide. Adelaide. Abstract. process of an MMPP/M/1 queue is not a MAP unless the queue is a

N.G.Bean, D.A.Green and P.G.Taylor. University of Adelaide. Adelaide. Abstract. process of an MMPP/M/1 queue is not a MAP unless the queue is a WHEN IS A MAP POISSON N.G.Bean, D.A.Green and P.G.Taylor Department of Applied Mathematics University of Adelaide Adelaide 55 Abstract In a recent paper, Olivier and Walrand (994) claimed that the departure

More information

Evaluation of Effective Bandwidth Schemes for Self-Similar Traffic

Evaluation of Effective Bandwidth Schemes for Self-Similar Traffic Proceedings of the 3th ITC Specialist Seminar on IP Measurement, Modeling and Management, Monterey, CA, September 2000, pp. 2--2-0 Evaluation of Effective Bandwidth Schemes for Self-Similar Traffic Stefan

More information

Asymptotic Delay Distribution and Burst Size Impact on a Network Node Driven by Self-similar Traffic

Asymptotic Delay Distribution and Burst Size Impact on a Network Node Driven by Self-similar Traffic Èíôîðìàöèîííûå ïðîöåññû, Òîì 5, 1, 2005, ñòð. 4046. c 2004 D'Apice, Manzo. INFORMATION THEORY AND INFORMATION PROCESSING Asymptotic Delay Distribution and Burst Size Impact on a Network Node Driven by

More information

On Stability and Sojourn Time of Peer-to-Peer Queuing Systems

On Stability and Sojourn Time of Peer-to-Peer Queuing Systems On Stability and Sojourn Time of Peer-to-Peer Queuing Systems Taoyu Li Minghua Chen Tony Lee Xing Li Tsinghua University, Beijing, China. {ldy03@mails.tsinghua.edu.cn,xing@cernet.edu.cn} The Chinese University

More information

arxiv: v1 [cs.sy] 24 Jul 2012

arxiv: v1 [cs.sy] 24 Jul 2012 Delay Stability Regions of the Max-Weight Policy under Heavy-Tailed Traffic Mihalis G. Markakis, Eytan Modiano, and John N. Tsitsiklis arxiv:1207.5746v1 [cs.sy] 24 Jul 2012 Abstract We carry out a delay

More information

Stochastic Optimization for Undergraduate Computer Science Students

Stochastic Optimization for Undergraduate Computer Science Students Stochastic Optimization for Undergraduate Computer Science Students Professor Joongheon Kim School of Computer Science and Engineering, Chung-Ang University, Seoul, Republic of Korea 1 Reference 2 Outline

More information

Computer Networks More general queuing systems

Computer Networks More general queuing systems Computer Networks More general queuing systems Saad Mneimneh Computer Science Hunter College of CUNY New York M/G/ Introduction We now consider a queuing system where the customer service times have a

More information

Multiaccess Communication

Multiaccess Communication Information Networks p. 1 Multiaccess Communication Satellite systems, radio networks (WLAN), Ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes,

More information

MARKOV PROCESSES. Valerio Di Valerio

MARKOV PROCESSES. Valerio Di Valerio MARKOV PROCESSES Valerio Di Valerio Stochastic Process Definition: a stochastic process is a collection of random variables {X(t)} indexed by time t T Each X(t) X is a random variable that satisfy some

More information

Logarithmic Delay for N N Packet Switches Under the Crossbar Constraint

Logarithmic Delay for N N Packet Switches Under the Crossbar Constraint 1 Logarithmic Delay for N N Packet Switches Under the Crossbar Constraint Michael J. Neely, Eytan Modiano, Yuan-Sheng Cheng Abstract We consider the fundamental delay bounds for scheduling packets in an

More information

Load Balancing in Distributed Service System: A Survey

Load Balancing in Distributed Service System: A Survey Load Balancing in Distributed Service System: A Survey Xingyu Zhou The Ohio State University zhou.2055@osu.edu November 21, 2016 Xingyu Zhou (OSU) Load Balancing November 21, 2016 1 / 29 Introduction and

More information

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking Lecture 7: Simulation of Markov Processes Pasi Lassila Department of Communications and Networking Contents Markov processes theory recap Elementary queuing models for data networks Simulation of Markov

More information

A Queueing System with Queue Length Dependent Service Times, with Applications to Cell Discarding in ATM Networks

A Queueing System with Queue Length Dependent Service Times, with Applications to Cell Discarding in ATM Networks A Queueing System with Queue Length Dependent Service Times, with Applications to Cell Discarding in ATM Networks by Doo Il Choi, Charles Knessl and Charles Tier University of Illinois at Chicago 85 South

More information

Delay Bounds for Approximate Maximum Weight Matching Algorithms for Input Queued Switches

Delay Bounds for Approximate Maximum Weight Matching Algorithms for Input Queued Switches Delay Bounds for Approximate Maximum Weight Matching Algorithms for Input Queued Switches Devavrat Shah, Milind Kopikare devavrat@cs.stanford.edu,kopi@stanford.edu Dept. of CS, Stanford University; Dept.

More information

Packet Loss Analysis of Load-Balancing Switch with ON/OFF Input Processes

Packet Loss Analysis of Load-Balancing Switch with ON/OFF Input Processes Packet Loss Analysis of Load-Balancing Switch with ON/OFF Input Processes Yury Audzevich, Levente Bodrog 2, Yoram Ofek, and Miklós Telek 2 Department of Information Engineering and Computer Science, University

More information

Logistics. All the course-related information regarding

Logistics. All the course-related information regarding Logistics All the course-related information regarding - grading - office hours - handouts, announcements - class project: this is required for 384Y is posted on the class website Please take a look at

More information

Overload Analysis of the PH/PH/1/K Queue and the Queue of M/G/1/K Type with Very Large K

Overload Analysis of the PH/PH/1/K Queue and the Queue of M/G/1/K Type with Very Large K Overload Analysis of the PH/PH/1/K Queue and the Queue of M/G/1/K Type with Very Large K Attahiru Sule Alfa Department of Mechanical and Industrial Engineering University of Manitoba Winnipeg, Manitoba

More information

PERFORMANCE OF A CROSSBAR NETWORK USING MARKOV CHAINS

PERFORMANCE OF A CROSSBAR NETWORK USING MARKOV CHAINS PERFORANCE OF A CROSSBAR NETWORK USING ARKOV CHAINS D. BENAZZOUZ 1 A. FARAH 2 1- Laboratoire LSS, FSI, Université of Boumerdes, 5, Algeria 2- AUST, Faculty of Computer Science and Engineering, UAE Phone/fax

More information

Distributed Optimization over Networks Gossip-Based Algorithms

Distributed Optimization over Networks Gossip-Based Algorithms Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random

More information

Multiplicative Multifractal Modeling of. Long-Range-Dependent (LRD) Trac in. Computer Communications Networks. Jianbo Gao and Izhak Rubin

Multiplicative Multifractal Modeling of. Long-Range-Dependent (LRD) Trac in. Computer Communications Networks. Jianbo Gao and Izhak Rubin Multiplicative Multifractal Modeling of Long-Range-Dependent (LRD) Trac in Computer Communications Networks Jianbo Gao and Izhak Rubin Electrical Engineering Department, University of California, Los Angeles

More information

A Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale

A Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale 222 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 2, APRIL 2003 A Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale Do Young Eun and Ness B. Shroff, Senior

More information

On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability

On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability Douglas S. Chan Toby Berger Lang Tong School of Electrical & Computer Engineering Cornell University,

More information

Large Deviations and the Generalized Processor Sharing Scheduling: Upper and Lower Bounds Part I: Two-Queue Systems

Large Deviations and the Generalized Processor Sharing Scheduling: Upper and Lower Bounds Part I: Two-Queue Systems University of Massachusetts Amherst ScholarWorks@UMass Amherst Computer Science Department Faculty Publication Series Computer Science 995 Large Deviations and the Generalized Processor Sharing Scheduling:

More information

The Burstiness Behavior of Regulated Flows in Networks

The Burstiness Behavior of Regulated Flows in Networks The Burstiness Behavior of Regulated Flows in Networks Yu Ying 1, Ravi Mazumdar 2, Catherine Rosenberg 2 and Fabrice Guillemin 3 1 Dept. of ECE, Purdue University, West Lafayette, IN, 47906, U.S.A. yingy@ecn.purdue.edu

More information

TUNABLE LEAST SERVED FIRST A New Scheduling Algorithm with Tunable Fairness

TUNABLE LEAST SERVED FIRST A New Scheduling Algorithm with Tunable Fairness TUNABLE LEAST SERVED FIRST A New Scheduling Algorithm with Tunable Fairness Pablo Serrano, David Larrabeiti, and Ángel León Universidad Carlos III de Madrid Departamento de Ingeniería Telemática Av. Universidad

More information

Optimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival

Optimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival 1 Optimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival Zhiyuan Jiang, Bhaskar Krishnamachari, Sheng Zhou, arxiv:1711.07912v1 [cs.it] 21 Nov 2017 Zhisheng Niu, Fellow,

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

ECE-517: Reinforcement Learning in Artificial Intelligence. Lecture 4: Discrete-Time Markov Chains

ECE-517: Reinforcement Learning in Artificial Intelligence. Lecture 4: Discrete-Time Markov Chains ECE-517: Reinforcement Learning in Artificial Intelligence Lecture 4: Discrete-Time Markov Chains September 1, 215 Dr. Itamar Arel College of Engineering Department of Electrical Engineering & Computer

More information

The Effective Bandwidth of Markov Modulated Fluid Process Sources with a Generalized Processor Sharing Server

The Effective Bandwidth of Markov Modulated Fluid Process Sources with a Generalized Processor Sharing Server The Effective Bandwidth of Markov Modulated Fluid Process Sources with a Generalized Processor Sharing Server Shiwen Mao Shivendra S. Panwar Dept. of ECE, Polytechnic University, 6 MetroTech Center, Brooklyn,

More information

The Multi-Path Utility Maximization Problem

The Multi-Path Utility Maximization Problem The Multi-Path Utility Maximization Problem Xiaojun Lin and Ness B. Shroff School of Electrical and Computer Engineering Purdue University, West Lafayette, IN 47906 {linx,shroff}@ecn.purdue.edu Abstract

More information

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Ibrahim Fawaz 1,2, Philippe Ciblat 2, and Mireille Sarkiss 1 1 LIST, CEA, Communicating Systems Laboratory,

More information

Loss Probability Calculations and Asymptotic Analysis for Finite Buffer Multiplexers

Loss Probability Calculations and Asymptotic Analysis for Finite Buffer Multiplexers IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 6, DECEMBER 2001 755 Loss Probability Calculations Asymptotic Analysis for Finite Buffer Multiplexers Han S. Kim Ness B. Shroff, Senior Member, IEEE Abstract

More information

Stability, Queue Length and Delay of Deterministic and Stochastic Queueing Networks Cheng-Shang Chang IBM Research Division T.J. Watson Research Cente

Stability, Queue Length and Delay of Deterministic and Stochastic Queueing Networks Cheng-Shang Chang IBM Research Division T.J. Watson Research Cente Stability, Queue Length and Delay of Deterministic and Stochastic Queueing Networks Cheng-Shang Chang IBM Research Division T.J. Watson Research Center P.O. Box 704 Yorktown Heights, NY 10598 cschang@watson.ibm.com

More information

Part I Stochastic variables and Markov chains

Part I Stochastic variables and Markov chains Part I Stochastic variables and Markov chains Random variables describe the behaviour of a phenomenon independent of any specific sample space Distribution function (cdf, cumulative distribution function)

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

ON THE OPTIMALITY OF AN INDEX RULE IN MULTICHANNEL ALLOCATION FOR SINGLE-HOP MOBILE NETWORKS WITH MULTIPLE SERVICE CLASSES*

ON THE OPTIMALITY OF AN INDEX RULE IN MULTICHANNEL ALLOCATION FOR SINGLE-HOP MOBILE NETWORKS WITH MULTIPLE SERVICE CLASSES* Probability in the Engineering and Informational Sciences, 14, 2000, 259 297+ Printed in the U+S+A+ ON THE OPTIMALITY OF AN INDEX RULE IN MULTICHANNEL ALLOCATION FOR SINGLE-HOP MOBILE NETWORKS WITH MULTIPLE

More information

A Heterogeneous Two-Server Queueing System with Balking and Server Breakdowns

A Heterogeneous Two-Server Queueing System with Balking and Server Breakdowns The Eighth International Symposium on Operations Research and Its Applications (ISORA 09) Zhangjiajie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 230 244 A Heterogeneous Two-Server Queueing

More information

On the Pathwise Optimal Bernoulli Routing Policy for Homogeneous Parallel Servers

On the Pathwise Optimal Bernoulli Routing Policy for Homogeneous Parallel Servers On the Pathwise Optimal Bernoulli Routing Policy for Homogeneous Parallel Servers Ger Koole INRIA Sophia Antipolis B.P. 93, 06902 Sophia Antipolis Cedex France Mathematics of Operations Research 21:469

More information

On the Performance of an Eective Bandwidths Formula. Costas Courcoubetis, George Fouskas. and Richard Weber y. Abstract

On the Performance of an Eective Bandwidths Formula. Costas Courcoubetis, George Fouskas. and Richard Weber y. Abstract On the Performance of an Eective Bandwidths Formula Costas Courcoubetis, George Fouskas and Richard Weber y Abstract At a buered switch in an ATM (asynchronous transfer mode) network it is important to

More information

Mean-Field Analysis of Coding Versus Replication in Large Data Storage Systems

Mean-Field Analysis of Coding Versus Replication in Large Data Storage Systems Electrical and Computer Engineering Publications Electrical and Computer Engineering 2-28 Mean-Field Analysis of Coding Versus Replication in Large Data Storage Systems Bin Li University of Rhode Island

More information

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits

More information

Stability of the two queue system

Stability of the two queue system Stability of the two queue system Iain M. MacPhee and Lisa J. Müller University of Durham Department of Mathematical Science Durham, DH1 3LE, UK (e-mail: i.m.macphee@durham.ac.uk, l.j.muller@durham.ac.uk)

More information

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

arxiv: v1 [math.pr] 13 Nov 2015

arxiv: v1 [math.pr] 13 Nov 2015 Submitted to the Annals of Applied Probability ON THE INSTABILITY OF MATCHING QUEUES arxiv:1511.04282v1 [math.pr] 13 Nov 2015 By Pascal Moyal and Ohad Perry Université de Technologie de Compiègne and Northwestern

More information

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels 1 Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels Invited Paper Ali ParandehGheibi, Muriel Médard, Asuman Ozdaglar, and Atilla Eryilmaz arxiv:0810.167v1 cs.it

More information

LIMITS FOR QUEUES AS THE WAITING ROOM GROWS. Bell Communications Research AT&T Bell Laboratories Red Bank, NJ Murray Hill, NJ 07974

LIMITS FOR QUEUES AS THE WAITING ROOM GROWS. Bell Communications Research AT&T Bell Laboratories Red Bank, NJ Murray Hill, NJ 07974 LIMITS FOR QUEUES AS THE WAITING ROOM GROWS by Daniel P. Heyman Ward Whitt Bell Communications Research AT&T Bell Laboratories Red Bank, NJ 07701 Murray Hill, NJ 07974 May 11, 1988 ABSTRACT We study the

More information

Optimal scaling of average queue sizes in an input-queued switch: an open problem

Optimal scaling of average queue sizes in an input-queued switch: an open problem DOI 10.1007/s11134-011-9234-1 Optimal scaling of average queue sizes in an input-queued switch: an open problem Devavrat Shah John N. Tsitsiklis Yuan Zhong Received: 9 May 2011 / Revised: 9 May 2011 Springer

More information

On the departure process of a leaky bucket system with long-range dependent input traffic

On the departure process of a leaky bucket system with long-range dependent input traffic Queueing Systems 28 (998) 9 24 9 On the departure process of a leaky bucket system with long-range dependent input traffic Socrates Vamvakos and Venkat Anantharam EECS Department, University of California,

More information

Model reversibility of a two dimensional reflecting random walk and its application to queueing network

Model reversibility of a two dimensional reflecting random walk and its application to queueing network arxiv:1312.2746v2 [math.pr] 11 Dec 2013 Model reversibility of a two dimensional reflecting random walk and its application to queueing network Masahiro Kobayashi, Masakiyo Miyazawa and Hiroshi Shimizu

More information

An M/M/1 Queue in Random Environment with Disasters

An M/M/1 Queue in Random Environment with Disasters An M/M/1 Queue in Random Environment with Disasters Noam Paz 1 and Uri Yechiali 1,2 1 Department of Statistics and Operations Research School of Mathematical Sciences Tel Aviv University, Tel Aviv 69978,

More information

5 Lecture 5: Fluid Models

5 Lecture 5: Fluid Models 5 Lecture 5: Fluid Models Stability of fluid and stochastic processing networks Stability analysis of some fluid models Optimization of fluid networks. Separated continuous linear programming 5.1 Stability

More information

Stationary Probabilities of Markov Chains with Upper Hessenberg Transition Matrices

Stationary Probabilities of Markov Chains with Upper Hessenberg Transition Matrices Stationary Probabilities of Marov Chains with Upper Hessenberg Transition Matrices Y. Quennel ZHAO Department of Mathematics and Statistics University of Winnipeg Winnipeg, Manitoba CANADA R3B 2E9 Susan

More information

Performance Evaluation of Queuing Systems

Performance Evaluation of Queuing Systems Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Strong Performance Guarantees for Asynchronous Buffered Crossbar Schedulers

Strong Performance Guarantees for Asynchronous Buffered Crossbar Schedulers Strong Performance Guarantees for Asynchronous Buffered Crossbar Schedulers Jonathan Turner Washington University jon.turner@wustl.edu January 30, 2008 Abstract Crossbar-based switches are commonly used

More information

Queueing Networks and Insensitivity

Queueing Networks and Insensitivity Lukáš Adam 29. 10. 2012 1 / 40 Table of contents 1 Jackson networks 2 Insensitivity in Erlang s Loss System 3 Quasi-Reversibility and Single-Node Symmetric Queues 4 Quasi-Reversibility in Networks 5 The

More information

Intro Refresher Reversibility Open networks Closed networks Multiclass networks Other networks. Queuing Networks. Florence Perronnin

Intro Refresher Reversibility Open networks Closed networks Multiclass networks Other networks. Queuing Networks. Florence Perronnin Queuing Networks Florence Perronnin Polytech Grenoble - UGA March 23, 27 F. Perronnin (UGA) Queuing Networks March 23, 27 / 46 Outline Introduction to Queuing Networks 2 Refresher: M/M/ queue 3 Reversibility

More information

Maximum Pressure Policies in Stochastic Processing Networks

Maximum Pressure Policies in Stochastic Processing Networks OPERATIONS RESEARCH Vol. 53, No. 2, March April 2005, pp. 197 218 issn 0030-364X eissn 1526-5463 05 5302 0197 informs doi 10.1287/opre.1040.0170 2005 INFORMS Maximum Pressure Policies in Stochastic Processing

More information

Probability Models in Electrical and Computer Engineering Mathematical models as tools in analysis and design Deterministic models Probability models

Probability Models in Electrical and Computer Engineering Mathematical models as tools in analysis and design Deterministic models Probability models Probability Models in Electrical and Computer Engineering Mathematical models as tools in analysis and design Deterministic models Probability models Statistical regularity Properties of relative frequency

More information

A source model for ISDN packet data traffic *

A source model for ISDN packet data traffic * 1 A source model for ISDN packet data traffic * Kavitha Chandra and Charles Thompson Center for Advanced Computation University of Massachusetts Lowell, Lowell MA 01854 * Proceedings of the 28th Annual

More information

queue KTH, Royal Institute of Technology, Department of Microelectronics and Information Technology

queue KTH, Royal Institute of Technology, Department of Microelectronics and Information Technology Analysis of the Packet oss Process in an MMPP+M/M/1/K queue György Dán, Viktória Fodor KTH, Royal Institute of Technology, Department of Microelectronics and Information Technology {gyuri,viktoria}@imit.kth.se

More information

Time Reversibility and Burke s Theorem

Time Reversibility and Burke s Theorem Queuing Analysis: Time Reversibility and Burke s Theorem Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. Yannis A. Korilis. Outline Time-Reversal

More information

Matrix analytic methods. Lecture 1: Structured Markov chains and their stationary distribution

Matrix analytic methods. Lecture 1: Structured Markov chains and their stationary distribution 1/29 Matrix analytic methods Lecture 1: Structured Markov chains and their stationary distribution Sophie Hautphenne and David Stanford (with thanks to Guy Latouche, U. Brussels and Peter Taylor, U. Melbourne

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Stochastic models in product form: the (E)RCAT methodology

Stochastic models in product form: the (E)RCAT methodology Stochastic models in product form: the (E)RCAT methodology 1 Maria Grazia Vigliotti 2 1 Dipartimento di Informatica Università Ca Foscari di Venezia 2 Department of Computing Imperial College London Second

More information