Environment (E) IBP IBP IBP 2 N 2 N. server. System (S) Adapter (A) ACV

Size: px
Start display at page:

Download "Environment (E) IBP IBP IBP 2 N 2 N. server. System (S) Adapter (A) ACV"

Transcription

1 The Adaptive Cross Validation Method - applied to polling schemes Anders Svensson and Johan M Karlsson Department of Communication Systems Lund Institute of Technology P. O. Box 118, Lund, Sweden Abstract The Adaptive Cross Validation (ACV) method is a general method for system performance optimization. It continuously investigates the performance of a number of simulation models in parallel to nd the currently best model. The best model and a number of alternative models are investigated next. This method can be used in the design phase to determine how a system should be designed, or it could be used during the operational phase to dynamically determine how the system should be controlled. A novel formalism, suitable for presentation of mathematical models in technical publications, is used to formally describe the studied system. The system is slotted, and consists of a shared server and a number of queues. A classical polling scheme (limited or gated) is used by the server at regular intervals to decide in which order the queues are served. The ACV method changes the polling frequency to optimize the system throughput even for bursty arrivals, in this case, one Interrupted Bernoulli Process for each queue. Both the steady state and the transient performance have been investigated. The advantage of using the ACV method over ordinary polling is demonstrated. 1 Introduction The issue of optimizing systems have been, and will be, one of the main objectives for many research studies. Usually the problem is the parameter setting in some algorithm, or any other mechanical or recursive computational procedure. Especially when the performance of the system is very dependent of the parameter setting and the optimal setting changes due to non stationary behavior of conditions that are out of control for the systems. In such cases a dynamic parameter setting, that follows the irregularities, would be a diserable property. Such a new dynamic method, called the Adaptive Cross Validation (ACV) method, is introduced and analyzed below. It mainly focus on the issue to provide better control of the transient behavior. To better understand the functionality and advantage of this method, it is, as an example, also applied to a polling system and some performance measures are presented. Polling systems could be used with dierent algorithms to decide how many jobs that should be attended from each queue in each cycle. These algorithms are often referred to as limited, gated and exhaustive search [1]. Several variants of the above basic polling schemes include probabilistic polling, and ic polling. For an explanation of these the reader is referred to [2]. In the studied example, the ACV method is applied to improve the performance of the limited scheme,

2 also be applied to many dierent systems within the telecommunication eld as well as outside. 2 Application description This section describes the usage of the ACV method for dynamic optimization of a resource sharing algorithm based on polling. Figure 1 shows a model of the application, which consists of three parts: an environment, a system, and an adapter. The environment consists of N sources, which are modeled by IBP processes, that generate jobs to the system. There are N queues in the system, one for each source, and a server, which is a shared resource. Each queue has space for L jobs. A polling algorithm is executed by the server ically with to determine the order in which the jobs in the queues are to be served. The ACV method is implemented by the adapter, which optimizes the server throughput by dynamically adjusting the. Environment (E) 1 IBP IBP IBP 2 N L 1 2 N System (S) Adapter (A) server ACV Figure 1: Model of the resource sharing application: environment (N job sources), system (N queues and one shared server) and adapter (ACV method). The application is dened in the mathematical model formalism MM [3], which has been designed to be compact, exact, and easy to read and understand, thereby making it easier to repeat experiments reported in technical publications. It uses a notation in between descriptions in programming languages, which are exact but require a lot of space, and abstract high level descriptions, which are short but leave the details to the reader. It provides people working with mathematical models with a \standardized" language. The overall structure of an application is described by a block scheme, which consists of a number of blocks. Each block, which is dened in a table, consists of variables and activities, which are triggered when certain conditions are fullled. Inter-block communication is handled by external variables, which are variables used by more than one block. A block is shown as a rectangle in a block scheme, while an external variable is illustrated by a symbol located close to the line that interconnects the blocks that use the variable. Figure 2 shows the block scheme for the application, that will be used and described below.

3 i Environment E t, System S n,h i im,t, τ, Adapter A τ,m Figure 2: Block scheme for the resource sharing application: environment E (N job sources), system S (N queues and one shared server) and adapter A (ACV method). 2.1 Environment block Table 1 denes the environment E. The arrival process from each source is an Interrupted Bernoulli Process (IBP), that is, for a geometrically distributed (on state) arrivals occur according to a Bernoulli process. This is followed by another (o state) which is also geometrically distributed, during which no arrivals occur. An IBP is governed by a two state Markov chain, where the time s between state changes are multiples of the slot time, S (the variable dened in the system block S). The state of source i, x i, can be either o or on, i = 1; :::; N. Given that a source is in the on state, the source will change to the o state with probability p OF F, or it will remain in the on state with probability 1? p OF F. If the source is in the o state, it will change to the on state with probability p ON, or it will remain in the o state with probability 1? p ON. A job is generated with probability when a source is in the on state. (x) x i = off; on [off] internal state, source i () 0:0 < N S [0:9] oered trac to the system [Erlang] C 2 = 1; 10; 100 [10] squared coecient of variation, arrivals (a) i = : i S ; 0:0 p OF F ; p ON ; 1:0 source #; probabilities; source trac 0:0 < t A [2] time when job arrivals may occur (y) y i = T; F (S; ) job arrival, source i (true,false) w (t S = t A ) : job arrivals r (1 i N S ) : f = =N S c (x i = on) : fy i = T ; p OF F = 1? (C 2? 1 + 3? 2 2 )=(1? + C 2 ) c (random < p OF F ) : fx i = offgg p ON = 1? (1? 2 + (1? p OF F ))=(1? ) (x i = off) : fy i = F ; t A = t S + S c (random < p ON ) : fx i = onggg Table 1: Environment block E: N sources generate jobs according to N independent Interrupted Bernoulli Processes with parameters and C 2. The total trac is called. Let be the interarrival time between jobs from a source, measured in number of slots. Equation 1 shows the expressions for the mean, E[], and the squared coecient of variation, C 2, of, derived in [4]. The burstiness in the job arrival process from one source is dened by C 2. The trac from one source, or the probability that a job arrives from one source,, is equal to the mean

4 over the mean length of the o and on s. Equation 2 shows the expressions for the = 1 case used to derive the expressions for p OF F and p ON in Table 1. E[] = 1 = p OF F + p ON p ON ; C 2 = V ar[] E[] 2 = 1 + [ p OF F (2? p OF F? p ON ) (p OF F + p ON ) 2? 1] (1) = p ON ; C 2 = p OF F (2? p OF F? p ON ) (2) p OF F + p ON (p OF F + p ON ) 2 Job arrivals may occur when the current time, t S, is equal to the arrival time t A. The system S is oered the trac = N. The p ON and p OF F probabilities are calculated each time a new slot begins to enable studies with time-varying trac. A random function, which returns a random number ( ), determines whether each individual source change state or not. The y i variable, which can be read by the S block, is set to T (true) when a job arrival from source i occurs. Note that job arrivals occur 2 after a slot starts, because the default, or initial, value for t A is equal to System block Table 2 denes the system S, which consists of N FIFO queues, one for each source, and a shared server. Each queue can hold L jobs. The system state, n i, denes the number of jobs in queue i, including the one currently being served, i = 1; :::; N. The server activities are divided into s of length slots. An activity list x j determines the server activity in slot j, j = 1; :::;. Possible activities in slot j are: executing the polling algorithm (x j =?1), idle (x j = 0) and processing a job from queue i (x j = i). A job's service time is equal to, the slot time. The server executes the polling algorithm at the beginning of a, at time t P, to determine the server activities during that. It takes O overhead slots to perform this task, which means that at most? O jobs from the queues can be processed during a. Table 2 shows that the rst O positions in x j are lled with minus one, and that k is set to the next slot to be scheduled. The longest queue is called ^i, and the number of jobs it contains is denoted by a^i. How many jobs that are selected from the longest queue, n, depends on a^i, the polling limit parameter, and the remaining slots to be scheduled,? k + 1. The parameter denes the maximum number of jobs that can be selected from a queue in each iteration of the algorithm. Two classical polling rules can be implemented: limited (1 < L) or gated ( = L). The remaining jobs to be scheduled in queue ^i, a^i, are updated before the next iteration starts. The procedure above is repeated until all slots have been scheduled (k > ), or until no more jobs remain to be scheduled (a^i = 0). Slots not used are lled with zeros to indicate server idleness. The current slot position within the is denoted by l. A job arrival from source i occurs when yi E is set to true. The job is accepted if there is less than L jobs in queue i. The h im variable, which is needed by the adapter A, records the arrival pattern to the queues in slot m. Job departures take place 2 before a slot ends, at time t D. A job departure from queue i = x l results in the updating of n i and s J, the number of jobs processed. The system performance is dened by the throughput, which is the probability that the server is busy processing jobs from the queues. Note that the maximum value is NL + O? 1 and not

5 when a slot starts, and job arrivals occur 2 after a slot starts. This implies that the queues can at most contain NL? 1 jobs when the polling algorithm is executed. It is clear that the performance of the polling algorithm depends on the and the polling limit. When the oered trac to the system is high, it is better to use longer s, because the relative overhead for executing the algorithm, O=, is then smaller. On the other side, when the oered trac is low, it is better to use shorter s, because a larger fraction of the slots are then used for job processing. The value that minimizes the variance between the queue lengths among the sources is one. This is only valid if the overhead O and the switch over time (time for the server to switch between two queues), do not depend on. It was decided that the should be optimized by the adapter A, primary for the case when = 1. (c) 1 N [5]; 1 L [10]; 0 O [1] # of queues; queue size; overhead slots 0:0 < [1:0] (A; E; ) slot time (x) 0 n i L [0] (A; ) # of jobs, queue i?1 x j N; h im = T; F (A; ); l = : j activity list; history logger; current slot () 1 + O NL + O? 1 [1 + O] (A; A) polling [slots] 1 L [1] maximum jobs selected/queue/iteration (a) 1 i;^i N; 1 j; k NL + O? 1 queue #; slot # within 0:0 t D [? 2]; 0:0 t P [0:0] departure time; polling time 1 n L; 1 m (; A); : a i = ni jobs/iteration; mega slot # (t) 0:0 t [0:0] (A; E; ) current time (p) 0:0 1:0; 0 s J ; s [0] throughput; # of processed jobs, slots w (t = t P ) : polling algorithm w (t = t D ) : job departure r (1 j O) : x j =?1; k = O + 1 c (1 x l N) : a i = n i ; ^i = maxargi a i fi = x l ; n i = n i? 1; s J = s J + 1g r (a^i > 0) ^ (k ) : f s = s + 1; = s J=s n = min(a^i ; ;? k + 1) l = l + 1; m = m + 1; t D = t + r (k j k + n? 1) : x j = ^i k = k + n; a^i = a^i? n; ^i = maxargi a i g r (k j ) : x j = 0; l = 1; t P = t + w (yi E = T ) _ (yi E = F ) : job arrivals c (yi E = T ) : n i = max(n i + 1; L); h im = yi E Table 2: System block S: N FIFO queues and a shared server. 2.3 Adapter block The ACV method [5], is a general method for system performance optimization. It can be used in the design phase to determine how a system should be designed, or it could be used during the operational phase to dynamically determine how the system should be controlled to optimize its performance. The method continuously investigates the performance of simulation models running in parallel with the real system under identical environmental conditions, as the real system, to nd

6 In this application, simulation models of the system S are executed in parallel, with the system, to optimize the server throughput. These simulation models are driven by exactly the same job arrival streams that have aected the system. It is the h im variable that provides the simulations with the job arrival streams. The simulation models are identical except for the polling algorithm used. This means that, by comparing the performance of the simulation models, a better than the one currently used by the system can be found. It takes several s to perform one iteration of this optimization procedure. Table 3 denes the adapter A, which consists of three activities performed during a mega. At time t 1, which occurs after the polling algorithm has executed, the number of jobs in the system queues are stored in a i ; the current slot in the mega, m S, is initialized; and the execution times are set. The start time for the next mega is stored in t 1. The length of a mega is + = 1 s of length 1 slots, where is the time it takes to perform the second activity, the simulations. At time t 2, which occurs when s has passed since time t 1, the performance of s, in this case = 3, the current 1, one shorter 2, and one longer 3, are investigated. The length of the alternative s depend on. The sim procedure takes the n, the simulation length 1, the initial system state a i, and the arrival pattern stored in h im, to compute the throughput n. The best procedure returns the best, ^. It approximates the ( 1 ; 1 ), ( 2 ; 2 ) and ( 3 ; 3 ) coordinates by a straight line, using the least squares method, if no single best was found. The longer, 3, is selected if the line has a positive slope; otherwise, the shorter is preferred if the slope is negative or if the line is horizontal. This means that the shorter is selected if 1 = 2 = 3. At time t 3, i.e. when slots has passed after time t 2, the selected can be used by the system S. (c) 3 [3]; 0 [10] # of simulation models; decision time [slots] : (a) 0:0 t 1 []; 0:0 t 2 ; t 3 ; a i = n S i execution times; # of jobs, queue i n ; ^ = : S ; 0:0 n 1:0 ; throughput 1 n ; m = : m S simulation #; mega slot # () 1 < [4]; 0:0 < [0:3] factor; alternative factor w (t S = t 1 ) : part one w (t S = t 2 ) : part two a i = n S i ; ms = 1; 1 = S 1 = S ; 2 = max( 1? 1 ; min( S )) t 1 = t S + ( + = 1 ) 1 S 3 = max( ; max( S )) t 2 = t S + 1 S r (1 n 3) : sim( n ; 1 ; a i ; h S im ; n) t 3 = t 2 +? 2 best( n ; n ; ^) w (t S = t 3 ) : part three S = ^ Table 3: Adapter block A: implements the ACV method.

7 The ACV method applied to the resource sharing application described in Section 2 was evaluated using simulation technique. To be able to get accurate results the simulations were executed for an extensive amount of times, and presented in the graphs below. The application model was initialized with the default values, specied in the tables in Section 2. In the simulations some of these parameters were altered, one or two at the time while the rest were kept at their default values. In this way it is possible to see the inuence of the individual parameters on the performance of the polling system. In general the new adaptive approach gives very good results compared to dierent static approaches. In the following these results are discussed and analyzed rho=n throughput rho= rho= rho=0.8 rho=0.9 probability Figure 3: The throughput versus for dierent loads (C 2 = 10), and the probability density function for the ACV method operated under the same conditions. 3.1 Steady state performance Figure 3 shows the throughput as a function of the, for three dierent trac loads. The three curves represent the system throughput for a relatively low load ( = 0:8), at presumed working load ( = 0:9) and at overload ( = N, the number of sources). All the results shown here have C 2 equals 10, the default value. As could be seen, the throughput for the system rises for longer s initially, due to the fact that there are more jobs waiting in the queues at the beginning of each than the length of the. As the s get longer there are not enough jobs in the queues to ll up a whole, so the system is hence forced to make plans for a whole without jobs to ll the last service slots within that. For the overload case, the throughput raises until it reaches the maximum. this point the throughput could be calculated as?o = NL?O NL = 0:98, shown in Figure 3. The lower part of Figure 3 shows the probability density function (pdf) of the s used while the At

8 C^2=1 throughput C^2=10 C^2= probability C^2= C^2=10 C^2= Figure 4: The throughput versus for dierent burstiness ( = 0:9), and the probability density function for the ACV method operated under the same conditions. ACV method was running under the same trac loads. The high probability of low length usage coincide with the highest throughput for each trac case respectively. This is, of course, the manner expected for a dynamic method aimed to optimize the throughput. The shape of the pdf is somewhat irregular, due to the fact that the only could be changed by steps,. For the overload case, i.e. job arrival in every slot, the pdf curve is not shown, however it has all the density in the equals NL. This is, however, an easier optimization problem since there is no stochastic behavior in the arrivals of jobs, i.e. the throughput is a monotone function of the. The burstiness of the arrival trac is also a factor that has an impact of the performance. This is shown in Figure 4, where the throughput is shown for three dierent settings of C 2, i.e. 1, 10 and 100. All three curves have the same load, in this case = 0:9, however the behavior is similar for other loads. As could be seen, the throughput decreases with increased burstiness, which is to be expected. The decrease is however rather substantial and the throughput is almost halved, for longer s, each time C 2 is increased a factor 10. This is due to the fact that for burstier trac patterns, there is a higher probability that the queues are empty when the polling algorithm is executed and hence a whole is scheduled without any jobs. This has more grave consequences for longer s. The lower part of Figure 4, which as above, shows the pdf for the has a slight tilt to lower s. This depends on the best procedure in Table 3, which gives priority to short s. The throughput for the ACV method is shown in Figures 3-4 as straight lines for each parameter combination. As could be seen, independent of the initial, the performance for the ACV method is almost identical to the throughput of the optimal. The ACV method has its advantages for trac patterns with smaller C 2, for the parameter settings shown. The performance

9 , which is discussed below. 3.2 Transient performance An important and essential issue is how the method reacts to sudden changes in the trac conditions. This is discussed and shown in the following. First the impact of a wrong chosen initial parameter setting for the is shown. As an extreme, the max and min values have been chosen as initial starting points. As shown in Figure 5 the method rather swiftly adjusts to a value close to the optimum (compare the curve for = 0:9 (C 2 =10) in Figure 3) time Figure 5: The versus time for two dierent initial settings of, where the adaptiveness of the ACV method is shown. In the upper curve the initial was set to its maximal value (NL + O? 1) and for the lower curve to its minimum value (1 + O). The impact of the value is clearly shown in this graph. Obviously, the initial NL is too large, hence it should at the next decision be decreased to NL? NL 1 which is shown in the gure. To further emphasize the dynamic behavior of the method, two cases where the trac changes its characteristics by steps are introduced. In the rst case, shown in Figure 6, the trac changes its mean arrival rate from its normal conditions ( = 0:9) to an overload condition at time instant 5000 and then back to normal conditions again at time instant This is to demonstrate how a sudden increase in trac intensity, restricted in time, is handled by the method. As could be seen, the throughput for the ACV method dramatically increases when the arrival intensity is increased compared to the optimal value (shown by the dashed line). When the trac alters back to normal conditions it takes some time for the method to change the to a new optimum value, as shown in Figure 6. During this time there are not a sucient number 1 The, in this case, only alternative investigated is? = NL? NL = 35.

10 throughput ACV static time x ACV static time x 10 4 Figure 6: The throughput for the ACV method and the optimal static case for a sudden change in (0:8! N! 0:8), and the used by these. (C 2 = 10) of jobs to ll the long s, and hence the throughput decreases substantially. However, after a short while the method has once again adapted to the new circumstances and the throughput is back to its origin. This, rather fast adjustment in the could be looked upon in the lower part of Figure 6. The second case consists of a change in the characteristic of the trac pattern, i.e. the load ( = 0:9) is unchanged while C 2 is altered from C 2 = 1 to C 2 = 100 at time instant 5000 and then back to normal conditions again at time instant As shown in Figure 7 the throughput performance for the ACV method (solid line) is as good as identical with the optimal throughput (dashed line) for the initial trac conditions, however after the change in the burstiness (C 2 ) the ACV method has an improved performance compared to the reference case. As for the change in the load () the ACV method very quickly adopts to the new conditions and gives a substantial improvement in total throughput. The rapid adjustment could be seen in the lower part of Figure 7, where the actual used by the system is shown. The edges, at the changes in the trac characteristics, are very distinct, which shows that the method is very dynamic without losing consistency. 3.3 General remarks So far nothing have been mentioned about the eect that the polling limit parameter has on the results. All results shown are evaluated using the limited strategy with = 1. Investigations have shown that the two strategies, limited ( = 1) and gated ( = L), have almost identical throughput characteristics. If they dier, it is only by a small fraction in favour of the limited strategy. The inuence of the value is o less importance for high C 2 values. The number of simulation models investigated in parallel,, was set to three during the experiments reported on. This number

11 throughput ACV 0.5 static time x static ACV time x 10 4 Figure 7: The throughput for the ACV method and the optimal static case for a sudden change in C 2 (1! 100! 1), and the used by these. ( = 0:9) could if desired be enlarged, which have the potential to increase the performance, especially the transient performance. However, this potentially enhanced performance have to be paid for by heavier calculations and thereby usually higher O values. Investigations, which are not shown in this paper due to space limitation, have indicated that there exist a trade o between small and large values. The outline from these studies is that a low value should be used for varying trac conditions, to optimize the transient behavior. While a large value would give a good steady state performance and hence be used in the design case. 4 Conclusions A new adaptive method to optimize dynamic systems, ACV, have been introduced. It has been applied to a resource sharing algorithm based on polling. The ACV method could however be applied to many dierent systems within the telecommunication eld as well as outside. The method is applied to a polling system, which is described by a new mathematical model formalism (MM). The formalism is designed to be compact, exact and easy to read and understand, making it easier to repeat experiments reported in technical publications. Extensive performance evaluations have been carried out and reported. The steady state performance of the ACV method gives a throughput close to that of the optimal static for the polling algorithm. The method was shown to rapidly adapt to changes in the environment, in this case, the mean load and burstiness of the arrival process. This results in an improved overall throughput performance. The main advantage of the ACV method is that no assumptions have to be made about the eect that the environment has upon the system. For queueing systems this would mean the arrival and service processes. In this way, a lot of time could be saved since

12 References [1] J. M. Karlsson, H.G. Perros and I. Viniotis,\Adaptive Polling Schemes for an ATM Bus with Bursty Arrivals', Computer Networks and ISDN Systems, Vol. 24, No. 1, [2] O. J. Boxma, H. Levy and J. A. Westrate, \Optimization of Polling Systems", in: King, Mitrani, Pooley, PERFORMANCE'90 (North Holland, Amsterdam, 1990), [3] A. Svensson, "The Mathematical Model Formalism", in preparation. [4] J. M. Karlsson, "Exact and Approximate Analytical Solutions of an ATM Buer Queueing Model - a Comparison", 2nd International Conference on Networks, paper E1.1, Singapore, [5] A. Svensson, "The Adaptive Cross Validation Method -Design and Control of Communication Systems", submitted for publication.

Multiplicative Multifractal Modeling of. Long-Range-Dependent (LRD) Trac in. Computer Communications Networks. Jianbo Gao and Izhak Rubin

Multiplicative Multifractal Modeling of. Long-Range-Dependent (LRD) Trac in. Computer Communications Networks. Jianbo Gao and Izhak Rubin Multiplicative Multifractal Modeling of Long-Range-Dependent (LRD) Trac in Computer Communications Networks Jianbo Gao and Izhak Rubin Electrical Engineering Department, University of California, Los Angeles

More information

The M/G/1 FIFO queue with several customer classes

The M/G/1 FIFO queue with several customer classes The M/G/1 FIFO queue with several customer classes Boxma, O.J.; Takine, T. Published: 01/01/2003 Document Version Publisher s PDF, also known as Version of Record (includes final page, issue and volume

More information

Bounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol.

Bounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol. Bounding the End-to-End Response imes of asks in a Distributed Real-ime System Using the Direct Synchronization Protocol Jun Sun Jane Liu Abstract In a distributed real-time system, a task may consist

More information

Optimal Rejuvenation for. Tolerating Soft Failures. Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi.

Optimal Rejuvenation for. Tolerating Soft Failures. Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi. Optimal Rejuvenation for Tolerating Soft Failures Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi Abstract In the paper we address the problem of determining the optimal time

More information

Scheduling I. Today Introduction to scheduling Classical algorithms. Next Time Advanced topics on scheduling

Scheduling I. Today Introduction to scheduling Classical algorithms. Next Time Advanced topics on scheduling Scheduling I Today Introduction to scheduling Classical algorithms Next Time Advanced topics on scheduling Scheduling out there You are the manager of a supermarket (ok, things don t always turn out the

More information

Clock-driven scheduling

Clock-driven scheduling Clock-driven scheduling Also known as static or off-line scheduling Michal Sojka Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Control Engineering November 8, 2017

More information

Part I Stochastic variables and Markov chains

Part I Stochastic variables and Markov chains Part I Stochastic variables and Markov chains Random variables describe the behaviour of a phenomenon independent of any specific sample space Distribution function (cdf, cumulative distribution function)

More information

A discrete-time priority queue with train arrivals

A discrete-time priority queue with train arrivals A discrete-time priority queue with train arrivals Joris Walraevens, Sabine Wittevrongel and Herwig Bruneel SMACS Research Group Department of Telecommunications and Information Processing (IR07) Ghent

More information

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017 CPSC 531: System Modeling and Simulation Carey Williamson Department of Computer Science University of Calgary Fall 2017 Motivating Quote for Queueing Models Good things come to those who wait - poet/writer

More information

Real-Time Systems. Event-Driven Scheduling

Real-Time Systems. Event-Driven Scheduling Real-Time Systems Event-Driven Scheduling Hermann Härtig WS 2018/19 Outline mostly following Jane Liu, Real-Time Systems Principles Scheduling EDF and LST as dynamic scheduling methods Fixed Priority schedulers

More information

Bounded Delay for Weighted Round Robin with Burst Crediting

Bounded Delay for Weighted Round Robin with Burst Crediting Bounded Delay for Weighted Round Robin with Burst Crediting Sponsor: Sprint Kert Mezger David W. Petr Technical Report TISL-0230-08 Telecommunications and Information Sciences Laboratory Department of

More information

Real-Time Systems. Event-Driven Scheduling

Real-Time Systems. Event-Driven Scheduling Real-Time Systems Event-Driven Scheduling Marcus Völp, Hermann Härtig WS 2013/14 Outline mostly following Jane Liu, Real-Time Systems Principles Scheduling EDF and LST as dynamic scheduling methods Fixed

More information

How to deal with uncertainties and dynamicity?

How to deal with uncertainties and dynamicity? How to deal with uncertainties and dynamicity? http://graal.ens-lyon.fr/ lmarchal/scheduling/ 19 novembre 2012 1/ 37 Outline 1 Sensitivity and Robustness 2 Analyzing the sensitivity : the case of Backfilling

More information

Discrete-event simulations

Discrete-event simulations Discrete-event simulations Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/elt-53606/ OUTLINE: Why do we need simulations? Step-by-step simulations; Classifications;

More information

Performance Evaluation of Queuing Systems

Performance Evaluation of Queuing Systems Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems

More information

A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS

A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS J. Anselmi 1, G. Casale 2, P. Cremonesi 1 1 Politecnico di Milano, Via Ponzio 34/5, I-20133 Milan, Italy 2 Neptuny

More information

2 optimal prices the link is either underloaded or critically loaded; it is never overloaded. For the social welfare maximization problem we show that

2 optimal prices the link is either underloaded or critically loaded; it is never overloaded. For the social welfare maximization problem we show that 1 Pricing in a Large Single Link Loss System Costas A. Courcoubetis a and Martin I. Reiman b a ICS-FORTH and University of Crete Heraklion, Crete, Greece courcou@csi.forth.gr b Bell Labs, Lucent Technologies

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

Lecture 6. Real-Time Systems. Dynamic Priority Scheduling

Lecture 6. Real-Time Systems. Dynamic Priority Scheduling Real-Time Systems Lecture 6 Dynamic Priority Scheduling Online scheduling with dynamic priorities: Earliest Deadline First scheduling CPU utilization bound Optimality and comparison with RM: Schedulability

More information

`First Come, First Served' can be unstable! Thomas I. Seidman. Department of Mathematics and Statistics. University of Maryland Baltimore County

`First Come, First Served' can be unstable! Thomas I. Seidman. Department of Mathematics and Statistics. University of Maryland Baltimore County revision2: 9/4/'93 `First Come, First Served' can be unstable! Thomas I. Seidman Department of Mathematics and Statistics University of Maryland Baltimore County Baltimore, MD 21228, USA e-mail: hseidman@math.umbc.edui

More information

TOWARDS BETTER MULTI-CLASS PARAMETRIC-DECOMPOSITION APPROXIMATIONS FOR OPEN QUEUEING NETWORKS

TOWARDS BETTER MULTI-CLASS PARAMETRIC-DECOMPOSITION APPROXIMATIONS FOR OPEN QUEUEING NETWORKS TOWARDS BETTER MULTI-CLASS PARAMETRIC-DECOMPOSITION APPROXIMATIONS FOR OPEN QUEUEING NETWORKS by Ward Whitt AT&T Bell Laboratories Murray Hill, NJ 07974-0636 March 31, 199 Revision: November 9, 199 ABSTRACT

More information

Che-Wei Chang Department of Computer Science and Information Engineering, Chang Gung University

Che-Wei Chang Department of Computer Science and Information Engineering, Chang Gung University Che-Wei Chang chewei@mail.cgu.edu.tw Department of Computer Science and Information Engineering, Chang Gung University } 2017/11/15 Midterm } 2017/11/22 Final Project Announcement 2 1. Introduction 2.

More information

Scheduling I. Today. Next Time. ! Introduction to scheduling! Classical algorithms. ! Advanced topics on scheduling

Scheduling I. Today. Next Time. ! Introduction to scheduling! Classical algorithms. ! Advanced topics on scheduling Scheduling I Today! Introduction to scheduling! Classical algorithms Next Time! Advanced topics on scheduling Scheduling out there! You are the manager of a supermarket (ok, things don t always turn out

More information

Simulation. Where real stuff starts

Simulation. Where real stuff starts 1 Simulation Where real stuff starts ToC 1. What is a simulation? 2. Accuracy of output 3. Random Number Generators 4. How to sample 5. Monte Carlo 6. Bootstrap 2 1. What is a simulation? 3 What is a simulation?

More information

Real-Time and Embedded Systems (M) Lecture 5

Real-Time and Embedded Systems (M) Lecture 5 Priority-driven Scheduling of Periodic Tasks (1) Real-Time and Embedded Systems (M) Lecture 5 Lecture Outline Assumptions Fixed-priority algorithms Rate monotonic Deadline monotonic Dynamic-priority algorithms

More information

CSE 380 Computer Operating Systems

CSE 380 Computer Operating Systems CSE 380 Computer Operating Systems Instructor: Insup Lee & Dianna Xu University of Pennsylvania, Fall 2003 Lecture Note 3: CPU Scheduling 1 CPU SCHEDULING q How can OS schedule the allocation of CPU cycles

More information

EE 368. Weeks 3 (Notes)

EE 368. Weeks 3 (Notes) EE 368 Weeks 3 (Notes) 1 State of a Queuing System State: Set of parameters that describe the condition of the system at a point in time. Why do we need it? Average size of Queue Average waiting time How

More information

Link Models for Circuit Switching

Link Models for Circuit Switching Link Models for Circuit Switching The basis of traffic engineering for telecommunication networks is the Erlang loss function. It basically allows us to determine the amount of telephone traffic that can

More information

[4] T. I. Seidman, \\First Come First Serve" is Unstable!," tech. rep., University of Maryland Baltimore County, 1993.

[4] T. I. Seidman, \\First Come First Serve is Unstable!, tech. rep., University of Maryland Baltimore County, 1993. [2] C. J. Chase and P. J. Ramadge, \On real-time scheduling policies for exible manufacturing systems," IEEE Trans. Automat. Control, vol. AC-37, pp. 491{496, April 1992. [3] S. H. Lu and P. R. Kumar,

More information

The Passport Control Problem or How to Keep an Unstable Service System Load Balanced?

The Passport Control Problem or How to Keep an Unstable Service System Load Balanced? The Passport Control Problem or How to Keep an Unstable Service System Load Balanced? A. ITAI Computer Science Department, Technion M. RODEH Computer Science Department, Technion H. SHACHNAI Computer Science

More information

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads Operations Research Letters 37 (2009) 312 316 Contents lists available at ScienceDirect Operations Research Letters journal homepage: www.elsevier.com/locate/orl Instability of FIFO in a simple queueing

More information

CPU scheduling. CPU Scheduling

CPU scheduling. CPU Scheduling EECS 3221 Operating System Fundamentals No.4 CPU scheduling Prof. Hui Jiang Dept of Electrical Engineering and Computer Science, York University CPU Scheduling CPU scheduling is the basis of multiprogramming

More information

Trac of an ATM-SMX in the NCIH. Tung Ouyang and Arne A. Nilsson. Center for Advanced Computing and Communication

Trac of an ATM-SMX in the NCIH. Tung Ouyang and Arne A. Nilsson. Center for Advanced Computing and Communication Departure Process for Periodic Real-Time Trac of an ATM-SMX in the NCIH Tung Ouyang and Arne A. Nilsson Center for Advanced Computing and Communication Department of Electrical and Computer Engineering

More information

A FAST MATRIX-ANALYTIC APPROXIMATION FOR THE TWO CLASS GI/G/1 NON-PREEMPTIVE PRIORITY QUEUE

A FAST MATRIX-ANALYTIC APPROXIMATION FOR THE TWO CLASS GI/G/1 NON-PREEMPTIVE PRIORITY QUEUE A FAST MATRIX-ANAYTIC APPROXIMATION FOR TE TWO CASS GI/G/ NON-PREEMPTIVE PRIORITY QUEUE Gábor orváth Department of Telecommunication Budapest University of Technology and Economics. Budapest Pf. 9., ungary

More information

Computer Systems Modelling

Computer Systems Modelling Computer Systems Modelling Computer Laboratory Computer Science Tripos, Part II Michaelmas Term 2003 R. J. Gibbens Problem sheet William Gates Building JJ Thomson Avenue Cambridge CB3 0FD http://www.cl.cam.ac.uk/

More information

VARIANCE REDUCTION IN SIMULATIONS OF LOSS MODELS

VARIANCE REDUCTION IN SIMULATIONS OF LOSS MODELS VARIANCE REDUCTION IN SIMULATIONS OF LOSS MODELS by Rayadurgam Srikant 1 and Ward Whitt 2 October 20, 1995 Revision: September 26, 1996 1 Coordinated Science Laboratory, University of Illinois, 1308 W.

More information

Contents LIST OF TABLES... LIST OF FIGURES... xvii. LIST OF LISTINGS... xxi PREFACE. ...xxiii

Contents LIST OF TABLES... LIST OF FIGURES... xvii. LIST OF LISTINGS... xxi PREFACE. ...xxiii LIST OF TABLES... xv LIST OF FIGURES... xvii LIST OF LISTINGS... xxi PREFACE...xxiii CHAPTER 1. PERFORMANCE EVALUATION... 1 1.1. Performance evaluation... 1 1.2. Performance versus resources provisioning...

More information

Scheduling Slack Time in Fixed Priority Pre-emptive Systems

Scheduling Slack Time in Fixed Priority Pre-emptive Systems Scheduling Slack Time in Fixed Priority Pre-emptive Systems R.I.Davis Real-Time Systems Research Group, Department of Computer Science, University of York, England. ABSTRACT This report addresses the problem

More information

Submitted to IEEE Transactions on Computers, June Evaluating Dynamic Failure Probability for Streams with. (m; k)-firm Deadlines

Submitted to IEEE Transactions on Computers, June Evaluating Dynamic Failure Probability for Streams with. (m; k)-firm Deadlines Submitted to IEEE Transactions on Computers, June 1994 Evaluating Dynamic Failure Probability for Streams with (m; k)-firm Deadlines Moncef Hamdaoui and Parameswaran Ramanathan Department of Electrical

More information

Queues and Queueing Networks

Queues and Queueing Networks Queues and Queueing Networks Sanjay K. Bose Dept. of EEE, IITG Copyright 2015, Sanjay K. Bose 1 Introduction to Queueing Models and Queueing Analysis Copyright 2015, Sanjay K. Bose 2 Model of a Queue Arrivals

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science 6.262 Discrete Stochastic Processes Midterm Quiz April 6, 2010 There are 5 questions, each with several parts.

More information

Lecture 20: Reversible Processes and Queues

Lecture 20: Reversible Processes and Queues Lecture 20: Reversible Processes and Queues 1 Examples of reversible processes 11 Birth-death processes We define two non-negative sequences birth and death rates denoted by {λ n : n N 0 } and {µ n : n

More information

Session-Based Queueing Systems

Session-Based Queueing Systems Session-Based Queueing Systems Modelling, Simulation, and Approximation Jeroen Horters Supervisor VU: Sandjai Bhulai Executive Summary Companies often offer services that require multiple steps on the

More information

Queueing systems. Renato Lo Cigno. Simulation and Performance Evaluation Queueing systems - Renato Lo Cigno 1

Queueing systems. Renato Lo Cigno. Simulation and Performance Evaluation Queueing systems - Renato Lo Cigno 1 Queueing systems Renato Lo Cigno Simulation and Performance Evaluation 2014-15 Queueing systems - Renato Lo Cigno 1 Queues A Birth-Death process is well modeled by a queue Indeed queues can be used to

More information

NATCOR: Stochastic Modelling

NATCOR: Stochastic Modelling NATCOR: Stochastic Modelling Queueing Theory II Chris Kirkbride Management Science 2017 Overview of Today s Sessions I Introduction to Queueing Modelling II Multiclass Queueing Models III Queueing Control

More information

Introduction to Markov Chains, Queuing Theory, and Network Performance

Introduction to Markov Chains, Queuing Theory, and Network Performance Introduction to Markov Chains, Queuing Theory, and Network Performance Marceau Coupechoux Telecom ParisTech, departement Informatique et Réseaux marceau.coupechoux@telecom-paristech.fr IT.2403 Modélisation

More information

Completion Time in Dynamic PERT Networks 57 job are nished, as well as that the associated service station has processed the same activity of the prev

Completion Time in Dynamic PERT Networks 57 job are nished, as well as that the associated service station has processed the same activity of the prev Scientia Iranica, Vol. 14, No. 1, pp 56{63 c Sharif University of Technology, February 2007 Project Completion Time in Dynamic PERT Networks with Generating Projects A. Azaron 1 and M. Modarres In this

More information

LIMITS FOR QUEUES AS THE WAITING ROOM GROWS. Bell Communications Research AT&T Bell Laboratories Red Bank, NJ Murray Hill, NJ 07974

LIMITS FOR QUEUES AS THE WAITING ROOM GROWS. Bell Communications Research AT&T Bell Laboratories Red Bank, NJ Murray Hill, NJ 07974 LIMITS FOR QUEUES AS THE WAITING ROOM GROWS by Daniel P. Heyman Ward Whitt Bell Communications Research AT&T Bell Laboratories Red Bank, NJ 07701 Murray Hill, NJ 07974 May 11, 1988 ABSTRACT We study the

More information

CPU Scheduling. CPU Scheduler

CPU Scheduling. CPU Scheduler CPU Scheduling These slides are created by Dr. Huang of George Mason University. Students registered in Dr. Huang s courses at GMU can make a single machine readable copy and print a single copy of each

More information

Algorithm for Characterizing the Superposition of Multiple Heterogeneous Interrupted Bernoulli Processes

Algorithm for Characterizing the Superposition of Multiple Heterogeneous Interrupted Bernoulli Processes A Computationally Efficient Algorithm for Characterizing the Superposition of Multiple Heterogeneous Interrupted Bernoulli Processes K. M. Elsayed H. G. Perras Center for Communications and Signal Processing

More information

Queueing Theory and Simulation. Introduction

Queueing Theory and Simulation. Introduction Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University, Japan

More information

EDF Scheduling. Giuseppe Lipari May 11, Scuola Superiore Sant Anna Pisa

EDF Scheduling. Giuseppe Lipari   May 11, Scuola Superiore Sant Anna Pisa EDF Scheduling Giuseppe Lipari http://feanor.sssup.it/~lipari Scuola Superiore Sant Anna Pisa May 11, 2008 Outline 1 Dynamic priority 2 Basic analysis 3 FP vs EDF 4 Processor demand bound analysis Generalization

More information

Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers

Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers Mohammad H. Yarmand and Douglas G. Down Department of Computing and Software, McMaster University, Hamilton, ON, L8S

More information

Multiserver Queueing Model subject to Single Exponential Vacation

Multiserver Queueing Model subject to Single Exponential Vacation Journal of Physics: Conference Series PAPER OPEN ACCESS Multiserver Queueing Model subject to Single Exponential Vacation To cite this article: K V Vijayashree B Janani 2018 J. Phys.: Conf. Ser. 1000 012129

More information

Stability, Queue Length and Delay of Deterministic and Stochastic Queueing Networks Cheng-Shang Chang IBM Research Division T.J. Watson Research Cente

Stability, Queue Length and Delay of Deterministic and Stochastic Queueing Networks Cheng-Shang Chang IBM Research Division T.J. Watson Research Cente Stability, Queue Length and Delay of Deterministic and Stochastic Queueing Networks Cheng-Shang Chang IBM Research Division T.J. Watson Research Center P.O. Box 704 Yorktown Heights, NY 10598 cschang@watson.ibm.com

More information

Real-time Scheduling of Periodic Tasks (1) Advanced Operating Systems Lecture 2

Real-time Scheduling of Periodic Tasks (1) Advanced Operating Systems Lecture 2 Real-time Scheduling of Periodic Tasks (1) Advanced Operating Systems Lecture 2 Lecture Outline Scheduling periodic tasks The rate monotonic algorithm Definition Non-optimality Time-demand analysis...!2

More information

Networking = Plumbing. Queueing Analysis: I. Last Lecture. Lecture Outline. Jeremiah Deng. 29 July 2013

Networking = Plumbing. Queueing Analysis: I. Last Lecture. Lecture Outline. Jeremiah Deng. 29 July 2013 Networking = Plumbing TELE302 Lecture 7 Queueing Analysis: I Jeremiah Deng University of Otago 29 July 2013 Jeremiah Deng (University of Otago) TELE302 Lecture 7 29 July 2013 1 / 33 Lecture Outline Jeremiah

More information

Buzen s algorithm. Cyclic network Extension of Jackson networks

Buzen s algorithm. Cyclic network Extension of Jackson networks Outline Buzen s algorithm Mean value analysis for Jackson networks Cyclic network Extension of Jackson networks BCMP network 1 Marginal Distributions based on Buzen s algorithm With Buzen s algorithm,

More information

PBW 654 Applied Statistics - I Urban Operations Research

PBW 654 Applied Statistics - I Urban Operations Research PBW 654 Applied Statistics - I Urban Operations Research Lecture 2.I Queuing Systems An Introduction Operations Research Models Deterministic Models Linear Programming Integer Programming Network Optimization

More information

Slides 9: Queuing Models

Slides 9: Queuing Models Slides 9: Queuing Models Purpose Simulation is often used in the analysis of queuing models. A simple but typical queuing model is: Queuing models provide the analyst with a powerful tool for designing

More information

Design of discrete-event simulations

Design of discrete-event simulations Design of discrete-event simulations Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2707/ OUTLINE: Discrete event simulation; Event advance design; Unit-time

More information

Chapter 6 Queueing Models. Banks, Carson, Nelson & Nicol Discrete-Event System Simulation

Chapter 6 Queueing Models. Banks, Carson, Nelson & Nicol Discrete-Event System Simulation Chapter 6 Queueing Models Banks, Carson, Nelson & Nicol Discrete-Event System Simulation Purpose Simulation is often used in the analysis of queueing models. A simple but typical queueing model: Queueing

More information

Uniform random numbers generators

Uniform random numbers generators Uniform random numbers generators Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2707/ OUTLINE: The need for random numbers; Basic steps in generation; Uniformly

More information

System with a Server Subject to Breakdowns

System with a Server Subject to Breakdowns Applied Mathematical Sciences Vol. 7 213 no. 11 539 55 On Two Modifications of E 2 /E 2 /1/m Queueing System with a Server Subject to Breakdowns Michal Dorda VSB - Technical University of Ostrava Faculty

More information

Name of the Student:

Name of the Student: SUBJECT NAME : Probability & Queueing Theory SUBJECT CODE : MA 6453 MATERIAL NAME : Part A questions REGULATION : R2013 UPDATED ON : November 2017 (Upto N/D 2017 QP) (Scan the above QR code for the direct

More information

Lecture 4: Bernoulli Process

Lecture 4: Bernoulli Process Lecture 4: Bernoulli Process Hyang-Won Lee Dept. of Internet & Multimedia Eng. Konkuk University Lecture 4 Hyang-Won Lee 1 / 12 Stochastic Process A stochastic process is a mathematical model of a probabilistic

More information

EDF Scheduling. Giuseppe Lipari CRIStAL - Université de Lille 1. October 4, 2015

EDF Scheduling. Giuseppe Lipari  CRIStAL - Université de Lille 1. October 4, 2015 EDF Scheduling Giuseppe Lipari http://www.lifl.fr/~lipari CRIStAL - Université de Lille 1 October 4, 2015 G. Lipari (CRIStAL) Earliest Deadline Scheduling October 4, 2015 1 / 61 Earliest Deadline First

More information

Exercises Stochastic Performance Modelling. Hamilton Institute, Summer 2010

Exercises Stochastic Performance Modelling. Hamilton Institute, Summer 2010 Exercises Stochastic Performance Modelling Hamilton Institute, Summer Instruction Exercise Let X be a non-negative random variable with E[X ]

More information

System Time Distribution of Dynamic Traveling Repairman Problem under the PART-n-TSP Policy

System Time Distribution of Dynamic Traveling Repairman Problem under the PART-n-TSP Policy System Time Distribution of Dynamic Traveling Repairman Problem under the PART-n-TSP Policy Jiangchuan Huang and Raja Sengupta Abstract We propose the PART-n-TSP policy for the Dynamic Traveling Repairman

More information

MACHINE DEDICATION UNDER PRODUCT AND PROCESS DIVERSITY. Darius Rohan. IBM Microelectonics Division East Fishkill, NY 12533, U.S.A.

MACHINE DEDICATION UNDER PRODUCT AND PROCESS DIVERSITY. Darius Rohan. IBM Microelectonics Division East Fishkill, NY 12533, U.S.A. Proceedings of the 1999 Winter Simulation Conference P. A. Farrington, H. B. Nembhard, D. T. Sturrock, and G. W. Evans, eds. MACHINE DEDICATION UNDER PRODUCT AND PROCESS DIVERSITY Darius Rohan IBM Microelectonics

More information

STEADY-STATE PROBABILITIES FOR SOME QUEUEING SYSTEMS: Part II

STEADY-STATE PROBABILITIES FOR SOME QUEUEING SYSTEMS: Part II STEADY-STATE PROBABILITIES FOR SOME QUEUEING SYSTEMS: Part II Mahmoud Abdel Moety Hussain Faculty of Computers and Informatics Zagazig University Abstract This paper applies the theoretical results presented

More information

M/G/1 and Priority Queueing

M/G/1 and Priority Queueing M/G/1 and Priority Queueing Richard T. B. Ma School of Computing National University of Singapore CS 5229: Advanced Compute Networks Outline PASTA M/G/1 Workload and FIFO Delay Pollaczek Khinchine Formula

More information

Input-queued switches: Scheduling algorithms for a crossbar switch. EE 384X Packet Switch Architectures 1

Input-queued switches: Scheduling algorithms for a crossbar switch. EE 384X Packet Switch Architectures 1 Input-queued switches: Scheduling algorithms for a crossbar switch EE 84X Packet Switch Architectures Overview Today s lecture - the input-buffered switch architecture - the head-of-line blocking phenomenon

More information

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking Lecture 7: Simulation of Markov Processes Pasi Lassila Department of Communications and Networking Contents Markov processes theory recap Elementary queuing models for data networks Simulation of Markov

More information

Scheduling. Uwe R. Zimmer & Alistair Rendell The Australian National University

Scheduling. Uwe R. Zimmer & Alistair Rendell The Australian National University 6 Scheduling Uwe R. Zimmer & Alistair Rendell The Australian National University References for this chapter [Bacon98] J. Bacon Concurrent Systems 1998 (2nd Edition) Addison Wesley Longman Ltd, ISBN 0-201-17767-6

More information

Queuing Analysis. Chapter Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Queuing Analysis. Chapter Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall Queuing Analysis Chapter 13 13-1 Chapter Topics Elements of Waiting Line Analysis The Single-Server Waiting Line System Undefined and Constant Service Times Finite Queue Length Finite Calling Problem The

More information

Real-Time Scheduling. Real Time Operating Systems and Middleware. Luca Abeni

Real-Time Scheduling. Real Time Operating Systems and Middleware. Luca Abeni Real Time Operating Systems and Middleware Luca Abeni luca.abeni@unitn.it Definitions Algorithm logical procedure used to solve a problem Program formal description of an algorithm, using a programming

More information

Chapter 1. Introduction. 1.1 Stochastic process

Chapter 1. Introduction. 1.1 Stochastic process Chapter 1 Introduction Process is a phenomenon that takes place in time. In many practical situations, the result of a process at any time may not be certain. Such a process is called a stochastic process.

More information

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch A Starvation-free Algorithm For Achieving 00% Throughput in an Input- Queued Switch Abstract Adisak ekkittikul ick ckeown Department of Electrical Engineering Stanford University Stanford CA 9405-400 Tel

More information

CHAPTER 4. Networks of queues. 1. Open networks Suppose that we have a network of queues as given in Figure 4.1. Arrivals

CHAPTER 4. Networks of queues. 1. Open networks Suppose that we have a network of queues as given in Figure 4.1. Arrivals CHAPTER 4 Networks of queues. Open networks Suppose that we have a network of queues as given in Figure 4.. Arrivals Figure 4.. An open network can occur from outside of the network to any subset of nodes.

More information

Simulation of Process Scheduling Algorithms

Simulation of Process Scheduling Algorithms Simulation of Process Scheduling Algorithms Project Report Instructor: Dr. Raimund Ege Submitted by: Sonal Sood Pramod Barthwal Index 1. Introduction 2. Proposal 3. Background 3.1 What is a Process 4.

More information

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 5, MAY

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 5, MAY IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 5, MAY 1998 631 Centralized and Decentralized Asynchronous Optimization of Stochastic Discrete-Event Systems Felisa J. Vázquez-Abad, Christos G. Cassandras,

More information

B. Maddah INDE 504 Discrete-Event Simulation. Output Analysis (1)

B. Maddah INDE 504 Discrete-Event Simulation. Output Analysis (1) B. Maddah INDE 504 Discrete-Event Simulation Output Analysis (1) Introduction The basic, most serious disadvantage of simulation is that we don t get exact answers. Two different runs of the same model

More information

Introduction to Queueing Theory

Introduction to Queueing Theory Introduction to Queueing Theory Raj Jain Washington University in Saint Louis Jain@eecs.berkeley.edu or Jain@wustl.edu A Mini-Course offered at UC Berkeley, Sept-Oct 2012 These slides and audio/video recordings

More information

Stochastic Optimization for Undergraduate Computer Science Students

Stochastic Optimization for Undergraduate Computer Science Students Stochastic Optimization for Undergraduate Computer Science Students Professor Joongheon Kim School of Computer Science and Engineering, Chung-Ang University, Seoul, Republic of Korea 1 Reference 2 Outline

More information

λ, µ, ρ, A n, W n, L(t), L, L Q, w, w Q etc. These

λ, µ, ρ, A n, W n, L(t), L, L Q, w, w Q etc. These Queuing theory models systems with servers and clients (presumably waiting in queues). Notation: there are many standard symbols like λ, µ, ρ, A n, W n, L(t), L, L Q, w, w Q etc. These represent the actual

More information

Chapter 2 Queueing Theory and Simulation

Chapter 2 Queueing Theory and Simulation Chapter 2 Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University,

More information

Class 11 Non-Parametric Models of a Service System; GI/GI/1, GI/GI/n: Exact & Approximate Analysis.

Class 11 Non-Parametric Models of a Service System; GI/GI/1, GI/GI/n: Exact & Approximate Analysis. Service Engineering Class 11 Non-Parametric Models of a Service System; GI/GI/1, GI/GI/n: Exact & Approximate Analysis. G/G/1 Queue: Virtual Waiting Time (Unfinished Work). GI/GI/1: Lindley s Equations

More information

7 Variance Reduction Techniques

7 Variance Reduction Techniques 7 Variance Reduction Techniques In a simulation study, we are interested in one or more performance measures for some stochastic model. For example, we want to determine the long-run average waiting time,

More information

Link Models for Packet Switching

Link Models for Packet Switching Link Models for Packet Switching To begin our study of the performance of communications networks, we will study a model of a single link in a message switched network. The important feature of this model

More information

Contents Preface The Exponential Distribution and the Poisson Process Introduction to Renewal Theory

Contents Preface The Exponential Distribution and the Poisson Process Introduction to Renewal Theory Contents Preface... v 1 The Exponential Distribution and the Poisson Process... 1 1.1 Introduction... 1 1.2 The Density, the Distribution, the Tail, and the Hazard Functions... 2 1.2.1 The Hazard Function

More information

Cisco [ advertises 64K cells output buers per link for its LightStream 00 ATM switch. Stratacom provides 64K cells

Cisco [  advertises 64K cells output buers per link for its LightStream 00 ATM switch. Stratacom provides 64K cells Analysis of Queueing Displacement Using Switch Port Speedup Israel Cidon y Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 3000, Israel cidon@ee.technion.ac.il Moshe

More information

Module 5: CPU Scheduling

Module 5: CPU Scheduling Module 5: CPU Scheduling Basic Concepts Scheduling Criteria Scheduling Algorithms Multiple-Processor Scheduling Real-Time Scheduling Algorithm Evaluation 5.1 Basic Concepts Maximum CPU utilization obtained

More information

1. Introduction. Consider a single cell in a mobile phone system. A \call setup" is a request for achannel by an idle customer presently in the cell t

1. Introduction. Consider a single cell in a mobile phone system. A \call setup is a request for achannel by an idle customer presently in the cell t Heavy Trac Limit for a Mobile Phone System Loss Model Philip J. Fleming and Alexander Stolyar Motorola, Inc. Arlington Heights, IL Burton Simon Department of Mathematics University of Colorado at Denver

More information

Readings: Finish Section 5.2

Readings: Finish Section 5.2 LECTURE 19 Readings: Finish Section 5.2 Lecture outline Markov Processes I Checkout counter example. Markov process: definition. -step transition probabilities. Classification of states. Example: Checkout

More information

Chapter 6: CPU Scheduling

Chapter 6: CPU Scheduling Chapter 6: CPU Scheduling Basic Concepts Scheduling Criteria Scheduling Algorithms Multiple-Processor Scheduling Real-Time Scheduling Algorithm Evaluation 6.1 Basic Concepts Maximum CPU utilization obtained

More information

Non Markovian Queues (contd.)

Non Markovian Queues (contd.) MODULE 7: RENEWAL PROCESSES 29 Lecture 5 Non Markovian Queues (contd) For the case where the service time is constant, V ar(b) = 0, then the P-K formula for M/D/ queue reduces to L s = ρ + ρ 2 2( ρ) where

More information

Exercises Solutions. Automation IEA, LTH. Chapter 2 Manufacturing and process systems. Chapter 5 Discrete manufacturing problems

Exercises Solutions. Automation IEA, LTH. Chapter 2 Manufacturing and process systems. Chapter 5 Discrete manufacturing problems Exercises Solutions Note, that we have not formulated the answers for all the review questions. You will find the answers for many questions by reading and reflecting about the text in the book. Chapter

More information

Massachusetts Institute of Technology

Massachusetts Institute of Technology .203J/6.28J/3.665J/5.073J/6.76J/ESD.26J Quiz Solutions (a)(i) Without loss of generality we can pin down X at any fixed point. X 2 is still uniformly distributed over the square. Assuming that the police

More information

A tandem queueing model with coupled processors

A tandem queueing model with coupled processors A tandem queueing model with coupled processors Jacques Resing Department of Mathematics and Computer Science Eindhoven University of Technology P.O. Box 513 5600 MB Eindhoven The Netherlands Lerzan Örmeci

More information