Environment (E) IBP IBP IBP 2 N 2 N. server. System (S) Adapter (A) ACV
|
|
- Felix Patrick
- 5 years ago
- Views:
Transcription
1 The Adaptive Cross Validation Method - applied to polling schemes Anders Svensson and Johan M Karlsson Department of Communication Systems Lund Institute of Technology P. O. Box 118, Lund, Sweden Abstract The Adaptive Cross Validation (ACV) method is a general method for system performance optimization. It continuously investigates the performance of a number of simulation models in parallel to nd the currently best model. The best model and a number of alternative models are investigated next. This method can be used in the design phase to determine how a system should be designed, or it could be used during the operational phase to dynamically determine how the system should be controlled. A novel formalism, suitable for presentation of mathematical models in technical publications, is used to formally describe the studied system. The system is slotted, and consists of a shared server and a number of queues. A classical polling scheme (limited or gated) is used by the server at regular intervals to decide in which order the queues are served. The ACV method changes the polling frequency to optimize the system throughput even for bursty arrivals, in this case, one Interrupted Bernoulli Process for each queue. Both the steady state and the transient performance have been investigated. The advantage of using the ACV method over ordinary polling is demonstrated. 1 Introduction The issue of optimizing systems have been, and will be, one of the main objectives for many research studies. Usually the problem is the parameter setting in some algorithm, or any other mechanical or recursive computational procedure. Especially when the performance of the system is very dependent of the parameter setting and the optimal setting changes due to non stationary behavior of conditions that are out of control for the systems. In such cases a dynamic parameter setting, that follows the irregularities, would be a diserable property. Such a new dynamic method, called the Adaptive Cross Validation (ACV) method, is introduced and analyzed below. It mainly focus on the issue to provide better control of the transient behavior. To better understand the functionality and advantage of this method, it is, as an example, also applied to a polling system and some performance measures are presented. Polling systems could be used with dierent algorithms to decide how many jobs that should be attended from each queue in each cycle. These algorithms are often referred to as limited, gated and exhaustive search [1]. Several variants of the above basic polling schemes include probabilistic polling, and ic polling. For an explanation of these the reader is referred to [2]. In the studied example, the ACV method is applied to improve the performance of the limited scheme,
2 also be applied to many dierent systems within the telecommunication eld as well as outside. 2 Application description This section describes the usage of the ACV method for dynamic optimization of a resource sharing algorithm based on polling. Figure 1 shows a model of the application, which consists of three parts: an environment, a system, and an adapter. The environment consists of N sources, which are modeled by IBP processes, that generate jobs to the system. There are N queues in the system, one for each source, and a server, which is a shared resource. Each queue has space for L jobs. A polling algorithm is executed by the server ically with to determine the order in which the jobs in the queues are to be served. The ACV method is implemented by the adapter, which optimizes the server throughput by dynamically adjusting the. Environment (E) 1 IBP IBP IBP 2 N L 1 2 N System (S) Adapter (A) server ACV Figure 1: Model of the resource sharing application: environment (N job sources), system (N queues and one shared server) and adapter (ACV method). The application is dened in the mathematical model formalism MM [3], which has been designed to be compact, exact, and easy to read and understand, thereby making it easier to repeat experiments reported in technical publications. It uses a notation in between descriptions in programming languages, which are exact but require a lot of space, and abstract high level descriptions, which are short but leave the details to the reader. It provides people working with mathematical models with a \standardized" language. The overall structure of an application is described by a block scheme, which consists of a number of blocks. Each block, which is dened in a table, consists of variables and activities, which are triggered when certain conditions are fullled. Inter-block communication is handled by external variables, which are variables used by more than one block. A block is shown as a rectangle in a block scheme, while an external variable is illustrated by a symbol located close to the line that interconnects the blocks that use the variable. Figure 2 shows the block scheme for the application, that will be used and described below.
3 i Environment E t, System S n,h i im,t, τ, Adapter A τ,m Figure 2: Block scheme for the resource sharing application: environment E (N job sources), system S (N queues and one shared server) and adapter A (ACV method). 2.1 Environment block Table 1 denes the environment E. The arrival process from each source is an Interrupted Bernoulli Process (IBP), that is, for a geometrically distributed (on state) arrivals occur according to a Bernoulli process. This is followed by another (o state) which is also geometrically distributed, during which no arrivals occur. An IBP is governed by a two state Markov chain, where the time s between state changes are multiples of the slot time, S (the variable dened in the system block S). The state of source i, x i, can be either o or on, i = 1; :::; N. Given that a source is in the on state, the source will change to the o state with probability p OF F, or it will remain in the on state with probability 1? p OF F. If the source is in the o state, it will change to the on state with probability p ON, or it will remain in the o state with probability 1? p ON. A job is generated with probability when a source is in the on state. (x) x i = off; on [off] internal state, source i () 0:0 < N S [0:9] oered trac to the system [Erlang] C 2 = 1; 10; 100 [10] squared coecient of variation, arrivals (a) i = : i S ; 0:0 p OF F ; p ON ; 1:0 source #; probabilities; source trac 0:0 < t A [2] time when job arrivals may occur (y) y i = T; F (S; ) job arrival, source i (true,false) w (t S = t A ) : job arrivals r (1 i N S ) : f = =N S c (x i = on) : fy i = T ; p OF F = 1? (C 2? 1 + 3? 2 2 )=(1? + C 2 ) c (random < p OF F ) : fx i = offgg p ON = 1? (1? 2 + (1? p OF F ))=(1? ) (x i = off) : fy i = F ; t A = t S + S c (random < p ON ) : fx i = onggg Table 1: Environment block E: N sources generate jobs according to N independent Interrupted Bernoulli Processes with parameters and C 2. The total trac is called. Let be the interarrival time between jobs from a source, measured in number of slots. Equation 1 shows the expressions for the mean, E[], and the squared coecient of variation, C 2, of, derived in [4]. The burstiness in the job arrival process from one source is dened by C 2. The trac from one source, or the probability that a job arrives from one source,, is equal to the mean
4 over the mean length of the o and on s. Equation 2 shows the expressions for the = 1 case used to derive the expressions for p OF F and p ON in Table 1. E[] = 1 = p OF F + p ON p ON ; C 2 = V ar[] E[] 2 = 1 + [ p OF F (2? p OF F? p ON ) (p OF F + p ON ) 2? 1] (1) = p ON ; C 2 = p OF F (2? p OF F? p ON ) (2) p OF F + p ON (p OF F + p ON ) 2 Job arrivals may occur when the current time, t S, is equal to the arrival time t A. The system S is oered the trac = N. The p ON and p OF F probabilities are calculated each time a new slot begins to enable studies with time-varying trac. A random function, which returns a random number ( ), determines whether each individual source change state or not. The y i variable, which can be read by the S block, is set to T (true) when a job arrival from source i occurs. Note that job arrivals occur 2 after a slot starts, because the default, or initial, value for t A is equal to System block Table 2 denes the system S, which consists of N FIFO queues, one for each source, and a shared server. Each queue can hold L jobs. The system state, n i, denes the number of jobs in queue i, including the one currently being served, i = 1; :::; N. The server activities are divided into s of length slots. An activity list x j determines the server activity in slot j, j = 1; :::;. Possible activities in slot j are: executing the polling algorithm (x j =?1), idle (x j = 0) and processing a job from queue i (x j = i). A job's service time is equal to, the slot time. The server executes the polling algorithm at the beginning of a, at time t P, to determine the server activities during that. It takes O overhead slots to perform this task, which means that at most? O jobs from the queues can be processed during a. Table 2 shows that the rst O positions in x j are lled with minus one, and that k is set to the next slot to be scheduled. The longest queue is called ^i, and the number of jobs it contains is denoted by a^i. How many jobs that are selected from the longest queue, n, depends on a^i, the polling limit parameter, and the remaining slots to be scheduled,? k + 1. The parameter denes the maximum number of jobs that can be selected from a queue in each iteration of the algorithm. Two classical polling rules can be implemented: limited (1 < L) or gated ( = L). The remaining jobs to be scheduled in queue ^i, a^i, are updated before the next iteration starts. The procedure above is repeated until all slots have been scheduled (k > ), or until no more jobs remain to be scheduled (a^i = 0). Slots not used are lled with zeros to indicate server idleness. The current slot position within the is denoted by l. A job arrival from source i occurs when yi E is set to true. The job is accepted if there is less than L jobs in queue i. The h im variable, which is needed by the adapter A, records the arrival pattern to the queues in slot m. Job departures take place 2 before a slot ends, at time t D. A job departure from queue i = x l results in the updating of n i and s J, the number of jobs processed. The system performance is dened by the throughput, which is the probability that the server is busy processing jobs from the queues. Note that the maximum value is NL + O? 1 and not
5 when a slot starts, and job arrivals occur 2 after a slot starts. This implies that the queues can at most contain NL? 1 jobs when the polling algorithm is executed. It is clear that the performance of the polling algorithm depends on the and the polling limit. When the oered trac to the system is high, it is better to use longer s, because the relative overhead for executing the algorithm, O=, is then smaller. On the other side, when the oered trac is low, it is better to use shorter s, because a larger fraction of the slots are then used for job processing. The value that minimizes the variance between the queue lengths among the sources is one. This is only valid if the overhead O and the switch over time (time for the server to switch between two queues), do not depend on. It was decided that the should be optimized by the adapter A, primary for the case when = 1. (c) 1 N [5]; 1 L [10]; 0 O [1] # of queues; queue size; overhead slots 0:0 < [1:0] (A; E; ) slot time (x) 0 n i L [0] (A; ) # of jobs, queue i?1 x j N; h im = T; F (A; ); l = : j activity list; history logger; current slot () 1 + O NL + O? 1 [1 + O] (A; A) polling [slots] 1 L [1] maximum jobs selected/queue/iteration (a) 1 i;^i N; 1 j; k NL + O? 1 queue #; slot # within 0:0 t D [? 2]; 0:0 t P [0:0] departure time; polling time 1 n L; 1 m (; A); : a i = ni jobs/iteration; mega slot # (t) 0:0 t [0:0] (A; E; ) current time (p) 0:0 1:0; 0 s J ; s [0] throughput; # of processed jobs, slots w (t = t P ) : polling algorithm w (t = t D ) : job departure r (1 j O) : x j =?1; k = O + 1 c (1 x l N) : a i = n i ; ^i = maxargi a i fi = x l ; n i = n i? 1; s J = s J + 1g r (a^i > 0) ^ (k ) : f s = s + 1; = s J=s n = min(a^i ; ;? k + 1) l = l + 1; m = m + 1; t D = t + r (k j k + n? 1) : x j = ^i k = k + n; a^i = a^i? n; ^i = maxargi a i g r (k j ) : x j = 0; l = 1; t P = t + w (yi E = T ) _ (yi E = F ) : job arrivals c (yi E = T ) : n i = max(n i + 1; L); h im = yi E Table 2: System block S: N FIFO queues and a shared server. 2.3 Adapter block The ACV method [5], is a general method for system performance optimization. It can be used in the design phase to determine how a system should be designed, or it could be used during the operational phase to dynamically determine how the system should be controlled to optimize its performance. The method continuously investigates the performance of simulation models running in parallel with the real system under identical environmental conditions, as the real system, to nd
6 In this application, simulation models of the system S are executed in parallel, with the system, to optimize the server throughput. These simulation models are driven by exactly the same job arrival streams that have aected the system. It is the h im variable that provides the simulations with the job arrival streams. The simulation models are identical except for the polling algorithm used. This means that, by comparing the performance of the simulation models, a better than the one currently used by the system can be found. It takes several s to perform one iteration of this optimization procedure. Table 3 denes the adapter A, which consists of three activities performed during a mega. At time t 1, which occurs after the polling algorithm has executed, the number of jobs in the system queues are stored in a i ; the current slot in the mega, m S, is initialized; and the execution times are set. The start time for the next mega is stored in t 1. The length of a mega is + = 1 s of length 1 slots, where is the time it takes to perform the second activity, the simulations. At time t 2, which occurs when s has passed since time t 1, the performance of s, in this case = 3, the current 1, one shorter 2, and one longer 3, are investigated. The length of the alternative s depend on. The sim procedure takes the n, the simulation length 1, the initial system state a i, and the arrival pattern stored in h im, to compute the throughput n. The best procedure returns the best, ^. It approximates the ( 1 ; 1 ), ( 2 ; 2 ) and ( 3 ; 3 ) coordinates by a straight line, using the least squares method, if no single best was found. The longer, 3, is selected if the line has a positive slope; otherwise, the shorter is preferred if the slope is negative or if the line is horizontal. This means that the shorter is selected if 1 = 2 = 3. At time t 3, i.e. when slots has passed after time t 2, the selected can be used by the system S. (c) 3 [3]; 0 [10] # of simulation models; decision time [slots] : (a) 0:0 t 1 []; 0:0 t 2 ; t 3 ; a i = n S i execution times; # of jobs, queue i n ; ^ = : S ; 0:0 n 1:0 ; throughput 1 n ; m = : m S simulation #; mega slot # () 1 < [4]; 0:0 < [0:3] factor; alternative factor w (t S = t 1 ) : part one w (t S = t 2 ) : part two a i = n S i ; ms = 1; 1 = S 1 = S ; 2 = max( 1? 1 ; min( S )) t 1 = t S + ( + = 1 ) 1 S 3 = max( ; max( S )) t 2 = t S + 1 S r (1 n 3) : sim( n ; 1 ; a i ; h S im ; n) t 3 = t 2 +? 2 best( n ; n ; ^) w (t S = t 3 ) : part three S = ^ Table 3: Adapter block A: implements the ACV method.
7 The ACV method applied to the resource sharing application described in Section 2 was evaluated using simulation technique. To be able to get accurate results the simulations were executed for an extensive amount of times, and presented in the graphs below. The application model was initialized with the default values, specied in the tables in Section 2. In the simulations some of these parameters were altered, one or two at the time while the rest were kept at their default values. In this way it is possible to see the inuence of the individual parameters on the performance of the polling system. In general the new adaptive approach gives very good results compared to dierent static approaches. In the following these results are discussed and analyzed rho=n throughput rho= rho= rho=0.8 rho=0.9 probability Figure 3: The throughput versus for dierent loads (C 2 = 10), and the probability density function for the ACV method operated under the same conditions. 3.1 Steady state performance Figure 3 shows the throughput as a function of the, for three dierent trac loads. The three curves represent the system throughput for a relatively low load ( = 0:8), at presumed working load ( = 0:9) and at overload ( = N, the number of sources). All the results shown here have C 2 equals 10, the default value. As could be seen, the throughput for the system rises for longer s initially, due to the fact that there are more jobs waiting in the queues at the beginning of each than the length of the. As the s get longer there are not enough jobs in the queues to ll up a whole, so the system is hence forced to make plans for a whole without jobs to ll the last service slots within that. For the overload case, the throughput raises until it reaches the maximum. this point the throughput could be calculated as?o = NL?O NL = 0:98, shown in Figure 3. The lower part of Figure 3 shows the probability density function (pdf) of the s used while the At
8 C^2=1 throughput C^2=10 C^2= probability C^2= C^2=10 C^2= Figure 4: The throughput versus for dierent burstiness ( = 0:9), and the probability density function for the ACV method operated under the same conditions. ACV method was running under the same trac loads. The high probability of low length usage coincide with the highest throughput for each trac case respectively. This is, of course, the manner expected for a dynamic method aimed to optimize the throughput. The shape of the pdf is somewhat irregular, due to the fact that the only could be changed by steps,. For the overload case, i.e. job arrival in every slot, the pdf curve is not shown, however it has all the density in the equals NL. This is, however, an easier optimization problem since there is no stochastic behavior in the arrivals of jobs, i.e. the throughput is a monotone function of the. The burstiness of the arrival trac is also a factor that has an impact of the performance. This is shown in Figure 4, where the throughput is shown for three dierent settings of C 2, i.e. 1, 10 and 100. All three curves have the same load, in this case = 0:9, however the behavior is similar for other loads. As could be seen, the throughput decreases with increased burstiness, which is to be expected. The decrease is however rather substantial and the throughput is almost halved, for longer s, each time C 2 is increased a factor 10. This is due to the fact that for burstier trac patterns, there is a higher probability that the queues are empty when the polling algorithm is executed and hence a whole is scheduled without any jobs. This has more grave consequences for longer s. The lower part of Figure 4, which as above, shows the pdf for the has a slight tilt to lower s. This depends on the best procedure in Table 3, which gives priority to short s. The throughput for the ACV method is shown in Figures 3-4 as straight lines for each parameter combination. As could be seen, independent of the initial, the performance for the ACV method is almost identical to the throughput of the optimal. The ACV method has its advantages for trac patterns with smaller C 2, for the parameter settings shown. The performance
9 , which is discussed below. 3.2 Transient performance An important and essential issue is how the method reacts to sudden changes in the trac conditions. This is discussed and shown in the following. First the impact of a wrong chosen initial parameter setting for the is shown. As an extreme, the max and min values have been chosen as initial starting points. As shown in Figure 5 the method rather swiftly adjusts to a value close to the optimum (compare the curve for = 0:9 (C 2 =10) in Figure 3) time Figure 5: The versus time for two dierent initial settings of, where the adaptiveness of the ACV method is shown. In the upper curve the initial was set to its maximal value (NL + O? 1) and for the lower curve to its minimum value (1 + O). The impact of the value is clearly shown in this graph. Obviously, the initial NL is too large, hence it should at the next decision be decreased to NL? NL 1 which is shown in the gure. To further emphasize the dynamic behavior of the method, two cases where the trac changes its characteristics by steps are introduced. In the rst case, shown in Figure 6, the trac changes its mean arrival rate from its normal conditions ( = 0:9) to an overload condition at time instant 5000 and then back to normal conditions again at time instant This is to demonstrate how a sudden increase in trac intensity, restricted in time, is handled by the method. As could be seen, the throughput for the ACV method dramatically increases when the arrival intensity is increased compared to the optimal value (shown by the dashed line). When the trac alters back to normal conditions it takes some time for the method to change the to a new optimum value, as shown in Figure 6. During this time there are not a sucient number 1 The, in this case, only alternative investigated is? = NL? NL = 35.
10 throughput ACV static time x ACV static time x 10 4 Figure 6: The throughput for the ACV method and the optimal static case for a sudden change in (0:8! N! 0:8), and the used by these. (C 2 = 10) of jobs to ll the long s, and hence the throughput decreases substantially. However, after a short while the method has once again adapted to the new circumstances and the throughput is back to its origin. This, rather fast adjustment in the could be looked upon in the lower part of Figure 6. The second case consists of a change in the characteristic of the trac pattern, i.e. the load ( = 0:9) is unchanged while C 2 is altered from C 2 = 1 to C 2 = 100 at time instant 5000 and then back to normal conditions again at time instant As shown in Figure 7 the throughput performance for the ACV method (solid line) is as good as identical with the optimal throughput (dashed line) for the initial trac conditions, however after the change in the burstiness (C 2 ) the ACV method has an improved performance compared to the reference case. As for the change in the load () the ACV method very quickly adopts to the new conditions and gives a substantial improvement in total throughput. The rapid adjustment could be seen in the lower part of Figure 7, where the actual used by the system is shown. The edges, at the changes in the trac characteristics, are very distinct, which shows that the method is very dynamic without losing consistency. 3.3 General remarks So far nothing have been mentioned about the eect that the polling limit parameter has on the results. All results shown are evaluated using the limited strategy with = 1. Investigations have shown that the two strategies, limited ( = 1) and gated ( = L), have almost identical throughput characteristics. If they dier, it is only by a small fraction in favour of the limited strategy. The inuence of the value is o less importance for high C 2 values. The number of simulation models investigated in parallel,, was set to three during the experiments reported on. This number
11 throughput ACV 0.5 static time x static ACV time x 10 4 Figure 7: The throughput for the ACV method and the optimal static case for a sudden change in C 2 (1! 100! 1), and the used by these. ( = 0:9) could if desired be enlarged, which have the potential to increase the performance, especially the transient performance. However, this potentially enhanced performance have to be paid for by heavier calculations and thereby usually higher O values. Investigations, which are not shown in this paper due to space limitation, have indicated that there exist a trade o between small and large values. The outline from these studies is that a low value should be used for varying trac conditions, to optimize the transient behavior. While a large value would give a good steady state performance and hence be used in the design case. 4 Conclusions A new adaptive method to optimize dynamic systems, ACV, have been introduced. It has been applied to a resource sharing algorithm based on polling. The ACV method could however be applied to many dierent systems within the telecommunication eld as well as outside. The method is applied to a polling system, which is described by a new mathematical model formalism (MM). The formalism is designed to be compact, exact and easy to read and understand, making it easier to repeat experiments reported in technical publications. Extensive performance evaluations have been carried out and reported. The steady state performance of the ACV method gives a throughput close to that of the optimal static for the polling algorithm. The method was shown to rapidly adapt to changes in the environment, in this case, the mean load and burstiness of the arrival process. This results in an improved overall throughput performance. The main advantage of the ACV method is that no assumptions have to be made about the eect that the environment has upon the system. For queueing systems this would mean the arrival and service processes. In this way, a lot of time could be saved since
12 References [1] J. M. Karlsson, H.G. Perros and I. Viniotis,\Adaptive Polling Schemes for an ATM Bus with Bursty Arrivals', Computer Networks and ISDN Systems, Vol. 24, No. 1, [2] O. J. Boxma, H. Levy and J. A. Westrate, \Optimization of Polling Systems", in: King, Mitrani, Pooley, PERFORMANCE'90 (North Holland, Amsterdam, 1990), [3] A. Svensson, "The Mathematical Model Formalism", in preparation. [4] J. M. Karlsson, "Exact and Approximate Analytical Solutions of an ATM Buer Queueing Model - a Comparison", 2nd International Conference on Networks, paper E1.1, Singapore, [5] A. Svensson, "The Adaptive Cross Validation Method -Design and Control of Communication Systems", submitted for publication.
Multiplicative Multifractal Modeling of. Long-Range-Dependent (LRD) Trac in. Computer Communications Networks. Jianbo Gao and Izhak Rubin
Multiplicative Multifractal Modeling of Long-Range-Dependent (LRD) Trac in Computer Communications Networks Jianbo Gao and Izhak Rubin Electrical Engineering Department, University of California, Los Angeles
More informationThe M/G/1 FIFO queue with several customer classes
The M/G/1 FIFO queue with several customer classes Boxma, O.J.; Takine, T. Published: 01/01/2003 Document Version Publisher s PDF, also known as Version of Record (includes final page, issue and volume
More informationBounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol.
Bounding the End-to-End Response imes of asks in a Distributed Real-ime System Using the Direct Synchronization Protocol Jun Sun Jane Liu Abstract In a distributed real-time system, a task may consist
More informationOptimal Rejuvenation for. Tolerating Soft Failures. Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi.
Optimal Rejuvenation for Tolerating Soft Failures Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi Abstract In the paper we address the problem of determining the optimal time
More informationScheduling I. Today Introduction to scheduling Classical algorithms. Next Time Advanced topics on scheduling
Scheduling I Today Introduction to scheduling Classical algorithms Next Time Advanced topics on scheduling Scheduling out there You are the manager of a supermarket (ok, things don t always turn out the
More informationClock-driven scheduling
Clock-driven scheduling Also known as static or off-line scheduling Michal Sojka Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Control Engineering November 8, 2017
More informationPart I Stochastic variables and Markov chains
Part I Stochastic variables and Markov chains Random variables describe the behaviour of a phenomenon independent of any specific sample space Distribution function (cdf, cumulative distribution function)
More informationA discrete-time priority queue with train arrivals
A discrete-time priority queue with train arrivals Joris Walraevens, Sabine Wittevrongel and Herwig Bruneel SMACS Research Group Department of Telecommunications and Information Processing (IR07) Ghent
More informationCPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017
CPSC 531: System Modeling and Simulation Carey Williamson Department of Computer Science University of Calgary Fall 2017 Motivating Quote for Queueing Models Good things come to those who wait - poet/writer
More informationReal-Time Systems. Event-Driven Scheduling
Real-Time Systems Event-Driven Scheduling Hermann Härtig WS 2018/19 Outline mostly following Jane Liu, Real-Time Systems Principles Scheduling EDF and LST as dynamic scheduling methods Fixed Priority schedulers
More informationBounded Delay for Weighted Round Robin with Burst Crediting
Bounded Delay for Weighted Round Robin with Burst Crediting Sponsor: Sprint Kert Mezger David W. Petr Technical Report TISL-0230-08 Telecommunications and Information Sciences Laboratory Department of
More informationReal-Time Systems. Event-Driven Scheduling
Real-Time Systems Event-Driven Scheduling Marcus Völp, Hermann Härtig WS 2013/14 Outline mostly following Jane Liu, Real-Time Systems Principles Scheduling EDF and LST as dynamic scheduling methods Fixed
More informationHow to deal with uncertainties and dynamicity?
How to deal with uncertainties and dynamicity? http://graal.ens-lyon.fr/ lmarchal/scheduling/ 19 novembre 2012 1/ 37 Outline 1 Sensitivity and Robustness 2 Analyzing the sensitivity : the case of Backfilling
More informationDiscrete-event simulations
Discrete-event simulations Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/elt-53606/ OUTLINE: Why do we need simulations? Step-by-step simulations; Classifications;
More informationPerformance Evaluation of Queuing Systems
Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems
More informationA POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS
A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS J. Anselmi 1, G. Casale 2, P. Cremonesi 1 1 Politecnico di Milano, Via Ponzio 34/5, I-20133 Milan, Italy 2 Neptuny
More information2 optimal prices the link is either underloaded or critically loaded; it is never overloaded. For the social welfare maximization problem we show that
1 Pricing in a Large Single Link Loss System Costas A. Courcoubetis a and Martin I. Reiman b a ICS-FORTH and University of Crete Heraklion, Crete, Greece courcou@csi.forth.gr b Bell Labs, Lucent Technologies
More informationQueueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "
Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals
More informationLecture 6. Real-Time Systems. Dynamic Priority Scheduling
Real-Time Systems Lecture 6 Dynamic Priority Scheduling Online scheduling with dynamic priorities: Earliest Deadline First scheduling CPU utilization bound Optimality and comparison with RM: Schedulability
More information`First Come, First Served' can be unstable! Thomas I. Seidman. Department of Mathematics and Statistics. University of Maryland Baltimore County
revision2: 9/4/'93 `First Come, First Served' can be unstable! Thomas I. Seidman Department of Mathematics and Statistics University of Maryland Baltimore County Baltimore, MD 21228, USA e-mail: hseidman@math.umbc.edui
More informationTOWARDS BETTER MULTI-CLASS PARAMETRIC-DECOMPOSITION APPROXIMATIONS FOR OPEN QUEUEING NETWORKS
TOWARDS BETTER MULTI-CLASS PARAMETRIC-DECOMPOSITION APPROXIMATIONS FOR OPEN QUEUEING NETWORKS by Ward Whitt AT&T Bell Laboratories Murray Hill, NJ 07974-0636 March 31, 199 Revision: November 9, 199 ABSTRACT
More informationChe-Wei Chang Department of Computer Science and Information Engineering, Chang Gung University
Che-Wei Chang chewei@mail.cgu.edu.tw Department of Computer Science and Information Engineering, Chang Gung University } 2017/11/15 Midterm } 2017/11/22 Final Project Announcement 2 1. Introduction 2.
More informationScheduling I. Today. Next Time. ! Introduction to scheduling! Classical algorithms. ! Advanced topics on scheduling
Scheduling I Today! Introduction to scheduling! Classical algorithms Next Time! Advanced topics on scheduling Scheduling out there! You are the manager of a supermarket (ok, things don t always turn out
More informationSimulation. Where real stuff starts
1 Simulation Where real stuff starts ToC 1. What is a simulation? 2. Accuracy of output 3. Random Number Generators 4. How to sample 5. Monte Carlo 6. Bootstrap 2 1. What is a simulation? 3 What is a simulation?
More informationReal-Time and Embedded Systems (M) Lecture 5
Priority-driven Scheduling of Periodic Tasks (1) Real-Time and Embedded Systems (M) Lecture 5 Lecture Outline Assumptions Fixed-priority algorithms Rate monotonic Deadline monotonic Dynamic-priority algorithms
More informationCSE 380 Computer Operating Systems
CSE 380 Computer Operating Systems Instructor: Insup Lee & Dianna Xu University of Pennsylvania, Fall 2003 Lecture Note 3: CPU Scheduling 1 CPU SCHEDULING q How can OS schedule the allocation of CPU cycles
More informationEE 368. Weeks 3 (Notes)
EE 368 Weeks 3 (Notes) 1 State of a Queuing System State: Set of parameters that describe the condition of the system at a point in time. Why do we need it? Average size of Queue Average waiting time How
More informationLink Models for Circuit Switching
Link Models for Circuit Switching The basis of traffic engineering for telecommunication networks is the Erlang loss function. It basically allows us to determine the amount of telephone traffic that can
More information[4] T. I. Seidman, \\First Come First Serve" is Unstable!," tech. rep., University of Maryland Baltimore County, 1993.
[2] C. J. Chase and P. J. Ramadge, \On real-time scheduling policies for exible manufacturing systems," IEEE Trans. Automat. Control, vol. AC-37, pp. 491{496, April 1992. [3] S. H. Lu and P. R. Kumar,
More informationThe Passport Control Problem or How to Keep an Unstable Service System Load Balanced?
The Passport Control Problem or How to Keep an Unstable Service System Load Balanced? A. ITAI Computer Science Department, Technion M. RODEH Computer Science Department, Technion H. SHACHNAI Computer Science
More informationOperations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads
Operations Research Letters 37 (2009) 312 316 Contents lists available at ScienceDirect Operations Research Letters journal homepage: www.elsevier.com/locate/orl Instability of FIFO in a simple queueing
More informationCPU scheduling. CPU Scheduling
EECS 3221 Operating System Fundamentals No.4 CPU scheduling Prof. Hui Jiang Dept of Electrical Engineering and Computer Science, York University CPU Scheduling CPU scheduling is the basis of multiprogramming
More informationTrac of an ATM-SMX in the NCIH. Tung Ouyang and Arne A. Nilsson. Center for Advanced Computing and Communication
Departure Process for Periodic Real-Time Trac of an ATM-SMX in the NCIH Tung Ouyang and Arne A. Nilsson Center for Advanced Computing and Communication Department of Electrical and Computer Engineering
More informationA FAST MATRIX-ANALYTIC APPROXIMATION FOR THE TWO CLASS GI/G/1 NON-PREEMPTIVE PRIORITY QUEUE
A FAST MATRIX-ANAYTIC APPROXIMATION FOR TE TWO CASS GI/G/ NON-PREEMPTIVE PRIORITY QUEUE Gábor orváth Department of Telecommunication Budapest University of Technology and Economics. Budapest Pf. 9., ungary
More informationComputer Systems Modelling
Computer Systems Modelling Computer Laboratory Computer Science Tripos, Part II Michaelmas Term 2003 R. J. Gibbens Problem sheet William Gates Building JJ Thomson Avenue Cambridge CB3 0FD http://www.cl.cam.ac.uk/
More informationVARIANCE REDUCTION IN SIMULATIONS OF LOSS MODELS
VARIANCE REDUCTION IN SIMULATIONS OF LOSS MODELS by Rayadurgam Srikant 1 and Ward Whitt 2 October 20, 1995 Revision: September 26, 1996 1 Coordinated Science Laboratory, University of Illinois, 1308 W.
More informationContents LIST OF TABLES... LIST OF FIGURES... xvii. LIST OF LISTINGS... xxi PREFACE. ...xxiii
LIST OF TABLES... xv LIST OF FIGURES... xvii LIST OF LISTINGS... xxi PREFACE...xxiii CHAPTER 1. PERFORMANCE EVALUATION... 1 1.1. Performance evaluation... 1 1.2. Performance versus resources provisioning...
More informationScheduling Slack Time in Fixed Priority Pre-emptive Systems
Scheduling Slack Time in Fixed Priority Pre-emptive Systems R.I.Davis Real-Time Systems Research Group, Department of Computer Science, University of York, England. ABSTRACT This report addresses the problem
More informationSubmitted to IEEE Transactions on Computers, June Evaluating Dynamic Failure Probability for Streams with. (m; k)-firm Deadlines
Submitted to IEEE Transactions on Computers, June 1994 Evaluating Dynamic Failure Probability for Streams with (m; k)-firm Deadlines Moncef Hamdaoui and Parameswaran Ramanathan Department of Electrical
More informationQueues and Queueing Networks
Queues and Queueing Networks Sanjay K. Bose Dept. of EEE, IITG Copyright 2015, Sanjay K. Bose 1 Introduction to Queueing Models and Queueing Analysis Copyright 2015, Sanjay K. Bose 2 Model of a Queue Arrivals
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science
MASSACHUSETTS INSTITUTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science 6.262 Discrete Stochastic Processes Midterm Quiz April 6, 2010 There are 5 questions, each with several parts.
More informationLecture 20: Reversible Processes and Queues
Lecture 20: Reversible Processes and Queues 1 Examples of reversible processes 11 Birth-death processes We define two non-negative sequences birth and death rates denoted by {λ n : n N 0 } and {µ n : n
More informationSession-Based Queueing Systems
Session-Based Queueing Systems Modelling, Simulation, and Approximation Jeroen Horters Supervisor VU: Sandjai Bhulai Executive Summary Companies often offer services that require multiple steps on the
More informationQueueing systems. Renato Lo Cigno. Simulation and Performance Evaluation Queueing systems - Renato Lo Cigno 1
Queueing systems Renato Lo Cigno Simulation and Performance Evaluation 2014-15 Queueing systems - Renato Lo Cigno 1 Queues A Birth-Death process is well modeled by a queue Indeed queues can be used to
More informationNATCOR: Stochastic Modelling
NATCOR: Stochastic Modelling Queueing Theory II Chris Kirkbride Management Science 2017 Overview of Today s Sessions I Introduction to Queueing Modelling II Multiclass Queueing Models III Queueing Control
More informationIntroduction to Markov Chains, Queuing Theory, and Network Performance
Introduction to Markov Chains, Queuing Theory, and Network Performance Marceau Coupechoux Telecom ParisTech, departement Informatique et Réseaux marceau.coupechoux@telecom-paristech.fr IT.2403 Modélisation
More informationCompletion Time in Dynamic PERT Networks 57 job are nished, as well as that the associated service station has processed the same activity of the prev
Scientia Iranica, Vol. 14, No. 1, pp 56{63 c Sharif University of Technology, February 2007 Project Completion Time in Dynamic PERT Networks with Generating Projects A. Azaron 1 and M. Modarres In this
More informationLIMITS FOR QUEUES AS THE WAITING ROOM GROWS. Bell Communications Research AT&T Bell Laboratories Red Bank, NJ Murray Hill, NJ 07974
LIMITS FOR QUEUES AS THE WAITING ROOM GROWS by Daniel P. Heyman Ward Whitt Bell Communications Research AT&T Bell Laboratories Red Bank, NJ 07701 Murray Hill, NJ 07974 May 11, 1988 ABSTRACT We study the
More informationCPU Scheduling. CPU Scheduler
CPU Scheduling These slides are created by Dr. Huang of George Mason University. Students registered in Dr. Huang s courses at GMU can make a single machine readable copy and print a single copy of each
More informationAlgorithm for Characterizing the Superposition of Multiple Heterogeneous Interrupted Bernoulli Processes
A Computationally Efficient Algorithm for Characterizing the Superposition of Multiple Heterogeneous Interrupted Bernoulli Processes K. M. Elsayed H. G. Perras Center for Communications and Signal Processing
More informationQueueing Theory and Simulation. Introduction
Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University, Japan
More informationEDF Scheduling. Giuseppe Lipari May 11, Scuola Superiore Sant Anna Pisa
EDF Scheduling Giuseppe Lipari http://feanor.sssup.it/~lipari Scuola Superiore Sant Anna Pisa May 11, 2008 Outline 1 Dynamic priority 2 Basic analysis 3 FP vs EDF 4 Processor demand bound analysis Generalization
More informationMaximizing throughput in zero-buffer tandem lines with dedicated and flexible servers
Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers Mohammad H. Yarmand and Douglas G. Down Department of Computing and Software, McMaster University, Hamilton, ON, L8S
More informationMultiserver Queueing Model subject to Single Exponential Vacation
Journal of Physics: Conference Series PAPER OPEN ACCESS Multiserver Queueing Model subject to Single Exponential Vacation To cite this article: K V Vijayashree B Janani 2018 J. Phys.: Conf. Ser. 1000 012129
More informationStability, Queue Length and Delay of Deterministic and Stochastic Queueing Networks Cheng-Shang Chang IBM Research Division T.J. Watson Research Cente
Stability, Queue Length and Delay of Deterministic and Stochastic Queueing Networks Cheng-Shang Chang IBM Research Division T.J. Watson Research Center P.O. Box 704 Yorktown Heights, NY 10598 cschang@watson.ibm.com
More informationReal-time Scheduling of Periodic Tasks (1) Advanced Operating Systems Lecture 2
Real-time Scheduling of Periodic Tasks (1) Advanced Operating Systems Lecture 2 Lecture Outline Scheduling periodic tasks The rate monotonic algorithm Definition Non-optimality Time-demand analysis...!2
More informationNetworking = Plumbing. Queueing Analysis: I. Last Lecture. Lecture Outline. Jeremiah Deng. 29 July 2013
Networking = Plumbing TELE302 Lecture 7 Queueing Analysis: I Jeremiah Deng University of Otago 29 July 2013 Jeremiah Deng (University of Otago) TELE302 Lecture 7 29 July 2013 1 / 33 Lecture Outline Jeremiah
More informationBuzen s algorithm. Cyclic network Extension of Jackson networks
Outline Buzen s algorithm Mean value analysis for Jackson networks Cyclic network Extension of Jackson networks BCMP network 1 Marginal Distributions based on Buzen s algorithm With Buzen s algorithm,
More informationPBW 654 Applied Statistics - I Urban Operations Research
PBW 654 Applied Statistics - I Urban Operations Research Lecture 2.I Queuing Systems An Introduction Operations Research Models Deterministic Models Linear Programming Integer Programming Network Optimization
More informationSlides 9: Queuing Models
Slides 9: Queuing Models Purpose Simulation is often used in the analysis of queuing models. A simple but typical queuing model is: Queuing models provide the analyst with a powerful tool for designing
More informationDesign of discrete-event simulations
Design of discrete-event simulations Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2707/ OUTLINE: Discrete event simulation; Event advance design; Unit-time
More informationChapter 6 Queueing Models. Banks, Carson, Nelson & Nicol Discrete-Event System Simulation
Chapter 6 Queueing Models Banks, Carson, Nelson & Nicol Discrete-Event System Simulation Purpose Simulation is often used in the analysis of queueing models. A simple but typical queueing model: Queueing
More informationUniform random numbers generators
Uniform random numbers generators Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2707/ OUTLINE: The need for random numbers; Basic steps in generation; Uniformly
More informationSystem with a Server Subject to Breakdowns
Applied Mathematical Sciences Vol. 7 213 no. 11 539 55 On Two Modifications of E 2 /E 2 /1/m Queueing System with a Server Subject to Breakdowns Michal Dorda VSB - Technical University of Ostrava Faculty
More informationName of the Student:
SUBJECT NAME : Probability & Queueing Theory SUBJECT CODE : MA 6453 MATERIAL NAME : Part A questions REGULATION : R2013 UPDATED ON : November 2017 (Upto N/D 2017 QP) (Scan the above QR code for the direct
More informationLecture 4: Bernoulli Process
Lecture 4: Bernoulli Process Hyang-Won Lee Dept. of Internet & Multimedia Eng. Konkuk University Lecture 4 Hyang-Won Lee 1 / 12 Stochastic Process A stochastic process is a mathematical model of a probabilistic
More informationEDF Scheduling. Giuseppe Lipari CRIStAL - Université de Lille 1. October 4, 2015
EDF Scheduling Giuseppe Lipari http://www.lifl.fr/~lipari CRIStAL - Université de Lille 1 October 4, 2015 G. Lipari (CRIStAL) Earliest Deadline Scheduling October 4, 2015 1 / 61 Earliest Deadline First
More informationExercises Stochastic Performance Modelling. Hamilton Institute, Summer 2010
Exercises Stochastic Performance Modelling Hamilton Institute, Summer Instruction Exercise Let X be a non-negative random variable with E[X ]
More informationSystem Time Distribution of Dynamic Traveling Repairman Problem under the PART-n-TSP Policy
System Time Distribution of Dynamic Traveling Repairman Problem under the PART-n-TSP Policy Jiangchuan Huang and Raja Sengupta Abstract We propose the PART-n-TSP policy for the Dynamic Traveling Repairman
More informationMACHINE DEDICATION UNDER PRODUCT AND PROCESS DIVERSITY. Darius Rohan. IBM Microelectonics Division East Fishkill, NY 12533, U.S.A.
Proceedings of the 1999 Winter Simulation Conference P. A. Farrington, H. B. Nembhard, D. T. Sturrock, and G. W. Evans, eds. MACHINE DEDICATION UNDER PRODUCT AND PROCESS DIVERSITY Darius Rohan IBM Microelectonics
More informationSTEADY-STATE PROBABILITIES FOR SOME QUEUEING SYSTEMS: Part II
STEADY-STATE PROBABILITIES FOR SOME QUEUEING SYSTEMS: Part II Mahmoud Abdel Moety Hussain Faculty of Computers and Informatics Zagazig University Abstract This paper applies the theoretical results presented
More informationM/G/1 and Priority Queueing
M/G/1 and Priority Queueing Richard T. B. Ma School of Computing National University of Singapore CS 5229: Advanced Compute Networks Outline PASTA M/G/1 Workload and FIFO Delay Pollaczek Khinchine Formula
More informationInput-queued switches: Scheduling algorithms for a crossbar switch. EE 384X Packet Switch Architectures 1
Input-queued switches: Scheduling algorithms for a crossbar switch EE 84X Packet Switch Architectures Overview Today s lecture - the input-buffered switch architecture - the head-of-line blocking phenomenon
More informationLecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking
Lecture 7: Simulation of Markov Processes Pasi Lassila Department of Communications and Networking Contents Markov processes theory recap Elementary queuing models for data networks Simulation of Markov
More informationScheduling. Uwe R. Zimmer & Alistair Rendell The Australian National University
6 Scheduling Uwe R. Zimmer & Alistair Rendell The Australian National University References for this chapter [Bacon98] J. Bacon Concurrent Systems 1998 (2nd Edition) Addison Wesley Longman Ltd, ISBN 0-201-17767-6
More informationQueuing Analysis. Chapter Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall
Queuing Analysis Chapter 13 13-1 Chapter Topics Elements of Waiting Line Analysis The Single-Server Waiting Line System Undefined and Constant Service Times Finite Queue Length Finite Calling Problem The
More informationReal-Time Scheduling. Real Time Operating Systems and Middleware. Luca Abeni
Real Time Operating Systems and Middleware Luca Abeni luca.abeni@unitn.it Definitions Algorithm logical procedure used to solve a problem Program formal description of an algorithm, using a programming
More informationChapter 1. Introduction. 1.1 Stochastic process
Chapter 1 Introduction Process is a phenomenon that takes place in time. In many practical situations, the result of a process at any time may not be certain. Such a process is called a stochastic process.
More informationA Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch
A Starvation-free Algorithm For Achieving 00% Throughput in an Input- Queued Switch Abstract Adisak ekkittikul ick ckeown Department of Electrical Engineering Stanford University Stanford CA 9405-400 Tel
More informationCHAPTER 4. Networks of queues. 1. Open networks Suppose that we have a network of queues as given in Figure 4.1. Arrivals
CHAPTER 4 Networks of queues. Open networks Suppose that we have a network of queues as given in Figure 4.. Arrivals Figure 4.. An open network can occur from outside of the network to any subset of nodes.
More informationSimulation of Process Scheduling Algorithms
Simulation of Process Scheduling Algorithms Project Report Instructor: Dr. Raimund Ege Submitted by: Sonal Sood Pramod Barthwal Index 1. Introduction 2. Proposal 3. Background 3.1 What is a Process 4.
More informationIEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 5, MAY
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 5, MAY 1998 631 Centralized and Decentralized Asynchronous Optimization of Stochastic Discrete-Event Systems Felisa J. Vázquez-Abad, Christos G. Cassandras,
More informationB. Maddah INDE 504 Discrete-Event Simulation. Output Analysis (1)
B. Maddah INDE 504 Discrete-Event Simulation Output Analysis (1) Introduction The basic, most serious disadvantage of simulation is that we don t get exact answers. Two different runs of the same model
More informationIntroduction to Queueing Theory
Introduction to Queueing Theory Raj Jain Washington University in Saint Louis Jain@eecs.berkeley.edu or Jain@wustl.edu A Mini-Course offered at UC Berkeley, Sept-Oct 2012 These slides and audio/video recordings
More informationStochastic Optimization for Undergraduate Computer Science Students
Stochastic Optimization for Undergraduate Computer Science Students Professor Joongheon Kim School of Computer Science and Engineering, Chung-Ang University, Seoul, Republic of Korea 1 Reference 2 Outline
More informationλ, µ, ρ, A n, W n, L(t), L, L Q, w, w Q etc. These
Queuing theory models systems with servers and clients (presumably waiting in queues). Notation: there are many standard symbols like λ, µ, ρ, A n, W n, L(t), L, L Q, w, w Q etc. These represent the actual
More informationChapter 2 Queueing Theory and Simulation
Chapter 2 Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University,
More informationClass 11 Non-Parametric Models of a Service System; GI/GI/1, GI/GI/n: Exact & Approximate Analysis.
Service Engineering Class 11 Non-Parametric Models of a Service System; GI/GI/1, GI/GI/n: Exact & Approximate Analysis. G/G/1 Queue: Virtual Waiting Time (Unfinished Work). GI/GI/1: Lindley s Equations
More information7 Variance Reduction Techniques
7 Variance Reduction Techniques In a simulation study, we are interested in one or more performance measures for some stochastic model. For example, we want to determine the long-run average waiting time,
More informationLink Models for Packet Switching
Link Models for Packet Switching To begin our study of the performance of communications networks, we will study a model of a single link in a message switched network. The important feature of this model
More informationContents Preface The Exponential Distribution and the Poisson Process Introduction to Renewal Theory
Contents Preface... v 1 The Exponential Distribution and the Poisson Process... 1 1.1 Introduction... 1 1.2 The Density, the Distribution, the Tail, and the Hazard Functions... 2 1.2.1 The Hazard Function
More informationCisco [ advertises 64K cells output buers per link for its LightStream 00 ATM switch. Stratacom provides 64K cells
Analysis of Queueing Displacement Using Switch Port Speedup Israel Cidon y Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 3000, Israel cidon@ee.technion.ac.il Moshe
More informationModule 5: CPU Scheduling
Module 5: CPU Scheduling Basic Concepts Scheduling Criteria Scheduling Algorithms Multiple-Processor Scheduling Real-Time Scheduling Algorithm Evaluation 5.1 Basic Concepts Maximum CPU utilization obtained
More information1. Introduction. Consider a single cell in a mobile phone system. A \call setup" is a request for achannel by an idle customer presently in the cell t
Heavy Trac Limit for a Mobile Phone System Loss Model Philip J. Fleming and Alexander Stolyar Motorola, Inc. Arlington Heights, IL Burton Simon Department of Mathematics University of Colorado at Denver
More informationReadings: Finish Section 5.2
LECTURE 19 Readings: Finish Section 5.2 Lecture outline Markov Processes I Checkout counter example. Markov process: definition. -step transition probabilities. Classification of states. Example: Checkout
More informationChapter 6: CPU Scheduling
Chapter 6: CPU Scheduling Basic Concepts Scheduling Criteria Scheduling Algorithms Multiple-Processor Scheduling Real-Time Scheduling Algorithm Evaluation 6.1 Basic Concepts Maximum CPU utilization obtained
More informationNon Markovian Queues (contd.)
MODULE 7: RENEWAL PROCESSES 29 Lecture 5 Non Markovian Queues (contd) For the case where the service time is constant, V ar(b) = 0, then the P-K formula for M/D/ queue reduces to L s = ρ + ρ 2 2( ρ) where
More informationExercises Solutions. Automation IEA, LTH. Chapter 2 Manufacturing and process systems. Chapter 5 Discrete manufacturing problems
Exercises Solutions Note, that we have not formulated the answers for all the review questions. You will find the answers for many questions by reading and reflecting about the text in the book. Chapter
More informationMassachusetts Institute of Technology
.203J/6.28J/3.665J/5.073J/6.76J/ESD.26J Quiz Solutions (a)(i) Without loss of generality we can pin down X at any fixed point. X 2 is still uniformly distributed over the square. Assuming that the police
More informationA tandem queueing model with coupled processors
A tandem queueing model with coupled processors Jacques Resing Department of Mathematics and Computer Science Eindhoven University of Technology P.O. Box 513 5600 MB Eindhoven The Netherlands Lerzan Örmeci
More information