On the Properties of a Tree-Structured Server Process

Similar documents
Series of Error Terms for Rational Approximations of Irrational Numbers

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS

3 Integration and Expectation

COS597D: Information Theory in Computer Science October 19, Lecture 10

On the mean connected induced subgraph order of cographs

HEAVY-TRAFFIC EXTREME-VALUE LIMITS FOR QUEUES

ON NEARLY SEMIFREE CIRCLE ACTIONS

Solving a linear equation in a set of integers II

ON THE REGULARITY OF SAMPLE PATHS OF SUB-ELLIPTIC DIFFUSIONS ON MANIFOLDS

Graphs with few total dominating sets

Standard forms for writing numbers

Bootstrap Percolation on Periodic Trees

Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018

Copyright 2013 Springer Science+Business Media New York

LOW-density parity-check (LDPC) codes were invented

MA008/MIIZ01 Design and Analysis of Algorithms Lecture Notes 3

On the static assignment to parallel servers

LIMITS FOR QUEUES AS THE WAITING ROOM GROWS. Bell Communications Research AT&T Bell Laboratories Red Bank, NJ Murray Hill, NJ 07974

Irregular Sets of Integers Generated by the Greedy Algorithm

Testing Problems with Sub-Learning Sample Complexity

COUNTING NUMERICAL SEMIGROUPS BY GENUS AND SOME CASES OF A QUESTION OF WILF

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems

Welsh s problem on the number of bases of matroids

Lecture 11: Polar codes construction

On the Set of Limit Points of Normed Sums of Geometrically Weighted I.I.D. Bounded Random Variables

arxiv:chao-dyn/ v1 3 Jul 1995

Convergence Rates for Renewal Sequences

On the Distribution of Multiplicative Translates of Sets of Residues (mod p)

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees

Some Background Math Notes on Limsups, Sets, and Convexity

Information measures in simple coding problems

Algorithm Analysis Recurrence Relation. Chung-Ang University, Jaesung Lee

Title. Citation Information Processing Letters, 112(16): Issue Date Doc URLhttp://hdl.handle.net/2115/ Type.

Oscillation Criteria for Delay Neutral Difference Equations with Positive and Negative Coefficients. Contents

k-protected VERTICES IN BINARY SEARCH TREES

Self-normalized laws of the iterated logarithm

arxiv: v1 [cs.lo] 16 Jul 2017

CHAPTER III THE PROOF OF INEQUALITIES

Infinite Continued Fractions

Introduction to Empirical Processes and Semiparametric Inference Lecture 12: Glivenko-Cantelli and Donsker Results

MARKING A BINARY TREE PROBABILISTIC ANALYSIS OF A RANDOMIZED ALGORITHM

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems

3 The language of proof

Sums of Squares. Bianca Homberg and Minna Liu

Chapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1.

arxiv: v2 [cs.ds] 3 Oct 2017

On the decay of elements of inverse triangular Toeplitz matrix

Lecture Notes on Inductive Definitions

5 Measure theory II. (or. lim. Prove the proposition. 5. For fixed F A and φ M define the restriction of φ on F by writing.

ERRORS AND THE TREATMENT OF DATA

Erdös-Ko-Rado theorems for chordal and bipartite graphs

LECTURE 15: COMPLETENESS AND CONVEXITY

2. Variance and Higher Moments

The Number of Non-Zero (mod k) Dominating Sets of Some Graphs

Maximal and Maximum Independent Sets In Graphs With At Most r Cycles

ACO Comprehensive Exam 19 March Graph Theory

Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall.

THE HEAVY-TRAFFIC BOTTLENECK PHENOMENON IN OPEN QUEUEING NETWORKS. S. Suresh and W. Whitt AT&T Bell Laboratories Murray Hill, New Jersey 07974

Valid Inequalities and Restrictions for Stochastic Programming Problems with First Order Stochastic Dominance Constraints

Explicit Bounds Concerning Non-trivial Zeros of the Riemann Zeta Function

Proof Terminology. Technique #1: Direct Proof. Learning objectives. Proof Techniques (Rosen, Sections ) Direct Proof:

Unconstrained optimization

COMPLEX ANALYSIS Spring 2014

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes

Computing and Communicating Functions over Sensor Networks

Math 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction

Asymptotics for Polling Models with Limited Service Policies

8 Primes and Modular Arithmetic

Scattered Data Interpolation with Polynomial Precision and Conditionally Positive Definite Functions

Comparing continuous and discrete versions of Hilbert s thirteenth problem

MATH 324 Summer 2011 Elementary Number Theory. Notes on Mathematical Induction. Recall the following axiom for the set of integers.

LECTURE 10: REVIEW OF POWER SERIES. 1. Motivation

A Complete Proof of the Robbins Conjecture

Theorem 1.7 [Bayes' Law]: Assume that,,, are mutually disjoint events in the sample space s.t.. Then Pr( )

COMPUTING π(x): THE MEISSEL-LEHMER METHOD. J. C. Lagarias AT&T Bell Laboratories Murray Hill, New Jersey

Irredundant Families of Subcubes

On improving matchings in trees, via bounded-length augmentations 1

On the Cost of Worst-Case Coding Length Constraints

The space requirement of m-ary search trees: distributional asymptotics for m 27

Packet #1: Logic & Proofs. Applied Discrete Mathematics

P i [B k ] = lim. n=1 p(n) ii <. n=1. V i :=

A Questionable Distance-Regular Graph

Convexity Properties of Loss and Overflow Functions

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization

21.1 Lower bounds on minimax risk for functional estimation

k-degenerate Graphs Allan Bickle Date Western Michigan University

A misère-play -operator

A Criterion for the Stochasticity of Matrices with Specified Order Relations

Algorithm Analysis Divide and Conquer. Chung-Ang University, Jaesung Lee

Supplementary Notes on Inductive Definitions

DIMACS Technical Report March Game Seki 1

A MATROID EXTENSION RESULT

On the exact bit error probability for Viterbi decoding of convolutional codes

MA103 Introduction to Abstract Mathematics Second part, Analysis and Algebra

Lecture 2. We now introduce some fundamental tools in martingale theory, which are useful in controlling the fluctuation of martingales.

The particle model for the Higgs condensate and the anomalous geometrical diffraction

Efficient Random Assignment with Cardinal and Ordinal Preferences: Online Appendix

Markov Chains and Stochastic Sampling

Growth of Solutions of Second Order Complex Linear Differential Equations with Entire Coefficients

ON THE DENSITY OF TRUTH IN GRZEGORCZYK S MODAL LOGIC

Transcription:

On the Properties of a Tree-Structured Server Process J. Komlos Rutgers University A. Odlyzko L. Ozarow L. A. Shepp AT&T Bell Laboratories Murray Hill, New Jersey 07974 I. INTRODUCTION In this paper we give some partial results about the following process: Let { X 0 (i), i = 0, 1,... } be independent, identically distributed, non-negative integer variables. For j = 1, 2,... we define recursively, X j (i) = (X j 1 ( 2i) 1 ) + + (X j 1 ( 2i + 1 ) 1 ) +, i = 0, 1,... We may think of the { X 0 (. ) } as being the number of customers associated with the leaves of a complete binary tree. At each epoch, the number of customers at each leaf is diminished by one, if it is positive. The customers remaining at each pair of leaves are handed down and collected at the parent node, which now becomes a leaf. We want to study the behavior of X k = X k ( 0 ) as k. This model originally arose as a crude model of the Aloha network as well as of a resource allocation model slightly related to that of [2] and became interesting in its own right. One obvious question is to determine those probability laws governing X 0 for which X k tends to zero as k. In general we might ask what types of limiting behavior can occur. In particular consider the case where X 0 is Poisson with mean λ. While this arrangement bears a superficial resemblance to the tree-structured contention resolution algorithms introduced by Capetenakis [1], there appears to be no real connection. In any event, for Poisson variables we are interested in that value of λ below which X k 0. We find, using the results to follow and extensive numerical calculations, that for λ.999, X k 0, and for λ 1. 001, X k, but have been unable to prove or disprove the tempting conjecture that the critical value of λ is 1. In the sequel we prove three results concerning the limiting behavior of X k.

- 2 - Theorem 1: If the probability distribution of X k approaches a limit X, then either i) Pr [X = 0 ] = 1, i.e. X 0 ii) Pr [X = 2 ] = 1, i.e. X 2 iii) Pr [X < t] = 0 for all t, i.e. X. Furthermore, case ii) only occurs if for all k = 0, 1,..., Pr [X k 2 ] 1. Now for any j, define g j (α) = E [α X j ], where X j is a generic j th generation variable. We shall prove Theorem 2: If for some α > 2 and some j, g j (α) satisfies g j (α) < (α 1 ) 2, then a. s. X k > 0. On the other hand, Theorem 3: If for some j, the mean of X j satisfies E [X j ] > 2, then X k blows up, i.e. a. s. X k >. Corollary to Theorem 3 is a form parallel to that of Theorem 2: Corollary 3a: If for some α < 1 and some j, g j (α) satisfies g j (α) < α 2, then X k blows up. We show also that there is a gap between the hypotheses of Theorems 2 and 3, i.e. there are X 0 satisfying neither hypothesis. We nevertheless think it may be true that one of X k 0, X k, or

- 3 - X k 2, always holds. Proofs of the results. We first prove Theorem 1. Note that if X k approaches a limit, then for all 0 α 1, g k (α) approaches a limit g (α). Now, since X j + 1 (i) = (X j ( 2i) 1 ) + + (X j ( 2i + 1 ) 1 ) +, then for g j (α) = Σ Pr [X j = i] α i, 0 we get the recurrence g j + 1 (α) = g j (α) + (α 1 ) p 2 j, (1) α where p j = Pr [X j = 0 ]. Now if g j (α) g (α) for 0 α 1, then p j p and g (α) = 2 g (α) + (α 1 ) p α. This quadratic equation can be solved to yield g (α) = ( 1 α) p + _ α 2 ± _ 1 α 2 2 α 2 4p α + 4p. (2) If p = 0, this has the solutions g (α) = 0, α 2, corresponding to cases ii) and iii) above. If p = 1, then (2) has solutions g (α) = 1, ( 1 α) 2. The former corresponds to case i), and the latter is spurious (i.e. not increasing and so clearly not a probability generating function). We can further see that case ii) cannot be approached, but can only arise if Pr [X 0 (. ) = 2 ] = 1. To see this, let p j i = P (X j = i) and thinking of j as fixed, set

- 4 - α i = Pr [X j = i], and β i = Pr [X j + 1 = i]. Since rule (1) gives β 2 = 2 (α 0 + α 1 ) α 3 + α 2 2 and since (α 0 + α 1 ) + α 3 1 α 2 we have β 2 2 2 1 α 2 2 + α 2 2 < α 2 if 1 < α 3 2 < 1. Thus if p j2 satisfies 3 1 < p j2 < 1, then p j + 1, 2 < p j2, so that p j2 cannot approach 1 from below. Note also that a solution to equation (2) for which 0 < p < 1 cannot be a generating function. The reason for this is that a generating function, viewed as a function on the complex plane, must have its innermost singularity on the real line (see [3; Section 7.2]). However, since the solution of equation (2) has singularities at α = 2 p ± 2 p (p 1 ), these singularities are complex unless p = 0 or p = 1. Theorem 1 is proven. Now, to prove Theorem 2, assume that for some j and α > 2, g j (α) = θ(α 1 ) 2, where, by the hypothesis of Theorem 2 and the fact that g j (α) > 1 for α > 1, 1 < θ < 1. (3) (α 1 ) 2 Using (1), we get

- 5 - g j + 1 (α) = g j (α) + p j (α 1 ) 2 α (4) = θ(α 1 ) 2 + p j (α 1 ) 2 α = (α 1 ) 2 2 _ θ(α 1 ) + p j, α or since p j < 1 g j + 1 (α) 1 < _ _ θ(α 1 ) + 1 2 g j (α) θ α. The right-hand side is strictly less than 1 for all θ satisfying (3), so that g j (α) 1. Now if g j (α) = 1 + δ, then from (4) since p j 1, g j + 1 (α) _ 1 + δ + α 1 2 α = 1 + α δ 2 = 1 + _ 2 _ δ + _ δ 2 α α 2 = 1 + δ 2 + δ α α 2. Now since α > 2, if δ is sufficiently small, g j + 1 (α) < 1 + ρ δ, for some ρ < 1, hence for all j > j g j (α) < 1 + ρ j j δ. Now

- 6 - g j (α) Pr [X j = 0 ] + α Pr [X j > 0 ] = p j + α( 1 p j ). 1 + ρ j j δ p j + α( 1 p j ), for all j > j or (α 1 ) ( 1 p j ) ρ j j δ (α 1 ) Σ j ( 1 p j ) δ Σ ρ j j j = δ <, 1 ρ so by the Borel-Cantelli lemma Pr [X j > 0 ] 0 a.s. To prove Theorem 3, suppose that E [X j ] = 2 + δ. Since X j + 1 (i) = (X j ( 2i) 1 ) + + (X j ( 2i + 1 ) 1 ) + X j ( 2i) + X j ( 2i + 1 ) 2 E [X j + 1 ] 2E [X j ] 2 = 2 + 2δ. Thus E [X j ] 2 + 2 ( j j) δ, for all j j. Now Var (X j + 1 ) = 2 Var [ (X j 1 ) + ]. But Var [ (X j 1 ) + ] = Var (X j ) + p j ( 1 p j 2E X j ). Since E X j > 2 the last term is < 0, so

- 7 - Var (X j + 1 ) < 2 Var (X j ). Hence Var (X j ) < 2 j j Var (X j ). Since the mean of X j grows, we can apply the Chebyshev inequality to show that for any finite t, for sufficiently large j, Pr [X j < t] k 1 j 2, hence goes to zero. A Borel-Cantelli argument shows X j strongly. To show the equivalence of Theorem 3 and Corollary 3a, note that g j (α) is continuous, at least on the unit disc. Then since E X j = d g dα j (α) α = 1, the function g j (α) α 2 is continuous on [ 0, 1 ], is zero at α = 1 and increasing at that point. Hence it must be negative for some interval including the point α = 1. Therefore E [X j ] > 2 = = > g j (α) < α 2 for some α sufficiently near 1. As for the reverse implication, consider the function h j (α) = _ g j (α). α Clearly h j ( 1 ) = 1. Now h j (α) = g j (α) _ g j (α). α α 2 Also

- 8 - h j (α) = d 2 dα 2 = d dα Σ p j α j 1 (5) 0 Σ ( j 1 ) p j α j 2 0 = Σ ( j 1 )( j 2 ) p j α j 3. 0 Since all the terms in (5) are non-negative, h j (α) is convex. If E X j < 2, then h j ( 1 ) = g j ( 1 ) g j ( 1 ) < 1. 1 1 Thus h j (α), since it is convex must lie above the line α, and we have shown E [X j ] 2 = = > g j (α) α 2, for all α < 1. Therefore Theorem 3 is equivalent to Corollary 3a. II. CONCLUSION We have proved the theorems described in the introduction. In particular, Theorems 2 and 3 applied to a Poisson starting distribution yield that λ < 0. 999 = = > X k 0, and λ > 1. 001 = = > X k. The lower number follows from the fact that g 55 ( 2. 03 ) = 1. 059 < ( 2. 03 1 ) 2 = 1. 0609. The upper value is implied by the fact that E [X 170 ] = 2. 311. The region of uncertainty can be narrowed with more numerical work, but the computations become onerous because of difficulty of dealing with roundoff errors. Our computations were carried out using the multiprecision facilities of the Maple symbolic computation language.

- 9 - It remains to be seen whether any behavior other than that described in Theorem 1 is possible. We finally prove there is a gap between the hypotheses of Theorems 2 and 3, that is there is an X 0 which satisfies neither hypothesis. Nevertheless, it seems likely that the conclusion of Theorem 1 always holds, i.e. either X k 0, X k, or the trivial case X k 2 holds. We have been unable to prove this. To show an example it seems worthwhile to slightly change notation by replacing for each k 0, Y k = (X k 1 ) + so that the recurrence becomes Y k + 1 = (Y k + Y k 1 ) +, k 0. Although X k represents the original notation, calculations become simpler in the Y k notation. Theorems 2 and a slightly stronger version of Theorem 3, become in the Y notation, Theorem 2. If E α Y k α 1 for some α > 2 and k 0, then a. s. Y k > 0. Theorem 3. If E Y k 1 for some k and if Y 0 1, then a. s. Y k >. We will give an example of Y 0 where E α Y k > α 1 for all k and α > 0 but E Y k < 1 for all k. To do this fix 0 < η < 1 and let Y 0 (η) take values 0 and 2 only with probabilities P(Y 0 (η) = 2 ) = η P(Y 0 (η) = 0 ) = 1 η. We will show that for some η, Y 0 (η) lies in the gap. which Let η n be that value of η for which E α Y n (η) is tangent to the line α 1, i.e. there is a value α = α n for

- 10 - E α n Y n (η n ) d Y E α n (η n ) dα = α n 1 = 1 at α = α n. It is easy to verify since E α Y n (η) increases in η for α > 1 that α n in n and η n in n. Denote η = lim η n. For each fixed n, Y k (η n ) 0 as k because of Theorem 2 so that by Theorem 3, E Y k (η n ) < 1 for all k 0, n 0. (6) Since Y k (η n ) Y k (η ) we must have from (6), E Y k (η ) 1 for all k 0 It follows that Y 0 (η ) satisfies neither the hypothesis of Theorem 2 nor 3 and X 0 = Y 0 (η ) + 1 satisfies neither the hypothesis of Theorem 2 nor of Theorem 3. Nevertheless it seems possible that there is no Y 0 for which Y k oscillates, i.e. neither Y k 0 nor Y k (except for Y 0 1). On the other hand, if there is such an example it probably has the following property: E Y k < 1 for all k (7) but if Y 0 > Y 0 in the stochastic sense then Y k. To see that there are Y 0 s with this property, suppose Y 0 ( 0 ) has P(Y 0 ( 0 ) > 1 ) > 0 and (7) holds for Y 0 = Y 0 ( 0 ). Let P(Y 0 ( 1 ) = j) = P(Y 0 ( 0 ) = j) for j > 1 and let P(Y 0 ( 1 ) = 1 ) be as large as possible subject to (7) holding for Y 0 = Y 0 ( 1 ). If Y 0 (n) has been defined, let P(Y 0 (n + 1 ) = j) = P(Y 0 (n) = j) for j > n + 1 and for j < n and let P(Y 0 (n + 1 ) = n + 1 ) be as large as possible subject to (7) holding for Y 0 = Y 0 (n + 1 ). Then we have Y 0 (n) stochastically increases in n say to Y 0 ( ). Since E Y k (n) < 1 for all k and n we must have

- 11 - E Y k ( ) 1 but since P(Y 0 ( 0 ) > 1 ) > 0, we must have E Y k ( ) < 1 for all k. It follows that if Y 0 > Y 0 ( ) then Y 0 > Y 0 (k) for some k and Y k.

REFERENCE [1] J. Capetenakis, Tree Algorithms for packet broadcast channels, IEEE Trans. on Inf. Th., IT-25, Sept. 79 (505-515). [2] M. Fisher, N. Griffeth, L. Guibas, and N. Lynch, Optimal placement of identical resources in a tree, Inform. Comp., to appear. [3] E. C. Titchmarsh, The Theory of Functions, Oxford University Press, (London, 1939).

On the Properties of a Tree-Structured Server Process J. Komlos Rutgers University A. Odlyzko L. Ozarow L. A. Shepp AT&T Bell Laboratories Murray Hill, New Jersey 07974 ABSTRACT Let X 0 be a nonnegative integer-valued random variable and let an independent copy of X 0 be assigned to each leaf of a binary tree of depth k. If X 0 and X 0 are adjacent leaves let X 1 = (X 0 1 ) + + (X 0 1 ) + be assigned to the parent node. In general, if X j and X j, are assigned to adjacent nodes at level j = 0,..., k 1, then X j and X j are, in turn, independent and the value assigned to their parent node is then X j + 1 = (X j 1 ) + + (X j 1 ) +. We ask what is the behavior of X k as k. We give sufficient conditions for X k and for X k 0 and ask whether these are the only nontrivial possibilities. The problem is of interest because it asks for the asymptotics of a non-linear transform which has an expansive term (the + in the sense of addition) and a contractive term (the + s in the sense of positive part).