Logistics. All the course-related information regarding

Similar documents
Input-queued switches: Scheduling algorithms for a crossbar switch. EE 384X Packet Switch Architectures 1

Stability of the Maximum Size Matching

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic

Delay Bounds for Approximate Maximum Weight Matching Algorithms for Input Queued Switches

Advanced Networking Technologies

Greedy weighted matching for scheduling the input-queued switch

I. INTRODUCTION. This work was supported by a Wakerly Stanford Graduate Fellowship and by the Powell Foundation.

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch

Optimal scaling of average queue sizes in an input-queued switch: an open problem

Ergodic Theorems. Samy Tindel. Purdue University. Probability Theory 2 - MA 539. Taken from Probability: Theory and examples by R.

MARKOV PROCESSES. Valerio Di Valerio

µ n 1 (v )z n P (v, )

Dynamic Matching Models

Regularity and optimization

25.1 Ergodicity and Metric Transitivity

CMPSCI 240: Reasoning Under Uncertainty

MAA704, Perron-Frobenius theory and Markov chains.

Examples of Countable State Markov Chains Thursday, October 16, :12 PM

Lecture 10: Powers of Matrices, Difference Equations

Stochastic Processes

Markov Chain Model for ALOHA protocol

LECTURE 3. Last time:

Scheduling with Soft Deadlines for Input Queued Switches

Stochastic Optimization for Undergraduate Computer Science Students

Advanced Computer Networks Lecture 2. Markov Processes

Deadline Aware Scheduling for Input Queued Packet Switches

Uniform random numbers generators

Quiz 1 EE 549 Wednesday, Feb. 27, 2008

Logarithmic Delay for N N Packet Switches Under the Crossbar Constraint

Stochastic optimization Markov Chain Monte Carlo

MAS275 Probability Modelling Exercises

Operational Laws Raj Jain

1 Stat 605. Homework I. Due Feb. 1, 2011

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Analysis of Software Artifacts

STA 624 Practice Exam 2 Applied Stochastic Processes Spring, 2008

Midterm Exam Information Theory Fall Midterm Exam. Time: 09:10 12:10 11/23, 2016

High-dimensional permutations

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads

COMS 4771 Lecture Course overview 2. Maximum likelihood estimation (review of some statistics)

EECS 495: Randomized Algorithms Lecture 14 Random Walks. j p ij = 1. Pr[X t+1 = j X 0 = i 0,..., X t 1 = i t 1, X t = i] = Pr[X t+

Problem set 1. (c) Is the Ford-Fulkerson algorithm guaranteed to produce an acyclic maximum flow?

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1

Lecture Notes 7 Random Processes. Markov Processes Markov Chains. Random Processes

variance of independent variables: sum of variances So chebyshev predicts won t stray beyond stdev.

Service Control Policies for Packet Switches with Target Output Traffic Profiles

Computer Engineering II Solution to Exercise Sheet Chapter 12

The Markov Chain Monte Carlo Method

Packet Loss Analysis of Load-Balancing Switch with ON/OFF Input Processes

MATH37012 Week 10. Dr Jonathan Bagley. Semester

A Load-Balanced Switch with an Arbitrary Number of Linecards

2. Transience and Recurrence

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking

A Load-Balanced Switch with an Arbitrary Number of Linecards

F (x) = P [X x[. DF1 F is nondecreasing. DF2 F is right-continuous

Note that in the example in Lecture 1, the state Home is recurrent (and even absorbing), but all other states are transient. f ii (n) f ii = n=1 < +

Fast Matching Algorithms for Repetitive Optimization: An Application to Switch Scheduling

Statistics 433 Practice Final Exam: Cover Sheet and Marking Sheet

Lecture 4 Noisy Channel Coding

Markov Chains and MCMC

Transience: Whereas a finite closed communication class must be recurrent, an infinite closed communication class can be transient:

Discrete random structures whose limits are described by a PDE: 3 open problems

Part I Stochastic variables and Markov chains

1.225 Transportation Flow Systems Quiz (December 17, 2001; Duration: 3 hours)

Matrix analytic methods. Lecture 1: Structured Markov chains and their stationary distribution

Solutions to Homework Discrete Stochastic Processes MIT, Spring 2011

1 Continuous-time chains, finite state space

Technical Appendix for: When Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance

CS 798: Homework Assignment 3 (Queueing Theory)

MATH 450: Mathematical statistics

Winter 2019 Math 106 Topics in Applied Mathematics. Lecture 9: Markov Chain Monte Carlo

Chapter 5. Continuous-Time Markov Chains. Prof. Shun-Ren Yang Department of Computer Science, National Tsing Hua University, Taiwan

ECE-517: Reinforcement Learning in Artificial Intelligence. Lecture 4: Discrete-Time Markov Chains

Recap. Probability, stochastic processes, Markov chains. ELEC-C7210 Modeling and analysis of communication networks

Random Walk on a Graph

21-301, Spring 2019 Homework 4 Solutions

Lecture 14: Random Walks, Local Graph Clustering, Linear Programming

Alternative Characterization of Ergodicity for Doubly Stochastic Chains

Asymptotic Pure State Transformations

Introduction to Queueing Theory

Statistics 150: Spring 2007

CS261: Problem Set #3

MATH 564/STAT 555 Applied Stochastic Processes Homework 2, September 18, 2015 Due September 30, 2015

(b) What is the variance of the time until the second customer arrives, starting empty, assuming that we measure time in minutes?

The Transition Probability Function P ij (t)

TCOM 501: Networking Theory & Fundamentals. Lecture 6 February 19, 2003 Prof. Yannis A. Korilis

Stability of the two queue system

Stability and Asymptotic Optimality of h-maxweight Policies

Networking = Plumbing. Queueing Analysis: I. Last Lecture. Lecture Outline. Jeremiah Deng. 29 July 2013

Achieving 100% throughput in reconfigurable optical networks

DISTRIBUTED THROUGHPUT OPTIMAL SCHEDULING FOR WIRELESS NETWORKS. A Thesis by. Shuang Xia

Fairness and Optimal Stochastic Control for Heterogeneous Networks

Machine Learning and Computational Statistics, Spring 2017 Homework 2: Lasso Regression

1 Ways to Describe a Stochastic Process

SMSTC (2007/08) Probability.

Math 166: Topics in Contemporary Mathematics II

Technical Appendix for: When Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance

The Theory behind PageRank

Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic

Transcription:

Logistics All the course-related information regarding - grading - office hours - handouts, announcements - class project: this is required for 384Y is posted on the class website Please take a look at the website right away, esp re project deadlines - some past projects and project reports are also posted Please subscribe to the class mailing list Note: the class won t be on SITN (instruction is live) EE384Y Packet Switch Architectures II 1

Overview of Topics Review Stability of switch scheduling algorithms Stability of the Max Weight Matching Algorithm EE384Y Packet Switch Architectures II 2

Review of stability Last quarter we saw - HoL blocking limited throughput in IQ switches to 2 2 58% - the use of VOQs removes HoL blocking, making it possible to get higher throughputs - the definition of the stability of Markov chains - how to use Foster s criterion to prove stability Stability of switch scheduling algorithms - when the arrival matrix, Λ = {λ ij }, is known: - use the Birkhoff-von Neumann decomposition to get a schedule - when Λ is unknown, use Q(t) = {q ij (t)}, the queue-sizes - we saw that the Max Size Matching was unstable, but the Max Weight Matching could be stable - the proof of MWM s stability involved using Foster s criterion and a quadratic Lyapunov function EE384Y Packet Switch Architectures II 3

Foster s criterion - Let X n be a discrete-time Markov chain on the countable state space S. Suppose that it is aperiodic and irreducible. - Let L : S R + be a Lyapunov function, and let C = {x S : L(x) B}; i.e. L(x) is bounded in C. Stability theorem: (a) If there exists an ɛ > 0 and B 1 > 0 such that E[L(X n+1 ) L(X n ) X n / C] ɛ and sup{l(x n+1 ) L(X n ) : X n C} B 1, then lim sup n L(X n ) < with probability 1. (b) Further, if there exits a monotonically increasing positive function f such that E[L(X n+1 ) L(X n ) X n / C] ɛf(l(x n )) then lim sup E[f(L(X n ))] <. n EE384Y Packet Switch Architectures II 4

Stability of the MWM algorithm Notation: consider an N N IQ switch with VOQs - arrivals form a Bernoulli IID process and are denoted by {A ij (t)} - the arrival rate vector: λ = {λ ij } (note: we re thinking of λ as a N 2 1 column vector) - let S(t) = {S ij (t)} denote the service vector or matching used at t - S ij (t) = 1 iff input i is connected to output j at time t - S(t) has exactly one 1 for each input i and output j - the queue-size vector at time t evolves according to: q(t + 1) = [q(t) S(t)] + + A(t + 1) (1) - let W (t) = ij q ij(t)s ij (t) = q(t), S(t) be the weight of the matching used at time t - given q(t), the Maximum Weight Matching algorithm uses the service vector with the biggest weight S (t) = arg max q(t), S S - let W (t) = q(t), S (t) be the weight of the MWM at time t EE384Y Packet Switch Architectures II 5

Lyapunov analysis Consider - consider a quadratic Lyapunov function: L(t) = ij q2 ij (t) = q(t), q(t) - we need to show: there is some ɛ > 0 and some K > 0 such that E[L(t + 1) L(t) q(t)] ɛw (t), whenever W (t) K (2) L(t + 1) L(t) = ij q 2 ij(t + 1) q 2 ij(t) = ij (q ij (t + 1) q ij (t)) (q ij (t + 1) + q ij (t)) Note that for each i, j and for every t q ij (t + 1) q ij (t) { 1 if q ij (t) = 0 A ij (t + 1) S ij (t) otherwise Therefore L(t + 1) L(t) ij ij (A ij (t + 1) S ij (t)) (2q ij (t) + 1) + 1 (A ij (t + 1) S ij (t)) (2q ij (t)) + 2N 2 EE384Y Packet Switch Architectures II 6

Taking conditional expectations E[L(t + 1) L(t) q(t)] 2 ij = 2 ij q ij (t) [E(A ij (t + 1) S ij (t) q(t)] + 2N 2 q ij (t) [λ ij E(S ij (t) q(t))] + 2N 2 Now - because our switch is using the MWM, it follows that E(S(t) q(t)) = S (t) and that ij q ij(t)e(s ij (t) q(t)) = q(t), S (t) = W (t) - because λ is admissible, it is strictly doubly-stochastic - therefore we can write λ = k α kp k, where P k are permutations and k α k = α < 1 - therefore, λ, q(t) = α k P k, q(t) k k α k W (t) = αw (t) Using this, we get the stability of MWM as follows: E[L(t + 1) L(t) q(t)] 2 λ, q(t) W (t) + 2N 2 = δw (t) + 2N 2, where δ = 2(α 1) EE384Y Packet Switch Architectures II 7

Consequences, variants So we finally have an online algorithm which is stable - it doesn t require a knowledge of Λ, it doesn t estimate it - it just works off of the queue-size (a good sufficient statistic for the arrivals) - this is pretty much the only algorithm that had been known to be stable at speedup 1 - i.e.; every other algorithm and proof was essentially a variant of MWM - this included some interesting randomized algorithms (see next lecture) in the next class you will see some recent work which pursues a new direction: a stable algorithm that is based on randomized edge-coloring Some of the early variants are quite notable - Oldest Cell First - the weight of the edge (i, j) equals the age of the HoL cell in VOQ ij - you will see this in a homework exercise - Longest Port First: this algorithm is due to Mekkitikkul and McKeown EE384Y Packet Switch Architectures II 8

The LPF algorithm - let {q ij (t)} be the queue-sizes - let r i (t) = j q ij(t) be all the packets at input i - let c i (t) = i q ij(t) be all the packets destined for output j - let w ij (t) be the weight of the edge (i, j), where { r i (t) + c j (t) if q ij (t) > 0 w ij (t) = 0 otherwise The LPF algorithm finds the Max Wt Matching in the bipartite graph whose edges have weight {w ij (t)} - key property: the LPF algorithm finds the maximum weighted, maximum size matching - this is key because it makes LPF be delay-optimal in a certain set of MWM algorithms - the above is paradoxical: recall that the MSM is not stable - however, LPF which finds the max weighted MSM is not only stable, but delay-optimal! EE384Y Packet Switch Architectures II 9

Stability of LPF: uses a simple trick - let T be the N 2 N 2 positive definite matrix defined as follows 2 if i = j 1 if i T ij = N = j N 1 if i mod N = j mod N 0 else - basically, all that matters about T to us is this: w(t) = T q(t) - because the Lyapunov function L(t) = q(t), w(t) = q(t), T q(t) can be used prove the stability of LPF exactly as the stability of MWM we revisit this argument when we do stability proofs via fluid models EE384Y Packet Switch Architectures II 10