1 DYNAMIC SCHEDULING OF A PARALLEL SERVER SYSTEM IN HEAVY TRAFFIC UNDER A COMPLETE RESOURCE POOLING CONDITION Ruth J. Williams University of California,

Slides:



Advertisements
Similar presentations
C&O 355 Mathematical Programming Fall 2010 Lecture 22 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
Advertisements

1 Dynamic Programming Week #4. 2 Introduction Dynamic Programming (DP) –refers to a collection of algorithms –has a high computational complexity –assumes.
OR Simplex method (algebraic interpretation) Add slack variables( 여유변수 ) to each constraint to convert them to equations. (We may refer it as.
Seminar In Game Theory Algorithms, TAU, Agenda  Introduction  Computational Complexity  Incentive Compatible Mechanism  LP Relaxation & Walrasian.
C&O 355 Mathematical Programming Fall 2010 Lecture 15 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A.
Lecture 13 – Continuous-Time Markov Chains
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
A gentle introduction to fluid and diffusion limits for queues Presented by: Varun Gupta April 12, 2006.
Network Bandwidth Allocation (and Stability) In Three Acts.
Scheduling Algorithms for Wireless Ad-Hoc Sensor Networks Department of Electrical Engineering California Institute of Technology. [Cedric Florens, Robert.
If time is continuous we cannot write down the simultaneous distribution of X(t) for all t. Rather, we pick n, t 1,...,t n and write down probabilities.
1 Alan Scheller-Wolf Joint with: Mor Harchol-Balter, Taka Osogami, Adam Wierman, and Li Zhang. Dimensionality Reduction for the analysis of Cycle Stealing,
Stability or Stabilizability? Seidman’s FCFS example revisited José A.A. Moreira Agilent Technologies Germany Carlos F.G. Bispo Instituto de Sistemas e.
1 IOE/MFG 543 Chapter 10: Single machine stochastic models Sections 10.1 and 10.4 You may skip Sections
Dimitrios Konstantas, Evangelos Grigoroudis, Vassilis S. Kouikoglou and Stratos Ioannidis Department of Production Engineering and Management Technical.
1 Real-Time Queueing Network Theory Presented by Akramul Azim Department of Electrical and Computer Engineering University of Waterloo, Canada John P.
Asaf Cohen (joint work with Rami Atar) Department of Mathematics University of Michigan Financial Mathematics Seminar University of Michigan March 11,
Resource Allocation for E-healthcare Applications
Decentralised load balancing in closed and open systems A. J. Ganesh University of Bristol Joint work with S. Lilienthal, D. Manjunath, A. Proutiere and.
On the variance curve of outputs for some queues and networks Yoni Nazarathy Gideon Weiss Yoav Kerner QPA Seminar, EURANDOM January 8, 2009.
Flows and Networks Plan for today (lecture 5): Last time / Questions? Blocking of transitions Kelly / Whittle network Optimal design of a Kelly / Whittle.
Queuing models Basic definitions, assumptions, and identities Operational laws Little’s law Queuing networks and Jackson’s theorem The importance of think.
ECES 741: Stochastic Decision & Control Processes – Chapter 1: The DP Algorithm 31 Alternative System Description If all w k are given initially as Then,
Control for Stochastic Models via Diffusion Approximations Amy Ward, ANS Lecture Series 2008 TexPoint fonts used in EMF. Read the TexPoint manual before.
Yoni Nazarathy Gideon Weiss University of Haifa Yoni Nazarathy Gideon Weiss University of Haifa The Asymptotic Variance of the Output Process of Finite.
Stability using fluid limits: Illustration through an example "Push-Pull" queuing network Yoni Nazarathy* EURANDOM Contains Joint work with Gideon Weiss.
Networks of Queues Plan for today (lecture 6): Last time / Questions? Product form preserving blocking Interpretation traffic equations Kelly / Whittle.
15.082J and 6.855J and ESD.78J Lagrangian Relaxation 2 Applications Algorithms Theory.
Queuing Theory Basic properties, Markovian models, Networks of queues, General service time distributions, Finite source models, Multiserver queues Chapter.
Stochastic Multicast with Network Coding Ajay Gopinathan, Zongpeng Li Department of Computer Science University of Calgary ICDCS 2009, June , Montreal.
On the variance curve of outputs for some queues and networks Yoni Nazarathy Gideon Weiss Yoav Kerner CWI Amsterdam March 2009.
Appointment Systems - a Stochastic and Fluid Approach Michal Penn The William Davidson Faculty of Industrial Engineering and Management Technion - Israel.
Competitive Queue Policies for Differentiated Services Seminar in Packet Networks1 Competitive Queue Policies for Differentiated Services William.
4th Annual INFORMS Revenue Management and Pricing Section Conference, June 2004 An Asymptotically-Optimal Dynamic Admission Policy for a Revenue Management.
Positive Harris Recurrence and Diffusion Scale Analysis of a Push-Pull Queueing Network Yoni Nazarathy and Gideon Weiss University of Haifa ValueTools.
ORSIS Conference, Jerusalem Mountains, Israel May 13, 2007 Yoni Nazarathy Gideon Weiss University of Haifa Yoni Nazarathy Gideon Weiss University of Haifa.
Chapter 61 Continuous Time Markov Chains Birth and Death Processes,Transition Probability Function, Kolmogorov Equations, Limiting Probabilities, Uniformization.
Chapter 01 Probability and Stochastic Processes References: Wolff, Stochastic Modeling and the Theory of Queues, Chapter 1 Altiok, Performance Analysis.
Chapter 01 Probability and Stochastic Processes References: Wolff, Stochastic Modeling and the Theory of Queues, Chapter 1 Altiok, Performance Analysis.
Optimal Placement of Energy Storage in Power Networks Christos Thrampoulidis Subhonmesh Bose and Babak Hassibi Joint work with 52 nd IEEE CDC December.
Algorithmic Game Theory and Internet Computing Vijay V. Vazirani Georgia Tech Primal-Dual Algorithms for Rational Convex Programs II: Dealing with Infeasibility.
© The McGraw-Hill Companies, Inc., Chapter 12 On-Line Algorithms.
14 th INFORMS Applied Probability Conference, Eindhoven July 9, 2007 Yoni Nazarathy Gideon Weiss University of Haifa Yoni Nazarathy Gideon Weiss University.
Part 3. Linear Programming 3.2 Algorithm. General Formulation Convex function Convex region.
(C) J. M. Garrido1 Objects in a Simulation Model There are several objects in a simulation model The activate objects are instances of the classes that.
Supplementary: Feasible Labels and Linear Programming  Consider the LP formulation of the shortest s-t path problem: (P) Minimize  (i, j)  A c ij x.
OR  Now, we look for other basic feasible solutions which gives better objective values than the current solution. Such solutions can be examined.
11 -1 Chapter 12 On-Line Algorithms On-Line Algorithms On-line algorithms are used to solve on-line problems. The disk scheduling problem The requests.
Flows and Networks Plan for today (lecture 6): Last time / Questions? Kelly / Whittle network Optimal design of a Kelly / Whittle network: optimisation.
Linear Programming Chap 2. The Geometry of LP  In the text, polyhedron is defined as P = { x  R n : Ax  b }. So some of our earlier results should.
Flows and Networks (158052) Richard Boucherie Stochastische Operations Research -- TW wwwhome.math.utwente.nl/~boucherierj/onderwijs/158052/ html.
Proving that a Valid Inequality is Facet-defining
Queuing models Basic definitions, assumptions, and identities
Chap 9. General LP problems: Duality and Infeasibility
Polyhedron Here, we derive a representation of polyhedron and see the properties of the generators. We also see how to identify the generators. The results.
Chapter 6. Large Scale Optimization
Chapter 5. Sensitivity Analysis
Chap 3. The simplex method
Queuing models Basic definitions, assumptions, and identities
Polyhedron Here, we derive a representation of polyhedron and see the properties of the generators. We also see how to identify the generators. The results.
Lecture 4: Algorithmic Methods for G/M/1 and M/G/1 type models
I.4 Polyhedral Theory (NW)
Flow Feasibility Problems
I.4 Polyhedral Theory.
Proving that a Valid Inequality is Facet-defining
Lecture 19 Linear Program
Part 3. Linear Programming
Chapter 6. Large Scale Optimization
Chapter 2. Simplex method
Presentation transcript:

1 DYNAMIC SCHEDULING OF A PARALLEL SERVER SYSTEM IN HEAVY TRAFFIC UNDER A COMPLETE RESOURCE POOLING CONDITION Ruth J. Williams University of California, San Diego Collaborators: Steven Bell, Maury Bramson I 1 1 K

2 HEAVY TRAFFIC APPROACH TO DYNAMIC SCHEDULING 1. Formulate stochastic network model 2. Define heavy traffic (flexible servers) 3. Formal diffusion approximation: BCP (Brownian control problem) 4. Reduce to EWF (equivalent workload formulation) 5. Solve the BCP (or EWF) 6. Interpret the solution of the BCP 7. Analyze the performance of this policy OVERALL APPROACH: Harrison (‘88), Laws (‘92), Kelly-Laws (‘93), Harrison-Van Mieghem (‘97), Harrison (‘00) SOME RELATED WORK ON OPTIMAL CONTROL OF PARALLEL SERVER MODELS: Harrison (‘98), Harrison-Lopez (‘99), W (‘00), Squillante, Xia, Yao, Zhang (‘00), Bell-W (‘01). – Convex holding cost: Stolyar (‘04), Mandelbaum-Stolyar (‘04). – Kushner-Chen (‘00), Ata-Kumar (‘04).

3 PARALLEL SERVER SYSTEM I 1 1 K total time allocated to activity j up to t

4 Model Primitives Stochastic Processes E I -diml renewal arrival process, rate S J-diml renewal potential service process, rate Assume certain independence and finite second moments of interarrival and service times Structure Assume jobs in buffers queued in FIFO order (HL service)

5 Linear Program (LP) Heavy traffic (HT) There is a unique solution of the LP and Proposition (Bramson-W, ‘03) The heavy traffic condition holds iff there is a unique vector (of allocation rates) such that & in addition, (full server utilization) Heavy traffic (Harrison, ’00)

6 Two-server example: Harrison ‘98 Holding cost per unit of queuelength per unit time: 12 12

7 Greedy Scheduling Policy Simulation of this policy goes here

8 Diffusion approximation Assume HT henceforth For a suitable cost function, is the only reasonable “fluid” allocation How should one achieve using a policy in the original system? Diffusion scaling: Basic activities: Non-basic activities: J Cost function:

9 (Formal) Brownian Control Problem (Harrison, ‘00) where is a Brownian motion and

10 “Canonical” non-negative workload (Harrison-Van Mieghem ‘97, Harrison ’00) Dual program (DP) Extreme point solutions: Max. lin. indept. subset of : Theorem : and are all non-negative. If we let have rows given by, then there is a matrix :

11 I 1 1 K COMPLETE RESOURCE POOLING Theorem (Harrison-Lopez ‘99) The following are equivalent. (i) the workload is one-dimensional, (ii) B = I + K -1, (iii) there is a unique solution of (DP), (iv) all servers communicate via basic activities. In fact, under any of these conditions, the server-buffer graph with basic activities as edges is a tree. (W, ’00; Squillante-Xia-Yao-Zhang, ’00)

12 Solution of the BCP under complete resource pooling (Harrison-Lopez ’99) Unique soln of (DP): One-dimensional workload process: Holding cost: Minimum workload: Optimal queuelength and idletime:

13 How can one interpret the solution of the BCP? Seek a policy that (a) keeps the bulk of the work in a buffer i* with smallest ratio of holding cost to workload contribution, (b) incurs idleness only when the system is nearly empty, (c) incurs the bulk of the idleness at a server k * that serves i * via a basic activity.

14 Two-server example Threshold policy (Bell-W, ‘01) Asymptotically optimal if (and finite exponential moments) 12 12

15 Parallel server example Threshold policy: W ‘00 Suppose i*= 4 Then k*=3 Threshold policy: Server 3 is the root. Buffer 4 has lowest priority. Place thresholds on transition activities. Servers give priority to transition activities below them in the tree, except suspend such an activity when the associated buffer is below threshold. Next priority goes to non-transition activities below server. Lowest priority to activities above server T T

16 Asymptotic optimality of tree based threshold policy Theorem (Bell-W, ’04) Assume finite exponential moments. If denotes the threshold control in the rth system, then for any other sequence of control policies we have where

17

18 Complete Resource Pooling (CRP) CRP: workload is one-dimensional and non-negative. Solution of the Brownian control problem “keep all of the work in the buffer i* with the smallest ratio of holding cost to workload contribution, and only allow server idling when the whole system is empty. How should one interpret this solution? Parallel server system: P=0 Harrison-Lopez ‘99: – CRP iff all servers communicate via basic activities – proposed discrete review policy (proof of asymptotic optimality – special two server case: Harrison ’98) W. ‘00 (see also Squillante, Xia, Yao, Zhang ‘00): – CRP iff server-buffer graph with edges given by basic activities is a tree – proposed threshold policy (continuous review) Bell-W. ’01, ‘04 – Proof that threshold policy of W. ‘00 is asymptotically optimal (two server (AAP) & multiserver (in prep.)) General network with CRP: – S. Kumar ‘99: proposed discrete review policy (example) – Ata-Kumar ’04: discrete review policy and proof of asymptotic optimality – Kang-W. (in prep.): proposed threshold policy (continuous review)