Power-law vs exponential queueing in a network traffic model

Size: px
Start display at page:

Download "Power-law vs exponential queueing in a network traffic model"

Transcription

1 Performance Evaluation 65 ( Power-law vs exponential queueing in a network traffic model Konstantinos P. Tsoukatos a,, Armand M. Makowski b a Department of Communications and Computer Engineering, University of Thessaly, Gklavani 37, Volos 3822, Greece b Department of Electrical and Computer Engineering and Institute for Systems Research, University of Maryland, College Park, MD 20742, United States Received 28 March 2005; received in revised form 8 January 2007 Available online February 2007 Abstract We examine the impact of network traffic dependencies on queueing performance in the context of a popular stochastic model, namely the infinite capacity discrete-time queue with deterministic service rate and M G arrival process. We propose approximations to the stationary queue size distribution which are generated by interpolating between heavy and light traffic extremes. This is done under both long- and short-range dependent network traffic. Under long-range dependence, the heavy traffic results can be expressed in terms of Mittag Leffler special functions which generalize the exponential distribution and yet display power-law decay. Numerical results from exact expressions (when available, approximations and simulations support the following conclusions: Network traffic dependencies need to be carefully accounted for, but whether this is accomplished through a shortor long-range dependent stochastic model bears little impact on queueing performance. The differences between exponential and power-law queueing are negligible at the head of the distribution, and manifest themselves only for large buffers. c 2007 Published by Elsevier B.V. Keywords: Power-law queues; Mittag Leffler function; Long-range dependence; Fractional powers; Interpolations More than a decade of network measurement studies [24] have brought about the widespread belief that communication network traffic exhibits persistent dependencies and statistical self-similarity across a wide range of time scales. The observed dependencies are evident in sample autocorrelation functions that decay in a slower-thanexponential manner, and may often be considered non-summable. As such, they cannot be captured by Markovian models with finite exponential moments. These findings have generated a sustained interest in measuring, analyzing, simulating and forecasting network traffic, e.g., see [] and references therein. They have also spurred intense research on the impact of high traffic variability and dependence on network performance. As a result, there is a growing body of analytical work concerning queueing models with long-range dependent inputs under a variety of scheduling disciplines [8,9,39]. When strong dependencies are present, diverse queueing patterns may arise, e.g., Weibull [2,7, 28], power-law [7,23,26] or even exponential [27]. Such conclusions mark a departure from the exponential decay commonly encountered in traditional traffic models. However, some have argued that the actual relevance of longrange dependence for network performance is questionable [2]. To complicate matters, its presence under large scale aggregations within the network core appears to be diminishing [3]. Corresponding author. address: ktsouk@uth.gr (K.P. Tsoukatos /$ - see front matter c 2007 Published by Elsevier B.V. doi:0.06/j.peva

2 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( In this paper, we look into the impact of network traffic dependencies on queueing performance from a different perspective. We do so by relying on heavy and light traffic limit theorems, under both long- and short-range dependent network traffic. To the best of our knowledge, there does not seem to be prior work addressing light traffic limits under long-range dependence. We then combine asymptotic theory (through approximations and simulation experiments in order to contrast exponential queueing, typically associated with short-range dependent arrivals, against power-law queueing, often induced by heavy-tailed traffic. At first, these dissimilar asymptotics seem to call for different buffer provisioning practices. Our work sheds some light on the actual differences between these two (apparently vastly different queueing regimes. The study is carried out in the context of a specific discrete-time queueing model with a deterministic service rate, a system often used as a surrogate for a multiplexer at a network node. Incoming packet traffic arrives in bursts; their durations follow an arbitrary, possibly long-tailed, distribution (or pmf G and burst initiation epochs form a Poisson process. This family of traffic processes has come to be known as M G processes. A fluid queue fed by the continuous time version of such processes was studied earlier by Cohen [4]. Later, it was observed by Cox [5] that the M G busy server process with Pareto-tailed G is a second order asymptotically self-similar process; this important special case is also called a Poisson Pareto burst process [2]. The recent popularity of M G processes can be attributed to some measure of analytical tractability [29], and to the fact that they arise as the aggregation limit of many sporadic on/off traffic sources. From a more practical viewpoint, M G processes are attractive due to their flexibility in providing a good match to correlation functions of actual network traffic, a feature exploited in the case of VBR video modeling [25]. Our focus is on the steady-state (or stationary queue length distribution at this network multiplexer fed by an M G traffic process with arbitrary burst duration pmf G. When G is geometric, a two-dimensional Markov chain formulation can be developed, leading to a functional equation for the z-transform of the stationary queue length []. For an arbitrary pmf G, expressions for this z-transform are available under slightly different modeling assumptions [6,37]. However, the evaluation of the stationary queue length distribution by numerical inversion techniques seems to offer little insight. The difficulties of an exact analysis can be bypassed by relying on the information gleaned from various asymptotic regimes. A promising approach consists in deriving approximations with the help of large buffer asymptotics [6,23,26,29]; these estimates are exact in the limit as the buffer level goes to infinity. Here, we follow an alternative approach and develop approximations which are anchored by light and heavy traffic limit theorems. Such approximations become exact in the limit as the system utilization goes to zero and one, respectively. The needed results concerning the heavy traffic regime can be found in [33,35]. When the M G process is short-range dependent, the associated limit for the queue size has an exponential distribution. Under long-range dependence, the corresponding distribution can be expressed with the help of a Mittag Leffler special function which generalizes the exponential distribution and yet displays power-law decay. The role of Mittag Leffler functions in the infinite variance setting is akin to the one assumed by the exponential distribution in classical queueing models with finite variance, suggesting that Mittag Leffler special functions may serve as canonical representatives of power-law queueing. In this paper, we derive an alternative expression for the Mittag Leffler function which is much more useful for numerical evaluations. This expression also underpins a particularly illuminating comparison with the exponential distribution, which helps illustrate the impact of the transition between short- and long-range dependent traffic where it can be most succinctly summarized, namely in the heavy traffic limit. Next, turning to light traffic, we take advantage of the fact that the M G arrival process is obviously Poisson driven, so that the light traffic theory originally developed by Reiman and Simon [30] applies under an appropriate moment assumption. The light traffic limits for the queue with M G arrivals are notably different from those for the classical M G I queue. This is a manifestation of the fact that work joins the system gradually (as is the case with M G inputs and generates less queueing than work that arrives instantaneously. In addition, we show that under long-range dependence, fractional powers appear in light traffic; this suggests that the queue length distribution is not an analytic function of the arrival rate under long-range dependence. Approximations to the queue size distribution are generated by interpolating between the heavy and light traffic extremes. We use the approach of Fleming and Simon [20] when considering short-range dependent arrivals, and postulate heuristics for the case of long-range dependence. We provide examples of approximations for several common pmfs G; in some cases the approximants assume a simple final form. Numerical results from exact expressions, approximations, and simulations support the following

3 34 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( conclusions: Network traffic dependencies need to be carefully accounted for, but whether this is achieved through a short- or long-range dependent stochastic model for the input has little quantitative impact on queueing performance. Power-law queueing, which arises as a consequence of infinite variance (or non-summable correlations, is mainly about the behavior far out in the tail. For practical purposes, the choice between a stochastic model with sufficiently large correlations and one with non-summable correlations bears no catastrophic consequences, as the sharp differences between exponential and power-law queues manifest themselves only for large buffers. The interpolation method used here has the advantage of capturing accurately the head of the queue size distribution at small buffer levels. Hence, it naturally complements large deviations approximations which offer large buffer asymptotics but which may be irrelevant when failing to fit the head of the distribution. On the other hand, when G has finite exponential moments, we do not expect the heavy light traffic approximation to be accurate for buffer levels much larger than the maximum burst length. It simply does not possess the correct decay rate it does so only as the system utilization tends to one, i.e., in the heavy traffic limit. Surprisingly, this drawback is often absent under long-range dependence, since there are cases where the queue size distribution has power-law asymptotics with the same exponent for all traffic intensities! Then an approximation is more valuable, especially when considering that, in the presence of heavy tails, alternative estimates by means of simulation take an unreasonably long time to obtain. Yet, this approach is somewhat compromised by a lack of rigorously established light traffic limits under long-range dependence. Here, we rely on a postulated fractional expansion in Section 5.2, but the problem is still unresolved. The paper is organized as follows: The system model is presented in Section. Section 2 summarizes the main conclusions from the heavy traffic analysis developed in [35]; this section also discusses a useful relationship between Mittag Leffler special functions and exponential distributions. In Section 3 we introduce an auxiliary queueing system with instantaneous inputs; in one important special case this system allows us to develop exact analytical expressions for the original system with M G inputs. In Section 4, the light traffic expansions are developed under both longand short-range dependent arrivals. These asymptotic results in both light and heavy traffic regimes are then combined into an approximation which is presented in Section 5. In Section 6 we discuss various examples with particular emphasis on the accuracy of the approximations against simulations. Several proofs are given in Appendix for sake of completeness.. The system model with M G arrival processes We introduce the queueing model of interest, together with the needed notation. We start by presenting the class of M G arrival processes and some of its properties; additional facts can be found in [5,29]. Consider an infinite population of information sources operating synchronously in discrete-time as follows. Time is organized in contiguous slots of equal duration. During such a slot, a source can be in one of two states, active or idle. Information is organized into packets of equal size, and while active, a source generates information at a constant rate of one packet per time slot. When its activity period ends, a source switches off permanently, never to generate packets again. More formally, for each n = 0,,..., let β n+ denote the number of new sources which become active during the time slot [n, n +. Source j, j =,..., β n+, begins generating information by the start of slot [n +, n + 2 and its activity period has duration σ n+, j (expressed in time slots. Let b n denote the number of active sources, or equivalently, the number of packets generated by the active sources, at the beginning of time slot [n, n +. If initially (i.e., at time n = 0 there were already b active sources, let σ 0, j denote the residual activity duration (in time slots for the jth active source, j =,..., b. The following assumptions are enforced throughout on the N-valued rvs b, {β n+, n = 0,,...}, {σ n, j, n =, 2,... ; j =, 2,...} and {σ 0, j, j =, 2,...}: (i These rvs are mutually independent; (ii The rvs {β n+, n = 0,,...} are i.i.d. Poisson rvs with parameter λ > 0; (iii The rvs {σ n, j, n =,... ; j =, 2,...} are i.i.d. rvs with common pmf G on {, 2,...}. With σ denoting a generic N-valued rv distributed according to the pmf G, we always assume E [σ ] < ; (iv The rvs {σ 0, j, j =, 2,...} are i.i.d. N-valued rvs distributed according to the equilibrium pmf G e associated with G, i.e., if σ e denotes a generic N-valued rv distributed according to the pmf G e, then P [σ e = n] = P [σ n], n =, 2,... ( E [σ ]

4 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( In summary, the process {b n, n = 0,,...} results from discrete-time Poisson arrivals of information bursts with burst duration distributed according to the pmf G and with packet generation rate set at one packet/slot during the activity period of a burst we refer to λ as the burst arrival rate. Under the enforced assumptions, the sequence {b n, n = 0,,...} can be identified as the stationary version of the busy server process of a discrete-time M G queue. For this reason, it is customary to refer to this packet arrival process {b n, n = 0,,...} as the (stationary M G arrival process (λ, G (or equivalently, (λ, σ. As shown in [29], the correlation structure of the dependent rvs {b n, n = 0,,...} is controlled by the pmf G of σ. In particular, it is well known that j=0 cov(b n+ j, b n = λ E [σ (σ + ] 2 so that {b n, n = 0,,...} is short-range (resp. long-range dependent if and only if E [ σ 2] is finite (resp. infinite. We feed this M G arrival stream {b n, n = 0,,...} into a discrete-time multiplexer with infinite buffer capacity. Let q n denote the number of packets remaining in the multiplexer buffer by the end of slot [n, n. If the multiplexer output link transmits at the rate of c packets/slot, then the buffer content sequence {q n, n = 0,,...} evolves according to the Lindley recursion q 0 = 0; q n+ = [q n + b n+ c] +, n = 0,,.... (2 The average input rate to the multiplexer is E [b n ] = λe [σ ], and the system is stable if the system utilization ρ := λe [σ ] /c satisfies ρ <. More specifically, we have q n n q for some R + -valued rv q known as the stationary queue size. We are interested in evaluating the probability P(b, λ that the stationary buffer content q exceeds level b when the burst arrival rate is λ, namely P(b, λ := P λ [q > b], b 0. Here, and elsewhere in the paper, we use the notation P λ to emphasize the fact that the M G input process (λ, G (together with related quantities to be introduced shortly is parametrized by λ. In what follows, we focus on obtaining explicit expressions for P(b, λ in two asymptotic regimes, namely the heavy traffic limit (i.e., as λ c/e [σ ] from below [38] and the light traffic limit (i.e., as λ 0 [30]. When doing so, it is understood that both c and σ (or equivalently G are held fixed while λ is allowed to vary to its appropriate limit with λ c/e [σ ] from below and λ 0, respectively. 2. Heavy traffic limits and Mittag Leffler functions We start with results on the heavy traffic behavior of the queue with M G arrivals. We tacitly assume that the heavy traffic limit of the stationary distribution is given by the stationary regime of the heavy traffic diffusion limit; see the references [34 36] for a similar approach and the recent paper [3] for a formal validation of this equivalence in a setting related to the one discussed here. Throughout, for each ν > 0, the Mittag Leffler special function E ν : R R is defined [8, p. 206] by (3 E ν (x := n=0 x n Γ (νn +, x R with the Gamma function Γ : (0, R + given by Γ (p = 0 x p e x dx, p > 0. With 0 < ν <, classical asymptotics for Mittag Leffler functions [8, p. 207] imply E ν ( x Γ ( ν x (x. (4 (5

5 36 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( In principle, the distribution of the stationary rv q depends jointly, and in a complicated manner, on the triplet λ, G and c, and not just on the utilization ρ. Yet, the relevant facts from Theorems 6. and 6.3 of [35, p. 3] given below in Proposition are expressed solely in terms of the utilization ρ. This practice should not create any confusion since by virtue of the convention introduced earlier, ρ is understood to mean λ c/e [σ ] from below, while both c and σ are held fixed. Proposition. The heavy traffic limits of the stationary queue length distribution associated with the Lindley recursion (2 can be classified as follows: (a If E [ σ 2] <, then ( x lim P ρ ρ, λ = exp (b If σ is distributed according to the Pareto distribution P [σ > n] = n α, n =, 2,... ( 2E [σ ] E [ σ 2] x, x 0. (6 for some < α < 2, then ( ( lim x( ρ /(α (α E [σ ], λ = E α x α, ρ Γ (2 α x 0. (8 Part (a of Proposition addresses the classical short-range dependent case, for which the heavy traffic normalizer is ( ρ and the limiting heavy traffic distribution is exponential. Part (b deals with a long-range dependent M G traffic process since E [ σ 2] = under (7, and the heavy traffic queue length distribution is now expressed through a Mittag Leffler special function with power-law decay. This decay is a simple consequence of (5 (with ν = α which yields E α ( (α E [σ ] x α Γ (2 α (α E [σ ] x α (x. (9 Part (b was stated for a Pareto distribution with a specific tail, in order to make the power-law form ( ρ /(α of the heavy traffic normalizer immediately apparent. However, we refer the reader to [35, p. 3] for corresponding results when σ is distributed according to a general regularly varying distribution. The Mittag Leffler functions can be viewed as generalizing the exponential function (which is obtained by setting ν = in (4. We now introduce an alternative expression for the Mittag Leffler functions [33] which makes the connection with exponential functions much more apparent. This representation has its origin in Bernstein s characterization of Laplace transforms of probability distributions as completely monotone functions on R + [9, Thm., p. 439]: For 0 < ν <, it is known [8, p. 207] that the function x E ν ( x is completely monotone on R +, i.e., for all n = 0,,..., we have ( n dn dx n E ν( x 0, x 0. The function x x ν having a completely monotone derivative, a well-known composition result [9, Criterion 2, p. 44] implies that the function x E ν ( x ν is itself completely monotone on R +, hence is the Laplace Stieltjes transform of some distribution and can be viewed as a mixture of exponential distributions [9, p. 439]. The precise sense in which this holds is now given. Proposition 2. For 0 < ν <, the function R + R : x E ν ( x ν admits the representation E ν ( x ν = 0 e xy f ν (ydy, x 0 (0 as a mixture of exponentials with mixing density given by sin(νπ f ν (y = πy ν ( y 2ν + 2y ν, y 0. ( cos(νπ + (7

6 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( Fig.. Mittag Leffler distributions E ν ( x ν and spectral densities f ν (y. The change of variables y = (tan θ /ν in (0 and ( readily yields the equivalent representation E ν ( x ν = sin(νπ νπ π/2 0 e x(tan θ/ν dθ, x 0. (2 + sin(2θ cos(νπ This last expression involves an integral over a bounded interval, and is therefore more convenient for carrying out numerical calculations (as is done in Section 6. When 0 < ν <, the expression ( yields lim y 0 f ν (y =, thereby precluding that E ν ( x ν contains a single dominant exponential with strictly positive parameter. This infinite mixture of exponentials is to be contrasted with the heavy traffic queue size distribution under short-range dependence, classically given by a single exponential, the one to which expression (0 collapses as ν (as can be seen from the original representation (4. In Fig. we illustrate the representation (0 and the convergence to the exponential distribution as ν. The bottom plots show the density function f ν (y for ν = 0.8, and , while the top log log scale plots show the corresponding function E ν ( x ν. The dash dotted line depicts the negative exponential e x. As ν, it is clear that the density f ν (y tends to place all of its mass at y =, i.e., at a single exponential, a fact which also becomes apparent from the top plot for ν = In addition, for ν = , we observe that e x and E ν ( x ν are very close for small values of the argument x, yet their respective exponential and power-law tails remain strikingly different as x grows unboundedly large. We interpret Fig. as roughly saying that when crossing from a large, yet finite variance, to an infinite variance model, the transition in the queue length distribution occurs far out in the tail! 3. An auxiliary system and the emptiness probability In order to derive light traffic limits for the distribution of the stationary queue size q, we find it useful to consider a related system with instantaneous inputs where each burst brings its entire workload into the system during a single time slot, immediately upon arrival. These inputs are to be contrasted with the gradual M G inputs where incoming work from a burst is spread over the entire duration of the burst. Such instantaneous arrivals are represented by the sequence of N-valued i.i.d. rvs {u n, n = 0,,...} given by β n+ u n+ := σ n+,i, n = 0,,..., i= (3

7 38 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( where the mutually independent families of i.i.d. rvs {β n+, n = 0,,...} and {σ n+,i, n = 0,,..., i =, 2,...} are as introduced in Section. These arrivals are also characterized by the pair (λ, G and let u denote the generic rv for the i.i.d. sequence {u n, n = 0,,...}. The instantaneous inputs {u n, n = 0,,...} are offered to the same multiplexer with constant release rate c. With the queue initially empty, the Lindley recursion for the corresponding queue length sequence {q n (u, n = 0,,...} is simply q (u 0 = 0; q (u n+ = [q(u n + u n+ c] +, n = 0,,.... (4 If E [u] = λe [σ ] < c, standard results for the G I G I queue [4, Cor. 6.4, p. 94] imply system stability in the sense that q n (u n q (u for some R + -valued rv q (u. Owing to the independence of the rvs {u n, n = 0,,...}, the recursion (4 can, at least in principle, be handled by standard generating function techniques. When the multiplexer release rate is c =, it is straightforward to show by this method [33, Section 2.3.2, p. 24] that [ ] P λ q (u = 0 = ( λe [σ ]e λ. (5 Furthermore, by adapting the arguments of [3] we obtain the following fact, whose proof is also available in [33, Lemma 4.3.2, p. 92]. Proposition 3. Consider the Lindley recursions (2 and (4 with respective inputs characterized by the common pair (λ, σ. If c = and λe [σ ] <, then [ ] ( P λ [q = 0] = P λ q (u = 0 P [β = ] + E [min(σ, X ] (6 P [β = 0] where β is a Poisson rv with parameter λ, and X denotes a rv which is independent of the rv σ and geometrically distributed according to P [X > k] = P [β = 0] k, k = 0,,.... (7 Related results, yet for a slightly different recursion, can be found in [6,37]. Combining (5 and (6, we arrive at the desired exact expression for the probability P λ [q = 0] when c =. Proposition 4. Consider the Lindley recursion (2 with c =. Under the stability condition λe [σ ] <, it holds that P λ [q = 0] = ( λe [σ ]e ( λ + λ e λk P [σ > k]. (8 k= 4. Light traffic limits We now turn to the system behavior in light traffic. The right-hand derivatives at λ = 0 of the queue length probabilities are evaluated by means of a methodology first developed by Reiman and Simon [30], and further refined by Blaszczyszyn [6,7]. The basic advantage of this approach is to reduce the evaluation of the nth order derivative of performance measures of interest at λ = 0+ to calculations under scenarios where at most n source bursts ever arrive into the system. For the technique to be applicable, a moment assumption is needed on σ [7]. Assumption. The generic burst duration rv σ satisfies E [ σ max{2,c}] <. The light traffic analysis is straightforward but tedious, and we summarize its conclusions in the following result which is established in Appendix A.2.

8 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( Proposition 5. Consider the Lindley recursion (2 with release rate c and let b 0. If Assumption is satisfied, then the following statements hold: (a For each n = 0,,..., c, we have n n P(b, 0+ := lim P(b, λ = 0. (9 λn λ 0 λn (b Moreover, for c =, we have 2 2 P(b, 0+ := lim P(b, λ λ2 λ 0 λ2 [ = E (σ b +2] P [σ > b] + 2E [ (σ b +] 2 [ 3E (σ b + ] P [σ > b] + P [σ > b] 2. (20 We next seek to develop some understanding into the light traffic asymptotics when Assumption fails, as would be the case if E [ σ 2] =. To that end, we develop light traffic expansions which are based directly on the closed-form expression (8 obtained when c =. Using this approach we first revisit the short-range dependent case. In the process we confirm that the leading term in the light traffic expansion of P [q > 0] is indeed of order λ 2, and we evaluate it explicitly. Corollary (Short-range Dependence. In the setup of Proposition 4 with E [ σ 2] <, it holds that lim λ 0 λ 2 P λ [q > 0] = (E [σ (σ ] + 2E [σ ] (E [σ ] +. (2 2 A proof of Corollary using (8 is straightforward [33, Cor. 4.3., p. 94]. Note that (2 is already implied by (9 and (20 for b = 0. Assumption here takes the form E [ σ 2] <, which is precisely what is needed to obtain a finite limit in (2. More interestingly, we can exploit (8 to collect a light traffic limit for long-range dependent inputs. Such a result could not have been obtained via the Reiman Simon theory (at least in its present form. In particular, we turn our attention to the situation where σ has a regularly varying tail. Corollary 2 (Long-range Dependence. In the setup of Proposition 4, with the tail of σ given by (7, it holds that lim λ α Γ (2 α P λ [q > 0] = λ 0 α. (22 The light traffic result (22 can be extended to general regularly varying distributions [33, Cor , p. 95]. This will not be done here in the interest of brevity, especially given that all numerical examples will be carried out under (7. Proof. First, we observe that e λk P [σ > k] = e λ k= ( With the help of this relation we can manipulate terms in (8 to obtain e λk P [σ = k] e λ. (23 k= P λ [q > 0] = e λ ( λe [σ ] ( λ λ2 e λ E [σ ] (24 ( λeλ e λ ( λe [σ ] e λk P [σ = k] + λe [σ ]. (25 k=

9 40 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( As this last expression explicitly displays the Laplace Stieltjes transform of σ, we can now invoke a Tauberian result on the asymptotic behavior of Laplace Stieltjes transforms at the origin. In particular, Theorem 8..6 in [5, p. 333] provides the asymptotics of the leading term at (25 as k= e λk α Γ (2 α P [σ = k] + λe [σ ] λ α (λ 0. (26 To handle the term at (24, we first note that e λ + λ lim λ 0 λ α = 0, < α < 2 while straightforward calculations show that lim λ 0 ( λ α e λ ( λe [σ ] ( λ λ2 e λ E [σ ] = 0. (27 Consequently, (24 and (25 lead to (22 with the help of (26 and (27. The impact of the distribution of σ, and in particular of its second moment, on the light traffic asymptotics of P λ [q > 0] is now more apparent. As λ 0, the busy queue probability P λ [q > 0] exhibits a λ 2 -decay under short-range dependence. When the tail of σ satisfies (7, the M G process is long-range dependent and the busy queue probability has a slower λ α -fractional power decay. This provides an example of a Poisson-driven system where the performance measure of interest is not an analytic function of the Poisson rate λ. The limit (22 prompts us to conjecture that when c =, under (7, this fractional λ α decay of the tail probability P λ [q > b] holds more generally for all b 0. This conjecture remains open as at the writing of this paper. Each active source in the M G arrival process generates one packet/slot. The condition c = corresponds to the case where the amount of service in one slot is exactly equal to the amount of work generated by a single active source during one slot. Thus, when c =, a single active source already utilizes the full server capacity, and there is never any leftover capacity to simultaneously serve more than one source. On the other hand, when c >, the server can attend to more than one source during a time slot, resulting in a multiple service feature. An exact or approximate analysis in this regime is more difficult. Only recently has the limitation c = been successfully removed in the literature on large buffer asymptotics of queues with long-range dependent inputs. In particular, a key insight obtained by large deviations arguments for heavy tails (e.g., see [0] and references therein is that it suffices to consider events where the minimal number of simultaneously active sources generates queueing. This insight is also helpful in the present context under shortrange dependence. Exactly c + active sources indeed suffice to yield the first non-zero light traffic derivative of Proposition 5 (although calculations quickly get complicated for c >. A similar argument can also be used under long-range dependence to obtain the light traffic expansion by considering scenarios with only c + active sources. This reasoning leads us to conjecture that the desired fractional expansion for P λ [q > b] is of the form λ + c (α for all buffer levels b 0. This conjecture also remains open as at the writing of this paper. 5. Heavy light traffic interpolations We now rely on the results in the light and heavy traffic regimes in order to construct approximations to the buffer content distribution (3 which are valid across the entire range of stable system utilization. 5.. The short-range dependent case Under Assumption, the probability P λ [q > b] is max{c, 2} times differentiable with respect to λ at λ = 0, and can therefore be approximated by combining heavy traffic limits and light traffic derivatives into a Taylor series-like expansion. To this end, we enforce Assumption throughout Section 5. and follow the approach proposed in [20]. Its main steps are given below:

10 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( For each ρ in the interval [0, and all x 0, we define ( x F(x, ρ := P λ [( ρq > x] = P ρ, λ where as before it is understood that ρ and λ are related through ρ = λe [σ ] /c, and set F(x, := lim ρ P λ [( ρq > x]. (28 (29 Fix x 0. Assume now that for some n =, 2,..., the partial derivatives of F(x, ρ with respect to ρ up to order n, are available in a neighborhood of ρ = 0. For notational convenience, we write i ( i F(x, 0+ = lim F(x, ρ, i =,..., n. ρi ρ 0 ρi The nth order interpolation approximation F n (x, ρ to F(x, ρ is the polynomial (in ρ given by ( n ρ F i i n i n (x, ρ := F(x, 0+ + F(x, F(x, 0+ ρ n+ i! ρi i! ρi i=0 on the range 0 ρ. With obvious notation, we observe that F n (x, = F(x, and that i i=0 ρ F i n (x, 0+ = i F(x, 0+, i = 0,,..., n. ρi In other words, F n (x, ρ is precisely that unique polynomial (in ρ of degree n + which matches the n + first partial derivatives of F(x, ρ (namely those partial derivatives of degree k = 0,,..., n at ρ = 0 and its heavy traffic limit. By reversing the ( ρ normalization in F n (x, ρ, we generate the nth order interpolation approximation to P λ [q > b] as P λ [q > b] F n (( ρb, ρ. (30 This quantity may lie outside [0, ], in which case it is obviously a poor approximation. We rely on the results of Sections 2 and 4 to implement this approach in the present setup. Under Assumption, the second moment E [ σ 2] is finite and Proposition yields ( F(x, = lim ρ exp 2E [σ ] E [ σ 2] x, x 0. If c, then the c th order interpolation approximation to P λ [q > b] is taken to be ( P λ [q > b] F c (( ρb, ρ = ρ c + 2E [σ ] exp E [ σ 2]( ρb. (3 In postulating (3, although we have followed the approach outlined above, we have conveniently neglected mixed partial derivatives; see [33, p. 05] for more details. This is also done for the case c = discussed next. More can be accomplished when c = : Part (b of Proposition 5 supplies the second partial derivative, leading to the 2nd order interpolation by means of the polynomial ( F 2 (x, ρ = 2 ρ2 ( ρ 2 ρ 2 P(x, E [σ ] ρ3 exp E [ σ 2] x (32 and this leads to the 2nd order interpolation P λ [q > b] F 2 (( ρb, ρ, c =. (33

11 42 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( The long-range dependent case The light traffic results of Proposition 5 do not cover distributions with E [ σ 2] = because Assumption is now violated, and the interpolation approach outlined above does not apply. However, we address the case of long-range dependence by constructing a sharp approximation based on the following heuristic arguments: Consider the Pareto distribution (7 with < α < 2. Since Assumption does not hold, the expression (20 from Proposition 5 yields now an infinite value. This indicates that under long-range dependence, P λ [q > b] may not be an analytic function of λ at λ = 0. As argued in Section 4, when c =, Corollary 2 strongly suggests that lim λ 0 λ α P λ [q > b] is the non-trivial sought-after limit for all b 0. Thus, when c =, these considerations lead us to postulate the existence of the limits lim λ 0 λ α P λ [q > b] = K (b, b 0 (34 for some unknown mapping K : R + R +. By Corollary 2 we already have K (0 = Γ (2 α/(α. On the other hand, the heavy traffic result of Proposition (b hints at a possible approximation around the normalized rv ( ρ /(α q, leading us to propose the approximation P λ [q > b] E α ( (α E [σ ] Γ (2 α ρ ρ α bα, c =. (35 This expression is in agreement with the heavy traffic limit (8 since ρ α ( ρ ( ρ as ρ. In addition, from the asymptotics (5, as b, we also find that ( (α E [σ ] ρ E α Γ (2 α ρ α bα (α E [σ ] ρ α ρ b α. This ensures that, as ρ 0, the approximation (35 conforms with the conjectured light traffic limit (34. However, it remains unclear what form should the higher order terms assume in the fractional expansion under long-range dependence, and whether there exists a relationship between heavy and light traffic limits that generalizes a result of Simon [32]. 6. Numerical results To quantify the impact of dependencies on queueing behavior, we collect numerical results from the proposed approximations and from simulation experiments. The accuracy of the approximations is gauged by comparing with simulation data under various choices for the distribution G of the burst duration rv σ. The experimental values are obtained by regenerative simulation [22] and the relative widths accompanying them correspond to 95% confidence intervals. We almost exclusively (with one exception confine ourselves to the simple situation where the multiplexer release rate is c =. While the list of examples below is not exhaustive, the discussion does illustrate the ability of the heavy light traffic interpolation to ballpark the true tail probabilities, as well as its limitations. It also highlights the fact that emerging power-law queueing patterns under long-range dependence are not captured by finite variance models, but that this failure occurs only as buffers grow large. Deterministic When the burst duration is deterministic, say σ = D a.s. for some positive integer D, approximation (33 reads P λ [q > b] ρ2 ( ρ 2D 2 (3[D ( ρb] + ([D ( ρb] + + [D > ( ρb] + ρ 3 exp ( 2D ( ρb for all b 0. With D = 3, we obtain simulation estimates for the steady state probability P λ [q > 0]. Of course, in this case the exact expression is available for b = 0 at (8. In Table we list simulation estimates and numerical values from (8 and from the light heavy traffic interpolation. There is excellent agreement between the values generated through the exact formula (8 and through the light heavy traffic interpolation. Since we expect the approximation to

12 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( Fig. 2. Geometric burst duration with γ = 2/3 and release rate c = 4. Table P λ [q > 0] for deterministic burst duration σ = 3 ρ Exact Simulation Approximation Error (% e e 02 ± 0.2%.0500e e e 02 ± 0.3% 4.778e e e 02 ± 0.2% e e e 0 ± 0.2%.6533e e e 0 ± 0.2% e e e 0 ± 0.% e e e 0 ± 0.% 4.987e e e 0 ± 0.% 6.47e e e 0 ± 0.% 8.450e be asymptotically exact at the endpoints ρ = 0 and ρ =, it is not surprising that the largest errors occur in moderate traffic. Geometric If σ follows a geometric distribution, e.g., P [σ > n] = γ n, n = 0,,..., with 0 < γ <, then we obtain from (33 that ( P λ [q > b] ρ2 2 ( ρ( + γ 2 γ 2( ρb + ρ 3 exp 2 γ ( ρb + γ for all b 0. If c >, then the expression (33 is not applicable, the first non-zero light traffic derivative is not available, and the only available heavy light traffic approximant is (3. We illustrate its behavior by means of an example where γ = 2/3 and c = 4. The resulting log linear plots in Fig. 2 correspond to system utilizations ρ = 0.2, ρ = 0.6 and ρ = 0.8. The approximation fares very well in moderate to heavy loads, but obviously yields inaccurate results for ρ = 0.2 due to insufficient light traffic information. Pareto Let the burst duration rv σ follow the Pareto distribution (7 with < α < 2, in which case the M G process is long-range dependent and the approximation (35 is in effect. Assessing the performance of (35 requires a numerical evaluation of the Mittag Leffler function, a task carried out by numerical integration with the help of the alternative expression (2. We have tested the approximation (35 for system utilizations ρ = 0.2, 0.5 and 0.8, and release rate c =. Under long-range dependence, simulation estimates converge very slowly. Moreover confidence intervals based on the regenerative method cannot be constructed because the underlying regenerative period has infinite variance. In the results shown in Fig. 3, the runs were 0 9 time slots long, by which time the estimates had stabilized. The log log scale plots correspond to two Pareto distributions with parameters α =.5 and α =.7, respectively. As expected, the heavier Pareto tail with α =.5 induces larger tail probabilities than the Pareto tail with α =.7, at the same system utilizations. In Fig. 3, simulated and approximate values are seen to be very close, suggesting that the expression

13 44 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( Fig. 3. Pareto burst duration with α =.5 (left and α =.7. (35 provides a satisfactory approximation. Note the almost linear shape of the curves in log log scale, reflecting the power-law asymptotics of the queue size distribution announced in [23,26]. Truncated Pareto When σ follows a truncated Pareto distribution, the resulting M G process is short-range dependent. Yet, over a finite range of time scales, it can display dependences similar to those of a long-range dependent M G process. Specifically, for < α < 2, pick some N = 2, 3,... and consider the truncated Pareto distribution on {, 2,..., N} given by P [σ > n] = N α (n α N α, n =, 2,..., N. (36 The distribution (36 has finite support and clearly satisfies Assumption. The integer parameter N provides a means to control the tail behavior of σ, hence the dependencies in the M G arrivals. When N = 2, the corresponding rv σ is deterministic with σ = 2 a.s. As N increases, the second moment of the burst duration distribution also increases, thus leading to stronger dependences in the M G process. As N goes to infinity, the rv σ converges weakly to the standard Pareto distribution (7. As a result, we move from a rv σ with finite exponential moments to a rv with infinite variance, hence to a corresponding M G process that is long-range dependent. To illustrate the effect of dependences in the traffic process on the resulting queue size distribution, we carry out simulation experiments with α =.7 and for the two truncation levels N = 50 and N = 000. Results are collected for system utilizations ρ = 0.2, 0.5, 0.8. As approximation (33 does not assume any simple closed form expression in this case, we evaluated numerically the various quantities entering (33. In Fig. 4 we compare simulation results for truncation level N = 50 with the approximate values obtained from (33 (labeled SRD and those from expression (35 (labeled LRD. Confidence intervals widths are not shown since, with the exception of the three points at the bottom of the plot, they were well within 0% of the mean. The curves corresponding to ρ = 0.2, 0.5 and 0.8, show that the SRD approximation tracks the true queue size probabilities satisfactorily, especially for small buffer sizes. As the target probabilities become smaller and the buffer size of interest increases, it is clear that the quality of the SRD approximation degrades. Further increase in N is expected to reveal the limitations of the SRD approximation (33. Still with α =.7, increasing N from 50 to 000 results in a small increase in the expectation from E [σ ] = 2.9 to E [σ ] = 3.035, and in a large increase in the second moment from E [ σ 2] = to E [ σ 2] = Obviously, the larger the variance of the truncated Pareto rv, the closer the simulation curve will be to that of the LRD approximation (35. Moreover, for a fixed variance of the rv σ the match between the simulation curve and that of the LRD approximation is better at smaller buffer sizes. On the other hand, as the buffer size grows to infinity, the LRD approximation (35 will also eventually fail: It exhibits a power-law decay, while, as follows from the developments in [29], the queue size distribution induced by truncated Pareto burst durations decays exponentially fast.

14 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( Fig. 4. Exponential vs. power-law approximations; truncated Pareto bursts with α =.7 and N = 50. Fig. 5. Simulations: Pareto vs. truncated Pareto with α =.7 and N = 000. This contrast between the queueing behavior of truncated Pareto with N = 000, and standard Pareto burst durations is more evident when comparing the log log plots of simulated values for Pareto and truncated Pareto bursts in Fig. 5. Although the shape of the left part of all curves in Fig. 5 is almost linear, thus suggestive of a hyperbolic initial segment, the rightmost part of the truncated Pareto curves decreases rapidly and the curves turn concave, in agreement with the anticipated exponential decay. Nevertheless, in spite of the different buffer asymptotics, it is clear that all numerical values from simulations, and both LRD and SRD approximations remain close at the head of the distribution. Also recall that the present queueing model with c = exhibits the smallest possible degree of traffic aggregation, as a single active source suffices to exhaust the link capacity. Hence the effect of long range dependence is expected to remain rather pronounced. Still, Fig. 5 shows that for buffer levels that are roughly up to 0, i.e., three times the average burst size E [σ ], any infinite variance effects go virtually unnoticed. This pattern should emerge more forcefully in the case c > ; unfortunately light traffic limits are then unavailable. These observations underscore the fact that the time dependencies of the M G arrivals, namely long-range vs. short-range dependence, do not have significant quantitative impact for small buffers. The transition between exponential and power-law queueing, and the so-called ineffectiveness of buffering for long-range dependent traffic emerge as buffer sizes grow to infinity.

15 46 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( Acknowledgments Fig. A.. Integration path. The authors would like to thank the Editor and the referees for suggestions that considerably improved the paper. The work of the first author was supported through an ARCHIMEDES grant by the Greek Ministry of Education. Appendix A.. A proof of Proposition 2 Fix 0 < ν <. From [8, Eq. (8 p. 209] (or [33, Eq. (3.20 and (3.23 p. 43], we collect the Laplace transform pair 0 e sx E ν ( x ν dx = s, + s ν s 0. (A. A representation of the form (0 is obtained for E ν ( x ν by using the definition of the Laplace inversion integral E ν ( x ν = lim L d+ j L e sx 2π j d j L s ds, + s ν x 0 (A.2 where we pick d to be any strictly positive abscissa on the real axis. To evaluate (A.2, we note that the denominator + s ν has roots of the form s m = e j 2m+ ν π for all m = 0, ±,.... Since 0 < ν <, we have 2m+ ν > for every m = 0, ±,..., so that there is no root with argument in [ π, π]. Thus, by standard arguments, the integral (A.2 can be evaluated along the clockwise path from H to A shown in Fig. A. through E ν ( x ν = lim R r 0 2π j A H e sx s ds, + s ν x 0. (A.3 In the limit, as the radius R goes to infinity, the contributions of the arcs C B and G F to the integral above are zero by Jordan s lemma. The limiting contributions of the arcs H G and B A are also zero, because their length is bounded and e sx is also bounded along these arcs. Finally, on the circular arc E D we set s = re jφ, φ in [ π, π], and see that the resulting integrand vanishes as r 0. Thus, in (A.3 only the integrals along the segments F E and DC remain in the limit. Setting s = ye jπ and s = ye jπ, y > 0, for F E and DC, respectively, we collect E ν ( x ν = 2π j 0 e xy y ( + y ν e jνπ + y ν e jνπ and manipulating we readily arrive at (0 with density (. dy, x 0

16 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( A.2. A proof of Proposition 5 Fig. A.2. Queue length evolution under the event {t, t 2 ; k, k 2 }. A proof of Part (a can be found in the thesis [33] and is omitted as it proceeds along the same lines as the proof of Part (b which we now provide. We apply the methodology outlined in [7,30]; see [33] for additional details. With the functional ψ taken to be ψ := [q 0 > b] for some b 0, we see that the performance measure of interest is φ(λ = E λ [ψ] = P λ [q > b], i.e., the probability that the queue content exceeds level b. From the developments in [7,30] we get d 2 dλ 2 φ(0+ = E [ ψ(σ, σ 2 ] where σ and σ 2 are i.i.d. copies of the generic activity duration rv σ and ψ is defined by ψ(k, k 2 := + + t = t 2 = ψ({t, t 2 ; k, k 2 } for all k, k 2 = 0,,..., where for all t, t 2 = 0, ±, ±2,..., we write (A.4 (A.5 ψ({t, t 2 ; k, k 2 } := [q 0 > b] ({t, t 2 ; k, k 2 } for the indicator function that the queue length at time t = 0 exceeds b, conditioned on the event {t, t 2 ; k, k 2 } where only two source bursts ever join the system, in slots [t, t and [t 2, t 2, with activity durations k and k 2, respectively. We thus need only examine the queue length process induced by events of the form {t, t 2 ; k, k 2 }. If min(t 2 + k 2, t + k > max(t, t 2, (A.6 the two sources arriving in slots [t, t and [t 2, t 2 are simultaneously active from time max(t, t 2 until min(t 2 +k 2, t +k. In that case the queue size evolves as shown in Fig. A.2. Otherwise, i.e., if min(t 2 +k 2, t +k max(t, t 2, the queue size is identically zero. By inspection, under (A.6, the queue length q 0 ({t, t 2 ; k, k 2 } at time t = 0 is given by max(t, t 2 if max(t, t 2 0 and 0 min(t + k, t 2 + k 2 min(t + k, t 2 + k 2 max(t, t 2 if min(t + k, t 2 + k 2 < 0 and 0 max(t + k, t 2 + k 2 min(t, t 2 + k + k 2 if max(t + k, t 2 + k 2 < 0 and 0 min(t, t 2 + k + k 2 0 otherwise.

17 48 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( Fig. A.3. Values of [ q 0 > b ] ({t, t 2 ; k, k 2 } for k < k 2. By symmetry we need only calculate ψ for k < k 2. Clearly, in order for q 0 to be greater than b, it is necessary that k > b. If this is not true, i.e. if k b, then [q 0 > b] = 0, hence ψ corresponding to ψ := [q 0 > b] is also zero and (20 follows via (A.5 and (A.4. Now, if k > b then the t t 2 -plane does indeed contain a region where ψ =. We show ψ({t, t 2 ; k, k 2 } corresponding to ψ := [q 0 > b] and identify this region in Fig. A.3. Using this graph, calculation of ψ(k, k 2 from the double sum (A.5 is a matter of algebra. From the points along the line t = k, which splits the ψ = region in two trapezoids, we collect b i= (k +k 2 +b+ = k + k 2 2b (A.7 while on the right trapezoid the double sum can be calculated as k 2 b 2 j=0 ( j + k b = 2 (2k + k 2 3b 2(k 2 b. (A.8 On the left trapezoid we find k b 2 j=0 (k + k 2 2b 2 j = 2 (2k 2 + k 3b 2(k b. (A.9 Collecting the expressions (A.7 (A.9, and inserting back into (A.4 and (A.5, we readily conclude to (20. References [] P. Abry, R. Baraniuk, P. Flandrin, R. Riedi, D. Veitch, The multiscale nature of network traffic, IEEE Signal Processing Magazine 9 (3 ( [2] R.G. Addie, T.D. Neame, M. Zukerman, Performance evaluation of a queue fed by a Poisson Pareto burst process, Computer Networks 40 (3 ( [3] J. Alvarez, B. Hajek, A queue with semi-periodic traffic, Advances in Applied Probability 37 ( ( [4] S. Asmussen, Applied Probability and Queues, second ed., Springer-Verlag, New York, NY, [5] N.H. Bingham, C.M. Goldie, J.T. Teugels, Regular Variation, in: Encyclopedia of Mathematics and its Applications, Cambridge University Press, Cambridge, UK, 987. [6] B. Blaszczyszyn, Factorial-moment expansion for stochastic systems, Stochastic Processes and their Applications 56 ( [7] B. Blaszczyszyn, Factorial moment expansion for functionals of point processes with application to approximations of stochastic models, Doctoral Dissertation, Math. Inst. Univ. of Wroclaw, 995.

18 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( [8] S. Borst, O.J. Boxma, R. Nunez-Queija, A.P. Zwart, The impact of service discipline on delay asymptotics, Performance Evaluation 54 (2 ( [9] S. Borst, M. Mandjes, M. van Uitert, Generalized processor sharing with light-tailed and heavy-tailed input, IEEE/ACM Transactions on Networking (5 ( [0] S. Borst, B. Zwart, Fluid queues with heavy-tailed M/G/ input, Mathematics of Operations Research 30 (4 ( [] A. Brandt, M. Brandt, H. Sulanke, A single server model for packetwise transmission of messages, Queueing Systems. Theory and Applications 6 ( [2] F. Brichet, J. Roberts, A. Simonian, D. Veitch, Heavy traffic analysis of a storage model with long range dependent on/off sources, Queueing Systems. Theory and Applications 23 ( [3] J. Cao, W. Cleveland, D. Lin, D. Sun, Internet traffic tends to Poisson and independent as the load increases, Technical Report, Bell Labs, 200. [4] J.W. Cohen, Superimposed renewal processes and storage with gradual input, Stochastic Processes and their Applications 2 ( [5] D.R. Cox, Long-range dependence: A review, in: H.A. David, H.T. David (Eds., Statistics: An Appraisal, Iowa State University Press, Ames, IA, 984, pp [6] T. Daniels, C. Blondia, Asymptotic behavior of a discrete-time queue with long-range dependent input, in: Proceedings of the IEEE Infocom 99, New York, NY, 999. [7] N.G. Duffield, N. O Connell, Large deviations and overflow probabilities for the general single server queue, with applications, in: Mathematical Proceedings of the Cambridge Philosophical Society, vol. 8, 995, pp [8] A. Erdélyi, Higher Transcendental Functions, vol. 3, McGraw-Hill, New York, NY, 955. [9] W. Feller, An Introduction to Probability Theory and its Applications, vol. II, John Wiley and Sons, New York, NY, 972. [20] P.J. Fleming, B. Simon, Interpolation approximations of sojourn time distributions, Operations Research 39 (2 ( [2] M. Grossglauser, J.-C. Bolot, On the relevance of long-range dependence in network traffic, IEEE/ACM Transactions on Networking 7 (5 ( [22] R.K. Jain, The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling, Wiley, 99. [23] P.R. Jelenković, A.A. Lazar, Asymptotic results for multiplexing subexponential on-off processes, Advances in Applied Probability 3 (2 ( [24] T. Karagiannis, M. Molle, M. Faloutsos, Long range dependence: Ten years of Internet traffic modeling, IEEE Internet Computing 8 ( [25] M.M. Krunz, A.M. Makowski, Modeling video traffic using M G input processes: A compromise between Markovian and LRD models, IEEE Journal on Selected Areas in Communications 6 (5 ( [26] Z. Liu, Ph. Nain, D. Towsley, Z.-L. Zhang, Asymptotic behavior of a multiplexer fed by a long-range dependent process, Journal of Applied Probability (36 ( [27] A.M. Makowski, Long range dependence does not necessarily imply non-exponential tails, IEEE Communications Letters 6 (2 ( [28] I. Norros, A storage model with self-similar input, Queueing Systems. Theory and Applications 6 ( [29] M. Parulekar, A.M. Makowski, Tail probabilities for M G processes (I: Preliminary asymptotics, Queueing Systems. Theory and Applications 27 ( [30] M.I. Reiman, B. Simon, Open queueing systems in light traffic, Mathematics of Operations Research 4 ( [3] K. Sigman, G. Yamazaki, Fluid models with burst arrivals: A sample path analysis, Probability in the Engineering and Informational Sciences 6 ( [32] B. Simon, A simple relationship between heavy and light traffic limits, Operations Research 40 (992 S342 S345. [33] K.P. Tsoukatos, Heavy and light traffic regimes for M G traffic models, Ph.D. Thesis, University of Maryland, College Park, MD, May pdf. [34] K.P. Tsoukatos, A.M. Makowski, Heavy traffic analysis for a multiplexer driven by M G I input processes, in: Proceedings of the 5th International Teletraffic Congress, Washington, D.C., June 997, pp [35] K.P. Tsoukatos, A.M. Makowski, Heavy traffic limits associated with M G input processes, Queueing Systems. Theory and Applications 34 ( 4 ( [36] K.P. Tsoukatos, A.M. Makowski, Asymptotic optimality of the Round Robin policy in multipath routing with resequencing, Queueing Systems. Theory and Applications 52 (3 ( [37] S. Wittevrongel, H. Bruneel, Correlation effects in ATM queues due to data format conversions, Performance Evaluation 32 ( 4 ( [38] W. Whitt, Stochastic-Process Limits: An Introduction to Stochastic-Process Limits and their Applications to Queues, Springer-Verlag, New York, NY, [39] A. Zwart, O.J. Boxma, Sojourn time asymptotics in the M G processor sharing queue, Queueing Systems. Theory and Applications 35 ( 4 (

19 50 K.P. Tsoukatos, A.M. Makowski / Performance Evaluation 65 ( Konstantinos (Kostas Tsoukatos received the Diploma degree from the National Technical University of Athens, Greece in 992, a M.Sc. and a Ph.D. in Electrical Engineering from the University of Maryland, College Park, in 994 and 999 respectively. He was a recipient of an Eugenides Foundation Scholarship for graduate studies in the United States in 993, and a summer intern at the IBM T.J. Watson Research Center, NY, in 994 and 995. During he was a research associate with the Telecommunications Laboratory, National Technical University of Athens. Since February 2003 he is as an adjunct assistant professor at the Communications and Computer Engineering Department, University of Thessaly, Volos. His interests are in performance modeling of wireless and wireline networks; topics include queueing analysis of self-similar Internet traffic, optimal scheduling in parallel systems, and resource allocation in wireless. Armand M. Makowski received the Licence en Sciences Mathématiques from the Université Libre de Bruxelles in 975, the M.S. degree in Engineering-Systems Science from U.C.L.A. in 976 and the Ph.D. degree in Applied Mathematics from the University of Kentucky in 98. In August 98, he joined the faculty of the Electrical Engineering Department at the University of Maryland College Park, where he is Professor of Electrical and Computer Engineering. He has held a joint appointment with the Institute for Systems Research since its establishment in 985. Armand Makowski was a C.R.B. Fellow of the Belgian-American Educational Foundation (BAEF for the academic year ; he is also a 984 recipient of the NSF Presidential Young Investigator Award and he became an IEEE Fellow in His research interests lie in applying advanced methods from the theory of stochastic processes to the modeling, design and performance evaluation of engineering systems, with particularemphasis on communication systems and networks.

Supplement to Call Centers with Delay Information: Models and Insights

Supplement to Call Centers with Delay Information: Models and Insights Supplement to Call Centers with Delay Information: Models and Insights Oualid Jouini 1 Zeynep Akşin 2 Yves Dallery 1 1 Laboratoire Genie Industriel, Ecole Centrale Paris, Grande Voie des Vignes, 92290

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

Corrected Diffusion Approximations for the Maximum of Heavy-Tailed Random Walk

Corrected Diffusion Approximations for the Maximum of Heavy-Tailed Random Walk Corrected Diffusion Approximations for the Maximum of Heavy-Tailed Random Walk Jose Blanchet and Peter Glynn December, 2003. Let (X n : n 1) be a sequence of independent and identically distributed random

More information

MATH 132: CALCULUS II SYLLABUS

MATH 132: CALCULUS II SYLLABUS MATH 32: CALCULUS II SYLLABUS Prerequisites: Successful completion of Math 3 (or its equivalent elsewhere). Math 27 is normally not a sufficient prerequisite for Math 32. Required Text: Calculus: Early

More information

M/M/1 and M/M/m Queueing Systems

M/M/1 and M/M/m Queueing Systems M/M/ and M/M/m Queueing Systems M. Veeraraghavan; March 20, 2004. Preliminaries. Kendall s notation: G/G/n/k queue G: General - can be any distribution. First letter: Arrival process; M: memoryless - exponential

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

Stationary random graphs on Z with prescribed iid degrees and finite mean connections

Stationary random graphs on Z with prescribed iid degrees and finite mean connections Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative

More information

Nonparametric adaptive age replacement with a one-cycle criterion

Nonparametric adaptive age replacement with a one-cycle criterion Nonparametric adaptive age replacement with a one-cycle criterion P. Coolen-Schrijner, F.P.A. Coolen Department of Mathematical Sciences University of Durham, Durham, DH1 3LE, UK e-mail: Pauline.Schrijner@durham.ac.uk

More information

Examining Self-Similarity Network Traffic intervals

Examining Self-Similarity Network Traffic intervals Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have

More information

Understanding Poles and Zeros

Understanding Poles and Zeros MASSACHUSETTS INSTITUTE OF TECHNOLOGY DEPARTMENT OF MECHANICAL ENGINEERING 2.14 Analysis and Design of Feedback Control Systems Understanding Poles and Zeros 1 System Poles and Zeros The transfer function

More information

CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e.

CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. This chapter contains the beginnings of the most important, and probably the most subtle, notion in mathematical analysis, i.e.,

More information

Random access protocols for channel access. Markov chains and their stability. Laurent Massoulié.

Random access protocols for channel access. Markov chains and their stability. Laurent Massoulié. Random access protocols for channel access Markov chains and their stability laurent.massoulie@inria.fr Aloha: the first random access protocol for channel access [Abramson, Hawaii 70] Goal: allow machines

More information

Observingtheeffectof TCP congestion controlon networktraffic

Observingtheeffectof TCP congestion controlon networktraffic Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu

More information

A Uniform Asymptotic Estimate for Discounted Aggregate Claims with Subexponential Tails

A Uniform Asymptotic Estimate for Discounted Aggregate Claims with Subexponential Tails 12th International Congress on Insurance: Mathematics and Economics July 16-18, 2008 A Uniform Asymptotic Estimate for Discounted Aggregate Claims with Subexponential Tails XUEMIAO HAO (Based on a joint

More information

A Coefficient of Variation for Skewed and Heavy-Tailed Insurance Losses. Michael R. Powers[ 1 ] Temple University and Tsinghua University

A Coefficient of Variation for Skewed and Heavy-Tailed Insurance Losses. Michael R. Powers[ 1 ] Temple University and Tsinghua University A Coefficient of Variation for Skewed and Heavy-Tailed Insurance Losses Michael R. Powers[ ] Temple University and Tsinghua University Thomas Y. Powers Yale University [June 2009] Abstract We propose a

More information

Persuasion by Cheap Talk - Online Appendix

Persuasion by Cheap Talk - Online Appendix Persuasion by Cheap Talk - Online Appendix By ARCHISHMAN CHAKRABORTY AND RICK HARBAUGH Online appendix to Persuasion by Cheap Talk, American Economic Review Our results in the main text concern the case

More information

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem

More information

A simple criterion on degree sequences of graphs

A simple criterion on degree sequences of graphs Discrete Applied Mathematics 156 (2008) 3513 3517 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Note A simple criterion on degree

More information

Modeling Heterogeneous Network Traffic in Wavelet Domain

Modeling Heterogeneous Network Traffic in Wavelet Domain 634 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 5, OCTOBER 2001 Modeling Heterogeneous Network Traffic in Wavelet Domain Sheng Ma, Member, IEEE, Chuanyi Ji Abstract Heterogeneous network traffic possesses

More information

Performance Analysis of a Telephone System with both Patient and Impatient Customers

Performance Analysis of a Telephone System with both Patient and Impatient Customers Performance Analysis of a Telephone System with both Patient and Impatient Customers Yiqiang Quennel Zhao Department of Mathematics and Statistics University of Winnipeg Winnipeg, Manitoba Canada R3B 2E9

More information

ECON20310 LECTURE SYNOPSIS REAL BUSINESS CYCLE

ECON20310 LECTURE SYNOPSIS REAL BUSINESS CYCLE ECON20310 LECTURE SYNOPSIS REAL BUSINESS CYCLE YUAN TIAN This synopsis is designed merely for keep a record of the materials covered in lectures. Please refer to your own lecture notes for all proofs.

More information

This unit will lay the groundwork for later units where the students will extend this knowledge to quadratic and exponential functions.

This unit will lay the groundwork for later units where the students will extend this knowledge to quadratic and exponential functions. Algebra I Overview View unit yearlong overview here Many of the concepts presented in Algebra I are progressions of concepts that were introduced in grades 6 through 8. The content presented in this course

More information

Lectures on Stochastic Processes. William G. Faris

Lectures on Stochastic Processes. William G. Faris Lectures on Stochastic Processes William G. Faris November 8, 2001 2 Contents 1 Random walk 7 1.1 Symmetric simple random walk................... 7 1.2 Simple random walk......................... 9 1.3

More information

Math 181 Handout 16. Rich Schwartz. March 9, 2010

Math 181 Handout 16. Rich Schwartz. March 9, 2010 Math 8 Handout 6 Rich Schwartz March 9, 200 The purpose of this handout is to describe continued fractions and their connection to hyperbolic geometry. The Gauss Map Given any x (0, ) we define γ(x) =

More information

Hydrodynamic Limits of Randomized Load Balancing Networks

Hydrodynamic Limits of Randomized Load Balancing Networks Hydrodynamic Limits of Randomized Load Balancing Networks Kavita Ramanan and Mohammadreza Aghajani Brown University Stochastic Networks and Stochastic Geometry a conference in honour of François Baccelli

More information

The Exponential Distribution

The Exponential Distribution 21 The Exponential Distribution From Discrete-Time to Continuous-Time: In Chapter 6 of the text we will be considering Markov processes in continuous time. In a sense, we already have a very good understanding

More information

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Self-similarity and its evolution in Computer Network Measurements Prior models used Poisson-like models Origins

More information

Maximum Likelihood Estimation

Maximum Likelihood Estimation Math 541: Statistical Theory II Lecturer: Songfeng Zheng Maximum Likelihood Estimation 1 Maximum Likelihood Estimation Maximum likelihood is a relatively simple method of constructing an estimator for

More information

How To Balance In A Distributed System

How To Balance In A Distributed System 6 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 11, NO. 1, JANUARY 2000 How Useful Is Old Information? Michael Mitzenmacher AbstractÐWe consider the problem of load balancing in dynamic distributed

More information

Review of Fundamental Mathematics

Review of Fundamental Mathematics Review of Fundamental Mathematics As explained in the Preface and in Chapter 1 of your textbook, managerial economics applies microeconomic theory to business decision making. The decision-making tools

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete

More information

The Heat Equation. Lectures INF2320 p. 1/88

The Heat Equation. Lectures INF2320 p. 1/88 The Heat Equation Lectures INF232 p. 1/88 Lectures INF232 p. 2/88 The Heat Equation We study the heat equation: u t = u xx for x (,1), t >, (1) u(,t) = u(1,t) = for t >, (2) u(x,) = f(x) for x (,1), (3)

More information

INSURANCE RISK THEORY (Problems)

INSURANCE RISK THEORY (Problems) INSURANCE RISK THEORY (Problems) 1 Counting random variables 1. (Lack of memory property) Let X be a geometric distributed random variable with parameter p (, 1), (X Ge (p)). Show that for all n, m =,

More information

DRAFT. Algebra 1 EOC Item Specifications

DRAFT. Algebra 1 EOC Item Specifications DRAFT Algebra 1 EOC Item Specifications The draft Florida Standards Assessment (FSA) Test Item Specifications (Specifications) are based upon the Florida Standards and the Florida Course Descriptions as

More information

Probability and Statistics Prof. Dr. Somesh Kumar Department of Mathematics Indian Institute of Technology, Kharagpur

Probability and Statistics Prof. Dr. Somesh Kumar Department of Mathematics Indian Institute of Technology, Kharagpur Probability and Statistics Prof. Dr. Somesh Kumar Department of Mathematics Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #15 Special Distributions-VI Today, I am going to introduce

More information

Probabilistic properties and statistical analysis of network traffic models: research project

Probabilistic properties and statistical analysis of network traffic models: research project Probabilistic properties and statistical analysis of network traffic models: research project The problem: It is commonly accepted that teletraffic data exhibits self-similarity over a certain range of

More information

LOGNORMAL MODEL FOR STOCK PRICES

LOGNORMAL MODEL FOR STOCK PRICES LOGNORMAL MODEL FOR STOCK PRICES MICHAEL J. SHARPE MATHEMATICS DEPARTMENT, UCSD 1. INTRODUCTION What follows is a simple but important model that will be the basis for a later study of stock prices as

More information

Some stability results of parameter identification in a jump diffusion model

Some stability results of parameter identification in a jump diffusion model Some stability results of parameter identification in a jump diffusion model D. Düvelmeyer Technische Universität Chemnitz, Fakultät für Mathematik, 09107 Chemnitz, Germany Abstract In this paper we discuss

More information

CHAPTER 2 Estimating Probabilities

CHAPTER 2 Estimating Probabilities CHAPTER 2 Estimating Probabilities Machine Learning Copyright c 2016. Tom M. Mitchell. All rights reserved. *DRAFT OF January 24, 2016* *PLEASE DO NOT DISTRIBUTE WITHOUT AUTHOR S PERMISSION* This is a

More information

Spatial Statistics Chapter 3 Basics of areal data and areal data modeling

Spatial Statistics Chapter 3 Basics of areal data and areal data modeling Spatial Statistics Chapter 3 Basics of areal data and areal data modeling Recall areal data also known as lattice data are data Y (s), s D where D is a discrete index set. This usually corresponds to data

More information

Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents

Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents William H. Sandholm January 6, 22 O.. Imitative protocols, mean dynamics, and equilibrium selection In this section, we consider

More information

Factoring Patterns in the Gaussian Plane

Factoring Patterns in the Gaussian Plane Factoring Patterns in the Gaussian Plane Steve Phelps Introduction This paper describes discoveries made at the Park City Mathematics Institute, 00, as well as some proofs. Before the summer I understood

More information

Georgia Department of Education Kathy Cox, State Superintendent of Schools 7/19/2005 All Rights Reserved 1

Georgia Department of Education Kathy Cox, State Superintendent of Schools 7/19/2005 All Rights Reserved 1 Accelerated Mathematics 3 This is a course in precalculus and statistics, designed to prepare students to take AB or BC Advanced Placement Calculus. It includes rational, circular trigonometric, and inverse

More information

CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA

CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA We Can Early Learning Curriculum PreK Grades 8 12 INSIDE ALGEBRA, GRADES 8 12 CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA April 2016 www.voyagersopris.com Mathematical

More information

arxiv:hep-th/0507236v1 25 Jul 2005

arxiv:hep-th/0507236v1 25 Jul 2005 Non perturbative series for the calculation of one loop integrals at finite temperature Paolo Amore arxiv:hep-th/050736v 5 Jul 005 Facultad de Ciencias, Universidad de Colima, Bernal Diaz del Castillo

More information

A Queueing System for Modeling a File Sharing Principle

A Queueing System for Modeling a File Sharing Principle A Queueing System for Modeling a File Sharing Principle Florian Simatos and Philippe Robert IRIA, RAP project Domaine de Voluceau, Rocquencourt 7853 Le Chesnay, France {Florian.Simatos,Philippe.Robert}@inria.fr

More information

South Carolina College- and Career-Ready (SCCCR) Algebra 1

South Carolina College- and Career-Ready (SCCCR) Algebra 1 South Carolina College- and Career-Ready (SCCCR) Algebra 1 South Carolina College- and Career-Ready Mathematical Process Standards The South Carolina College- and Career-Ready (SCCCR) Mathematical Process

More information

Analysis of a Production/Inventory System with Multiple Retailers

Analysis of a Production/Inventory System with Multiple Retailers Analysis of a Production/Inventory System with Multiple Retailers Ann M. Noblesse 1, Robert N. Boute 1,2, Marc R. Lambrecht 1, Benny Van Houdt 3 1 Research Center for Operations Management, University

More information

Stochastic Inventory Control

Stochastic Inventory Control Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the

More information

Vilnius University. Faculty of Mathematics and Informatics. Gintautas Bareikis

Vilnius University. Faculty of Mathematics and Informatics. Gintautas Bareikis Vilnius University Faculty of Mathematics and Informatics Gintautas Bareikis CONTENT Chapter 1. SIMPLE AND COMPOUND INTEREST 1.1 Simple interest......................................................................

More information

Stochastic Processes and Queueing Theory used in Cloud Computer Performance Simulations

Stochastic Processes and Queueing Theory used in Cloud Computer Performance Simulations 56 Stochastic Processes and Queueing Theory used in Cloud Computer Performance Simulations Stochastic Processes and Queueing Theory used in Cloud Computer Performance Simulations Florin-Cătălin ENACHE

More information

THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING

THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING 1. Introduction The Black-Scholes theory, which is the main subject of this course and its sequel, is based on the Efficient Market Hypothesis, that arbitrages

More information

t := maxγ ν subject to ν {0,1,2,...} and f(x c +γ ν d) f(x c )+cγ ν f (x c ;d).

t := maxγ ν subject to ν {0,1,2,...} and f(x c +γ ν d) f(x c )+cγ ν f (x c ;d). 1. Line Search Methods Let f : R n R be given and suppose that x c is our current best estimate of a solution to P min x R nf(x). A standard method for improving the estimate x c is to choose a direction

More information

Math Review. for the Quantitative Reasoning Measure of the GRE revised General Test

Math Review. for the Quantitative Reasoning Measure of the GRE revised General Test Math Review for the Quantitative Reasoning Measure of the GRE revised General Test www.ets.org Overview This Math Review will familiarize you with the mathematical skills and concepts that are important

More information

Estimating the Degree of Activity of jumps in High Frequency Financial Data. joint with Yacine Aït-Sahalia

Estimating the Degree of Activity of jumps in High Frequency Financial Data. joint with Yacine Aït-Sahalia Estimating the Degree of Activity of jumps in High Frequency Financial Data joint with Yacine Aït-Sahalia Aim and setting An underlying process X = (X t ) t 0, observed at equally spaced discrete times

More information

Errata and updates for ASM Exam C/Exam 4 Manual (Sixteenth Edition) sorted by page

Errata and updates for ASM Exam C/Exam 4 Manual (Sixteenth Edition) sorted by page Errata for ASM Exam C/4 Study Manual (Sixteenth Edition) Sorted by Page 1 Errata and updates for ASM Exam C/Exam 4 Manual (Sixteenth Edition) sorted by page Practice exam 1:9, 1:22, 1:29, 9:5, and 10:8

More information

4.3 Lagrange Approximation

4.3 Lagrange Approximation 206 CHAP. 4 INTERPOLATION AND POLYNOMIAL APPROXIMATION Lagrange Polynomial Approximation 4.3 Lagrange Approximation Interpolation means to estimate a missing function value by taking a weighted average

More information

IEOR 6711: Stochastic Models, I Fall 2012, Professor Whitt, Final Exam SOLUTIONS

IEOR 6711: Stochastic Models, I Fall 2012, Professor Whitt, Final Exam SOLUTIONS IEOR 6711: Stochastic Models, I Fall 2012, Professor Whitt, Final Exam SOLUTIONS There are four questions, each with several parts. 1. Customers Coming to an Automatic Teller Machine (ATM) (30 points)

More information

THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS

THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS KEITH CONRAD 1. Introduction The Fundamental Theorem of Algebra says every nonconstant polynomial with complex coefficients can be factored into linear

More information

State of Stress at Point

State of Stress at Point State of Stress at Point Einstein Notation The basic idea of Einstein notation is that a covector and a vector can form a scalar: This is typically written as an explicit sum: According to this convention,

More information

Undergraduate Notes in Mathematics. Arkansas Tech University Department of Mathematics

Undergraduate Notes in Mathematics. Arkansas Tech University Department of Mathematics Undergraduate Notes in Mathematics Arkansas Tech University Department of Mathematics An Introductory Single Variable Real Analysis: A Learning Approach through Problem Solving Marcel B. Finan c All Rights

More information

Sequences and Series

Sequences and Series Sequences and Series Consider the following sum: 2 + 4 + 8 + 6 + + 2 i + The dots at the end indicate that the sum goes on forever. Does this make sense? Can we assign a numerical value to an infinite

More information

SPARE PARTS INVENTORY SYSTEMS UNDER AN INCREASING FAILURE RATE DEMAND INTERVAL DISTRIBUTION

SPARE PARTS INVENTORY SYSTEMS UNDER AN INCREASING FAILURE RATE DEMAND INTERVAL DISTRIBUTION SPARE PARS INVENORY SYSEMS UNDER AN INCREASING FAILURE RAE DEMAND INERVAL DISRIBUION Safa Saidane 1, M. Zied Babai 2, M. Salah Aguir 3, Ouajdi Korbaa 4 1 National School of Computer Sciences (unisia),

More information

Lecture L3 - Vectors, Matrices and Coordinate Transformations

Lecture L3 - Vectors, Matrices and Coordinate Transformations S. Widnall 16.07 Dynamics Fall 2009 Lecture notes based on J. Peraire Version 2.0 Lecture L3 - Vectors, Matrices and Coordinate Transformations By using vectors and defining appropriate operations between

More information

1 The Brownian bridge construction

1 The Brownian bridge construction The Brownian bridge construction The Brownian bridge construction is a way to build a Brownian motion path by successively adding finer scale detail. This construction leads to a relatively easy proof

More information

Lectures 5-6: Taylor Series

Lectures 5-6: Taylor Series Math 1d Instructor: Padraic Bartlett Lectures 5-: Taylor Series Weeks 5- Caltech 213 1 Taylor Polynomials and Series As we saw in week 4, power series are remarkably nice objects to work with. In particular,

More information

Inner Product Spaces

Inner Product Spaces Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and

More information

Algebraic and Transcendental Numbers

Algebraic and Transcendental Numbers Pondicherry University July 2000 Algebraic and Transcendental Numbers Stéphane Fischler This text is meant to be an introduction to algebraic and transcendental numbers. For a detailed (though elementary)

More information

Brownian Motion and Stochastic Flow Systems. J.M Harrison

Brownian Motion and Stochastic Flow Systems. J.M Harrison Brownian Motion and Stochastic Flow Systems 1 J.M Harrison Report written by Siva K. Gorantla I. INTRODUCTION Brownian motion is the seemingly random movement of particles suspended in a fluid or a mathematical

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

MATH4427 Notebook 2 Spring 2016. 2 MATH4427 Notebook 2 3. 2.1 Definitions and Examples... 3. 2.2 Performance Measures for Estimators...

MATH4427 Notebook 2 Spring 2016. 2 MATH4427 Notebook 2 3. 2.1 Definitions and Examples... 3. 2.2 Performance Measures for Estimators... MATH4427 Notebook 2 Spring 2016 prepared by Professor Jenny Baglivo c Copyright 2009-2016 by Jenny A. Baglivo. All Rights Reserved. Contents 2 MATH4427 Notebook 2 3 2.1 Definitions and Examples...................................

More information

Time series Forecasting using Holt-Winters Exponential Smoothing

Time series Forecasting using Holt-Winters Exponential Smoothing Time series Forecasting using Holt-Winters Exponential Smoothing Prajakta S. Kalekar(04329008) Kanwal Rekhi School of Information Technology Under the guidance of Prof. Bernard December 6, 2004 Abstract

More information

Introduction to time series analysis

Introduction to time series analysis Introduction to time series analysis Margherita Gerolimetto November 3, 2010 1 What is a time series? A time series is a collection of observations ordered following a parameter that for us is time. Examples

More information

Probability Generating Functions

Probability Generating Functions page 39 Chapter 3 Probability Generating Functions 3 Preamble: Generating Functions Generating functions are widely used in mathematics, and play an important role in probability theory Consider a sequence

More information

The Characteristic Polynomial

The Characteristic Polynomial Physics 116A Winter 2011 The Characteristic Polynomial 1 Coefficients of the characteristic polynomial Consider the eigenvalue problem for an n n matrix A, A v = λ v, v 0 (1) The solution to this problem

More information

arxiv:1112.0829v1 [math.pr] 5 Dec 2011

arxiv:1112.0829v1 [math.pr] 5 Dec 2011 How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly

More information

1. (First passage/hitting times/gambler s ruin problem:) Suppose that X has a discrete state space and let i be a fixed state. Let

1. (First passage/hitting times/gambler s ruin problem:) Suppose that X has a discrete state space and let i be a fixed state. Let Copyright c 2009 by Karl Sigman 1 Stopping Times 1.1 Stopping Times: Definition Given a stochastic process X = {X n : n 0}, a random time τ is a discrete random variable on the same probability space as

More information

FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z

FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z DANIEL BIRMAJER, JUAN B GIL, AND MICHAEL WEINER Abstract We consider polynomials with integer coefficients and discuss their factorization

More information

Optimal shift scheduling with a global service level constraint

Optimal shift scheduling with a global service level constraint Optimal shift scheduling with a global service level constraint Ger Koole & Erik van der Sluis Vrije Universiteit Division of Mathematics and Computer Science De Boelelaan 1081a, 1081 HV Amsterdam The

More information

Evaluating the Lead Time Demand Distribution for (r, Q) Policies Under Intermittent Demand

Evaluating the Lead Time Demand Distribution for (r, Q) Policies Under Intermittent Demand Proceedings of the 2009 Industrial Engineering Research Conference Evaluating the Lead Time Demand Distribution for (r, Q) Policies Under Intermittent Demand Yasin Unlu, Manuel D. Rossetti Department of

More information

VI. Real Business Cycles Models

VI. Real Business Cycles Models VI. Real Business Cycles Models Introduction Business cycle research studies the causes and consequences of the recurrent expansions and contractions in aggregate economic activity that occur in most industrialized

More information

6. Define log(z) so that π < I log(z) π. Discuss the identities e log(z) = z and log(e w ) = w.

6. Define log(z) so that π < I log(z) π. Discuss the identities e log(z) = z and log(e w ) = w. hapter omplex integration. omplex number quiz. Simplify 3+4i. 2. Simplify 3+4i. 3. Find the cube roots of. 4. Here are some identities for complex conjugate. Which ones need correction? z + w = z + w,

More information

VERTICES OF GIVEN DEGREE IN SERIES-PARALLEL GRAPHS

VERTICES OF GIVEN DEGREE IN SERIES-PARALLEL GRAPHS VERTICES OF GIVEN DEGREE IN SERIES-PARALLEL GRAPHS MICHAEL DRMOTA, OMER GIMENEZ, AND MARC NOY Abstract. We show that the number of vertices of a given degree k in several kinds of series-parallel labelled

More information

Stochastic Models for Inventory Management at Service Facilities

Stochastic Models for Inventory Management at Service Facilities Stochastic Models for Inventory Management at Service Facilities O. Berman, E. Kim Presented by F. Zoghalchi University of Toronto Rotman School of Management Dec, 2012 Agenda 1 Problem description Deterministic

More information

Linear algebra and the geometry of quadratic equations. Similarity transformations and orthogonal matrices

Linear algebra and the geometry of quadratic equations. Similarity transformations and orthogonal matrices MATH 30 Differential Equations Spring 006 Linear algebra and the geometry of quadratic equations Similarity transformations and orthogonal matrices First, some things to recall from linear algebra Two

More information

CHAPTER 3 CALL CENTER QUEUING MODEL WITH LOGNORMAL SERVICE TIME DISTRIBUTION

CHAPTER 3 CALL CENTER QUEUING MODEL WITH LOGNORMAL SERVICE TIME DISTRIBUTION 31 CHAPTER 3 CALL CENTER QUEUING MODEL WITH LOGNORMAL SERVICE TIME DISTRIBUTION 3.1 INTRODUCTION In this chapter, construction of queuing model with non-exponential service time distribution, performance

More information

Mathematics Course 111: Algebra I Part IV: Vector Spaces

Mathematics Course 111: Algebra I Part IV: Vector Spaces Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are

More information

WHEN DOES A RANDOMLY WEIGHTED SELF NORMALIZED SUM CONVERGE IN DISTRIBUTION?

WHEN DOES A RANDOMLY WEIGHTED SELF NORMALIZED SUM CONVERGE IN DISTRIBUTION? WHEN DOES A RANDOMLY WEIGHTED SELF NORMALIZED SUM CONVERGE IN DISTRIBUTION? DAVID M MASON 1 Statistics Program, University of Delaware Newark, DE 19717 email: davidm@udeledu JOEL ZINN 2 Department of Mathematics,

More information

How To Check For Differences In The One Way Anova

How To Check For Differences In The One Way Anova MINITAB ASSISTANT WHITE PAPER This paper explains the research conducted by Minitab statisticians to develop the methods and data checks used in the Assistant in Minitab 17 Statistical Software. One-Way

More information

Trading activity as driven Poisson process: comparison with empirical data

Trading activity as driven Poisson process: comparison with empirical data Trading activity as driven Poisson process: comparison with empirical data V. Gontis, B. Kaulakys, J. Ruseckas Institute of Theoretical Physics and Astronomy of Vilnius University, A. Goštauto 2, LT-008

More information

9.2 Summation Notation

9.2 Summation Notation 9. Summation Notation 66 9. Summation Notation In the previous section, we introduced sequences and now we shall present notation and theorems concerning the sum of terms of a sequence. We begin with a

More information

Chapter 8 - Power Density Spectrum

Chapter 8 - Power Density Spectrum EE385 Class Notes 8/8/03 John Stensby Chapter 8 - Power Density Spectrum Let X(t) be a WSS random process. X(t) has an average power, given in watts, of E[X(t) ], a constant. his total average power is

More information

Fluid Approximation of Smart Grid Systems: Optimal Control of Energy Storage Units

Fluid Approximation of Smart Grid Systems: Optimal Control of Energy Storage Units Fluid Approximation of Smart Grid Systems: Optimal Control of Energy Storage Units by Rasha Ibrahim Sakr, B.Sc. A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment

More information

TOPIC 4: DERIVATIVES

TOPIC 4: DERIVATIVES TOPIC 4: DERIVATIVES 1. The derivative of a function. Differentiation rules 1.1. The slope of a curve. The slope of a curve at a point P is a measure of the steepness of the curve. If Q is a point on the

More information

Entry Level College Mathematics: Algebra or Modeling

Entry Level College Mathematics: Algebra or Modeling Entry Level College Mathematics: Algebra or Modeling Dan Kalman Dan Kalman is Associate Professor in Mathematics and Statistics at American University. His interests include matrix theory, curriculum development,

More information

OPTIMAL CONTROL OF FLEXIBLE SERVERS IN TWO TANDEM QUEUES WITH OPERATING COSTS

OPTIMAL CONTROL OF FLEXIBLE SERVERS IN TWO TANDEM QUEUES WITH OPERATING COSTS Probability in the Engineering and Informational Sciences, 22, 2008, 107 131. Printed in the U.S.A. DOI: 10.1017/S0269964808000077 OPTIMAL CONTROL OF FLEXILE SERVERS IN TWO TANDEM QUEUES WITH OPERATING

More information

AVAILABLE bandwidth of a network path has long been

AVAILABLE bandwidth of a network path has long been 918 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 4, AUGUST 2007 A Queueing-Theoretic Foundation of Available Bandwidth Estimation: Single-Hop Analysis Xiliang Liu, Member, IEEE, Kaliappa Ravindran,

More information

Resource Pooling in the Presence of Failures: Efficiency versus Risk

Resource Pooling in the Presence of Failures: Efficiency versus Risk Resource Pooling in the Presence of Failures: Efficiency versus Risk Sigrún Andradóttir and Hayriye Ayhan H. Milton Stewart School of Industrial and Systems Engineering Georgia Institute of Technology

More information

2.2. Instantaneous Velocity

2.2. Instantaneous Velocity 2.2. Instantaneous Velocity toc Assuming that your are not familiar with the technical aspects of this section, when you think about it, your knowledge of velocity is limited. In terms of your own mathematical

More information

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information