Mark Shifrin. YEQT 2015 Eurandom, Eindhoven 12th November 2015

Similar documents
Load Balancing and Switch Scheduling

On the effect of forwarding table size on SDN network utilization

Paper 2 Revision. (compiled in light of the contents of paper1) Higher Tier Edexcel

Master of Arts in Mathematics

Pull versus Push Mechanism in Large Distributed Networks: Closed Form Results

Surface Area Quick Review: CH 5

Curriculum Overview YR 9 MATHS. SUPPORT CORE HIGHER Topics Topics Topics Powers of 10 Powers of 10 Significant figures

Mathematics 31 Pre-calculus and Limits

Optimization of Supply Chain Networks

Joint Optimization of Overlapping Phases in MapReduce

Common Core Unit Summary Grades 6 to 8

Cloud Computing Capacity Planning. Maximizing Cloud Value. Authors: Jose Vargas, Clint Sherwood. Organization: IBM Cloud Labs

CSE 135: Introduction to Theory of Computation Decidability and Recognizability

Grade 6 Mathematics Performance Level Descriptors

Algebra 1 Course Title

HSR HOCHSCHULE FÜR TECHNIK RA PPERSW I L

MATH. ALGEBRA I HONORS 9 th Grade ALGEBRA I HONORS

AN ASYMPTOTIC OPTIMALITY RESULT FOR THE MULTICLASS QUEUE WITH FINITE BUFFERS IN HEAVY TRAFFIC

The Classes P and NP

Hydrodynamic Limits of Randomized Load Balancing Networks

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Basic Math for the Small Public Water Systems Operator

Solving Quadratic Equations

CHAPTER 3 CALL CENTER QUEUING MODEL WITH LOGNORMAL SERVICE TIME DISTRIBUTION

GRADES 7, 8, AND 9 BIG IDEAS

Study Guide 2 Solutions MATH 111

Inv 1 5. Draw 2 different shapes, each with an area of 15 square units and perimeter of 16 units.

Stochastic Models for Inventory Management at Service Facilities

Competitive Analysis of QoS Networks

Student Outcomes. Lesson Notes. Classwork. Exercises 1 3 (4 minutes)

Effective Bandwidth of Multiclass Markovian Traffic Sources and Admission Control With Dynamic Buffer Partitioning

LOAD BALANCING MECHANISMS IN DATA CENTER NETWORKS

4.3 Lagrange Approximation

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Deployment of express checkout lines at supermarkets

Classifying Large Data Sets Using SVMs with Hierarchical Clusters. Presented by :Limou Wang

How To Model A System

In mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data.

Case Study I: A Database Service

AN INTRODUCTION TO NUMERICAL METHODS AND ANALYSIS

Near Optimal Solutions

QoS for Cloud Computing!

DELAWARE MATHEMATICS CONTENT STANDARDS GRADES PAGE(S) WHERE TAUGHT (If submission is not a book, cite appropriate location(s))

Data Structure [Question Bank]

An Approach to Load Balancing In Cloud Computing

Performance Test Process

Sequence of Mathematics Courses

How Solace Message Routers Reduce the Cost of IT Infrastructure

The Halting Problem is Undecidable

Florida Math Correlation of the ALEKS course Florida Math 0028 to the Florida Mathematics Competencies - Upper

ARBITRAGE-FREE OPTION PRICING MODELS. Denis Bell. University of North Florida

Performance And Scalability In Oracle9i And SQL Server 2000

The Analysis of Dynamical Queueing Systems (Background)

Volumes of Revolution

2x 2x 2 8x. Now, let s work backwards to FACTOR. We begin by placing the terms of the polynomial inside the cells of the box. 2x 2

Triangular Distributions

1 The Brownian bridge construction

Geometry Course Summary Department: Math. Semester 1

Arena Tutorial 1. Installation STUDENT 2. Overall Features of Arena

5.1 Bipartite Matching

Cyberoam and Bandwidth

t hours This is the distance in miles travelled in 2 hours when the speed is 70mph. = 22 yards per second. = 110 yards.

Table of Contents INTRODUCTION Prerequisites... 3 Audience... 3 Report Metrics... 3

Solutions of Equations in One Variable. Fixed-Point Iteration II

Two Topics in Parametric Integration Applied to Stochastic Simulation in Industrial Engineering

Operations Research and Financial Engineering. Courses

Sect Solving Equations Using the Zero Product Rule

A New Method for Estimating Maximum Power Transfer and Voltage Stability Margins to Mitigate the Risk of Voltage Collapse

MATH 132: CALCULUS II SYLLABUS

MATHEMATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Logic and Computer Science - Phokion G. Kolaitis

Higher Education Math Placement

Math 0980 Chapter Objectives. Chapter 1: Introduction to Algebra: The Integers.

Perimeter, Area, and Volume

Section 7.2 Area. The Area of Rectangles and Triangles

4.3 Results Drained Conditions Undrained Conditions References Data Files Undrained Analysis of

Florida Department of Education/Office of Assessment January Grade 6 FCAT 2.0 Mathematics Achievement Level Descriptions

Unit 7 Quadratic Relations of the Form y = ax 2 + bx + c

MATH 0110 Developmental Math Skills Review, 1 Credit, 3 hours lab

Stanford Math Circle: Sunday, May 9, 2010 Square-Triangular Numbers, Pell s Equation, and Continued Fractions

Indiana State Core Curriculum Standards updated 2009 Algebra I

Postulate 17 The area of a square is the square of the length of a. Postulate 18 If two figures are congruent, then they have the same.

The New Style of IT. Rob McMahon. Director Cloud Computing HP General Western Europe

LPV model identification for power management of Web service systems Mara Tanelli, Danilo Ardagna, Marco Lovera

Area & Volume. 1. Surface Area to Volume Ratio

Vblock Systems hybrid-cloud with Cisco Intercloud Fabric

Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary

Berkeley Ninja Architecture

Modernizing Servers and Software

A HYBRID GROUND DATA MODEL TO SUPPORT INTERACTION IN MECHANIZED TUNNELING

ALGEBRA. sequence, term, nth term, consecutive, rule, relationship, generate, predict, continue increase, decrease finite, infinite

In Cloud, Do MTC or HTC Service Providers Benefit from the Economies of Scale?

Chapter 6. Cuboids. and. vol(conv(p ))

( ) ( ) Math 0310 Final Exam Review. # Problem Section Answer. 1. Factor completely: Factor completely: 3. Factor completely:

Key Topics What will ALL students learn? What will the most able students learn?

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints

Keywords Backup and restore strategies, online backup, metrics, modelling methods, hourly backup.

Transcription:

Asymptotically optimal policies for the multi-class finite queue (partially joint with Rami Atar) Technion Israel Institute of Technology BGU Ben Gurion University Mark Shifrin YEQT 2015 Eurandom, Eindhoven 12th November 2015

Lets start with motivational use-case: Hybrid Cloud: Private + Public Private No outsourcing cost Low time response vs Public Unlimited capacity Pay per usage Private Only: Have to supply additional processing resources for the peak load

Cloudbursting: exploit both of the worlds The demand should be met => excessive demand goes to the Public capacity limit 3

Differentiated task types problem The pricing (if cloudburst), service rates (if locally processed) are different. Reserve space for more expensive tasks? Objective: Find the optimal rule how to cloudburst. (M. Shifrin, R. Atar, I. Cidon. "Optimal scheduling in the hybrid-cloud")

Outline Hybrid Cloud motivational example Model definition (2 configurations) Diffusion scaling (Reduced) Brownian control problem (RBCP) Limit solution and numerical study AO policies and theorem Optimality gap

Model: The multi-class queue with finite buffers The admission/scheduling problem: How to optimally decide on admission and service allocation 6

Type 1 Type 2 task arrivals Separate buffers Type K DECISION $ $ Cloud Computing Resourses $ Fraction 1 Fraction 2 Fraction K SERVER 7

Type 1 Type 2 task arrivals Type K Shared buffer DECISION $ $ Cloud Computing Resourses $ Fraction 1 Fraction 2 Fraction K SERVER 8

Processes, HT condition 9

Diffusion model

Why diffusion limit? Reason of Math: Under heavy traffic condition we have limit problem which the can solve. Reason of Practice: The limit means increase service and the arrival complies with modern computational scenarios. Especially: cloud computing.

The Brownian Control Problem (BCP) The solution to this is well understood, via 2 steps (1) Workload reduction Equivalence of BCP with Reduced BCP (RBCP) where RBCP is 1-Dimensional problem, V BCP =V RBCP Atar Rami, Sh.M, 2014 (2) The Harrison-Taksar free boundary value problem (1983) Provides the solution for the processes related to the workload

Reduced BCP (RBCP) and its solution Uniquness: Atar,Budhiraja,Willams, 2007

Queue-length vs. Workload rectangular case

The triangular case Cost minimization problem problem is written Which is translated into LP With canonical form P. R. Thie and G. E. Keough. An introduction to linear programming and game theory.

Solution to the LP At most two tasks are present (simplex method) Recursive formula for the priorities: Given find by

Queue-length vs. Workload- Triangular case (schematically)

Numerical solution of the HJB Rectangular: 3 task classes

ODE rectangular case

V and V numerical solutions

The optimal curve

Numerical solution of the HJB Triangular: 3 task types

ODE triangular case

V and V numerical solutions

The optimal curve, order of accumulation

An AO policy rectangular case Difficulty: being close to Solution: work with while avoiding forced rejections

AO policy examples (rectangle)

An AO policy triangular case Same difficulty:, avoid forced rejections For each define appropriate and approximate Rejection: similar to rectangular case Service: serve high priority. Low priority only for 2 classes which fill the buffer, j and j-1 (recall, ) :

AO policy examples (triangle)

Asymptotic optimality full theorem General lower bound (LB) Consider any admissible control U n : Theorem: Proof see Atar R. & S. M., 2014 Upper bound (specific for each case) Define AO policy U n (Є) control Theorem: Proof (rectangular) - Atar R. & S. M., 2014

Upper Bound proof: two major steps Step 1 The workload process converges to RBM => workload complies with the solution according to H-T in the asymptotical sense Step 2 (state space collapse) is close to the minimizing curve => multi-d process is closed to the processes which correspond to the solution of BCP

Step 1 (conclusion and summary) Work conserving: Boundary on a*: The definition of the Skhorohod problem is valid. is continuous so the has cont. paths => convergence to the RBM which is solution to H-T free boundary problem.

Step 2 We show Reminder the minimizing curve:

Step 2 (technique & conclusion) Use C-tightness of and work as in Step 1 We have convergence of the workload By providing additional technical results the theorem follows:

Simulation study: When diffusion approximation becomes practical? R1: Observe how optimal policy solved by MDP becomes closed to the solution in the limit 3 cases: B=15, 50, 125 square root of n R2: implement the proposed policy increase n, compare to the optimal solution See the optimality gap

B=15 ( )

B=50 ( )

B=125 ( )

The proposed policy

The proposed policy #2

The proposed policy #3

Optimality gap Ratio between the (simulated) cost under the proposed policy and the (computed) optimal cost as a function of sq. root(n). The graph shows values for sq. root(n) = 3, 5, 10 and 20. The corresponding buffer sizes are given by 5*(sq. root(n)), namely 15 15, 25 25, 50 50 and 100 100,respectively.

Conclusions & future work We presented treatment of multi-class finite queue by heavy traffic analyses: Two specific cases (triangular and rectangular) AO policy guidelines for the proof Relevance for the large networks, especially Cloud Computing Many more settings are relevant: Tasks take different number of slots (is it solvable?) Other limits (number of serving machines)

Thanks! 44