Lecture 8 Numerical PDE methods for exotic options Lecture Notes by Andrzej Palczewski Computational Finance p. 1
Barrier options For barrier option part of the option contract is triggered if the asset price hits some barrier S = X, at some time prior to expiry. Depending on the way the hitting time is monitored we distinguish following options: continuous monitoring (called American barrier) hitting moment can be any time between issue and expiry of the option; discrete monitoring security price is monitored only in selected moments of time (say daily or weekly); discrete monitoring called European barrier security price is monitored only at expiry. Computational Finance p. 2
Barrier options cont. Depending on the conditions under which the option gets or losses value we have following type of barrier options: up-and-in the option expires worthless unless the barrier S = X is reached from below; down-and-in the option expires worthless unless the barrier S = X is reached from above; up-and-out the option expires worthless if the barrier S = X is reached from below; down-and-out the option expires worthless if the barrier S = X is reached from above. Computational Finance p. 3
Barrier options valuation The value of a barrier option can be computed using the Black-Scholes equation. For European options with barriers of European or American type there are explicit analytic formulas (although some of them are quite complicated). But American options or option with the barrier monitored discretely have to be valued numerically. To solve the Black-Scholes equation for barrier options we have to supplement the equation with proper boundary and terminal conditions. Computational Finance p. 4
Knock-out options Terminal conditions are as for vanila options modified by limitations coming from boundary conditions. Boundary conditions: Down-and-out option V(S,t) = 0, for S = X, V(S, t) = boundary value for vanila option, for S > X. Up-and-out option V(S, t) = boundary value for vanila option, for S < X, V(S,t) = 0, for S = X. Computational Finance p. 5
Double knock-out options A double knock-out option is a barrier option which expires worthless when the price of the underlying asset is to the left of the lower barrier X 1 or to the right of the upper barrier X 2. Terminal conditions are as for vanila options modified by limitations coming from boundary conditions. Boundary conditions: V(S,t) = 0, for S = X 1, V(S,t) = 0, for S = X 2. Computational Finance p. 6
Knock-in options Down-and-in option. For S [0,X] this is a plain vanila option. We show conditions for S > X. Terminal condition Boundary condition V(S,T) = 0 for S > X. V(S,t) 0 as S, V(X,t) = C(X,t), where C(S,t) is the price of corresponding vanila option. Computational Finance p. 7
Up-and-in option. For S [X, ) this is a plain vanila option. We show conditions for S < X. Terminal condition Boundary condition V(S,T) = 0 for S < X. V(S,t) 0 as S 0, V(X,t) = C(X,t), where C(S,t) is the price of corresponding vanila option. Computational Finance p. 8
Discretely monitored barrier A boundary constraint which holds at a point in time can be applied directly in an explicit manner. We compute the solution for a given time level and apply the constraint if necessary. Then move to the next time level. Consider a down-and-out option with barrier X monitored in time moments t α. At time level ν we compute V ν and then apply the boundary constraint V ν i = V(s i,t ν ) = where δ (tν,t α ) is the Kronecker delta. { 0, if s i δ (tν,t α )X, V ν i, otherwise Computational Finance p. 9
iscretely monitored barrier cont. Boundary conditions on outer boundaries For discretely monitored barriers we need boundary conditions for S 0 and/or S. To impose these boundary conditions correctly we can use the relation knock-in option + knock-out option = vanilla option (1) which holds as well for continuously and discretely monitored barriers when the monitoring moments are the same for in and out options. Consider again a down-and-out option with barrier monitored discretely. For the upper boundary we have V(S, t) = boundary value for vanila option, for S. Computational Finance p. 10
iscretely monitored barrier cont. To impose proper conditions on the lower boundary S = 0 let us observe that for the down-and-in option we have V(S, t) = boundary value for vanila option, for S 0. Using relation (1) we obtain for a down-and-out option V(S,t) = 0, for S 0. Boundary conditions for other options can be obtained in a similar manner. Computational Finance p. 11
Lookback options For the basic lookback contracts, the payoff comes in two varieties: the fixed strike and the floating strike. These options have payoffs that are the same as vanilla options except that in the floating strike option the vanilla exercise price is replaced by the maximum or minimum. In the fixed strike option it is the asset value in the vanilla option that is replaced by the maximum or minimum. M T S T, floating put, S T m T, floating call H(S T,J T ) = (M T K) +, fixed call, (K m T ) +, fixed put, where J T denotes M T or m T and M T = max 0 t T S t, m T = min 0 t T S t. Computational Finance p. 12
Lookback options cont. Depending on the way the maximum or minimum is monitored we distinguish: continuous monitoring security price is monitored continuously between the issue and expiry of the option; discrete monitoring security price is monitored only in selected moments of time (say weekly or monthly). The pair (S t,j t ) is a Markov process, and the price at time t of the lookback option is equal to V(t,S t,j t ) where the functionv is defined fort [0,T] and(s,j) in an appropriate set depending whether J = M or J = m { {(S,M) R 2 + : 0 S M}, for J = M, (S,J) {(S,m) R 2 + : 0 m S}, for J = m. Computational Finance p. 13
Lookback options valuation The value of a lookback option can be computed using an extended version of the Black-Scholes equation. We derive this equation assuming J = M. Let ( t( ) ) n 1/n. M n (t) = Sτ We have 0 lim M n(t) = max S τ = M t. n 0 τ t Next we consider the function V(S,M n,t), which can be think of as a price of an instrument depending on the variable M n. Computational Finance p. 14
Black-Scholes equation Using the Feynman-Kac theorem and the differential dm n (t) = 1 n S n t ( Mn (t) ) n 1 dt we obtain V(S,M n,t) t +rs V(S,M n,t) S + 1 n S n M n 1 n V(S,M n,t) M n + + 1 2 σ2 S 2 2 V(S,M n,t) S 2 rv(s,m n,t) = 0. Computational Finance p. 15
Black-Scholes equation cont. Since S t max 0 τ t S τ = M t then for S < M lim n 1 n S n ( Mn ) n 1 = 0 and we obtain the Black-Scholes equation V(S,M,t) t +rs V(S,M,t) S + 1 2 σ2 S 2 2 V(S,M,t) S 2 rv(s,m,t) = 0. Observe that the above equation is the standard onedimensional Black-Scholes equation in which the variable M plays the role of a parameter. This parameter enters however into boundary and terminal conditions. Computational Finance p. 16
Black-Scholes equation cont. At expiry we have V(S,M,T) = H(S,M). We require a boundary condition on the line S = M. Consider the stochastic process S t close to current maximum. Since the probability that the current maximum is still the maximum at expiry is zero, the option price must be insensitive to small changes of M when S is close to M. Hence V(S,M,t) M = 0 for S = M. Computational Finance p. 17
Black-Scholes equation cont. Additional boundary conditions depend on the type of the option. For a floating put option we have V(0,M,t) = Me r(t t). For a floating call option we have boundary conditions as for a vanila option V(S,m,t) S for S very large. Observe that in all these cases we have to solve a 3- dimensional PDE. Computational Finance p. 18
Similarity reduction For floating strike lookback options the 3-dimensional Black- Scholes equation can be reduced to 2 dimensions. We perform all calculations for a floating put option. We introduce the new variable x = M S. When the payoff can be written as (this is the case of the floating put and call) H(S,M) = Mh(x), then we search for a solution of the Black-Scholes equation assuming V(S,M,t) = MW(x,t). The equation for W has the form W(x,t) t +rx W(x,t) x + 1 2 σ2 x 2 2 W(x,t) x 2 rw(x,t) = 0. Computational Finance p. 19
Similarity reduction cont. The terminal and boundary conditions are as follows: W(x,T) = max(1 x,0), W(0,t) = e r(t t), W x = W at x = 1. Computational Finance p. 20
Asian options For the basic Asian contracts, the payoff comes in two varieties: the average price and the average strike. These options have payoffs that are the same as vanilla options except that in the average strike option the vanilla exercise price is replaced by the average of asset prices. In the average price option it is the asset value in the vanilla option that is replaced by the average of asset prices. (Ŝ K) +, average price call, (K Ŝ) +, average price put, (S T Ŝ) +, average strike call, (Ŝ S T ) +, average strike put, where Ŝ denotes the average of asset prices. Computational Finance p. 21
Asian options cont. There are several ways the average of past values of S t can be formated: arithmetic average continuously monitored Ŝ = T 1 T 0 S tdt, arithmetic average discretely monitored Ŝ = n 1 n i=1 S t i, geometric ( average continuously monitored Ŝ = exp 1T ) T 0 log(s t)dt, geometric average discretely monitored Ŝ = ( n i=1 S t i ) 1/n, Computational Finance p. 22
Asian options cont. Since for geometric average Asian options we have analytic expressions for the price, we are only interested in calculation of arithmetic average Asian option. In what follows, we shall describe the PDE method for the calculation of an arithmetic average continuously monitored Asian option. This problem leads to a 3-dimensional Black- Scholes equation. For an arithmetic average continuously monitored Asian option this equation can be reduced to two dimensions and solved numerical by finite difference algorithms. For an arithmetic average discretely monitored Asian option we can use straightforwardly the known 2-dimensional Black-Scholes equation appropriately modifying initial conditions at the time of monitoring. Computational Finance p. 23
Asian options valuation The value of an arithmetic average continuously monitored Asian option can be computed using an extended version of the Black-Scholes equation. Let us consider a generalized arithmetic average A t = t 0 f(s τ,τ)dτ, where f(x,t) depends on the type of averaging (for a simple arithmetic average f(x,t) = x up to a constant factor). The pair (S t,a t ) is a Markov process, and the price at time t of an arithmetic average Asian option is equal to V(t,S t,a t ) where the function V is defined for t [0,T], S t > 0 and A t > 0. Computational Finance p. 24
Black-Scholes equation Using the Feynman-Kac theorem and the differential we obtain da t = f(s t,t)dt V(S,A,t) t +rs V(S,A,t) S +f(s,t) V(S,A,t) A + 1 2 σ2 S 2 2 V(S,A,t) S 2 rv(s,a,t) = 0. + Computational Finance p. 25
Similarity reduction We consider an arithmetic average strike call with payoff ( S T 1 ) ( + T A T = ST 1 1 TS T T 0 S τ dτ) +. This form of the payoff suggest introduction of an auxiliary variable R t = 1 t S τ dτ. S t Then the payoff is 0 S T (1 1 T R T) +, and we can look for the factorization V(S,A,t) = SH(R,t). Computational Finance p. 26
Similarity reduction cont. The equation for H has the form H(R, t) t +(1 rr) H(R,t) R + 1 2 σ2 R 2 2 H(R,t) R 2 = 0. The terminal condition follows from the payoff H(R T,T) = ( 1 1 T R T) +. Since S t is integrable, then, from the definition of R t, for R we have S 0. Remembering that for S 0 call option is not exercised, we obtain H(R,t) = 0 for R. Computational Finance p. 27
Similarity reduction cont. To obtain the boundary condition on the boundary R = 0 we return to the PDE which H fulfills. For R 0 this equation gives H(R, t) t + H(R,t) R = 0 for R 0. Finally we obtain the following boundary value problem H t +(1 rr) H R + 1 2 σ2 R 2 2 H R 2 = 0, H = 0 for R, H t + H = 0 for R 0, R ( H(R T,T) = 1 1 +. T) T R Computational Finance p. 28
Numerical scheme We solve the 2-dimensional Black-Scholes PDE of the previous slides (barrier, lookback and options) without transformation of variables. This approach is very usefull because the boundary conditions can be easily implemented. The equation reads u(x, t) t +α(x) u(x,t) x + 1 2 σ2 x 2 2 u(x,t) x 2 ρu(x,t) = 0, with appropriate terminal and boundary conditions. Computational Finance p. 29
Finite difference approximation Letv i,ν be an approximation ofu(x i,t ν ) andη i approximation 2α(x of i ) x i+1 x i 1. Then v i,ν 1 v i,ν δt = θa i v i 1,ν 1 +θb i v i,ν 1 +θc i v i+1,ν 1 + +(1 θ)a i v i 1,ν +(1 θ)b i v i,ν +(1 θ)c i v i+1,ν, (2) where A i = 1 2 (σ2 i 2 η i ), B i = (σ 2 i 2 +ρ), C i = 1 2 (σ2 i 2 +η i ). The choice of θ gives the explicit (θ = 0), the implicit (θ = 1) and the Crank-Nicolson (θ = 1 2 ) scheme. Computational Finance p. 30
Spurious oscillations Numerical scheme (2), even if the grid is chosen properly to avoid instabilities, can be a subject of spurious oscillations. Computational Finance p. 31
Spurious oscillations cont. To understand the phenomenon of spurious oscillations let us consider a model equation u t +a u x = b 2 u x 2. The source of oscillations is the first order term a u x. To see this let us perform the von Neumann stability analysis. To this end we approximate the above equation by finite differences w j,ν+1 w jν t +a w j+1,ν w j 1,ν 2 x = b w j+1,ν 2w jν +w j 1,ν ( x) 2. Computational Finance p. 32
Spurious oscillations cont. Let us express the approximations w jν of the ν-th time level by a sum of Fourier modes w jν = k c (ν) k eikj x, The linearity of the numerical scheme allows to find a relation c (ν+1) k = G k c (ν) k, where G k is the growth factor. For G k 1 it is guaranteed that the modes e ik x are not amplified. Computational Finance p. 33
Spurious oscillations cont. For the model equation we arrive at and where G k = 1 2λ+2λcosk x iβλsink x G k 2 = (1 4λs 2 ) 2 +4β 2 λ 2 s 2 (1 s 2 ), λ = b t a x ( x) 2, β =, s = sin k x b 2. A straightforward analysis of the polynomial G k 2 reveals that G k 1 for 0 λ 1 2, and, in addition, for β > 2 we need λβ2 2. Computational Finance p. 34
Spurious oscillations cont. The inequality 0 λ 1/2 brings back the stability criterion of the heat equation. β is called a mesh Péclet number and corresponds to the ratio of the convection term a u x to the diffusion term u b 2 x in 2 the model equation. It is clear that controlling oscillations means that β must be small. Computational Finance p. 35
purious oscillations for BS equation Theorem In order to prevent the formation of spurious oscillations in the numerical scheme (2), the following conditions must be satisfied (x i x i 1 ) 2 x 2 i < σ2 η i and 1 (1 θ)δt > x 2 σ2 i (x i+1 x i )(x i x i 1 ) +ρ. Computational Finance p. 36
Upwind scheme The source of oscillations is the first order term a u x. Let us consider the model equation u t +a u x = 0. The solution of this equation isf(x at), wheref(y) = u 0 (y) is the initial condition for our equation u(x,0) = u 0 (x). For a > 0, we approximate the above equation by finite differences w j,ν+1 w jν t +a w j,ν w j 1,ν x This scheme is called upwind scheme. = 0 Computational Finance p. 37
Upwind scheme cont. To explain the name we return to the solution F(x at). As t increases the profile F(y) drifts in positive x-directions. We say that the wind blows to the right. In agreement with that blowing direction we approximate the derivative u x w j,ν w j 1,ν, x i.e. the information flows from downstream to upstream nodes. The stability analysis for this scheme gives G k = 1 γ +γe ik x, where γ = a t x. Then G k 1 for γ 1. Computational Finance p. 38
Upwind scheme cont. For a < 0, the upwind scheme is w j,ν+1 w jν t +a w j+1,ν w j,ν x = 0. The stability analysis for this scheme gives G k 1 for γ 1. Computational Finance p. 39