418 research outputs found

    Dynamic importance sampling for queueing networks

    Full text link
    Importance sampling is a technique that is commonly used to speed up Monte Carlo simulation of rare events. However, little is known regarding the design of efficient importance sampling algorithms in the context of queueing networks. The standard approach, which simulates the system using an a priori fixed change of measure suggested by large deviation analysis, has been shown to fail in even the simplest network setting (e.g., a two-node tandem network). Exploiting connections between importance sampling, differential games, and classical subsolutions of the corresponding Isaacs equation, we show how to design and analyze simple and efficient dynamic importance sampling schemes for general classes of networks. The models used to illustrate the approach include dd-node tandem Jackson networks and a two-node network with feedback, and the rare events studied are those of large queueing backlogs, including total population overflow and the overflow of individual buffers.Comment: Published in at http://dx.doi.org/10.1214/105051607000000122 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org

    Stable Wireless Network Control Under Service Constraints

    Full text link
    We consider the design of wireless queueing network control policies with particular focus on combining stability with additional application-dependent requirements. Thereby, we consequently pursue a cost function based approach that provides the flexibility to incorporate constraints and requirements of particular services or applications. As typical examples of such requirements, we consider the reduction of buffer underflows in case of streaming traffic, and energy efficiency in networks of battery powered nodes. Compared to the classical throughput optimal control problem, such requirements significantly complicate the control problem. We provide easily verifyable theoretical conditions for stability, and, additionally, compare various candidate cost functions applied to wireless networks with streaming media traffic. Moreover, we demonstrate how the framework can be applied to the problem of energy efficient routing, and we demonstrate the aplication of our framework in cross-layer control problems for wireless multihop networks, using an advanced power control scheme for interference mitigation, based on successive convex approximation. In all scenarios, the performance of our control framework is evaluated using extensive numerical simulations.Comment: Accepted for publication in IEEE Transactions on Control of Network Systems. arXiv admin note: text overlap with arXiv:1208.297

    A tool for model-checking Markov chains

    Get PDF
    Markov chains are widely used in the context of the performance and reliability modeling of various systems. Model checking of such chains with respect to a given (branching) temporal logic formula has been proposed for both discrete [34, 10] and continuous time settings [7, 12]. In this paper, we describe a prototype model checker for discrete and continuous-time Markov chains, the Erlangen-Twente Markov Chain Checker EÎMC2, where properties are expressed in appropriate extensions of CTL. We illustrate the general benefits of this approach and discuss the structure of the tool. Furthermore, we report on successful applications of the tool to some examples, highlighting lessons learned during the development and application of EÎMC2

    Loss systems in a random environment

    Full text link
    We consider a single server system with infinite waiting room in a random environment. The service system and the environment interact in both directions. Whenever the environment enters a prespecified subset of its state space the service process is completely blocked: Service is interrupted and newly arriving customers are lost. We prove an if-and-only-if-condition for a product form steady state distribution of the joint queueing-environment process. A consequence is a strong insensitivity property for such systems. We discuss several applications, e.g. from inventory theory and reliability theory, and show that our result extends and generalizes several theorems found in the literature, e.g. of queueing-inventory processes. We investigate further classical loss systems, where due to finite waiting room loss of customers occurs. In connection with loss of customers due to blocking by the environment and service interruptions new phenomena arise. We further investigate the embedded Markov chains at departure epochs and show that the behaviour of the embedded Markov chain is often considerably different from that of the continuous time Markov process. This is different from the behaviour of the standard M/G/1, where the steady state of the embedded Markov chain and the continuous time process coincide. For exponential queueing systems we show that there is a product form equilibrium of the embedded Markov chain under rather general conditions. For systems with non-exponential service times more restrictive constraints are needed, which we prove by a counter example where the environment represents an inventory attached to an M/D/1 queue. Such integrated queueing-inventory systems are dealt with in the literature previously, and are revisited here in detail

    Analysis of a Splitting Estimator for Rare Event Probabilities in Jackson Networks

    Full text link
    We consider a standard splitting algorithm for the rare-event simulation of overflow probabilities in any subset of stations in a Jackson network at level n, starting at a fixed initial position. It was shown in DeanDup09 that a subsolution to the Isaacs equation guarantees that a subexponential number of function evaluations (in n) suffice to estimate such overflow probabilities within a given relative accuracy. Our analysis here shows that in fact O(n^{2{\beta}+1}) function evaluations suffice to achieve a given relative precision, where {\beta} is the number of bottleneck stations in the network. This is the first rigorous analysis that allows to favorably compare splitting against directly computing the overflow probability of interest, which can be evaluated by solving a linear system of equations with O(n^{d}) variables.Comment: 23 page

    Networks of /G/\cdot/G/\infty Server Queues with Shot-Noise-Driven Arrival Intensities

    Get PDF
    We study infinite-server queues in which the arrival process is a Cox process (or doubly stochastic Poisson process), of which the arrival rate is given by shot noise. A shot-noise rate emerges as a natural model, if the arrival rate tends to display sudden increases (or: shots) at random epochs, after which the rate is inclined to revert to lower values. Exponential decay of the shot noise is assumed, so that the queueing systems are amenable for analysis. In particular, we perform transient analysis on the number of customers in the queue jointly with the value of the driving shot-noise process. Additionally, we derive heavy-traffic asymptotics for the number of customers in the system by using a linear scaling of the shot intensity. First we focus on a one dimensional setting in which there is a single infinite-server queue, which we then extend to a network setting
    corecore