Adversarial queuing theory with setups
نویسندگان
چکیده
We look at routing and scheduling problems on Kelly type networks where the injection process is under the control of an adversary. The novelty of the model we consider is that the adversary injects requests of distinct types. Resources are subject to switch-over delays or setups when they begin servicing a new request class. In this new setting, we study the behavior of sensible policies as introduced by Dai and Jennings [J. Dai, O. Jennings, Stabilizing queueing networks with setups, Math. Oper. Res. (2004) 891–922]. We first show that the model is robust in the sense that under some mild conditions universal stability of work conserving packet routing protocols is preserved for natural variants of the underlyingmodel. Also, themodel’s equivalence to so called token networks is established. We adapt to the multi-type request and setup setting, standard arguments for proving stability. Nevertheless, we provide counterexamples that show that for several reasonable adaptations of contention resolution protocols to the multi-type case, stability results do not carry over from the single-type scenario. Thismotivates us to explore fluidmodel based arguments that could be used for proving stability for a given network. Specificallywe show analogues of results obtained by Gamarnik [D. Gamarnik, Stability of adversarial queues via fluid model, in: Proc. of the 39th Annual Symposium on Foundations of Computer Science, 1998, pp. 60–70] but in the multi-type request with setups scenario. © 2008 Elsevier B.V. All rights reserved.
منابع مشابه
Application of queuing theory in production-inventory optimization
This paper presents a mathematical model for an inventory control system in which customers’ demands and suppliers’ service time are considered as stochastic parameters. The proposed problem is solved through queuing theory for a single item. In this case, transitional probabilities are calculated in steady state. Afterward, the model is extended to the case of multi-item inventory systems. The...
متن کاملApplication of queuing theory in inventory systems with substitution flexibility
Considering the competition in today’s business environment, tactical planning of a supply chain becomes more complex than before. In many multi-product inventory systems, substitution flexibility can improve profits. This paper aims to prepare a comprehensive substitution inventory model, where an inventory system with two substitute products with ignorable lead time has been considered, and e...
متن کاملScheduling and Stochastic Capacity Estimation of an EV Charging Station with PV Rooftop Using Queuing Theory and Random Forest
Power capacity of EV charging stations could be increased by installing PV arrays on their rooftops. In these charging stations, power transmission can be two-sided when needed. In this paper a new method based on queuing theory and random forest algorithm proposed to calculate net power of charging station considering random SOC of EV’s. Due to estimation time constraints, a queuing model with...
متن کاملOn Delivery Times in Packet Networks
We consider packet networks and make use of the “adversarial queuing theory” model [10]. We are interested in the question of guaranteeing that all packets are actually delivered to destination, and of having an upper bound on the delivery times of all packets. Whether this is possible against all adversarial queuing theory rate-1 adversaries was previously posed as an open question [13, 10]. A...
متن کاملUniversal Routing in Multi-hop Radio Networks
We study dynamic routing in multi-hop radio networks in a specialized framework of adversarial queuing. We consider cross-layer interactions of the following three components of routing protocols: transmission policies for mediumaccess control, scheduling policies on the network layer, and hearing-control mechanisms through which transmissions interact with a scheduler. We propose a model of ad...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Theor. Comput. Sci.
دوره 410 شماره
صفحات -
تاریخ انتشار 2009