Instability of FIFO at Arbitrarily Low Rates in the Adversarial Queuing Model - PowerPoint PPT Presentation

About This Presentation
Title:

Instability of FIFO at Arbitrarily Low Rates in the Adversarial Queuing Model

Description:

Instability of FIFO at Arbitrarily Low Rates in the Adversarial Queueing Model. ... w: burst size, r: injection rate (r 1) No identifiable hotspots in the system ... – PowerPoint PPT presentation

Number of Views:23
Avg rating:3.0/5.0
Slides: 25
Provided by: valueds259
Learn more at: https://cs.stanford.edu
Category:

less

Transcript and Presenter's Notes

Title: Instability of FIFO at Arbitrarily Low Rates in the Adversarial Queuing Model


1
Instability of FIFO at Arbitrarily Low Rates in
the Adversarial Queuing Model
  • Rajat Bhattacharjee
  • Ashish Goel
  • Stanford University

Instability of FIFO at Arbitrarily Low Rates in
the Adversarial Queueing Model . IEEE Foundations
of Computer Science (FOCS), 2003. SIAM Journal
on Computing 34(2) 318-332 (2004).
2
Overworked server
Betty
  • Server processes tasks at rate 1
  • Tasks are generated for the server at rate r
  • What is the value of r such that the input quue
    of the server would become unbounded (unstable)?
  • Equivalently, what is the value of r s.t. there
    would be a task, which would never be processed
    (unstable)?
  • r gt 1

3
Overworked network
  • Is the network of servers stable at rate r lt 1?
  • Unstable at r gt 0.85!!! Andrews et al.

4
Adversarial Queuing Model
  • Borodin et al. 1996
  • Packets injected by an adversary instead of a
    stochastic process
  • Route given at the time of injection
  • Each edge forwards at most one packet in one time
    step
  • Contention resolved by a protocol like FIFO

5
Adversarial Queuing Model
  • Limitations on the adversary
  • In any window of T time steps, a (w,r) adversary
    can inject at most wrT packets that need to
    traverse any edge in the network
  • w burst size, r injection rate (rlt1)
  • No identifiable hotspots in the system

6
Stability of protocols
  • Stability bounded queue size and delay
  • r-stable stable against all (w,r) adversaries
  • Universally stable r-stable for all rlt1
  • Andrews et al. 1996
  • Rings and DAGs are universally stable networks
  • Longest-in-system (global FIFO) and
    Shortest-in-system are universally stable
    protocols
  • FIFO is unstable at rategt0.85

7
Related Work
  • Tsaparas 1997 Nearest-To-Go unstable at
    arbitrarily low rates
  • Gamarnik 1998 Equivalence of Fluid Model and
    Adversarial Queuing Model
  • Andrews 2000 Session-oriented model
  • Goel 2001, Gamarnik1999, Alvarez et al.
    2002 Characterized universally stable networks
  • Bramson studied FIFO in stochastic models
  • Kelly-type networks
  • Job-shop scheduling model

8
Stability of FIFO
  • Andrews et al. 1996 unstable at rate gt 0.85
  • Diaz et al. 2001 0.83
  • Koukopoulos et al. 2001 0.749
  • Lotker et al. 2002 0.5
  • Is FIFO stable below some threshold, or, is it
    unstable at arbitrarily low rates?

9
Our Result
  • FIFO is unstable at arbitrarily low injection
    rates in Adversarial Queuing Model
  • Size of the network is polynomial in 1/r
  • Stability not possible even at rates which are
    some inverse polylograthmic function of the
    network size (1/logc n)
  • Main idea Construct a gadget which acts as a
    break
  • Use gadget to create a network and flow which is
    unstable at arbitrarily low rates

10
Basic Gadget Topology
  • Edges input, load, output edges

11
A Special Flow
  • Gadget traversing packets arrive at rate 1
  • Internal gadget packets arrive at rate r

12
Proportional Share Property of FIFO
  • T ?j r(j) Tlt1 R(i) r(i)
  • Tgt1 R(i) r(i)/T we will use this a lot

13
Analysis of the flow
  • r(i) the rate of arrival of packets which have
    traversed i of the k load edges
  • T ? 1r at all times

14
Analysis of the flow
  • r1 1/T, ri ri-1/T 1/Ti
  • Rate of Escape R krk ? k/(1r)k

15
Concatenation of gadgets
  • Output edges of the first gadget act as Input
    edges of the second
  • A chain is a sequence of concatenated gadgets
  • More than one gadget can be concatenated to a
    gadget

16
Network
Columns and connectors are formed by
concatenation of gadgets
17
Chain Traversing Packets
18
Induction Phases
Beginning of a phase s packets in each input
queue
End of phase sgts packets in each input queue
19
Subphases
At the beginning of subphase i, there are si
packets waiting in the input queue of gadget
i. These packets are chain traversing for the
rest of column A.
20
Next si time steps
In the next si time steps rsi internal gadget
packets on each load edge and rsi/k chain
traversing packets on each input edge are
introduced
21
At the end of the phase
At the end of the phase there are chain
traversing packets in each of the
connectors which wish to traverse column B
22
Putting it all together
  • Parameters of the network
  • Size of the ring k
  • Length of column ?
  • Length of connector ?
  • Choose parameters such that
  • (1r)k gt 64 k3/r2, ? 4k/r, ? ?2

23
Putting it all together
  • The number of packets in the column at the
    beginning of subphase i, si gt s/2
  • s is the number of initial packets in each input
    queue of column A
  • Due to exponentially small leak from a gadget
  • Number of packets which survive each connector
    per load edge is gt rs/4k
  • The number of connectors 4k/r
  • Hence, the number of packets in each of the input
    queue of column B gt s

24
Conclusion
  • Polynomial size of the network excludes
    possibility of FIFO being stable even at rate
    O(1/logc n)
  • Subsequently, Lotker has tightened our
    construction to Ă•(1/r)
  • Are there meaningful restrictions which can be
    imposed on the adversary to achieve stability
    using FIFO?
  • Session-oriented model?
Write a Comment
User Comments (0)
About PowerShow.com