• No results found

Markovian models of a transactional system supported by checkpointing and recovery strategies, Part 1: A model with state-dependent parameters

N/A
N/A
Protected

Academic year: 2021

Share "Markovian models of a transactional system supported by checkpointing and recovery strategies, Part 1: A model with state-dependent parameters"

Copied!
36
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

Markovian models of a transactional system supported by

checkpointing and recovery strategies, Part 1: A model with

state-dependent parameters

Citation for published version (APA):

Nicola, V. F. (1982). Markovian models of a transactional system supported by checkpointing and recovery strategies, Part 1: A model with state-dependent parameters. (EUT report. E, Fac. of Electrical Engineering; Vol. 82-E-128). Technische Hogeschool Eindhoven.

Document status and date: Published: 01/01/1982

Document Version:

Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers)

Please check the document version of this publication:

• A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website.

• The final author version and the galley proof are versions of the publication after peer review.

• The final published version features the final layout of the paper including the volume, issue and page numbers.

Link to publication

General rights

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain

• You may freely distribute the URL identifying the publication in the public portal.

If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license above, please follow below link for the End User Agreement:

www.tue.nl/taverne Take down policy

If you believe that this document breaches copyright please contact us at: openaccess@tue.nl

providing details and we will investigate your claim.

(2)

Electrical Engineering

Markovian models of a transactional system supported by checkpointing and recovery strategies.

Part I: A model with state-dependent parameters.

By

V.F. Nicola

EUT Report 62-E-126

ISBN 90-6144-126-5

ISSN 0167-9708 August 1982

(3)

Errata to: EUT Report 82-E-128

page

9 9

18

21

27

27

Markovian models of a transactional system

supported by checkpointing and recovery

strategies, Part I, by V. F. Nicola.

line or equation

(

...

)

to be replaced with

(

...

)

eq. (3.8)

+

p(c,t-I)

...

p(c,i-I)

1. 17

e.

...

S.

1 J

1.

3

(2.23)

-+

(3.23)

1.

25

p(a,o),

-+

p(a,i)

1.

16

and a failure

~

or a failure

(4)

EINDHOVEN UNIVERSITY OF TECHNOLOGY

Department of Etectrical Engineering Eindhoven The Netherlands

MARKOVIAN MODELS OF A TRANSACTIONAL SYSTEM SUPPORTED BY CHECKPOINTING AND RECOVERY STRATEGIES. Part I: A model with state-dependent parameters.

By

V.F. Nicola

EUT Report 82-E-128 ISBN 90-6144-128-5 ISSN 0167-9708

Eindhoven August 1982

(5)

Nicola, V.F.

Markovian models of a transactional system supported by checkpointing and recovery strategies / by V.F. Nicola. -Eindhoven: University of technology.

Part I: A model with statedependent parameters. -(Eindhoven university of technology research reports; 82-E-128)

Met lit. opg., reg. ISBN 90-6144-128-5 ISSN 0167-9708

SISO 656 UDC 519.71

(6)

Abstract 2. 3. Introduction ••••...•..•..••.•.•••••••••••••.•.••... 1 The model

. ... .

5 Computational aspects ..••••••.•••••••••••••••••••••• 8

3.1 Recursive computation of the limiting

state probabilities •••••••••••.••••.••••••••• 8

3.2 Recursive computation of the

sensitivities of the limiting state probabilities with respect to the

transition parameters •••••••••••••••••••••••• 13

3.3 Numerical optimization ••••••••••....••••••••• 18

4. Analytical aspects •..••.•.••••.•••••••.••.•••.••••••• 21

4.1 State-space analysis and performance

variables

...

21

4.2 Analytic optimization ••••.•••...••••••.••.••• 24

5. Conclusions

. ... .

27

Acknowledgement

(7)

A Markovian model of a transactional system supported with

checkpoint-lng and recovery strategies to guarantee reliable operation is

consid-ered. meters.

The model allows representations with state-dependent para-Algorithms for the computation of the state probabilities (and thus the performance variables) and their sensitivities with

respect to the model parameters are presented. In the case of

state-independent parameters, a state-space analysis approach is demonstrated

for the derivation of analytic expressions for the performance

variables.

The optimization of some important performance criterions, such as the

system availability and the mean response time of a transaction, is

discussed.

Nicola, V.F.

~iARKOVIAN MODELS OF A TRANSACTIONAL SYSTEM SUPPORTED BY CHECKPOINTING AND RECOVERY STRATEGIES. Part I: A model with state-dependent

parameters.

Department of Electrical Engineering, Eindhoven University of

Technology, 1982. EUT Report 82-E-128

Address of the author:

Group Measurement and Control,

Department of Electrical Engineering, Eindhoven University of Technology,

P.O. Box 513, 5600 MB EINDHOVEN, The Netherlands

(8)

1 Introduction

This paper introduces a state-space approach to the analysis of a class

of models which may serve as a tool in the performance analysis of

certain kinds (or components) of computer systems. A single server may

be switched to different modes of operation depending on the occurrence

of certain events, the arrival and service rates of customers may

de-pend on the state of the system, e.g. on the operation mode of the

server and on the number of customers 1n the system (customers in

ser-vice and waiting for serser-vice). It is of much interest to consider

models which allow representations with state-dependent parameters and

aids to determine (or control) important performance criterions. In particular, we consider a model of a file-oriented (or database) transactional system supported with checkpointing and rollback recovery

strategies. The system is assumed to have a finite waiting room.

A checkpoint is an operation which is performed at consecutive time stages, during which a copy of the relevant system files is saved in a

secondary storage device. Checkpointlng is a common technique to

re-store the integrity of information in critical database applications

subject to information destructive failures and to enhance the

reliabi-lity of the system operation for serving the users.

In the following we describe the system operation (assumptions

concern-ing the mathematical model will follow in the next chapter).

The system can be operating in one of three modes, labelled as a, c

and r.

~£~~_~~~_i~~~!!~~!~2:

In this mode the system is available for processing transactions (by a transaction we mean one or more tasks generated at the same time by a

single user to be executed by the computer system). These transactions

arrive at a rate depending on the state of the system (i.e. the number

of transactions in the system). This dependency exists, for instance,

in systems with a limited number of users or in cases of discouraged arrivals.

(9)

Transactions are processed at a rate depending on the state of the system; such a dependency exists 1n multiprocessing environments.

Checkpoints are performed at predefined time instants (according to a checkpointing strategy) during mode 'a' of operation. When checkpoints

are performed, trans! tions to mode 'c' of operation take place.

A state-dependent checkpointing rate is a realistic requirement since it is preferable to perform a checkpoint when the system is lightly

loaded. Failures (due to hardware, software, etc.) may occur

dur-ing mode 'a' of operation. When a failure is detected a recovery

action is initiated and a transition to mode tr' of operation takes

place. In certain circumstances failures may increase with the number

of transactions in the system and thus the failure rate may be

state-dependent. Transactions which have caused modifications in the system

files since the last checkpoint, are recorded in a file called an "audit trail".

~~~~_~~~_i~~~~~££!~~!~~2:

In this mode, transaction processing is blocked and a valid non-erron-eous copy of the relevant system files (files and information needed to restore the system to its state just before the initiation of the

checkpoint) is saved in a secondary storage device. Transactions keep arriving at the system at a state-dependent rate. The checkpoint duration may increase with the load on the system and thus it may be

state-dependent. When a checkpoint operation is completed a transition

to mode 'a' takes place and the system becomes available for transaction processing.

~~~~_~!~_i!~~~~~!l2:

Transition from mode 'at to mode 'r' occurs with the initiation of a

recovery action after the detection of a failure. Transaction

proces-sing is blocked during recovery and a valid copy of the relevant system

files (which was saved at the most recent checkpoint) is loaded into

primary storage. This restores the system files to their status just

before the initiation of the most recent checkpoint. The modifying transactions which were recorded in the audit trail (after being

processed) since the last checkpoint, are reprocessed. The recovery

action is completed when reprocesing reaches the point at which the fa ilure

(10)

occurred. With the completion of a recovery action a transition to mode 'a' takes place and the system resumes useful processing of

transactions. It is obvious that the duration of a recovery action

depends on the amount of modifying processing in the time interval

between the instant of failure occurrence and the last checkpoint. This implies the dependency of the mean duration of a recovery action

on the mean time interval between successive checkpoints. Transactions

keep arriving at the system at a state-dependent rate during recovery

actions.

Obviously, the shorter the mean time interval between successive

check-points, the more time spent by the system in performing checkcheck-points,

and, similarly, the longer the mean time interval between successive

checkpoints, the more time spent by the system in recovery actions

after failures. Thus there is an optimum strategy for determining the

time intervals between successive checkpoints which minimizes the time

spent by the system in checkpointing and recoveries after failures (or maximizes the available time for transactions processing).

The determination of the optimum time interval between checkpoints has been considered previously in several papers [3,4,5,6,7,9J.

Young and Chandy [9,3] considered models of checkpointing and rollback-recovery in which the queueing and the backlog of transactions are not

taken into account. They determined an optimum constant value for the

time between checkpoints which maximizes the system availabilty.

Gelenbe et a1. [5] introduced a stochastic model in which the queueing

and the backlog of transactions are taken into account. They assumed

an exponential distribution for the available time between checkpoints. They obtained analytic expressions for the system availability and for

the mean response time of a transaction and considered their optimiza-tion with respect to the mean available time between checkpoints. In [6] Gelenbe assumed a general distribution for the available time be-tween checkpoints. He showed that the optimum checkpoint interval (which maximizes the system availability) must be deterministic and obtained an explicit expression for its value which is a function of the system load.

Bacelli [1] continued the work of Gelenbe to derive useful relations

for the numerical computation of the average number of transactions in the system under general assumptions concerning the available time

(11)

between checkpoints and the checkpointing duration, with the

restrict-ive assumption of constant recovery periods. In {2] Bacelli considered

queueing analysis of an MlG/1 system subject to Poisson breakdowns of

exponential duration, with an application to the modelling of

check-pointing and recovery in database systems.

In this paper an M/M/l/N system subject to Poisson breakdowns of

expon-ential durations is considered as a model of a transactional database

system, supported with checkpointing and recovery strategies (as des-cribed earlier).

The state-transition parameters depend on the number of transactions in

the system (for state-independent transition parameters and infinite waiting room [N-]. this model is equivalent to the model in [5]).

We present algorithms for the computation of the state probabilities (and the performance variables) as well as their sensitivities with respect to the model parameters (the sensitivities are employed in the

numerical optimization of the performance variables). In the case of

state-independent parameters we demonstrate a state-space approach (as

an alternative to the generating function approach) to derive analytic

expressions for the performance variables (they agree with Gelenb~'s

results [5] as N - ) .

The maximization of the system availability yields an expression for the optimum checkpointing rate as a function of the system load. The minimization of the mean response time of a transaction yields a different optimum for the checkpointing rate. The relation between the

two optima is discussed in some detail.

In chapter 2 we introduce the mathematical model and the underlying

assumptions, together with some notations and definitions. Sections

3.1 and 3.2 are devoted to the presentation of algorithms for the

re-cursive computation of the state probabilities and their sensitivities

with respect to the state-transition parameters. The numerical optimi-zation of the performance variables is considered in section 3.3. Chapter 4 is devoted to the analysis of the model in the case of

state-independent transition parameters. Analytic expressions for the

per-formance variables are derived in section 4.1. Analytic optimization of the performance variables is considered in section 4.2.

(12)

2. The model:

In this chapter we introduce a mathematical model (and the underlying assumptions) of the system described in chapter 1. We also introduce some notations and definitions which will be used in the following

chapters.

The system is modelled as an M/M/l/N system, subject to two different types of interrupts (checkpoints and failures). The following assump-tions will be made in the model analysis:

i) Transaction requests arrive according to a Poisson process at a

state-dependent rate Ai, i (0 ~ i ~ N) is an index to indicate the number of transactions present in the system. They require processing time which is exponentially distributed with a state-dependent mean ~i_l. Transaction processing is blocked during

an interrupt and is resumed at the end of an interrupt.

ii) Checkpoints occur according to a Poisson process at a state-de-pendent rate ai (thus ~ -1 is the mean "available" time be-tween checkpoints with i transactions present in the system). Checkpointing periods are exponentially distributed with a state-dependent mean Be 1.

iii) Failures occur according to a Poisson process at a state-depend-ent rate 'Ii (thus Yi -1 is the mean "available" time between

failures with i transactions present in the system). It is

as-sumed that the detection of a failure coincides with its occur-rence. Recovery periods are exponentially distributed with a state-dependent mean ~e 1 (the ~i' s depend on the ai's;

this dependence will be considered when performance optimization is discussed).

Figure (2.1) shows the state transition diagram of the considered model. The following are some basic notations and definitions related

to the model.

The index "m" (m = a,e,r) indicates the mode of the system operation

(as described in chapter 1), "a" stands for the available mode, "c"

stands for the checkpointing mode and "r" stands for the recovery mode.

Let p(m,i), m - a,c or rand 0 ~ i ~ N, be the probability that the

(13)

I checkpointing available 1 I I I I

r

recovery . I o

t> ,

/1 N·' <l o il

,

"

I.,

<l N·' N o 'i' o

r

r

1 F

I.'

F N., F N rp N·' IJJ N

Fig.(2.1) State transition diagram of a

finite continuous-time Markov chain representing the system considered

.1 o

(14)

system. Define the following probabilities:

(2.1) p(i) f?:

I

p(m.i), m = a,c and r, 0 ~ i ~ N , m

p(i) is the probability that i transactions are present in the system.

(2.2) A " m =

I

i

p(m,i) • 1 = O,l, ... ,N, m = a,e or r t

Am

is the probability that the system is operating in mode m.

(2.3) g(m,i) ~ p( m, i) p(a,O)

,

m = a,c or r, 0 ~ i ~ N

g(i)

"

p(i) =

I

g(m,i). m = a.c and r, 0 ~ i ~ N = p(a,O)

m

(2.4)

The g(m,i)'s and g(i)'9, m = a.c or r. 0 ~ i ~ N. are scaled probabili-ties (with a factor (p(a,O»-I).

Define the following vectors:

!:m

It

[p(m.O) •••• ,p(m .i), ... ,p(m,N)]T.

So

It

[g( m ,0) , ••• ,g( m • i) , •••• g( m ,N) j T , p

It

[p(O) ••••• p(i), •.• ,P(N)jT

I

p """1l1 m = a,e and r m G

~

[g(O) . . . . ,g(1), ... ,g(N) JT

I

G """1l1 m m = a,e and r I t follows that (2.5) and (2.6) P """1l1 p(a,O) G --1ll P = p(a,O) G m = ate or r m = ate or r

(15)

3. Computational aspects:

In the case of state-dependent transition parameters, the limiting

state-probabilities can only be determined by numerical means.

Fortu-nately, for the model we introduced in chapter 2, it is possible to

develop recursive schemes for the computation of the limiting state

probabilities. These schemes will be developed in section 3.1. In section 3.2 we show that the partial derivatives (or the sensitivities) of the limiting state probabilities, with respect to the transition

parameters, can be computed In a similar fashion to the computation of

of the limiting state probabilities. Section 3.3 is devoted to the

numerical optimization of the performance variables.

The limiting state probabilities of the the continuous-time Markov chain in fig. (2.1) can, in general, be determined using the transition

balance equations at each of the 3(N+l) states. These equations

con-tain 3N+2 independent euqations, together with the normalizing condi-tion

(3.1 )

I

p(m,i) = 1

m,i

m = a,e and r, i = O,l, ... ,N

they form a set of linear equations which can be solved for the 3(N+l)

unknown state probabilities. Due to the model structure we are able to

determine the state probabilities recursively in terms of the state probability p(a,O). Then p(a,O) can be determined from the condition (3.1).

Transition balance at state (c,O) yields

(3.2)

"0

p(c,O) =

('0+80)

p(a,O)

Transition balance at state (r,O) yields

(3.3)

Yo

p(r,O) =

('0+$0)

p(a,O)

(16)

(3.4) p(O)

"0 Yo

(1

+ + ) p(a,O)

AQ+BO

xur~o

Transition balance between the i-th and the (i-1)-th set of states yields

(3.5) p(a,i) ~ Pi p(i-l) with

Transition balance at state (e,i) yields

(3.6) p(e,i) = eli (~) p(a,i) + i i

,

( ~ i-1 ) p(e,i-1), Ai TPi

Transition balance at state (r,i) yields

(3.7) p(r,i) It follows that (3.8) p(i)

+ (

with 'N = O. Yi (~) p(a,i)

+

i i

,

(

~)

,+~ p(r,i-1), Ai ' i "i

Y

i (1

+

\+6

i

+

\+~i)

p(a,i) 'i-1 X

+S )

+

p(e,i-1)

+

i i

,

( i-1 ) ~ p(r,i-1), Ai T~i

The state probabil ities p(e,i), p( r, i) and p(i), 0 <; i <; N, can be

expressed in terms of all p( a, j) , j ( i, as follows

i i-1 p(e,i) =

I

(

IT 6k+l \ ) 6i

".

p( a, j) j=O k=j J i i-1 p(r,i)

I

(

IT IPk

+

1 \ ) IP j Y j p( a, j) j=O k=j

(17)

p(i) with i i-I p(a,i) +

I ((

IT j=O k= j 1

~i

1

~i

i-I 9k+1 Ak ) 9j a j +

(k~j

"'k+l Ak)"'j'fj)p(a,j)

(Note that \ = 0 and

i-1

( IT k=i

•••• ) = 1, in the above equations).

In a vector-matrix form we can write (using the definitions of chapter

2)

(3.9) p =

eo

p

~ a-a

where e is a triangular matrix with elements e{i,j}, 0 ~ i, j ~ N,

={

1 for i j

e{ i, j} i-I

IT 9 A for i

>

j

k=j k+1 k

and Da is a diagonal matrix with elements Da{i,j},

o

~ i, j ~ N, D {i,i}

a Similarly,

(3.10)

where ~ is a triangular matrix with elements ~{i,j}, 0 ( i,j ( N,

= { 1 for i j ~{i,j} i-I IT "'k+1 \ for i > j k=j

and Dy is a diagonal matrix with elements Dy{i,j},

o

~ i, j ~ N,

Dy{i,j} = "'i'f i

o

~ i ~ N I t follows that (3.11) p = p + p + p ~ --c. -r = (I

+

eo

+

m )

P a y - a

(18)

where I is the identity matrix.

If we employ the relation given by equation

(3.5)

then we can rewrite equation (3.11) in the following form

(3.12) [ p(O)] p(l) p(N) Q

l

p(a,o)]

p(O) p(N-1) with Q

fl

(I + 0D + 'I'D ) D a y p

and Dp is a diagonal matrix with elements Dpji,jl, 0 ~ i,j ~ N, 1 for i 0

\-1

for 1 ~ i ~ N

~i

Q is a triangular matrix and thus the system of equations (3.12) can be solved recursively to obtain all state probabilities p(i), 0 ~ i ~ N,

in terms of the state probability p(a,O).

If p(a,O) is made equal to one in (3.12), then the recursive solution of the system equations yields values for g(i), 0 ~ i ( N (g(i) is defined in (2.4», which, i f substituted in the normalizing condition

N

I

p(i) = 1 yields a value for p(a,O) i=O

N -I

(3.13) p(a,O)=

(I

g(1)) i=O

The values of the state probabilities p(i), 0 ( i ( N, immediately follow (3.14) p(i) = g(i) N

( I

i=O - I g( i) )

Figure (3.1) shows the recursive scheme for the computation of g(i),

(19)

gee, 0)

=

9 ( c , 1 )

9( c, N) •

=

9(a,1)

=

I~ g(O)

9 ( r , 1 ) • 9 ( r ,N) 9 ( N )

Fig.(3. I) Recursive computation of the state probabilities

}' q,

(20)

It is of much interest to determine the effect of varying the transi-tion parameters on the limiting state probabilities. This will allow

numerical optimization of the performance variables with respect to the transition parameters under control.

For the specific case considered in this paper, we are interested in the values of aj, 0 ~ j ~ N, which optimize some performance criter-ion; this will require the determination of the partial derivatives and the sensitivities of the limiting state probabilities, with respect to the parameters aj, 0 ~ j ~ N, as well as the partial derivatives, with respect to the parameters $j, 0 ~ j ~ N (since the $j'S depend on the aj'S in our specific model).

In the following, we derive some important relations to proceed with

the determination of the partial derivatives and the sensitivities.

Differentiating equation (3.t4) with respect to aj and $j and mak-ing use of equation (3.13) yields

(3.t5) dcl d p( 1) = j p(a,O) dcl d g(i) j (3.16 ) ~ d p(i) ) = p(a,O)

df:"

d g( i) j Now, let (3.17) ~

=

~ (ao, aj, •••• ,c'--) q q N

The sensitivities with respect to the

be determined a follows: d d N (3.t8) dci"" p(i) = da j p(i)

+

I

a j q=O d k~j - (p(a,O»2 g(i) dcl

I

aj t,k d k~j - (p(a,O»2 g(i)

df:"

I

j t,k g(t,k), g(t,k),

parameters Uj,

o

~ j , N, can

d d~q

3f""

p(i). da j q

(21)

a

a

For the evaluation of the partial derivatives ~-- p(i) and ~ p(i). "j J

a

o

~ i , N. we need to determine the partial derivatives ~ g(k)

j

and ~

a

g(k). k

j

j •...• N (as shown by equations (3.15) and (3.16».

In the remainder of this section we show that the partial derivatives

a

~ g(k) and ~

a

g(k). j , k , N.

o ,

j , N. can be computed

j J

recursively in a similar fashion to the computation of the state probabilities.

The partial derivatives - - - a a g(k). j , k , N

"j

(Note that

a!.

g(k) = O.

J

for k

<

j). can be determined recursively as will be shown in the fol-lowing.

From equation (3.11) i t follows that

(3.19) G = (I

+

eo

+

'I'D ) G

" y - a

Differentiating equation (3.19) with respect to "j yields

(3.20 ) where

a

G = ~­ j (I

+

eo

+

'I'D ) ..:- G

+

GD G " y aCl. -a . 8j-a J

a

D (= ___ D ) is a 8j

a"j"

matrix with elements DSj{t,k}, 0 ~ t,k (N,

and all elements are equal to zero except DSj{j.j) = G

j .

It follows from equation (3.5) and the definitions (2.3) and (2.4) that

(3.21) g(a.j)

= {

1 for j 0

for 1 , j , N

Using equation (3.21). equation (3.20) can be written in the following form:

(22)

9(c,i+1) 9 ( c , N) if _ _ 9(8,i+1) ;;(1' i C· i,uj + + 9 ( N ) L u ( . , N ) (la,

Fig.(3.2) Recursive computation of the

sensitivities with respect to a.

(23)

0 0 0 0 0 0 g(i) 0 8 jP jg( j-l)

a

a

(3.22)

daj

g(j+l) = Q."d'Q""

OJ

g(j) +

e

0 g( j+l) 0 0 g(N) g(N-l) 0

where Q and

e

(as defined in equations (3.12) and (3.9» are triangular matrices. and the system of equations (3.22) can be solved recursively to obtain "'d'{l."

a

g ( k) • j < k < N. Similar systems can be solved for ~.~.

a

J J

o

~ j < N. Figure (3.2) shows the recursive scheme for the computation

a

of

ao.

g(t.k). t = a.c and r. k = i ••••• N.

J

The partial derivatives with respect to Yj. 0

<

j

<

N can be computed

in exactly the same way.

The partial derivatives

ar

a

g( k). j

<

k , N j

(Note that ~

a

g(k)

J

= 0,

for k

<

j). can be determined recursively as will be shown in the fol-lowing.

Differentiating equation (3.19) with respect to ~j yields (3.23)

ai-

G = (I + 00

+

'i'D )

ai-

G + (S"'jD + 'i'D,,,.) G

$ j - a y ~ j -a ~ Y ~J'"

a

S1jJj {t.k}, 0

<

t.k

where SljIj(=

ar

'1') is a matrix with elements j t-l , N.

{

-l/J,(

J q=k IT Ijiq+lAql

for j

<

t

<

N. 0 , k ( j-l S .{t.k} IjiJ 0 otherwise

(24)

r

91 •. i) • .\. I/J, f: 918.i-l) ••••••••••. l I/J ···A I/J F,-_,

I 1-1 1-1 1-1 '-1 1-, 0 0 Or

9 (c. N)

( N)

Fig.(3.3) Recursive computation of the

sensitivities with respect toct>. 1

(25)

a

"J'f:" Dy) is a matrix with elements Dljij {t,k}, 0 ( t,k ( N

J

all elements are equal to zero except D ljij {j ,j} = -lji~ y j.

Using equation (3.21), we can rewri te equation (2.23) in the following form: 0 0 0 0 0 0 g(j) 0 P jg(j-1)

a

a

(3.24 )

"'Jfj

g(j+1) = Q."J'f:" j g( j) + Zljij Pj+~g(j) g(j+l ) g(N) g(N-1) P Ng(N-1)

where Q is a triangular matrix (defined in (3.12)) and Zljij is a matrix with elements Zljij {t,k}, 0 ( t,k ( N,

{

-lji lji y

Z ljij

{t,

k} = j k k

o

otherwise

The system of equations (3.24) can be solved recursively to obtain

a

~ g( k) , j ~ k ( N. j

Similar systems can be solved for

~~,

J

o (

j (N. Figure (3.3) shows the recursive scheme for the computation

a

of"J'f:" f(~,k), t = a,c and r, k = i, ••• ,N.

J

The partial derivatives with respect to Bj, 0 ( j ( N can be compu-ted in exactly the same way.

In this section we will consider the numerical optimization of two

performance criterions; namely, the maximization of the system

(26)

N

(3.25) A =

L

p( a. i)

i=O

and the minimization of the average number of transactions In the sys-tem

(N).

given by

0·26 ) N N

L

i p( i)

i=1

We are interested in the values of the checkpointing rates aO' al ••••• ON (or a subset of them) which optimize a chosen performance criterion. Due to the possibly complicated dependence of the paramet-ers ~i. 0 ( i ( N. on the parameters "i. 0 ( i ( N. i t is

reason-able to employ numerical (iterative) optimization techniques. We start with an acceptable guess

~

(=[aoo.alo •••••

~olT)

and generate a

sequence ...9:1' ..9:2' .••• which should converge to a at which the chosen criterion is optimized.

The model is adjusted to the new parameters ~ after each iteration and the chosen criterion. as well as its derivatives with respect to

~n are computed; they are used to perform the next iteration. If A is to be maximized. then the (n+l)-th iteration is given by

0·27)

where, i f a gradient method is used, then 1IS!n is given by

(3.28) lIa = 6 dA

I

-n n d~ ~ = a n

where 6 is a scalar such that A(~+l) > A( a ). and

n -n (3.29)

da-

dA 3A + d,tT 3A "a

da

"f

N ("p(a.i) d~T "p(a.i) ) =

I

+ i=O

aa

da

31

(27)

h ap(a,i) and

were

aa.

ap(a,i)

a l '

0 ' i 'N can be

,

computed using the

schemes presented in section 3.2 and the matrix

~taT

is determined from the dependency of the ~i'S on the ai'S.

The iterations are terminated according to a stopping criterion. For example, if the value of

I

~

I

a = a or

I~

-

~-l

I

approaches

-n

A

then we accept ~ as an approximation to a which maximizes A. If N is to be minimized, then 6~ is given by

(3.30) 6a -n <I n da dN

I

a = a

-n

where <I is a scalar such that N(2n+1)

<

N( a ), and

n -n (3.31) dN da

a<i

aN

+

di

da- at -aN N T

lri!l)

I

i(ap(i)

+

d~ 1=0 aa da • af zero,

The computation of the partial derivations, the iteration steps and the

(28)

4. Analytical aspects:

In this chapter we consider the Markovian model presented in chapter 2.

When the transition parameters are state-independent (ai

=

a,

A = A

i • and ~i =~. 0 ( i ( N), it is

possible to derive analytic expressions for important system perform-ance quantities such as the ergodicity condition, the system availabi-lity and the average number of transaction in the system. A similar system with infinite waiting room was analysed by Gelenbe

[SJ.

In section 4.1 we present a state-space analysis approach as an

altern-ative to the generating function approach which is widely used in the analysis of queueing systems

[SJ.

Section

4.2

is devoted to discussion on the analytic optimization of the performance quantities.

The considered model (shown in fig. (2.1» is a continuous-time

irredu-cible Markov chain. For a finite state-space (corresponding to a

sys-tem with a finite waiting room), it can be shown that all states are ergodic

[8],

Le. there exists a limiting stationary probability dis-tribution for which all state probabilities have positive finite

values. For an infinite state-space (corresponding to a system with an infinite waiting room), the system is ergodic if and only if the state probability p(a,o)

>

0

[sJ.

Balance of downward transitions and upward transitions (fig. (2.1» yields

(4.1)

),(l-p(N» ~(A-p(a,o»

N

where A (=

L

p(a,o» is the system availability. i=O

It follows that for a system with an infinite waiting room,

A

p(a,O) = A

-~

(4.2)

(29)

The system availability A can easily be derived as follows.

Transition balance at the states (c,l), 0 ( i ( N and at the states

(r,i), 0 C i C N, yield

(4.3) (4.4)

with

Ac

and Ar as defined in (2.2).

But since A

+

Ac

+

Ar = 1, A follows immediately,

(4.5) A

Note that A is independent of the system load and the size of the wait-ing room.

NOw, using (4.2), we can write the ergodicity condition in terms of the

system parameters, (4.6)

N

The average number of transactions in the system

N

(=

I

i p(i») will i=l

be derived by making use of the following definitions N (4.7) N a ~

I

i p(a,i) i=1 N (4.8) N b.

I

i p(c,i) c 1=1 N (4.9) N r = b.

I

i p(r,i) i=1 and, thuS (4.10) N N + N + N a c r

For convenience we rewrite the recursive relations (3.5), (3.6) and

(3.7)

(30)

(4.12) (A

+

8) p( c , i) " p(a,i) + A p(c,i-l), l ' i , N-l, with

8 p(c,N) ~ " p(a,N) + A p(c,N-l)

(4.13) (A + ~) p(r,i) = y p(a,i) + A p(r,i-l), l ' i , N-l with

A p(r,N) y p(a,N) + A p(r,N-l)

Multiplication of equation (4.11) by i and summation for i yields

(4.14) N =

~

(N+l) - (N+l) p(N»)

a ~

Similarly, equations (4.12) a:ld (4.13) yield (4.15) N c -N

"

-

+ A (A p(c,N») and 8 a

1i

c y - A p(r,N) ) (4.16) Nr -N + - (A -~ a ~ r 1,2, .•. ,N,

From equations (4.10), (4.14), (4.15) and (4.16) we obtain the follow-ing expression for

N

(4.17) N 1 (1-

~)

M

[~

(l-(N+l) p(N» +

i

(Ac- p(c,N» +

~

(A - p(r,N» ] ~ r

For a system with infinite waiting room p(N) + 0 and N p(N) + 0, thus

equation (4.17) reduces to (4.18) N =

which is indentical to Gelenbe's result [5].

(31)

A-p(a,o) (4.19) N = A

- - , -__ +

A p(a,o) c A -p(c,o) ....;:,c-,,--=+ A p(c,o) r A -p(r,o) r p(r,o)

In this section we consider the analytic determination of the two opti-mum values of the checkpointing rate; aA which maximizes the

system availability and ~ which minimizes the average number of

transactions in the system. The two optimums are found to be differ-ent.

So far we have not considered the dependence of the mean recovery time ( -I) ~ on the mean avai ab e time I I b etween checkpoints (a-I).

It can be proved [5] for Poisson failure occurrences and exponential

available time between checkpoints (with mean a-I), that the available time intervals between the failure occurrences and the most recent checkpoint are exponentially distributed (with mean a-I). These time intervals are independent when the failure rate is much smaller than the checkpointing rate (i.e. y «a). Furthermore, we assume that the recovery time after a failure is equal to the available busy time between the failure occurrence and the most recent checkpoint. It follows, for a failure rate which is much smaller than the processing rate (i.e. y

«

~) or for a heavily-loaded system, that the recovery time is proportional to the available time interval between the failure

occurence and the most recent checkpoint. The above assumptions yield

recovery periods which are independent and exponentially distributed with a mean (~-I) equal to the mean available busy time between

checkpoints. The probability that the system is busy, given that it is available, is

A-p(a,o)

A

with A as given in equation (4.5), and thus (4.20)

<1>-1

=

Now, we are able to use the analytic results of section 4.1 for the optimization of A or N with respect to a (the checkpointing rate). Substituting from (4.20) into (4.5), differentiating with respect to a and equating to zero yields ~A for which A is maximum

(32)

(4.21) u A =

r>'~Y

)\;

)lA with 2& -1 (4.22)

A

(1+ / )

With some manipulations we get the following expression for nA, (4.23)

For values of

A

close to 1, aA reduces the results obtained in earlier papers

to (ABY)'!! which is analagous to

~

[3,5,9J.

Differentiating equation (4.18) for

N

with respect to a and making use of equation (4.20) yields

(4.24)

+

Equating (4.24) to zero yields an equation for

aN

for which

N

is minimum. The analytical expression for

aN

is quite tedious and numerical techniques should be employed to determine

aN.

It is interesting to evaluate (4.24) we obtain:

(4.25) Ttl

aN

I

From equations (4.21) to

It is obvious from equation (4.25) that 0A which maximizes the

system availability, does not, in general, yield a minimum for the

average number of transactions in the system

N.

There is a minimum for

_ A

N at aA i f the following condition is satisfied,

o

(or equivalently, _ 4AS = 1).

~YA

(33)

(4.26) Y(n -~ 1)

for which

"N

a

A

A

Considerable simplification arises in the determination of

aN

if

a

2A

»---

in the neighbourhood of

"N '

since then we may put

aa

2

aA

0

i

h

i for

aN

Tn -

n t e equa t on

Tn

It follows that (4.27)

aa

aN

which yields an (4.28)

"N

approximate value

1-(2y

(~)2)

~

It is easy to show that

(4.29)

A (J.A

for

aN,

given by

which is equal to one i f 4 AS = ~yA.

A

Note that maximizing A yields a maximum for p(a,O) (since - is

invari-~

ant in eqution (4.2» which is a measure for the maximum additional load which can be added to the system (recall the ergodicity condition

A

<

~). The maximum limit on the arrival rate of transactions at

maximum availability is determined from the equality

(4.30) A

max

(34)

5. Conclusions

An M/M/l/N system subject to Poisson breakdowns of exponential duration is considered. In the case of state-dependent parameters, efficient numerical algorithms were presented for the computation of the state probabilities and their sensitivities with respect to the system para-meters (they are used in the numerical optimization of performance variables). In the case of state-independent parameters, a state-space

analysis approach was presented in order to derive analytic expressions

for the system availability and the average queue length. The analysed system can be used to represent the operation of a transactional data-base system, subject to random failures and supported with checkpoint-ing and rollback recovery strategies. This representation is valid

under various assumptions such as the Poisson occurrences of arrivals

and breakdowns, and the exponential time distribution of transaction

serivce and checkpoint duration. Furthermore, it was necessary to

assume a heavily-loaded situation and a failure rate which is much smaller than the checkpointing rate in order to agree with the exponen-tial assumption of recovery times. The recovery periods are

independent when the failure rate is much smaller than the

checkpointing rate. The optimum value of the checkpointing rate which maximizes the system availability is determined, depending on the

system load and found to be different from the value which minimizes

the average number of transactions in the system.

Although the underlying assumptions may not all be realistic, the ob-tained results may agreeably fit in practical situations. It remains interesting to develop and analyse more realistic models.

Acknowledgement

It is a pleasure to thank Prof. ir. F.J. Kylstra for his constant support and useful comments. I am grateful to Dr. ir. J. van der Wal for the interest he has shown during several fruitful discussions.

(35)

References:

[1 ]

[ 2]

Bacelli, F.

Analysis of a service facility with periodic checkpointing. Acta Informatica, Vol. 15 (1981), p. 67-81.

Bacelli, F. and T. Znati

Queueing algorithms with breakdowns in database modelling. In: Performance '81: Proc. 8th Int. Symp. on Computer

Performance Modelling, Measurement and Evaluation, Amsterdam,

4-6 Nov. 1981.

Ed. by F.J. Kylstra. Amsterdam: North-Holland, 1981. P. 213-231.

Chandy, K.M., J.C. Browne, C.W. Dissly and W.R. Uhrig Analytic models for rollback and recovery strategies in

database systems. IEEE Trans. Software Eng., Vol. SE-l (1975)

p. 100-ll0.

[4] Chandy, K.M.

A survey of analytic models of rollback and recovery

strategies.

Computer, vol. 8, No.5 (May 1975), p. 40-47. [5] Gelenbe, E. and D. Derochette.

Performance of rollback recovery systems under intermittent failures.

Commun. ACM, Vol. 21 (1978), p. 493-499.

Gelenbe, E.

On the optimum checkpoint interval.

J. Assoc. Compo Mach., Vol. 26 (1979), p. 259-270. Gelenbe, E.,

Model of information recovery using the method of multiple checkpoints.

Autom. & Remote Control, Vol. 40 (1979), p. 598-605.

Translated from Avtom. & Telemekh., No.4 (April 1979), p. 142-151.

[8] Kleinrock, L.

Queueing systems. Vol. I: Theory. New York: Wiley, 1975. [9] Young, J .\0/.

A first order approximation to the optimum checkpoint interval.

(36)

Reports:

EUT Reports are a continuation of TH-Reports.

116)~, W.

THE CIRCULAR HALL PLATE: Approximation of the geometrical correction

f actor for small contacts.

TH-Re:port 81-E-116. 1981. ISBN 90-6144-116-1 \ 17) Fabian, K.

~ AND IMPLEMENTATION OF A CENTRAL INSTRUCTION PROCESSOR WITH

A MULTIMASTRR SUS INTERFACE.

TH-Report 81-E-117. 1981. ISBN 90-6144-117-X 118) Wang Yen Ping

ENCODING HOVING PICTURE BY USING ADAPTIVE STRAIGHT LINE APPROXIMATION. EUT ·Report 81-£-118. \98\. ISBN 90-6144-118-8

119) Heijnen. C.l.H., R.A. ~. J.F.G.J. Olijelasers and W. ~

FABRICATION OF PLANAR SEMICONDUCTOR DIODES, AN EDUCATIONAL LABORATORY EXPERIMENT.

EUT Report 81-E-119. 1981. ISBN 90-6144-119-6.

120) Piecha. J.

B£s"Ci'i'PTION AND IMPLEMENTATION OF A SINGLE BOARD COMPUTER FOR

Ih~USTRIAL CONTROL.

EUT Report 81-[-120. 1981. ISBN 90-6144-120-X 121) Plasman. J.L.C. and C.M.M. 1immers

DrifC'THEASUREHENT OF BLOOD"""'P"REs'SiiRE BY LIQUID-FILLED CATHETER MANOMETER SYSTEMS.

EUT Report 81-[-121. 1981. ISBN 90-6144-121-8

I~~) ?onomarenko, H.F.

ISFORMATIQN THEORY AND IlJENTIFICATION.

ELT Report 81-E-122. 19BI. tSBN 90-6144-122-6

123) Ponomarenko, M.F.

INFOIU1ATlON MEASURES AND THEIR APPLICATIONS TO lIJENTU'ICATION

(a bibliography).

En Repor t 81-E-123. 1981. ISBN 90-6! 44-123-4

124) Borghi, C.A., A. Veefkind and J.M. ~

EFFECT OF RADIATION AND NON-MAXWELLIAN ELECTRON DISTRIBUTION ON RELAXATION PROCESSES IN AN~BMOSPHERIC CESIUM SEEDED ARGON PLASMA.

EUT Report 82-£-124. 19B2. ISBN 90-6144-124-2

l"'~' Saranummi, N.

DE'I'EcrIQN OF TRENDS IN LONG TERM RECORDINGS OF CARDIOVASCULAR SIGNALS. EOT Report 82-E-125. 1982. ISBN 90-6144-125-0

1.:6; Krolikowski, A.

HODEL STRUCTURE SELECTION IN LINEAR SYSTEM IDF.NTIFICATION: SlIrvey of methods with emphasis on the information theory approach. EUT Report 82-E-126. 1982. ISBN 90-6 J 44-126-9

THE NETHERLANDS

DEPARTMENT OF ELECTRICAL ENGINEERING

Eindhoven university of Technology Research Reports (ISSN 0167-9708) (127) Damen, A.A.H., P.M.J. Van den Hof and A.K. Hajdasinski

THE PAGE MATRIX: An excellent tool for noise filte~ing of Markov parameters. order testing and realization.

EUT Report 82-E-127. 1982. ISBN 90-6144-127-7

(128) Nicola, V.r',

MARKOVIAN MODELS OF ~ TRANSACTIONAL SYSTEM SUPPORTED BY CH£CKPOIN11NG

~~ RECOVERY STRATEGIES. Part I: A model with state-dependent parameters.

EDT Report 82-E-128. 1982. ISBN 90-6144-128-5 (129) Nicola, V.F.

~IAN MODELS OF A TRANSACTIONAL SYSTEM SUPPORTED BY CHECKPOINTING AND RECOVERY STRATEGIES. Part 2: A model with a specified number of completed transactions between checkpoints.

Referenties

GERELATEERDE DOCUMENTEN

De prijzen worden gesteund door de goede vraag vanuit Duitsland waar door het omschakelingsproces naar alternatieve systemen het aanbod verkrapt.. De afzet van kuikenvlees loopt

Door de signaalstoffen van de ziekteverwekker te inactiveren (‘quorum quen- ching’), kan infectie worden voorkomen, zoals is aangetoond voor Pectobacterium in aardappel, of

Die bekentenis nam me voor hem in – totdat ik begreep dat die woede niet zozeer zijn eigen `korte lontje’ betrof als wel de cultuurkritische clichés waarmee zijn essay vol staat,

Verslag van het bezoek aan het &#34;Laboratorium voor weerstand van materialen&#34; van de Universiteit van Gent, vrijdag 29-9-1967.. (DCT

In presence of coordinating counter-ions (Cl, OH) both mono- nuclear and dinuclear complexes are simultaneously present, the mono/di ratio being dependent on

too much; the inaccuracy in the formula of Wilke-Chang is approx. 10%, however, by using this series of solutes possible discrepancies in the calculated diffusion

Topics covered are: information needs of drivers, in-vehicle communication, communication with the driver by variabIe message signs, broadcasting of traffic

De gemiddelde aantallen slachtoffers jonger dan 15 jaar dalen in de experimentele gebieden in de naperiode zowel bij alle experimenten te zamen, als bij de