• No results found

A recursive aggregation-disaggregation method to approximate large-scale closed queuing networks with multiple job types

N/A
N/A
Protected

Academic year: 2021

Share "A recursive aggregation-disaggregation method to approximate large-scale closed queuing networks with multiple job types"

Copied!
21
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

A recursive aggregation-disaggregation method to

approximate large-scale closed queuing networks with

multiple job types

Citation for published version (APA):

van Doremalen, J. B. M., & Wessels, J. (1988). A recursive aggregation-disaggregation method to approximate large-scale closed queuing networks with multiple job types. (Memorandum COSOR; Vol. 8808). Technische Universiteit Eindhoven.

Document status and date: Published: 01/01/1988 Document Version:

Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication:

• A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website.

• The final author version and the galley proof are versions of the publication after peer review.

• The final published version features the final layout of the paper including the volume, issue and page numbers.

Link to publication

General rights

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain

• You may freely distribute the URL identifying the publication in the public portal.

If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license above, please follow below link for the End User Agreement:

www.tue.nl/taverne

Take down policy

If you believe that this document breaches copyright please contact us at:

openaccess@tue.nl

providing details and we will investigate your claim.

(2)

Department of Mathematics and Computing Science

Memorandum COSOR 88-08

A

recursive aggregation-disaggregation method to approximate large-scale

closed queuing networks with mUltiple job types

by

Jan van Doremalen and Jaap Wessels

Eindhoven, Netherlands April 1988

(3)

A recursive aggregation-disaggregation method to approximate large-scale closed queuing networks with multiple job types

by

Jan van Doremalen1 and

Jaap Wesse1s2

ABSTRACT

This paper deals with a new approximation method for large scale queuing net-work models with multiple job types.

In recent years mean value oriented approximation algorithms have received much attention. Most of the approximation methods are based on decomposition and aggregation arguments and use iteration to obtain a fixed point of an impli-citly defined set of non-linear equations for the relevant performance measures, such as mean response times, throughputs and mean queue lengths.

In this paper a recursive aggregation-disaggregation method is introduced to bypass the computational problems involved in evaluating the standard multi-dimensional recursive schemes associated with exact mean value analysis in separable queuing networks with multiple job types. As a side result we study the influence of Pollaczek-Khintchine type approximations for the mean response times at first-in first-out single server queues with non-exponential service demand distributions.

The power of the method is tested with a closed central server model involving multiple central processors, disk units and job types.

1 Centre for Quantitative Methods. Nederlandse Philipsbedrijven BV, P.O. Box 518, NI.,..5600MD Eind-hoven

2 Department of Mathematics and Computing Science, Eindhoven University of Technology, P.O. Box 513, NL-5600MB Eindhoven.

(4)

1. Introduction

NetwoIks of queues are used in many areas tD model and analyse real-life systems, as for instance

computer systems, communication netwoIXs, transportation systems, harbour facilities, flexible

manufacturing systems and production lines. The use of such models is justified by a common

characteristic of such systems: they can be viewed as a collection of interconnected resources

providing service tD groups of custDmers with specific job requirements. The resources have finite

capacities or service rates and, consequently, waiting lines of jobs

will

be formed.

Stochastic models and particularly (semi) Markov processes are a widely used tool for the

analysis of queuing netwolk. systems. Under certain ergodicity conditions the equilibrium

distri-bution of the Malk.ov process may be obtained as the unique strictly positive and normalized

solution of a set of linear equations relating

the

equilibrium probabilities.

If

a queuing network

model apart from these ergodicity conditions satisfies so-called separability conditions, the

solu-tion attains an attractive product-form. These models form the class of product-form or separable

queuing netwolk. models.

The search for separability in queuing networks started in Jackson

[19].

Noteworthy papers in this

line are Gordon and Newell [16] and Baskett, Chandy, Muntz and Palacios [2J. Important

theoret-ical

extensions are covered in, for example, Lam [24], Kelly [20], Hordijk and Van Dijk

[17]

and

[18]

and

Cohen

[43].

Apart from the fact that for separable queuing netwolk. models analytical expressions have been

obtained for the solution of the equilibrium equations, it has been shown that important system

characteristics may be computed in a relatively simple and efficient way.

In

this paper we shall be concerned with the computation of relevant performance characteristics

in

so-called closed queuing netwoIXs, i.e. for each job type a fixed number of jobs proceeds

through the network and the jobs neither enter nor leave the system. For such netwoIXs the

product-form establishes the equilibrium distribution up to a normalization constant. The

evalua-tion of this constant causes computaevalua-tional problems, as it involves a summaevalua-tion of the

unnormal-ized

equilibrium probabilities over the complete state space.

The two main procedures for solving this problem are known as the convolution method (CM)

and

mean value analysis (MV A), which lead tD the CM algorithm and the MV A algorithm

respectively. Recently, a third convolution-like procedure

has

been developed known under the

name of recursion by chain algorithm (RECAL). This approach almost immediately found its

mean value sister in the mean value analysis by chain algorithm

(MY

AC).

The CM algorithm, introduced for the simplest situation in Buzen [6], is a recursive procedure for

the

computation of the normalization constant. It appears that the system characteristics can be

expressed in

the

recursively computed values and thus may be evaluated efficiently.

In

Reiser and

Kobayashi

[31]

the procedure has been extended tD cover a large class of separable queuing

net-wolk. models.

(5)

~ 3 ~

The MV A algorithm is based on a set of recursive relations between important system charac-teristics, such as mean response times, mean queue lengths and throughputs. It has been intro-duced in Reiser [29] and extensions can be found in Reiser and Lavenberg [32], ZahOIjan and Wong [40], Krzesinski. Teunissen and Kritzinger [23] and Bruell, Balbo and Afshari [5].

Whereas CM and MV A are essentially based on a recursion in the number of job types, RECAL and MV AC are based on a recursion in the number of work stations. RECAL is described in Conway and Georganas [8] and MV AC in Conway, De Souza e Silva and Lavenberg [9].

For notes on the implementation of the CM and MV A algorithms we refer to Bruell and Balbo [4]. Reiser [30] and Zahorjan and Wong [40].

Though separable queuing network models are an important tool to study queuing network sys-tems. the application area is restricted. Most realistic models for practical problems do not satisfy the separability conditions, whereas separable models tend to be very large and, therefore, cannot be evaluated using standard methods. For both types of problems the use of approximation methods seems a natural way out

The importance of the MV A relations in the development of simple and efficient approximation methods lies in the fact that they have an attractive intuitive interpretation in terms of Little's for-mula (cf. Little [25] and Stidham [36]) and an arrival theorem, that couples the equilibrium distri-butions at the departure and arrival moments of individual jobs with the equilibrium distribution of the network model with one job less (cf. Lavenberg and Reiser [411 and Sevcik and Mitrani [34]). An extra property of MVA based approximation methods is that they, in general, can be implemented very easily in existing MV A codes.

Since the presentation ofMV A a wave of papers has appeared on the subject, see e.g. De Souza e Silva. Lavenberg and Muntz [37] and Van Doremalen and Wessels [12] for an overview and appraisal.

In this paper we shall be concerned with a combination of the modelling and computational prob-lems. The line of argument is as follows.

We start with an introduction of the MV A algorithm for a class of closed queuing networks with multiple job types in Section 2. In Section 3 a heuristic extension of the basic MV A relation for the mean response times at first-in first-out single servers is introduced. Our main contribution to the literature on queuing network models is the recursive aggregation-disaggregation method introduced in Section 4. The method is developed for the approximation of large scale closed queuing network models with multiple job types. The basic idea is to aggregate groups of job types. This leads to a substantial reduction of the number of dimensions in the multidimensional MVA scheme and, consequently, to a reduction in the computational complexity. In order to maintain the influences of the original job type structure, an elementary disaggregation step is perfonned in every recursion step of the reduced scheme. In Section 5 we investigate the merits of the method by means of a numerical example stemming from computer perfonnance evalua-tion: a closed central server model with multiple central processors, disk units and job types.

(6)

Section 6 concludes with some final remarks, related topics and points of future research.

2. The MY A algorithm for closed queuing network models with multiple job types 2.1. The queuing network model

Consider a closed queuing netwotk with N workstations and R job types. The Kr jobs of type r proceed through (part of) the netwotk in accordance with a Matkov routing defined by an irredu-cible stochastic matrix Pro r =: 1.2, ... • R. The relative visiting frequencies

I",,.

of jobs of type r at the woIkstations n = 1,2, ...• N

are

defined as the limiting distribution of the discrete Markov chain generated by the matrix P r' The service demands of type r jobs at wotkstation n are

sto-chastically independent random variables with finite mean W",r and variance

0';,,..

We allow for three service disciplines: first-come first-served (FCPS), processor sharing (PS) and infinite server (IS). It is assumed that the service rates at each of the workstations are fixed and normalized to unity and that the service demands are exponentially distributed with the same mean for each job type at PCFS wotkstations.

The relevant steady state system characteristics

are:

SIJ1'(!): A,.,.(K) : LIJ1'(!f) :

expected sojourn time of a type r job at wotkstation n. throughput of type r jobs at wotkstation n, and

expected number of type r jobs at wotkstation n,

where the argument

!f

denotes the dependence on the population vector that is introduced as

!f=(K1.···,KR ).

22. The MVA algorithm

In Reiser and Lavenberg [32] it is proved that the system characteristics are related through the following so-called mean value relations. These relations constitute the kernel of the MV A algo-rithm.

The first relation couples the expected sojourn times at population vector

!f

with the mean number of jobs at the population vectors

!f

-.£1'

!f -

'£2, •.•

,!f

-~, where!r denotes the r-th unit vector,

(2.1)

R

{

(l:L,.,,{!f

-!r)+ l)wlI,r. ifn isFCFS orPS

1=1

SlI,r(!) = WlI,r. if . n 18 IS

The relation (2.1) is based on an arrival theorem (cf. [34], [41]).

The second relation is a version of Little's formula and couples throughputs and expected sojourn times,

(7)

(2.2)

All,rClf) = -N::-:---=;=-~-/ll,r K"

~ /m.,rSm,r®

m=1

-5-The last relation is a direct application of Little's fonnula and couples mean numbers of jobs,

mean sojourn times and throughputs,

For more details on the interpretation of the MV A relations we refer to Reiser [29], Reiser and

Lavenberg [32] and Van Doremalen [13]. Bard [I] uses these interpretations for constructing

approximations in non-separable systems.

2.3 Notes on the complexity

of

the MVA algorithm

The MV A relations (2.1), (2.2) and (2.3) constitute a recursive algorithm for the evaluation of the

system characteristics over a range of population vectors. The initialization is by

Lll,r(Q) =

0 for

each couple

n

and

r.

The recursion runs through all the vectors in the range of (0, 0, ...• 0) up

till

(K1,K

z '"

,KR).

Hence. the computational complexity is largely detennined by the fact that

R

I1(K,. + 1)

recursion steps are necessary. For larger values of

R, K h ••• ,KR

this will prohibit an

,,=1

exact evaluation of the scheme within a reasonable amount of time. Furthennore, the storage

requirements also grow exponentially with

R,

as the larger part of all computed infonnation must

be

stored.

3. Non-identical and non-exponential service demands at FCFS single server queues

Consider the network introduced in Section 2. However, now

the

service demands of type

r

jobs

at a FCFS workstation

n

are distributed with mean

w..,,.

and variance

cs~,.

without extra conditions.

This relaxation of the model assumptions leads to a violation of the separability conditions and,

consequently. the MVA relations are no longer valid.

In this

section we shall adopt an approximation method advocated in Reiser [28] that lends itself

to a direct implementation in any existing MV A algorithm. First we shall describe the method

for lucidity of presentation. Then we will make some comments.

A first approximation for the evaluation of expected sojourn times in the non-separable queuing

network at FCFS single server queues would

be

the following. Using an adjustment of (2.1)

R

(3.1) Sll,r(!) = ~LII,I(K -~)WII,I+WII,"

1=1

as

if

the arrival theorem holds (which is not the case) and, consequently, a

type r

job would see,

upon its arrival at workstation

n,

an expected number of

L",I(K -~)

jobs of

type 1

in front of it.

The mean service demand of a

type I

job is

W..,l.

So, summing these mean service demands and

(8)

The approximation may be improved upon. If a type I job is being served upon the arrival moment of a type r job, its expected residual service demand, in general, will not equal Wl&,l. It

seems a better guess to apply the mean residual life time fonnula at an arbitrary time instant So, if a job of type I is in service, we use

0!,+W;.,

(3.2)

2wII,I

to approximate the expected residual service demand at the arrival moment of a type r job. Note that

A...,([f

-!r)WII.1 is an obvious approximation for the probability that a type r job finds upon its arrival at woIkstation n a type I job in service. This yields the following improvement of relation (3.1).

R

(3.3) SII,,,([f)

=

l:(LI&,I([f -!r) - A,.,I([f -!r) WI&,I) Wil,l

1=1

R Z 2

01&,1 +WII.1

+

l:

A...,([f -!r) WII,I

+

WlI,r •

1=1 2WI&,1

The similarity between this fonnula and the Pollaczek-Khintchine fonnula for MIG II-queues should be observed, cf. Oliver [27] and Kleinrock [21] and [22] for similar reasonings to obtain the expected sojourn times in MIG II-queues.

Observe that (3.3) with (2.2) and (2.3) fonns a strictly recursive scheme for the evaluation of approximations of the system characteristics. It is easily verified that, in a straightforward way, the scheme can be implemented in any existing MY A algorithm.

In Reiser [28] it has been reported that the approximation perfonns quite well, especially for values of the coefficient of variation vlI.r=0l&,rlwlI,r in the range of OS vlI,rS 1. Recently, in Bondi and Whitt [3], the influence of the service demand variability in closed queuing networlcs with FCFS single server queues has been analysed in more detail. Bondi and Whitt compare four approximation methods, namely 1. Reiser's MY A-based apprOximation (Reiser [28]), 2. the extended product fonn method (Shum and Buzen [35]), 3. the generalized product fonn method (fripathi [38]) and 4. Marie's device complement method (Marie [26]). The authors conclude that Marie's method performs best. However. Reiser's method, especially for smaller values of the coefficient of variation, perfonns reasonably well also. If we consider the question of implemen-tation, especially for larger closed networlcs with many job types. the MY A adjustment proposed by Reiser has to be advocated. Our numerical results support the findings in Reiser [28] and Bondi and Whitt [3].

(9)

-7-4. A recursive aggregation-disaggregation method

4.1. Introduction

The computational complexity and storage requirements of the exact MV A algorithm introduced

in

Section 2 prohibit the evaluation of closed queuing network models with a large number of job

types.

The

complexity

is

largely caused by the fact that the number of recursion steps grows

exponentially with the number of job

types.

In

the literature much attention has been paid to this complexity problem and a number of

approximation methods have been proposed and analysed. Three lines of research can be

dis-cerned.

The

first approach is to avoid the recursion and to concentrate on the evaluation of the

perfor-mance measures at the desired population vectors. A typical representative of this approach is the

widely appraised Schweitzer method, introduced in Schweitzer [33], and its refinements

sug-gested in Chandy

and

Neuse [7].

The

second approach is to decompose the queuing network model by analysing adjusted queuing

network models per job

type.

The mutual influence of the job types is approximated e.g. by

adjusting

the

operation of the service centres by slowing down the service rates as in Reiser [28]

and Reiser and Lavenberg [32] or by adjusting the MV A scheme as in Van Doremalen [13].

The third approach is to aggregate the groups of job types in some way or another. The standard

way to do so

is to

define a smaller number of new job types and to assign each original job type

to one of the newly defined types. The problem is then

to

assign job type characteristics to the

newly formed job types.

In

most instances this

is

done in an iterative way.

Typical of the methods presented in the literature is that they are iterative

in

nature.

In

fact, most

methods can

be

viewed as successive approximation methods

to

determine a fixed point of an

implicitly defined set of non-linear equations.

We shall present a recursive aggregation-disaggregation method that is based on the aggregation

of job types, but that tries

to

preserve the typical features of the distinct job types

in

the recursive

disaggregation. We start with a description of the aggregation method in its most extreme form: a

total

aggregation. Then a refinement. the partial aggregation,

will

be discussed. Eventually, a

so-called depth-improvement

will

be introduced.

4.2. A total aggregation metlwd

We

shall

introduce an approximation method based en a recursive aggregation-disaggregation of

the job types. The aggregation concentrates on the sojourn time relation (2.1). The disaggregation

concentrates on

the

throughput relation (2.2). Starting point of the analysis is the exact MV A

algorithm of subsection 2.2.

In

this we assume exponentially distributed service times, but in a

similar way as in section 3 the method can be extended to the non-exponential case.

(10)

The complexity of the MV A algorithm is caused by the multidimensional recursion in the popu-lation vector. We suggest to aggregate the set of job types into a single type of job. As a conse-quence the adjusted MV A algorithm will run through the integers 0, ... , T, where

R

(4.1) T=:E Kr .

1'.1

A recursion step starts with a sojourn time relation. The expected sojourn time with k jobs in the system, k = I, 2 •...• T. is given by

R

{

(:ELII,I(k-l) + 1) wlI,Tt n isFCFS orPS

'-I

SlI,r(k)

=

w..,,.. n is IS

(4.2)

for a type r job at workstation n.

The basic idea of the disaggregation is that the jobs which are lumped together in a single type in the aggregation step, may be distributed over the original types in a disaggregation step. Let, therefore. a,.. r = I, ... ,R be the fraction of the total number of jobs being of type r, i.e.

(4.3)

ar=T'

K,.

Then we approximate the throughput of type r jobs at workstation n by

(4.4) A 11,7' (k) _ - N a,.!lI,rk

:E !m,rSm,r(k)

",-I

The last relation in the MV A-algorithm remains unchanged, i.e.

(4.5) LII,.,.(k) = A..,.,.(k) SII,.,.(k) .

The algorithm is easy to implement and has the considerable advantage over most existing methods that it is non-iterative.

4.3. Partial aggregation

In this subsection we discuss a refinement of the total aggregation method. It seems a good idea to use a partitioning of the set of job types. Each of the created subsets fonns the basis for an aggregate closed job type.

A partitioning of C. where C is defined as {I.··· ,R}, in! subsets, Cl>"', C1 say, is the basis of the partial aggregation method. The sets Ci are disjoint and their union is C. With the subset Ci we

associate a population sizeB;. where

(4.6) Bj =

:E

K,. .

ree,

This defines a population vector ~ = (B 1> ••• ,BI ) for the aggregated model. We introduce for all

(11)

-9-i.e.

(4.7)

The approximating MV A-algorithm again is an adjusted mean value analysis scheme involving

an I-dimensional recursion on the population vector

!t.

The recursion

is

defined by the following four relations at an arbitrary population vector

!!

= (b1 , ••• ,bl )

in the range of (0, ... ,0) through

(B 1 •••• ,BI ).

For

all

r

E Cit i

=

1 •... •

1

and

n =

1 •...

,N

evaluate

(4.8)

(4.9)

I

{

<L

LII,I<!!. - ~) + 1) wlI,rt n is FCPS or PS 1=1 S,.,r<!!.) = WII,T' n is IS a.,.bJ',.,r AlI,r(~) = N = '

-L

fm,rSm,r<!!.)

(4.10) LlI,r<!!.) = AlI,r<!!.) SlI,r<!!.) ,

Note that the fractions

a.,.

remain constant during the recursion.

In

fact, it would

be

difficult to

define a local value for these frnctions.

The recursion runs through

all

the vectors in the range of (0, ...• 0) through

(B 1 •••• ,BJ) and.

con-sequently,

I

(4.11)

n

(Bi + 1)

1=1

recursion steps are

to

be evaluated.

The

amount of work per recursion step

is

very similar to that

in the original MV A-algorithm. As a consequence the total amount of work to

be

done will be

much less

than

for the original MV A-algorithm if the value of

I

is not too large.

We have introduced the partial aggregation method. The problem that remains, is a good choice

of a partitioning.

The

accuracy of the method will tend to be better for a more detailed

partition-ing. but a refined partitioning will cost more computation time and larger storage facilities than a

simple one. One has to look for a partitioning in the range of

I = R

corresponding with

the

exact

MV A-algorithm, and

I

=

1 corresponding with the global aggregation. which yields the right

bal-ance between desired accuracy and acceptable computational costs.

The number of recursion steps gives a good indication of the computational complexity and may

be

used to give a prior estimate of the efficiency of a given partitioning.

The accurncy of

the

method for a given partitioning

is

hard

to

measure as no bounds are presently

known for the resulting procedures (compare the final remark of the next subsection). Here.

numerical experiments and intuition have

to

be combined to come up with guidelines. For more

details we refer to Section 5.

(12)

4.4. Depth improvement

The total aggregation method is highly efficient and fairly accurate, even for quite substantial

differences

in

the workloads of the respective

types

(see section 5). However, if a higher accuracy

is required and one is willing to spend extra computation time and storage facilities, a

straightfor-ward depth improvement may be considered.

The basic idea is to

stalt

with the computation of approximations via the total aggregation

method for the behavioural characteristics at the population vectors

K. -

£T, r

=

1 •...

,R,

and then

to evaluate the last step

in

the recursive MY A-algorithm exactly. We

shall

refer to this

improve-ment as a first order depth improveimprove-ment. It is a special case of a range of improveimprove-ments which we

have

called

depth improvements.

The MY A-algorithm runs through

all

vectors

in

the range of (0, ... , 0) up to

(K 1 ••••• KR).

With

v

we denote the set of

all

R-dimensional integer valued vectors in

this

range. ie.

(4.12)

V={!=(kh ... •

k,)

jt,e

10.

···.K,l.r-l.· ..•

R} .

The MVA-algorithm is recursive in the number of customers of the distinct chains. So, it makes

sense to introduce

the

sets

V(t), t

=

O.

I, ...•

T.

as .

(4.13) V(t) ={k e V

If

kr

=

t}

with T=

f

Kr .

,=1 r==l

Observe that the sets

V (I)

are disjoint and their union is the set

v.

These sets fonn the basis for an

efficient implementation of the MV A-algorithm as well, cf. Zahorjan and Wong [40]. To evaluate

the characteristics

at

the vectors in the set

V(t)

the behavioural characteristics at the population

vectors in the set

V(t -1)

are needed only.

We now introduce the tilt-order depth improvement. First, approximations via total aggregation

for the behavioural characteristics at the population vectors

in

the set

V(T - t)

are evaluated.

Afterwards, an evaluation of the original MY A-algorithm is perfonned for the population vectors

in the

sets

V(T - t +

1) through

V (T).

The depth improvement is a generally applicable method and it yields very satisfactory results.

For most purposes a first order depth improvement, with

t

=

1. will suffice.

An

interesting use of

higher order depth improvements is

the

Perfonnance Bound Hierarchy method introduced in

Eager and Sevcik [14] and [15]. The method generates upper and lower bounds on certain

perfor-mance characteristics by an appropriate choice of initial sets of characteristics.

4.5. Non-identical

ond

non-exponential service demands

So far, the computational methods have been developed under the service demand restrictions for

separable networlcs. However, section 3 shows how an MY A-algorithm can

be

adapted in the

case of non-identical and non-exponential service demands at single server FCFS-stations. These

(13)

-11-adaptations do not lead to exact solutions, but the approximations appear to be reasonable (see section 3). If necessary the methods described in this section can and will be analogously amended. In the numerical examples of section 5 this is executed for the disks in the relevant cases.

5.

A numerical example

5.1. The test environment

The power of the introduced class of approximation methods has been tested with numerical experiments. The basic model is a closed central server model with multiple central processor units (CPUs), a shared set of background storage devices (DISKs) and multiple job classes. Such models can be used to evaluate optimal configurations, job allocations and multi-programming levels.

In our examples the computer system comprises three CPUs and nine DISKs. The CPUs operate in a processor sharing (PS) fashion and the service discipline at the DISKs is come first-served (FCPS).

We discern three types of jobs. The jobs are characterized by their routing probabilities and their workloads at the DISKs. For job type i, i

=

1,2, 3, the probability to visit DISK j, j

=

I, ...• 9, after a visit to one of the CPUs is p;J. The probabilities are pictured in Table 1.

PiJ DISK UNIT

1 2 3 4 5 6 7 8 9

type 1

.25

.25

.25 .05 .05 .05

.06

.04 .00 type 2 .15 .15 .15 .10

.10

.10 .05 .05 .15 type 3 .00 .00 .05 .05 .15 .15 .20 .20 .20

Table 1

The routing probabilities.

Each job is associated with a single CPU. So, we can discern nine job classes. It is assumed that . to each CPU a fixed number of jobs from each type has been allocated. KiJ is the number of jobs of type i, i = 1,2,3, associated with CPU j. j

=

1,2,3, in the system. In Table 2 the three popula-tion vectors that we have used in our experiments have been pictured.

(14)

KiJ case a CPU caseb CPU casec CPU T=16 1 2 3 T=20 1 2 3 T=26 1 2 3 TYPE 1 3 1 1 4 2 1 4 2 2 TYPE 2 2 2 1 2 3 2 3 4 2 TYPE 3 1 2 3 2 2 2 3 3 3 Table 2

The population vectors.

The service demands at the CPUs are deterministic. This assumption is relatively arbitrary. In the separable case it is unimportant, but in the other cases it might have some influence on the results. For the service demands at the DISKs we have tested detenninistic demands (coefficient of varia-tion 0), exponential demands (coefficient of variation 1) and hyperexponential demands (coefficient of variation 2). Those demand distributions have been tested with the four sets of mean service demands as pictured in Table 3. Note that only those models are separable that have job type independent exponential service demands at the DISKs.

CASE A

CPU

DISKS DISKS DISKS DISKS

1 2 3 1,2,3 4,5 6,7 8,9

TYPE 1 15 15 15 30 50 60 80

TYPE 2 25 25 25 30 50 60 80

TYPE 3 40 40 40 30 50 60 80

CASEB

CPU

DISKS DISKS DISKS DISKS

1 2 3 1,2,3 4,5 6,7 8,9

TYPE I 15 15 15 36

60

72

96

TYPE 2 25 25 25 36

60

72 96

TYPE 3 40 40 40 36 60 72 96

CASEC CPU DISKS DISKS DISKS DISKS

1 2 3 1,2,3 4,5 6,7 8,9

TYPE 1 10 15 15 30 50 60 80

TYPE 2 20 25 30 30 50 60 80

(15)

13

-CASED CPU DISKS DISKS DISKS DISKS

1 2 3 1,2,3 4,5 6.7 8,9

TYPEl 15 15 15 25 45 55 75

TYPE 2 25 25 25 30 50 60 80

TYPE 3 40 40 40 35 55 65 85

Table 3

Mean service demands.

5.2. The numerical experiments

The following evaluation techniques have been used:

SIM Via a discrete event simulation the perfonnance characteristics have been approxi-mated. We have used a sub-run argument to obtain 90% confidence intervals.

MV A A direct implementation of the MV A algorithm with the Pollazcek-Khintchine adjustments at FCPS worle. stations. No aggregation involved.

T A Aggregation of all job types into a single type. TA-FODI The first order depth improvementofTA.

PA-CPU A partial aggregation where all job types associated with a specific CPU have been aggregated. The number of job types has been reduced to three.

PA-TYPE A partial aggregation where all job types associated with a given disk-routing are aggregated. The number of job types has been reduced to three.

The MV A-algorithm has only been used for the cases with T = 16 in order to keep computation time within reasonable bounds.

The Tables 4 and 5 picture the results of our numerical experiments. The perfonnance measure at stake is the utilization of the CPUs. Pictured are the means and maxima of the relative differences in the results of the approximation methods and the simulation results in percentages. We have grouped the numerical results in accordance with three model criteria: 1. the coefficient of varia-tion of the service demands at the DISKs (Table 4a), 2. the total number of jobs in the system (Table 4b) and 3. the mean service demand characteristics (Table 4c). For the DISKs the same results have been pictured in the Tables 5a, 5b and 5~.

(16)

COEFFICIENT VC=O VC=1 VC=2

OF

VARIATION MEAN MAX MEAN MAX MEAN MAX

PA-CPU 1.87 2.94 1.66 6.73 3.50 7.41 PA-TYPE 8.53 11.17 5.99 8.62 5.11 8.18 TA 9.69 13.14 7.36 10.33 6.52 9.72 TA-FODI 2.71 4.32 1.22 2.96 1.72 4.87 Table4a NUMBER T=16 T=2t) T=26 OF

JOBS MEAN MAX MEAN MAX MEAN MAX

PA-CPU 2.50 7.38 2.48 7.41 2.05 6.61 PA-TYPE 4.75 11.17 6.71 10.98 6.24 10.62 TA 8.32 13.14 7.97 12.21 7.29 11.36 TA-FODI 1.78 4.87 2.02 4.25 1.85 4.32 MVA 1.38 5.70

--

--

--

--Table4b

DEMAND CASE A CASEB CASEC CASED

AT

DISKS MEAN MAX MEAN MAX MEAN MAX MEAN MAX

PA-CPU 2.23 7.41 3.38 7.38 2.58 6.73 2.70 6.80

PA-TYPE 7.37 10.54 4.75 8.15 6.77 11.17 8.28 10.98

TA 8.51 12.23 6.45 9.44 6.08 13.14 8.39 11.56

TA-FODI 2.04 4.10 1.83 4.87 1.66 3.94 1.99 4.32

Table4c

Table 4 Mean and maximum relative error in the evaluation of the utilizations at the CPUs in per-centages.

(17)

15

-COEFFICIENT VC=O VC=1 VC=2

OF

VARIATION MEAN MAX MEAN MAX MEAN MAX

PA-CPU 2.72 4.78 2.50 5.35 3.51 7.07 PA-TYPE 9.23 12.02 6.79 10.76 5.07 9.30 TA 10.34 12.98 8.11 11.74 6.49 10.42 TA-FODI 3.24 5.94 1.90 4.77 2.03 5.63 Table5a

NUMBER

K=16 K=20 K=26 OF

JOBS MEAN MAX MEAN MAX MEAN MAX

PA-CPU 3.05 7.07 2.89 5.88 2.79 7.04 PA-TYPE 7.05 11.76 7.19 12.02 6.86 11.05 TA 8.65 12.98 8.38 12.81 7.90 11.74 TA-FODI 2.29 5.27 2.36 5.40 2.51 5.94 MVA 1.78 5.63

.-

--

--

--Table5b

DEMAND CASE A CASEB CASEC CASED

AT

DISKS MEAN MAX MEAN MAX MEAN MAX MEAN MAX

PA-CPU 2.73 7.04 3.22 7.07 3.06 6.05 2.63 5.26

PA-TYPE 7.82 11.23 5.63 9.01 6.78 12.02 7.90 11.85

TA 8.93 12.60 7.28 10.02 8.09 12.81 8.94 12.98

TA-FODI 2.55 5.63 1.90 4.91 2.27 4.76 2.83 5.40

Table 5c

Table 5 Mean and maximum relative error in the evaluation of the utilizations at the DISKs in percentages.

5.3. Conclusions

The results show that the refinement of the total aggregation method with a first order depth improvement (T A-FODI) and the partial aggregation with respect to CPU-routing (P A-CPU) both have a very good overall perfonnance. Quite remarkable is the relative insensitivity with respect to the choice of system characteristics. Particularly. the coefficient of variation has no severe influence on the accuracy of the proposed methods (ct. tables 4a and 5a). So, the deviations in the model from the exponential distribution (VC

=

1) are well captured by the Pollaczek-Khintchine type approximations.

(18)

The TA-FODI approximation has to be recommended, as it is easier to implement and in general will require much less computation time.

Noteworthy is that the partial aggregation with respect to CPU-routing (PA-CPU) has a very good performance, whereas the results of the partial aggregation with respect to DISK-routing (PA-TYPE) are poor and can be compared with the total aggregation method (TA).

This leads to an important observation: a partial aggregation should be done in such a way that job types visiting approximately the same set of workstations are lumped together. This observa-tion has far reaching consequences for the analysis of large queuing networks with many job types which, for example, are typical in the analysis of communication networks. In such net-works partial aggregation has to be dissuaded, as the routing patterns of the job types will in gen-eral be highly disjoint

In another context we have studied the performance of the aggregation method against other approximation methods (cf. Van Doremalen [10], Van Doremalen, Wessels en Wijbrands [11] and WiJbrands [39]). It has appeared that the Schweitzer method (cf. Schweitzer [33]) with a first order depth improvement has the same performance characteristics as the aggregation method. It should be observed that straightforward Schweitzer gives relatively poor results. The more so, when the method is integrated in further adjustments of the MV A scheme, as for example the Pollaczek-Khintchine adjustments. Linearizer, the refinement of the Schweitzer method proposed in Chandy and Neuse [7]. is Slightly better than our TA-FODI method.

6. Concluding remarks

The total aggregation method with a first order depth improvement offers an interesting alterna-tive to well-known existing methods, such as the Schweitzer method (with a first order depth improvement) and the Chandy and Neuse refinements (cf. Schweitzer [33] and Chandy and Neuse [7]). Apart from the fact that the performance of the aggregation method resembles that of related methods, it has the advantage that no iteration is involved.

Furthermore, the method can be efficiently implemented on a personal computer. In fact, our tests have been run on a Philips P-3200. an IBM-AT compatible PC, in a TURBO-PASCAL environment.

Finally, we would like to note that the method can be easily extended to cover approximation ideas in different situations. For example. in Van Doremalen. Wessels and Wijbrands [11] and Wijbrands [39] approximations for priority queues have been developed and successfully tested. At the moment we are testing MIG Ie adjustments in the MVA scheme based on theM/Gle approx-imations advocated in Boxma, Cohen and Huffels [42]. The first results are promising.

(19)

17

-Acknowledgements

We thank our student Ieroen Kuipers for his help in executing and evaluating the numerical experiments and our colleague Rudo Wijbrands for his advice and helpful discussions.

References

[1] Y. BARD,

Some extensions to multiclass queueing network analysis.

In: M. Arato, A. Butrimenko, E. Gelenbe (eds.), Fourth Int. Symp. on Modelling and Performance Evalua-tion of Computer Systems. North Holland, Amsterdam 1979 (p. 51-62).

[2] F. BASKETT, KM. CHANDY, R. MUNI'Z. F. PALACIOS-GOMEZ,

Open. closed and

mixed networks of queues with different classes of customers. I.A.C.M.

22 (1975) 248-260. [3] A.B. BONDI and W. WHITT,

The influence of service-time variability in closed networks

of queues.

Performance Evaluation 6 (1986) 219-234.

[4] S.C. BRUELL, G. BALBO,

Computational algorithms for closed queueing networks.

North-Holland, Amsterdam 1980.

[5] S.C. BRUELL, G. BALBO, P.V. AFSHARI,

Mean Value Analysis of mixed multiple class

BCMP-networks with

load

dependent service stations.

Performance Evaluation 4 (1984) 241-260.

[6] J.P. BUZEN,

Computational algorithms for closed queueing networks with exponential

servers. Comm.

of the A.C.M. 16 (1973) 527-531.

[7] KM. CHANDY, D. NEUSE,

Linearizer: A heuristic algorithm for queueing network

models of computing systems.

Comm. of the A. C.M. 25 (1982) 126-134.

[8] A.E. CONWAY and N.D. GEORGANAS.

A

new

method for computing the normalization

constant of multiple-chain queueing networks.

INFOR 24 (1986) 184-198.

[9] A.E. CONWAY, E. DE SOUZA E SILVA and S.S. LA VENBERG,

Mean value analysis

by

chain of

product form queueing networks.

To appear in IEEE Transactions on Computers, 1988.

[10J J.B.M. VAN DOREMALEN,

Mean Value Analysis in multichain queueing networks: an

iterative approximation.

In: H. Steckhan, W. Buhler, K.E. Jager, Ch. Schneeweiss, J. Schwarze (eds.), Operations Research Proceedings 1983. Springer Verlag, Berlin 1984 (p. 441-448).

[1l] J.B.M. VAN DOREMALEN, J. WESSELS, R. WIJBRANDS,

Approximate analysis of

priority queueing networks.

In: 0.1. Boxma. lW. Cohen, H.C. Tijrns (OOs.), Teletraffic

analysis

and computer performance evaluation. North Holland, Amsterdam, 1986 (p. 95-106).

[12] I.B.M. VAN DOREMALEN and 1. WESSELS.

Iterative approximations for networks of

queues. In:

F. Archetti, G. di Pilo and M. Lucertini (OOs.). Stochastic Programming. SpringerVedag. Bertin. 1985 (p. 117-131).

(20)

[13] J.B.M. VAN DOREMALEN,

Approximate analysis of queueing network models.

Ph.D. Thesis, Department of Mathematics and Computing Science, Eindhoven University of Technology, Eindhoven, 1986.

[14] D.L. EAGER, K.C. SEVCIK,

Performance bound hierarchies for queueing networks.

J.A.C.M. Trans. on Comp. Syst. 1 (1983) 99-115.

[15] D.L. EAGER, K.C. SEVCIK.

Bound hierarchies for multiple class queueing networks.

J. Assoc. Comput Mach. 33 (1986) 179-206.

[16] W.J. GORDON, G.F. NEWELL,

Closed queueing systems with exponential servers.

Opera-tions Research 15 (1967) 254-265.

I17] .A. HORDIJK, N.M. V AN DIJK

Stationary probabilities for networks of queues.

In: RL. Disney, T.J. Ott (eds.), Applied Probability - Computer Science: The Interface. Birkhauser, Boston 1982 (p. 423-451).

[18] A. HORDIJK, N.M. VAN DIJK, Netwolk of queues: Parts I and II. In: F. Baccelli, G. Fay-olle (eds.).

Modelling and Performance Evaluation Methodology.

Springer Verlag, Berlin 1984 (p. 151-205).

[19] J.R. JACKSON,

Networks of waiting lines.

Operations Research 5 (1957) 518-521.

[20] F.P. KELLY,

Reversibility and stochastic networks.

John Wiley and Sons, New York 1979. [21] L. KLEINROCK,

Queueing Systems,

Volume 1: Theory. John Wiley and Sons, New York

1975.

[22] L. KLEINROCK,

Queueing Systems,

Volume 2: Computer Applications. John Wiley and Sons, New Yolk 1975.

(23] A. KRZESINSKI. P. TEUNISSEN, P. KRITZINGER.

Mean Value Analysis for load

depen-dent servers in mixed multiclass queueing networks.

ITR 82-01-00 University of Stellen-bosch. Inst. for Appl. Comp. Sci., Stellenbosch, South Africa 1982.

[24] S.S. LAM,

Queuing networks with population size constraints.

lB.M Journal of Res. and Dev. 21 (1977) 370-378.

[25] J.D.C. LITrLE,

A proof

of

the queueing formula L

=

AW. Operations Research 9 (1961) 383-387.

[26] R MARIE.

An approximate analytical method for general queueing networks.

lE.E.E. Trans. on Software Engineering SE-5 (1979) 530-538.

[27] RM. OLIVER.

An alternative derivation of

the

Pollaczek-Khintchine formula.

Operations Research 12 (1964) 158-159.

[28] M. REISER,

A queueing network analysis of computer communication networks with

win-dow

flow control.

I.E.RE. Trans. on Comm. COM-27 (1979) 1199-1209.

[29] M. REISER,

Mean Value Analysis

of

queueing networks: a

new

look at an old problem.

In: M. Arato, A. Butrimenko, E. Gelenbe (eds.), Fourth Int. Symp. on Modelling and Perfor-mance Evaluation of Computer Systems. North-Holland, Amsterdam 1979 (p. 63-77). [30] M. REISER,

Mean Value Analysis and convolution methodfor queue-dependent servers in

(21)

19

-[31] M. REISER, H. KOBAYASHI,

Queuing networks with multiple closed chains: theory and

computational algorithms.

I.B.M. Journal of Res. and Dev. 19 (1975) 283-294.

{32] M. REISER, S.S. LA VENBERG.

Mean Value Analysis of closed multichain queueing

net-works.

Journal of the AC.M. 27 (1980) 313-322.

[33] PJ. SCHWEITZER,

Approximate analysis of multi class closed networks of queues.

Interna-tional Conference on Stochastic Control and Optimization, Amsterdam, 1979.

[34] K.C. SEVCIK, I. MITRANI,

The distribution of queueing network states

at

input and

out-put instants.

Journal of the AC.M. 28 (1981) 358-371.

[35] AW. SHUM and J.P. BUZEN.

The EPF technique: A methodfor obtaining approximate

solutions to closed queueing networks with general service times.

In: Measuring, Modeling and Evaluating Computer Systems. North-Holland, Amsterdam 1977 (p. 201-220).

[36] S.

STIDHAM,A last word onL

=

AW. Operations Research, 22 (1974)417421.

137] E. DE SOUZA E SILVA. S.S. LA VENBERG, R.

MUNTZ,

A perspective on iterative

methods for the approximate analysis of closed queueing networks.

In: G. Iazeolla, P.l Courtois. A Hordijk (eds.), Mathematical Computer Perfonnance and Reliability. North-Holland, Amsterdam 1984 (p. 225-244).

[38] S.K. TRIPATHI,

On approximate solution techniques for queueing network models of

com-puter systems.

Ph.D.Thesis, Tech.Rept. CSRG-I06, CSRG, University of Toronto, 1981. [39] R. WIffiRANDS.

On an approximation method/or priority queueing in CPU-disk models.

Memorandum CaSaR 85-18, Eindhoven University of Technology, Dept. of Math. and Compo Sci., Eindhoven 1985.

[40] J. ZAHORJAN, E. WONG,

The solution of separable queueing networks using Mean Value

Analysis.

A.C.M. Sigm. Perf. Eva!. Rev. 3 (1981) 80-85.

[41] S.S. LA VENBERG, M. REISER,

Stationary state probabilities at a"ival instants for

closed queueing networks with multiple types of customers.

J. App. Probab. 17 (1980) 1048-1061.

[42] O.J. BOXMA, J.W. COHEN. N. HUFFELS,

Approximations of the mean waiting time in an

M

IGls-queueing system.

Operations Research 27 (1979) 1115-1127.

[43] J.W. COHEN,

The multiple phase service network with generalized processor sharing.

Referenties

GERELATEERDE DOCUMENTEN

Opname van voedingsstoffen door de planten tot week 27 van Salvia staan in tabel 12 en in tabel 13 voor Delphinium geoogst in week 29 in 2006.. Tabel 12 Opname van voedingsstoffen pe

Deze studies maken echter gebruik van genotypen die niet alleen verschillen in de mate van resistentie maar ook in de genetische

Gij kunt U desgewenst troosten met de op ervaring steunende gedachte, dat zijn resultaten, hoe dan ook, later nog van nut kunnen blijken, maar gij zult hebben te aanvaarden, dat

Bladaaltjes kunnen ook bladsymptomen geven in pioen, maar bij een aantasting door bladaaltjes zijn de symptomen anders van kleur en vorm dan bij hagelschot: er ontstaan grote

There also exist other solutions that do not involve point loads, for example the engineer Alfred Flamant used Boussinesq's solution to answer the question of how the continuum

HPTN 071 (PopART) will measure the impact of the PopART combination prevention intervention package on HIV incidence at population level by means of a cluster- randomised trial

Criteria for inclusion in this study were: (i) FFPE tissue samples from patients with a diagnosis of vulvar intraepithelial neoplasia (VIN) or invasive vulvar squamous cell

Pancreatic involvement is rare]·5 This paper describes the pre- operative evaluation and surgical treatment of a patient with asymptomatic hydatid disease of the tail of the