-
Server saturation in skewed networks
Authors:
Diego Goldsztajn,
Sem C. Borst,
Johan S. H. van Leeuwaarden
Abstract:
We consider a model inspired by compatibility constraints that arise between tasks and servers in data centers, cloud computing systems and content delivery networks. The constraints are represented by a bipartite graph or network that interconnects dispatchers with compatible servers. Each dispatcher receives tasks over time and sends every task to a compatible server with the least number of tas…
▽ More
We consider a model inspired by compatibility constraints that arise between tasks and servers in data centers, cloud computing systems and content delivery networks. The constraints are represented by a bipartite graph or network that interconnects dispatchers with compatible servers. Each dispatcher receives tasks over time and sends every task to a compatible server with the least number of tasks, or to a server with the least number of tasks among $d$ compatible servers selected uniformly at random. We focus on networks where the neighborhood of at least one server is skewed in a limiting regime. This means that a diverging number of dispatchers are in the neighborhood which are each compatible with a uniformly bounded number of servers; thus, the degree of the central server approaches infinity while the degrees of many neighboring dispatchers remain bounded. We prove that each server with a skewed neighborhood saturates, in the sense that the mean number of tasks queueing in front of it in steady state approaches infinity. Paradoxically, this pathological behavior can even arise in random networks where nearly all the servers have at most one task in the limit.
△ Less
Submitted 9 April, 2024;
originally announced April 2024.
-
Distributionally robust monopoly pricing: Switching from low to high prices in volatile markets
Authors:
Tim S. G. van Eck,
Pieter Kleer,
Johan S. H. van Leeuwaarden
Abstract:
Traditional monopoly pricing assumes sellers have full information about consumer valuations. We consider monopoly pricing under limited information, where a seller only knows the mean, variance and support of the valuation distribution. The objective is to maximize expected revenue by selecting the optimal fixed price. We adopt a distributionally robust framework, where the seller considers all v…
▽ More
Traditional monopoly pricing assumes sellers have full information about consumer valuations. We consider monopoly pricing under limited information, where a seller only knows the mean, variance and support of the valuation distribution. The objective is to maximize expected revenue by selecting the optimal fixed price. We adopt a distributionally robust framework, where the seller considers all valuation distributions that comply with the limited information. We formulate a maximin problem which seeks to maximize expected revenue for the worst-case valuation distribution. The minimization problem that identifies the worst-case valuation distribution is solved using primal-dual methods, and in turn leads to an explicitly solvable maximization problem. This yields a closed-form optimal pricing policy and a new fundamental principle prescribing when to use low and high robust prices. We show that the optimal policy switches from low to high prices when variance becomes sufficiently large, yielding significant performance gains compared with existing robust prices that generally decay with market uncertainty. This presents guidelines for when the seller should switch from targeting mass markets to niche markets. Similar guidelines are obtained for delay-prone services with rational utility-maximizing customers, underlining the universality and wide applicability of the low-high pricing principle.
△ Less
Submitted 28 March, 2024;
originally announced March 2024.
-
Multi-dimensional state space collapse in non-complete resource pooling scenarios
Authors:
Ellen Cardinaels,
Sem Borst,
Johan S. H. van Leeuwaarden
Abstract:
The present paper establishes an explicit multi-dimensional state space collapse (SSC) for parallel-processing systems with arbitrary compatibility constraints between servers and job types. This breaks major new ground beyond the SSC results and queue length asymptotics in the literature which are largely restricted to complete resource pooling (CRP) scenarios where the steady-state queue length…
▽ More
The present paper establishes an explicit multi-dimensional state space collapse (SSC) for parallel-processing systems with arbitrary compatibility constraints between servers and job types. This breaks major new ground beyond the SSC results and queue length asymptotics in the literature which are largely restricted to complete resource pooling (CRP) scenarios where the steady-state queue length vector concentrates around a line in heavy traffic. The multi-dimensional SSC that we establish reveals heavy-traffic behavior which is also far more tractable than the pre-limit queue length distribution, yet exhibits a fundamentally more intricate structure than in the one-dimensional case, providing useful insight into the system dynamics. In particular, we prove that the limiting queue length vector lives in a $K$-dimensional cone of which the set of spanning vectors is random in general, capturing the delicate interplay between the various job types and servers. For a broad class of systems we provide a further simplification which shows that the collection of random cones constitutes a fixed $K$-dimensional cone, resulting in a $K$-dimensional SSC. The dimension $K$ represents the number of critically loaded subsystems, or equivalently, capacity bottlenecks in heavy-traffic, with $K=1$ corresponding to conventional CRP scenarios. Our approach leverages probability generating function (PGF) expressions for Markovian systems operating under redundancy policies.
△ Less
Submitted 29 April, 2024; v1 submitted 1 February, 2024;
originally announced February 2024.
-
Second-order bounds for the M/M/$s$ queue with random arrival rate
Authors:
Wouter J. E. C. van Eekelen,
Grani A. Hanasusanto,
John J. Hasenbein,
Johan S. H. van Leeuwaarden
Abstract:
Consider an M/M/$s$ queue with the additional feature that the arrival rate is a random variable of which only the mean, variance, and range are known. Using semi-infinite linear programming and duality theory for moment problems, we establish for this setting tight bounds for the expected waiting time. These bounds correspond to an arrival rate that takes only two values. The proofs crucially dep…
▽ More
Consider an M/M/$s$ queue with the additional feature that the arrival rate is a random variable of which only the mean, variance, and range are known. Using semi-infinite linear programming and duality theory for moment problems, we establish for this setting tight bounds for the expected waiting time. These bounds correspond to an arrival rate that takes only two values. The proofs crucially depend on the fact that the expected waiting time, as function of the arrival rate, has a convex derivative. We apply the novel tight bounds to a rational queueing model, where arriving individuals decide to join or balk based on expected utility and only have partial knowledge about the market size.
△ Less
Submitted 15 October, 2023;
originally announced October 2023.
-
Fluid limits for interacting queues in sparse dynamic graphs
Authors:
Diego Goldsztajn,
Sem C. Borst,
Johan S. H. van Leeuwaarden
Abstract:
Consider a network of $n$ single-server queues where tasks arrive independently at each of the servers at rate $λ_n$. The servers are interconnected by a graph that is resampled at rate $μ_n$ in a way that is symmetric with respect to the servers, and each task is dispatched to the shortest queue in the graph neighborhood where it appears. The so-called occupancy process describes the empirical di…
▽ More
Consider a network of $n$ single-server queues where tasks arrive independently at each of the servers at rate $λ_n$. The servers are interconnected by a graph that is resampled at rate $μ_n$ in a way that is symmetric with respect to the servers, and each task is dispatched to the shortest queue in the graph neighborhood where it appears. The so-called occupancy process describes the empirical distribution of the number of tasks across the servers. This stochastic process evolves on the underlying dynamic graph, and its dynamics depend on the the number of tasks at each individual server and the neighborhood structure of the graph. We prove that this dependency disappears in the limit as $n \to \infty$ when $λ_n / n \to λ$ and $μ_n \to \infty$, and establish that the limit of the occupancy process is given by a system of differential equations that depends solely on $λ$ and the limiting degree distribution of the graph. We further show that the stationary distribution of the occupancy process converges to an equilibrium point of the differential equations, and derive properties of this equilibrium that reflect the impact of the degree distribution. Our focus is on truly sparse graphs where the maximum degree is uniformly bounded across $n$, making neighboring servers strongly correlated.
△ Less
Submitted 23 May, 2024; v1 submitted 22 May, 2023;
originally announced May 2023.
-
Robust knapsack ordering for a partially-informed newsvendor with budget constraint
Authors:
Guus Boonstra,
Wouter J. E. C. van Eekelen,
Johan S. H. van Leeuwaarden
Abstract:
This paper studies the multi-item newsvendor problem with a constrained budget and information about demand limited to its range, mean and mean absolute deviation. We consider a minimax model that determines order quantities by minimizing the expected overage and underage costs for the worst-case demand distributions. The resulting optimization problem turns out to be solvable by a method reminisc…
▽ More
This paper studies the multi-item newsvendor problem with a constrained budget and information about demand limited to its range, mean and mean absolute deviation. We consider a minimax model that determines order quantities by minimizing the expected overage and underage costs for the worst-case demand distributions. The resulting optimization problem turns out to be solvable by a method reminiscent of the greedy algorithm that solves the continuous knapsack problem, purchasing items in order of marginal value. This method has lower computational complexity compared to directly solving the model and leads to a simple policy that (i) sorts items based on their marginal effect on the total cost and (ii) determines order quantities according to this ranking until the budget is spent.
△ Less
Submitted 5 January, 2023;
originally announced January 2023.
-
Sharpest possible clustering bounds using robust random graph analysis
Authors:
Judith Brugman,
Johan S. H. van Leeuwaarden,
Clara Stegehuis
Abstract:
Complex network theory crucially depends on the assumptions made about the degree distribution, while fitting degree distributions to network data is challenging, in particular for scale-free networks with power-law degrees. We present a robust assessment of complex networks that does not depend on the entire degree distribution, but only on its mean, range and dispersion: summary statistics that…
▽ More
Complex network theory crucially depends on the assumptions made about the degree distribution, while fitting degree distributions to network data is challenging, in particular for scale-free networks with power-law degrees. We present a robust assessment of complex networks that does not depend on the entire degree distribution, but only on its mean, range and dispersion: summary statistics that are easy to obtain for most real-world networks. By solving several semi-infinite linear programs, we obtain tight (the sharpest possible) bounds for correlation and clustering measures, for all networks with degree distributions that share the same summary statistics. We identify various extremal random graphs that attain these tight bounds as the graphs with specific three-point degree distributions. We leverage the tight bounds to obtain robust laws that explain how degree-degree correlations and local clustering evolve as function of node degrees and network size. These robust laws indicate that power-law networks with diverging variance are among the most extreme networks in terms of correlation and clustering, building further theoretical foundation for widely reported scale-free network phenomena such as correlation and clustering decay.
△ Less
Submitted 10 November, 2022; v1 submitted 29 August, 2022;
originally announced August 2022.
-
Heavy-traffic single-server queues and the transform method
Authors:
M. A. A. Boon,
A. J. E. M. Janssen,
J. S. H. van Leeuwaarden
Abstract:
Heavy-traffic limit theory deals with queues that operate close to criticality and face severe queueing times. Let $W$ denote the steady-state waiting time in the ${\rm GI}/{\rm G}/1$ queue. Kingman (1961) showed that $W$, when appropriately scaled, converges in distribution to an exponential random variable as the system's load approaches 1. The original proof of this famous result uses the trans…
▽ More
Heavy-traffic limit theory deals with queues that operate close to criticality and face severe queueing times. Let $W$ denote the steady-state waiting time in the ${\rm GI}/{\rm G}/1$ queue. Kingman (1961) showed that $W$, when appropriately scaled, converges in distribution to an exponential random variable as the system's load approaches 1. The original proof of this famous result uses the transform method. Starting from the Laplace transform of the pdf of $W$ (Pollaczek's contour integral representation), Kingman showed convergence of transforms and hence weak convergence of the involved random variables. We apply and extend this transform method to obtain convergence of moments with error assessment. We also demonstrate how the transform method can be applied to so-called nearly deterministic queues in a Kingman-type and a Gaussian heavy-traffic regime. We demonstrate numerically the accuracy of the various heavy-traffic approximations.
△ Less
Submitted 20 June, 2022;
originally announced June 2022.
-
Optimal Stop** Theory for a Distributionally Robust Seller
Authors:
Pieter Kleer,
Johan van Leeuwaarden
Abstract:
Sellers in online markets face the challenge of determining the right time to sell in view of uncertain future offers. Classical stop** theory assumes that sellers have full knowledge of the value distributions, and leverage this knowledge to determine stop** rules that maximize expected welfare. In practice, however, stop** rules must often be determined under partial information, based on…
▽ More
Sellers in online markets face the challenge of determining the right time to sell in view of uncertain future offers. Classical stop** theory assumes that sellers have full knowledge of the value distributions, and leverage this knowledge to determine stop** rules that maximize expected welfare. In practice, however, stop** rules must often be determined under partial information, based on scarce data or expert predictions. Consider a seller that has one item for sale and receives successive offers drawn from some value distributions. The decision on whether or not to accept an offer is irrevocable, and the value distributions are only partially known. We therefore let the seller adopt a robust maximin strategy, assuming that value distributions are chosen adversarially by nature to minimize the value of the accepted offer. We provide a general maximin solution to this stop** problem that identifies the optimal (threshold-based) stop** rule for the seller for all possible statistical information structures. We then perform a detailed analysis for various ambiguity sets relying on knowledge about the common mean, dispersion (variance or mean absolute deviation) and support of the distributions. We show for these information structures that the seller's stop** rule consists of decreasing thresholds converging to the common mean, and that nature's adversarial response, in the long run, is to always create an all-or-nothing scenario. The maximin solutions also reveal what happens as dispersion or the number of offers grows large.
△ Less
Submitted 29 June, 2022; v1 submitted 6 June, 2022;
originally announced June 2022.
-
Utility maximizing load balancing policies
Authors:
Diego Goldsztajn,
Sem C. Borst,
Johan S. H. van Leeuwaarden
Abstract:
Consider a service system where incoming tasks are instantaneously dispatched to one out of many heterogeneous server pools. Associated with each server pool is a concave utility function which depends on the class of the server pool and its current occupancy. We derive an upper bound for the mean normalized aggregate utility in stationarity and introduce two load balancing policies that achieve t…
▽ More
Consider a service system where incoming tasks are instantaneously dispatched to one out of many heterogeneous server pools. Associated with each server pool is a concave utility function which depends on the class of the server pool and its current occupancy. We derive an upper bound for the mean normalized aggregate utility in stationarity and introduce two load balancing policies that achieve this upper bound in a large-scale regime. Furthermore, the transient and stationary behavior of these asymptotically optimal load balancing policies is characterized on the scale of the number of server pools, in the same large-scale regime.
△ Less
Submitted 10 February, 2024; v1 submitted 16 December, 2021;
originally announced December 2021.
-
Power-of-two sampling in redundancy systems: the impact of assignment constraints
Authors:
Ellen Cardinaels,
Sem Borst,
Johan S. H. van Leeuwaarden
Abstract:
A classical sampling strategy for load balancing policies is power-of-two, where any server pair is sampled with equal probability. This does not cover practical settings with assignment constraints which force non-uniform sampling. While intuition suggests that non-uniform sampling adversely impacts performance, this was only supported through simulations, and rigorous statements have remained el…
▽ More
A classical sampling strategy for load balancing policies is power-of-two, where any server pair is sampled with equal probability. This does not cover practical settings with assignment constraints which force non-uniform sampling. While intuition suggests that non-uniform sampling adversely impacts performance, this was only supported through simulations, and rigorous statements have remained elusive. Building on product-form distributions for redundancy systems, we prove the stochastic dominance of uniform sampling for a four-server system as well as arbitrary-size systems in light traffic.
△ Less
Submitted 15 July, 2022; v1 submitted 10 November, 2021;
originally announced November 2021.
-
Robust subgraph counting with distribution-free random graph analysis
Authors:
Johan S. H. van Leeuwaarden,
Clara Stegehuis
Abstract:
Subgraphs such as cliques, loops and stars form crucial connections in the topologies of real-world networks. Random graph models provide estimates for how often certain subgraphs appear, which in turn can be tested against real-world networks. These subgraph counts, however, crucially depend on the assumed degree distribution. Fitting a degree distribution to network data is challenging, in parti…
▽ More
Subgraphs such as cliques, loops and stars form crucial connections in the topologies of real-world networks. Random graph models provide estimates for how often certain subgraphs appear, which in turn can be tested against real-world networks. These subgraph counts, however, crucially depend on the assumed degree distribution. Fitting a degree distribution to network data is challenging, in particular for scale-free networks with power-law degrees. In this paper we develop robust subgraph counts that do not depend on the entire degree distribution, but only on the mean and mean absolute deviation (MAD), summary statistics that are easy to obtain for most real-world networks. By solving an optimization problem, we provide tight (the sharpest possible) bounds for the subgraph counts, for all possible subgraphs, and for all networks with degree distributions that share the same mean and MAD. We identify the extremal random graph that attains the tight bounds as the graph with a specific three-point degree distribution. We leverage the bounds to obtain robust scaling laws for how the numbers of subgraphs grow as function of the network size. The scaling laws indicate that sparse power-law networks are not the most extreme networks in terms of subgraph counts, but dense power-law networks are. The robust bounds are also shown to hold for several real-world data sets.
△ Less
Submitted 21 July, 2021;
originally announced July 2021.
-
Optimal capacity allocation for heavy-traffic fixed-cycle traffic-light queues and intersections
Authors:
Marko Boon,
Guido Janssen,
Johan van Leeuwaarden,
Rik Timmerman
Abstract:
Setting traffic light signals is a classical topic in traffic engineering, and important in heavy-traffic conditions when green times become scarce and longer queues are inevitably formed. For the fixed-cycle traffic-light queue, an elementary queueing model for one traffic light with cyclic signaling, we obtain heavy-traffic limits that capture the long-term queue behavior. We leverage the limit…
▽ More
Setting traffic light signals is a classical topic in traffic engineering, and important in heavy-traffic conditions when green times become scarce and longer queues are inevitably formed. For the fixed-cycle traffic-light queue, an elementary queueing model for one traffic light with cyclic signaling, we obtain heavy-traffic limits that capture the long-term queue behavior. We leverage the limit theorems to obtain sharp performance approximations for one queue in heavy traffic. We also consider optimization problems that aim for optimal division of green times among multiple conflicting traffic streams. We show that inserting heavy-traffic approximations leads to tractable optimization problems and close-to-optimal signal prescriptions. The same type of limiting result can be established for several vehicle-actuated strategies which adds to the general applicability of the framework presented in this paper.
△ Less
Submitted 11 August, 2022; v1 submitted 9 April, 2021;
originally announced April 2021.
-
Learning and balancing unknown loads in large-scale systems
Authors:
Diego Goldsztajn,
Sem C. Borst,
Johan S. H. van Leeuwaarden
Abstract:
Consider a system of identical server pools where tasks with exponentially distributed service times arrive as a time-inhomogenenous Poisson process. An admission threshold is used in an inner control loop to assign incoming tasks to server pools while, in an outer control loop, a learning scheme adjusts this threshold over time to keep it aligned with the unknown offered load of the system. In a…
▽ More
Consider a system of identical server pools where tasks with exponentially distributed service times arrive as a time-inhomogenenous Poisson process. An admission threshold is used in an inner control loop to assign incoming tasks to server pools while, in an outer control loop, a learning scheme adjusts this threshold over time to keep it aligned with the unknown offered load of the system. In a many-server regime, we prove that the learning scheme reaches an equilibrium along intervals of time where the normalized offered load per server pool is suitably bounded, and that this results in a balanced distribution of the load. Furthermore, we establish a similar result when tasks with Coxian distributed service times arrive at a constant rate and the threshold is adjusted using only the total number of tasks in the system. The novel proof technique developed in this paper, which differs from a traditional fluid limit analysis, allows to handle rapid variations of the first learning scheme, triggered by excursions of the occupancy process that have vanishing size. Moreover, our approach allows to characterize the asymptotic behavior of the system with Coxian distributed service times without relying on a fluid limit of a detailed state descriptor.
△ Less
Submitted 5 April, 2024; v1 submitted 18 December, 2020;
originally announced December 2020.
-
Optimal Hyper-Scalable Load Balancing with a Strict Queue Limit
Authors:
Mark van der Boor,
Sem Borst,
Johan van Leeuwaarden
Abstract:
Load balancing plays a critical role in efficiently dispatching jobs in parallel-server systems such as cloud networks and data centers. A fundamental challenge in the design of load balancing algorithms is to achieve an optimal trade-off between delay performance and implementation overhead (e.g. communication or memory usage). This trade-off has primarily been studied so far from the angle of th…
▽ More
Load balancing plays a critical role in efficiently dispatching jobs in parallel-server systems such as cloud networks and data centers. A fundamental challenge in the design of load balancing algorithms is to achieve an optimal trade-off between delay performance and implementation overhead (e.g. communication or memory usage). This trade-off has primarily been studied so far from the angle of the amount of overhead required to achieve asymptotically optimal performance, particularly vanishing delay in large-scale systems. In contrast, in the present paper, we focus on an arbitrarily sparse communication budget, possibly well below the minimum requirement for vanishing delay, referred to as the hyper-scalable operating region. Furthermore, jobs may only be admitted when a specific limit on the queue position of the job can be guaranteed.
The centerpiece of our analysis is a universal upper bound for the achievable throughput of any dispatcher-driven algorithm for a given communication budget and queue limit. We also propose a specific hyper-scalable scheme which can operate at any given message rate and enforce any given queue limit, while allowing the server states to be captured via a closed product-form network, in which servers act as customers traversing various nodes. The product-form distribution is leveraged to prove that the bound is tight and that the proposed hyper-scalable scheme is throughput-optimal in a many-server regime given the communication and queue limit constraints. Extensive simulation experiments are conducted to illustrate the results.
△ Less
Submitted 14 December, 2020;
originally announced December 2020.
-
Self-Learning Threshold-Based Load Balancing
Authors:
Diego Goldsztajn,
Sem C. Borst,
Johan S. H. van Leeuwaarden,
Debankur Mukherjee,
Philip A. Whiting
Abstract:
We consider a large-scale service system where incoming tasks have to be instantaneously dispatched to one out of many parallel server pools. The user-perceived performance degrades with the number of concurrent tasks and the dispatcher aims at maximizing the overall quality-of-service by balancing the load through a simple threshold policy. We demonstrate that such a policy is optimal on the flui…
▽ More
We consider a large-scale service system where incoming tasks have to be instantaneously dispatched to one out of many parallel server pools. The user-perceived performance degrades with the number of concurrent tasks and the dispatcher aims at maximizing the overall quality-of-service by balancing the load through a simple threshold policy. We demonstrate that such a policy is optimal on the fluid and diffusion scales, while only involving a small communication overhead, which is crucial for large-scale deployments. In order to set the threshold optimally, it is important, however, to learn the load of the system, which may be unknown. For that purpose, we design a control rule for tuning the threshold in an online manner. We derive conditions which guarantee that this adaptive threshold settles at the optimal value, along with estimates for the time until this happens. In addition, we provide numerical experiments which support the theoretical results and further indicate that our policy copes effectively with time-varying demand patterns.
△ Less
Submitted 11 September, 2023; v1 submitted 29 October, 2020;
originally announced October 2020.
-
Tight tail probability bounds for distribution-free decision making
Authors:
Ernst Roos,
Ruud Brekelmans,
Wouter van Eekelen,
Dick den Hertog,
Johan van Leeuwaarden
Abstract:
Chebyshev's inequality provides an upper bound on the tail probability of a random variable based on its mean and variance. While tight, the inequality has been criticized for only being attained by pathological distributions that abuse the unboundedness of the underlying support and are not considered realistic in many applications. We provide alternative tight lower and upper bounds on the tail…
▽ More
Chebyshev's inequality provides an upper bound on the tail probability of a random variable based on its mean and variance. While tight, the inequality has been criticized for only being attained by pathological distributions that abuse the unboundedness of the underlying support and are not considered realistic in many applications. We provide alternative tight lower and upper bounds on the tail probability given a bounded support, mean and mean absolute deviation of the random variable. We obtain these bounds as exact solutions to semi-infinite linear programs. We leverage the bounds for distribution-free analysis of the newsvendor model, monopolistic pricing, and stop-loss reinsurance. We also exploit the bounds for safe approximations of sums of correlated random variables, and to find convex reformulations of single and joint ambiguous chance constraints that are ubiquitous in distributionally robust optimization.
△ Less
Submitted 15 October, 2020;
originally announced October 2020.
-
Heavy-Traffic Universality of Redundancy Systems with Assignment Constraints
Authors:
Ellen Cardinaels,
Sem Borst,
Johan S. H. van Leeuwaarden
Abstract:
Service systems often face task-server assignment-constraints due to skill-based routing or geographical conditions. Redundancy scheduling responds to this limited flexibility by replicating tasks to specific servers in agreement with these assignment constraints. We gain insight from product-form stationary distributions and weak local stability conditions to establish a state space collapse in h…
▽ More
Service systems often face task-server assignment-constraints due to skill-based routing or geographical conditions. Redundancy scheduling responds to this limited flexibility by replicating tasks to specific servers in agreement with these assignment constraints. We gain insight from product-form stationary distributions and weak local stability conditions to establish a state space collapse in heavy traffic. In this limiting regime, the parallel-server system with redundancy scheduling operates as a multi-class single-server system, achieving full resource pooling and exhibiting strong insensitivity to the underlying assignment constraints. In particular, the performance of a fully flexible (unconstrained) system can be matched even with rather strict assignment constraints.
△ Less
Submitted 16 August, 2022; v1 submitted 29 May, 2020;
originally announced May 2020.
-
Critical percolation on scale-free random graphs: New universality class for the configuration model
Authors:
Souvik Dhara,
Remco van der Hofstad,
Johan S. H. van Leeuwaarden
Abstract:
In this paper, we study the critical behavior of percolation on a configuration model with degree distribution satisfying an infinite second-moment condition, which includes power-law degrees with exponent $τ\in (2,3)$. It is well known that, in this regime, many canonical random graph models, such as the configuration model, are robust in the sense that the giant component is not destroyed when t…
▽ More
In this paper, we study the critical behavior of percolation on a configuration model with degree distribution satisfying an infinite second-moment condition, which includes power-law degrees with exponent $τ\in (2,3)$. It is well known that, in this regime, many canonical random graph models, such as the configuration model, are robust in the sense that the giant component is not destroyed when the percolation probability stays bounded away from zero. Thus, the critical behavior is observed when the percolation probability tends to zero with the network size, despite of the fact that the average degree remains bounded.
In this paper, we initiate the study of critical random graphs in the infinite second-moment regime by identifying the critical window for the configuration model. We prove scaling limits for component sizes and surplus edges, and show that the maximum diameter the critical components is of order $\log n$, which contrasts with the previous universality classes arising in the literature. This introduces a third and novel universality class for the critical behavior of percolation on random networks, that is not covered by the multiplicative coalescent framework due to Aldous and Limic (1998). We also prove concentration of the component sizes outside the critical window, and that a unique, complex giant component emerges after the critical window. This completes the picture for the percolation phase transition on the configuration model.
△ Less
Submitted 29 June, 2020; v1 submitted 12 September, 2019;
originally announced September 2019.
-
MAD dispersion measure makes extremal queue analysis simple
Authors:
Wouter van Eekelen,
Dick den Hertog,
Johan S. H. van Leeuwaarden
Abstract:
A notorious problem in queueing theory is to compute the worst possible performance of the GI/G/1 queue under mean-dispersion constraints for the interarrival and service time distributions. We address this extremal queue problem by measuring dispersion in terms of Mean Absolute Deviation (MAD) instead of variance, making available recently developed techniques from Distributionally Robust Optimiz…
▽ More
A notorious problem in queueing theory is to compute the worst possible performance of the GI/G/1 queue under mean-dispersion constraints for the interarrival and service time distributions. We address this extremal queue problem by measuring dispersion in terms of Mean Absolute Deviation (MAD) instead of variance, making available recently developed techniques from Distributionally Robust Optimization (DRO). Combined with classical random walk theory, we obtain explicit expressions for the extremal interarrival time and service time distributions, and hence the best possible upper bounds, for all moments of the waiting time. {We also apply the DRO techniques to obtain tight lower bounds that together with the upper bounds provide robust performance intervals. We show that all bounds are computationally tractable and remain sharp, also when the mean and MAD are not known precisely, but estimated based on available data instead.
△ Less
Submitted 15 December, 2020; v1 submitted 30 July, 2019;
originally announced July 2019.
-
Variational principle for scale-free network motifs
Authors:
Clara Stegehuis,
Remco van der Hofstad,
Johan S. H. van Leeuwaarden
Abstract:
For scale-free networks with degrees following a power law with an exponent $τ\in(2,3)$, the structures of motifs (small subgraphs) are not yet well understood. We introduce a method designed to identify the dominant structure of any given motif as the solution of an optimization problem. The unique optimizer describes the degrees of the vertices that together span the most likely motif, resulting…
▽ More
For scale-free networks with degrees following a power law with an exponent $τ\in(2,3)$, the structures of motifs (small subgraphs) are not yet well understood. We introduce a method designed to identify the dominant structure of any given motif as the solution of an optimization problem. The unique optimizer describes the degrees of the vertices that together span the most likely motif, resulting in explicit asymptotic formulas for the motif count and its fluctuations. We then classify all motifs into two categories: motifs with small and large fluctuations.
△ Less
Submitted 17 April, 2019;
originally announced April 2019.
-
Hyper-Scalable JSQ with Sparse Feedback
Authors:
Mark van der Boor,
Sem Borst,
Johan van Leeuwaarden
Abstract:
Load balancing algorithms play a vital role in enhancing performance in data centers and cloud networks. Due to the massive size of these systems, scalability challenges, and especially the communication overhead associated with load balancing mechanisms, have emerged as major concerns. Motivated by these issues, we introduce and analyze a novel class of load balancing schemes where the various se…
▽ More
Load balancing algorithms play a vital role in enhancing performance in data centers and cloud networks. Due to the massive size of these systems, scalability challenges, and especially the communication overhead associated with load balancing mechanisms, have emerged as major concerns. Motivated by these issues, we introduce and analyze a novel class of load balancing schemes where the various servers provide occasional queue updates to guide the load assignment.
We show that the proposed schemes strongly outperform JSQ($d$) strategies with comparable communication overhead per job, and can achieve a vanishing waiting time in the many-server limit with just one message per job, just like the popular JIQ scheme. The proposed schemes are particularly geared however towards the sparse feedback regime with less than one message per job, where they outperform corresponding sparsified JIQ versions.
We investigate fluid limits for synchronous updates as well as asynchronous exponential update intervals. The fixed point of the fluid limit is identified in the latter case, and used to derive the queue length distribution. We also demonstrate that in the ultra-low feedback regime the mean stationary waiting time tends to a constant in the synchronous case, but grows without bound in the asynchronous case.
△ Less
Submitted 6 March, 2019;
originally announced March 2019.
-
Job Allocation in Large-Scale Service Systems with Affinity Relations
Authors:
Ellen Cardinaels,
Sem C. Borst,
Johan S. H. van Leeuwaarden
Abstract:
We consider load balancing in service systems with affinity relations between jobs and servers. Specifically, an arriving job can be allocated to a fast, primary server from a particular selection associated with this job or to a secondary server to be processed at a slower rate. Such job-server affinity relations can model network topologies based on geographical proximity, or data locality in cl…
▽ More
We consider load balancing in service systems with affinity relations between jobs and servers. Specifically, an arriving job can be allocated to a fast, primary server from a particular selection associated with this job or to a secondary server to be processed at a slower rate. Such job-server affinity relations can model network topologies based on geographical proximity, or data locality in cloud scenarios. We introduce load balancing schemes that allocate jobs to primary servers if available, and otherwise to secondary servers. A novel coupling construction is developed to obtain stability conditions and performance bounds using a coupling technique. We also conduct a fluid limit analysis for symmetric model instances, which reveals a delicate interplay between the model parameters and load balancing performance.
△ Less
Submitted 27 December, 2018;
originally announced December 2018.
-
Counting cliques and cycles in scale-free inhomogeneous random graphs
Authors:
A. J. E. M. Janssen,
Johan S. H. van Leeuwaarden,
Seva Shneer
Abstract:
Scale-free networks contain many small cliques and cycles. We model such networks as inhomogeneous random graphs with regularly varying infinite-variance weights. For these models, the number of cliques and cycles have exact integral expressions amenable to asymptotic analysis. We obtain various asymptotic descriptions for how the average number of cliques and cycles, of any size, grow with the ne…
▽ More
Scale-free networks contain many small cliques and cycles. We model such networks as inhomogeneous random graphs with regularly varying infinite-variance weights. For these models, the number of cliques and cycles have exact integral expressions amenable to asymptotic analysis. We obtain various asymptotic descriptions for how the average number of cliques and cycles, of any size, grow with the network size. For the cycle asymptotics we invoke the theory of circulant matrices.
△ Less
Submitted 11 December, 2018;
originally announced December 2018.
-
Scale-free network clustering in hyperbolic and other random graphs
Authors:
Clara Stegehuis,
Remco van der Hofstad,
Johan S. H. van Leeuwaarden
Abstract:
Random graphs with power-law degrees can model scale-free networks as sparse topologies with strong degree heterogeneity. Mathematical analysis of such random graphs proved successful in explaining scale-free network properties such as resilience, navigability and small distances. We introduce a variational principle to explain how vertices tend to cluster in triangles as a function of their degre…
▽ More
Random graphs with power-law degrees can model scale-free networks as sparse topologies with strong degree heterogeneity. Mathematical analysis of such random graphs proved successful in explaining scale-free network properties such as resilience, navigability and small distances. We introduce a variational principle to explain how vertices tend to cluster in triangles as a function of their degrees. We apply the variational principle to the hyperbolic model that quickly gains popularity as a model for scale-free networks with latent geometries and clustering. We show that clustering in the hyperbolic model is non-vanishing and self-averaging, so that a single random graph sample is a good representation in the large-network limit. We also demonstrate the variational principle for some classical random graphs including the preferential attachment model and the configuration model.
△ Less
Submitted 7 December, 2018;
originally announced December 2018.
-
Scalable load balancing in networked systems: A survey of recent advances
Authors:
Mark van der Boor,
Sem C. Borst,
Johan S. H. van Leeuwaarden,
Debankur Mukherjee
Abstract:
The basic load balancing scenario involves a single dispatcher where tasks arrive that must immediately be forwarded to one of $N$ single-server queues. We discuss recent advances on scalable load balancing schemes which provide favorable delay performance when $N$ grows large, and yet only require minimal implementation overhead. Join-the-Shortest-Queue (JSQ) yields vanishing delays as $N$ grows…
▽ More
The basic load balancing scenario involves a single dispatcher where tasks arrive that must immediately be forwarded to one of $N$ single-server queues. We discuss recent advances on scalable load balancing schemes which provide favorable delay performance when $N$ grows large, and yet only require minimal implementation overhead. Join-the-Shortest-Queue (JSQ) yields vanishing delays as $N$ grows large, as in a centralized queueing arrangement, but involves a prohibitive communication burden. In contrast, power-of-$d$ or JSQ($d$) schemes that assign an incoming task to a server with the shortest queue among $d$ servers selected uniformly at random require little communication, but lead to constant delays. In order to examine this fundamental trade-off between delay performance and implementation overhead, we consider JSQ($d(N)$) schemes where the diversity parameter $d(N)$ depends on $N$ and investigate what growth rate of $d(N)$ is required to asymptotically match the optimal JSQ performance on fluid and diffusion scale.
Stochastic coupling techniques and stochastic-process limits play an instrumental role in establishing the asymptotic optimality. We demonstrate how this methodology carries over to infinite-server settings, finite buffers, multiple dispatchers, servers arranged on graph topologies, and token-based load balancing including the popular Join-the-Idle-Queue (JIQ) scheme. In this way we provide a broad overview of the many recent advances in the field. This survey extends the short review presented at ICM 2018 (arXiv:1712.08555).
△ Less
Submitted 4 November, 2021; v1 submitted 14 June, 2018;
originally announced June 2018.
-
Parameter estimators of random intersection graphs with thinned communities
Authors:
Joona Karjalainen,
Johan S. H. van Leeuwaarden,
Lasse Leskelä
Abstract:
This paper studies a statistical network model generated by a large number of randomly sized overlap** communities, where any pair of nodes sharing a community is linked with probability $q$ via the community. In the special case with $q=1$ the model reduces to a random intersection graph which is known to generate high levels of transitivity also in the sparse context. The parameter $q$ adds a…
▽ More
This paper studies a statistical network model generated by a large number of randomly sized overlap** communities, where any pair of nodes sharing a community is linked with probability $q$ via the community. In the special case with $q=1$ the model reduces to a random intersection graph which is known to generate high levels of transitivity also in the sparse context. The parameter $q$ adds a degree of freedom and leads to a parsimonious and analytically tractable network model with tunable density, transitivity, and degree fluctuations. We prove that the parameters of this model can be consistently estimated in the large and sparse limiting regime using moment estimators based on partially observed densities of links, 2-stars, and triangles.
△ Less
Submitted 24 June, 2018; v1 submitted 4 February, 2018;
originally announced February 2018.
-
Finding induced subgraphs in scale-free inhomogeneous random graphs
Authors:
Ellen Cardinaels,
Johan S. H. van Leeuwaarden,
Clara Stegehuis
Abstract:
We study the problem of finding a copy of a specific induced subgraph on inhomogeneous random graphs with infinite variance power-law degrees. We provide a fast algorithm that finds a copy of any connected graph $H$ on a fixed number of $k$ vertices as an induced subgraph in a random graph with $n$ vertices. By exploiting the scale-free graph structure, the algorithm runs in $O(n k)$ time for smal…
▽ More
We study the problem of finding a copy of a specific induced subgraph on inhomogeneous random graphs with infinite variance power-law degrees. We provide a fast algorithm that finds a copy of any connected graph $H$ on a fixed number of $k$ vertices as an induced subgraph in a random graph with $n$ vertices. By exploiting the scale-free graph structure, the algorithm runs in $O(n k)$ time for small values of $k$. As a corollary, this shows that the induced subgraph isomorphism problem can be solved in time $O(nk)$ for the inhomogeneous random graph. We test our algorithm on several real-world data sets.
△ Less
Submitted 29 August, 2019; v1 submitted 25 January, 2018;
originally announced January 2018.
-
Scalable Load Balancing in Networked Systems: Universality Properties and Stochastic Coupling Methods
Authors:
Mark van der Boor,
Sem C. Borst,
Johan S. H. van Leeuwaarden,
Debankur Mukherjee
Abstract:
We present an overview of scalable load balancing algorithms which provide favorable delay performance in large-scale systems, and yet only require minimal implementation overhead. Aimed at a broad audience, the paper starts with an introduction to the basic load balancing scenario, consisting of a single dispatcher where tasks arrive that must immediately be forwarded to one of $N$ single-server…
▽ More
We present an overview of scalable load balancing algorithms which provide favorable delay performance in large-scale systems, and yet only require minimal implementation overhead. Aimed at a broad audience, the paper starts with an introduction to the basic load balancing scenario, consisting of a single dispatcher where tasks arrive that must immediately be forwarded to one of $N$ single-server queues.
A popular class of load balancing algorithms are so-called power-of-$d$ or JSQ($d$) policies, where an incoming task is assigned to a server with the shortest queue among $d$ servers selected uniformly at random. This class includes the Join-the-Shortest-Queue (JSQ) policy as a special case ($d = N$), which has strong stochastic optimality properties and yields a mean waiting time that vanishes as $N$ grows large for any fixed subcritical load. However, a nominal implementation of the JSQ policy involves a prohibitive communication burden in large-scale deployments. In contrast, a random assignment policy ($d = 1$) does not entail any communication overhead, but the mean waiting time remains constant as $N$ grows large for any fixed positive load.
In order to examine the fundamental trade-off between performance and implementation overhead, we consider an asymptotic regime where $d(N)$ depends on $N$. We investigate what growth rate of $d(N)$ is required to match the performance of the JSQ policy on fluid and diffusion scale. The results demonstrate that the asymptotics for the JSQ($d(N)$) policy are insensitive to the exact growth rate of $d(N)$, as long as the latter is sufficiently fast, implying that the optimality of the JSQ policy can asymptotically be preserved while dramatically reducing the communication overhead. We additionally show how the communication overhead can be reduced yet further by the so-called Join-the-Idle-Queue scheme, leveraging memory at the dispatcher.
△ Less
Submitted 22 December, 2017;
originally announced December 2017.
-
Spitzer's identity for discrete random walks
Authors:
A. J. E. M. Janssen,
Johan S. H. van Leeuwaarden
Abstract:
Spitzer's identity describes the position of a reflected random walk over time in terms of a bivariate transform. Among its many applications in probability theory are congestion levels in queues and random walkers in physics. We present a new derivation of Spitzer's identity under the assumption that the increments of the random walk have bounded jumps to the left. This mild assumption facilitate…
▽ More
Spitzer's identity describes the position of a reflected random walk over time in terms of a bivariate transform. Among its many applications in probability theory are congestion levels in queues and random walkers in physics. We present a new derivation of Spitzer's identity under the assumption that the increments of the random walk have bounded jumps to the left. This mild assumption facilitates a proof of Spitzer's identity that only uses basic properties of analytic functions and contour integration. The main novelty, believed to be of broader interest, is a reversed approach that recognizes a factored polynomial expression as the outcome of Cauchy's formula.
△ Less
Submitted 26 October, 2017;
originally announced October 2017.
-
Triadic closure in configuration models with unbounded degree fluctuations
Authors:
Remco van der Hofstad,
Johan S. H. van Leeuwaarden,
Clara Stegehuis
Abstract:
The configuration model generates random graphs with any given degree distribution, and thus serves as a null model for scale-free networks with power-law degrees and unbounded degree fluctuations. For this setting, we study the local clustering $c(k)$, i.e., the probability that two neighbors of a degree-$k$ node are neighbors themselves. We show that $ c(k)$ progressively falls off with $k$ and…
▽ More
The configuration model generates random graphs with any given degree distribution, and thus serves as a null model for scale-free networks with power-law degrees and unbounded degree fluctuations. For this setting, we study the local clustering $c(k)$, i.e., the probability that two neighbors of a degree-$k$ node are neighbors themselves. We show that $ c(k)$ progressively falls off with $k$ and eventually for $k=Ω(\sqrt{n})$ settles on a power law $c(k)\sim k^{-2(3-τ)}$ with $τ\in(2,3)$ the power-law exponent of the degree distribution. This fall-off has been observed in the majority of real-world networks and signals the presence of modular or hierarchical structure. Our results agree with recent results for the hidden-variable model and also give the expected number of triangles in the configuration model when counting triangles only once despite the presence of multi-edges. We show that only triangles consisting of triplets with uniquely specified degrees contribute to the triangle counting.
△ Less
Submitted 5 October, 2017;
originally announced October 2017.
-
Analysis of structured Markov processes
Authors:
Ivo Adan,
Johan van Leeuwaarden,
Jori Selen
Abstract:
Markov processes are popular mathematical models, studied by theoreticians for their intriguing properties, and applied by practitioners for their flexible structure. With this book we teach how to model and analyze Markov processes. We classify Markov processes based on their structural properties, which in turn determine which analytic methods are required for solving them. In doing so, we start…
▽ More
Markov processes are popular mathematical models, studied by theoreticians for their intriguing properties, and applied by practitioners for their flexible structure. With this book we teach how to model and analyze Markov processes. We classify Markov processes based on their structural properties, which in turn determine which analytic methods are required for solving them. In doing so, we start in each chapter with specific examples that naturally lead up to general theory and general methods. In this way the reader learns about Markov processes on the job.
By studying this book, the reader becomes acquainted with the basic analytic methods that come into play when systems are modeled as structured Markov processes. These basic methods will likely prove useful, in real-time when studying the examples at hand, but more importantly for future encounters with Markov processes not covered in this book. Methods are more important than examples. The methods have a large scope of application, even outside the scope of Markov processes, in areas like probability theory, industrial engineering, mechanical engineering, physics and financial mathematics.
△ Less
Submitted 26 September, 2017;
originally announced September 2017.
-
Optimal subgraph structures in scale-free configuration models
Authors:
Remco van der Hofstad,
Johan S. H. van Leeuwaarden,
Clara Stegehuis
Abstract:
Subgraphs reveal information about the geometry and functionalities of complex networks. For scale-free networks with unbounded degree fluctuations,
we obtain the asymptotics of the number of times a small connected graph occurs as a subgraph or as an induced subgraph. We obtain these results by analyzing the configuration model with degree exponent $τ\in(2,3)$ and introducing a novel class of o…
▽ More
Subgraphs reveal information about the geometry and functionalities of complex networks. For scale-free networks with unbounded degree fluctuations,
we obtain the asymptotics of the number of times a small connected graph occurs as a subgraph or as an induced subgraph. We obtain these results by analyzing the configuration model with degree exponent $τ\in(2,3)$ and introducing a novel class of optimization problems. For any given subgraph, the unique optimizer describes the degrees of the vertices that together span the subgraph.
We find that subgraphs typically occur between vertices with specific degree ranges. In this way, we can count and characterize {\it all} subgraphs. We refrain from double counting in the case of multi-edges, essentially counting the subgraphs in the {\it erased} configuration model.
△ Less
Submitted 8 June, 2020; v1 submitted 11 September, 2017;
originally announced September 2017.
-
Asymptotically Optimal Load Balancing Topologies
Authors:
Debankur Mukherjee,
Sem C. Borst,
Johan S. H. van Leeuwaarden
Abstract:
We consider a system of $N$ servers inter-connected by some underlying graph topology $G_N$. Tasks arrive at the various servers as independent Poisson processes of rate $λ$. Each incoming task is irrevocably assigned to whichever server has the smallest number of tasks among the one where it appears and its neighbors in $G_N$. Tasks have unit-mean exponential service times and leave the system up…
▽ More
We consider a system of $N$ servers inter-connected by some underlying graph topology $G_N$. Tasks arrive at the various servers as independent Poisson processes of rate $λ$. Each incoming task is irrevocably assigned to whichever server has the smallest number of tasks among the one where it appears and its neighbors in $G_N$. Tasks have unit-mean exponential service times and leave the system upon service completion.
The above model has been extensively investigated in the case $G_N$ is a clique. Since the servers are exchangeable in that case, the queue length process is quite tractable, and it has been proved that for any $λ< 1$, the fraction of servers with two or more tasks vanishes in the limit as $N \to \infty$. For an arbitrary graph $G_N$, the lack of exchangeability severely complicates the analysis, and the queue length process tends to be worse than for a clique. Accordingly, a graph $G_N$ is said to be $N$-optimal or $\sqrt{N}$-optimal when the occupancy process on $G_N$ is equivalent to that on a clique on an $N$-scale or $\sqrt{N}$-scale, respectively.
We prove that if $G_N$ is an Erdős-Rényi random graph with average degree $d(N)$, then it is with high probability $N$-optimal and $\sqrt{N}$-optimal if $d(N) \to \infty$ and $d(N) / (\sqrt{N} \log(N)) \to \infty$ as $N \to \infty$, respectively. This demonstrates that optimality can be maintained at $N$-scale and $\sqrt{N}$-scale while reducing the number of connections by nearly a factor $N$ and $\sqrt{N} / \log(N)$ compared to a clique, provided the topology is suitably random. It is further shown that if $G_N$ contains $Θ(N)$ bounded-degree nodes, then it cannot be $N$-optimal. In addition, we establish that an arbitrary graph $G_N$ is $N$-optimal when its minimum degree is $N - o(N)$, and may not be $N$-optimal even when its minimum degree is $c N + o(N)$ for any $0 < c < 1/2$.
△ Less
Submitted 6 April, 2019; v1 submitted 18 July, 2017;
originally announced July 2017.
-
Economies-of-scale in resource sharing systems: tutorial and partial review of the QED heavy-traffic regime
Authors:
Johan S. H. van Leeuwaarden,
Britt W. J. Mathijsen,
Bert Zwart
Abstract:
Multi-server queueing systems describe situations in which users require service from multiple parallel servers. Examples include check-in lines at airports, waiting rooms in hospitals, queues in contact centers, data buffers in wireless networks, and delayed service in cloud data centers. These are all situations with jobs (clients, patients, tasks) and servers (agents, beds, processors) that hav…
▽ More
Multi-server queueing systems describe situations in which users require service from multiple parallel servers. Examples include check-in lines at airports, waiting rooms in hospitals, queues in contact centers, data buffers in wireless networks, and delayed service in cloud data centers. These are all situations with jobs (clients, patients, tasks) and servers (agents, beds, processors) that have large capacity levels, ranging from the order of tens (checkouts) to thousands (processors). This survey investigates how to design such systems to exploit resource pooling and economies-of-scale. In particular, we review the mathematics behind the Quality-and-Efficiency Driven (QED) regime, which lets the system operate close to full utilization, while the number of servers grows simultaneously large and delays remain manageable. Aimed at a broad audience, we describe in detail the mathematical concepts for the basic Markovian many-server system, and only provide sketches or references for more advanced settings related to e.g. load balancing, overdispersion, parameter uncertainty, general service requirements and queueing networks. While serving as a partial survey of a massive body of work, the tutorial is not aimed to be exhaustive.
△ Less
Submitted 28 July, 2019; v1 submitted 16 June, 2017;
originally announced June 2017.
-
Clustering Spectrum of scale-free networks
Authors:
Clara Stegehuis,
Remco van der Hofstad,
Johan S. H. van Leeuwaarden,
A. J. E. M Janssen
Abstract:
Real-world networks often have power-law degrees and scale-free properties such as ultra-small distances and ultra-fast information spreading. In this paper, we study a third universal property: three-point correlations that suppress the creation of triangles and signal the presence of hierarchy. We quantify this property in terms of $\bar c(k)$, the probability that two neighbors of a degree-$k$…
▽ More
Real-world networks often have power-law degrees and scale-free properties such as ultra-small distances and ultra-fast information spreading. In this paper, we study a third universal property: three-point correlations that suppress the creation of triangles and signal the presence of hierarchy. We quantify this property in terms of $\bar c(k)$, the probability that two neighbors of a degree-$k$ node are neighbors themselves. We investigate how the clustering spectrum $k\mapsto\bar c(k)$ scales with $k$ in the hidden variable model and show that $c(k)$ follows a {\it universal curve} that consists of three $k$-ranges where $\bar c(k)$ remains flat, starts declining, and eventually settles on a power law $\bar c(k)\sim k^{-α}$ with $α$ depending on the power law of the degree distribution. We test these results against ten contemporary real-world networks and explain analytically why the universal curve properties only reveal themselves in large networks.
△ Less
Submitted 5 October, 2017; v1 submitted 6 June, 2017;
originally announced June 2017.
-
Load Balancing in Large-Scale Systems with Multiple Dispatchers
Authors:
Mark van der Boor,
Sem Borst,
Johan van Leeuwaarden
Abstract:
Load balancing algorithms play a crucial role in delivering robust application performance in data centers and cloud networks. Recently, strong interest has emerged in Join-the-Idle-Queue (JIQ) algorithms, which rely on tokens issued by idle servers in dispatching tasks and outperform power-of-$d$ policies. Specifically, JIQ strategies involve minimal information exchange, and yet achieve zero blo…
▽ More
Load balancing algorithms play a crucial role in delivering robust application performance in data centers and cloud networks. Recently, strong interest has emerged in Join-the-Idle-Queue (JIQ) algorithms, which rely on tokens issued by idle servers in dispatching tasks and outperform power-of-$d$ policies. Specifically, JIQ strategies involve minimal information exchange, and yet achieve zero blocking and wait in the many-server limit. The latter property prevails in a multiple-dispatcher scenario when the loads are strictly equal among dispatchers. For various reasons it is not uncommon however for skewed load patterns to occur. We leverage product-form representations and fluid limits to establish that the blocking and wait then no longer vanish, even for arbitrarily low overall load. Remarkably, it is the least-loaded dispatcher that throttles tokens and leaves idle servers stranded, thus acting as bottleneck.
Motivated by the above issues, we introduce two enhancements of the ordinary JIQ scheme where tokens are either distributed non-uniformly or occasionally exchanged among the various dispatchers. We prove that these extensions can achieve zero blocking and wait in the many-server limit, for any subcritical overall load and arbitrarily skewed load profiles. Extensive simulation experiments demonstrate that the asymptotic results are highly accurate, even for moderately sized systems.
△ Less
Submitted 4 June, 2017;
originally announced June 2017.
-
Big jobs arrive early: From critical queues to random graphs
Authors:
Gianmarco Bet,
Remco van der Hofstad,
Johan S. H. van Leeuwaarden
Abstract:
We consider a queue to which only a finite pool of $n$ customers can arrive, at times depending on their service requirement. A customer with stochastic service requirement $S$ arrives to the queue after an exponentially distributed time with mean $S^{-α}$ for some $α\in[0,1]$; so larger service requirements trigger customers to join earlier. This finite-pool queue interpolates between two previou…
▽ More
We consider a queue to which only a finite pool of $n$ customers can arrive, at times depending on their service requirement. A customer with stochastic service requirement $S$ arrives to the queue after an exponentially distributed time with mean $S^{-α}$ for some $α\in[0,1]$; so larger service requirements trigger customers to join earlier. This finite-pool queue interpolates between two previously studied cases: $α= 0$ gives the so-called $Δ_{(i)}/G/1$ queue and $α= 1$ is closely related to the exploration process for inhomogeneous random graphs. We consider the asymptotic regime in which the pool size $n$ grows to infinity and establish that the scaled queue-length process converges to a diffusion process with a negative quadratic drift. We leverage this asymptotic result to characterize the head start that is needed to create a long period of activity. We also describe how this first busy period of the queue gives rise to a critically connected random forest.
△ Less
Submitted 11 April, 2017;
originally announced April 2017.
-
Optimal Service Elasticity in Large-Scale Distributed Systems
Authors:
Debankur Mukherjee,
Souvik Dhara,
Sem Borst,
Johan S. H. van Leeuwaarden
Abstract:
A fundamental challenge in large-scale cloud networks and data centers is to achieve highly efficient server utilization and limit energy consumption, while providing excellent user-perceived performance in the presence of uncertain and time-varying demand patterns. Auto-scaling provides a popular paradigm for automatically adjusting service capacity in response to demand while meeting performance…
▽ More
A fundamental challenge in large-scale cloud networks and data centers is to achieve highly efficient server utilization and limit energy consumption, while providing excellent user-perceived performance in the presence of uncertain and time-varying demand patterns. Auto-scaling provides a popular paradigm for automatically adjusting service capacity in response to demand while meeting performance targets, and queue-driven auto-scaling techniques have been widely investigated in the literature. In typical data center architectures and cloud environments however, no centralized queue is maintained, and load balancing algorithms immediately distribute incoming tasks among parallel queues. In these distributed settings with vast numbers of servers, centralized queue-driven auto-scaling techniques involve a substantial communication overhead and major implementation burden, or may not even be viable at all.
Motivated by the above issues, we propose a joint auto-scaling and load balancing scheme which does not require any global queue length information or explicit knowledge of system parameters, and yet provides provably near-optimal service elasticity. We establish the fluid-level dynamics for the proposed scheme in a regime where the total traffic volume and nominal service capacity grow large in proportion. The fluid-limit results show that the proposed scheme achieves asymptotic optimality in terms of user-perceived delay performance as well as energy consumption. Specifically, we prove that both the waiting time of tasks and the relative energy portion consumed by idle servers vanish in the limit. At the same time, the proposed scheme operates in a distributed fashion and involves only constant communication overhead per task, thus ensuring scalability in massive data center operations.
△ Less
Submitted 24 March, 2017;
originally announced March 2017.
-
Pollaczek contour integrals for the fixed-cycle traffic-light queue
Authors:
Marko Boon,
A. J. E. M. Janssen,
Johan S. H. van Leeuwaarden,
Rik W. Timmerman
Abstract:
The fixed-cycle traffic-light (FCTL) queue is the standard model for intersections with static signaling, where vehicles arrive, form a queue and depart during cycles controlled by a traffic light. Classical analysis of the FCTL queue based on transform methods requires a computationally challenging step of finding the complex-valued roots of some characteristic equation. Building on the recent wo…
▽ More
The fixed-cycle traffic-light (FCTL) queue is the standard model for intersections with static signaling, where vehicles arrive, form a queue and depart during cycles controlled by a traffic light. Classical analysis of the FCTL queue based on transform methods requires a computationally challenging step of finding the complex-valued roots of some characteristic equation. Building on the recent work of Oblakova et al. (Exact expected delay and distribution for the fixed-cycle traffic-light model and similar systems in explicit form, 2016), we obtain a contour-integral expression, reminiscent of Pollaczek integrals for bulk-service queues, for the probability generating function of the steady-state FCTL queue. We also show that similar contour integrals arise for generalizations of the FCTL queue introduced in Oblakova et al. (2016) that relax some of the classical assumptions. Our results allow to compute the queue-length distribution and all its moments using algorithms that rely on contour integrals and avoid root-finding procedures.
△ Less
Submitted 30 November, 2018; v1 submitted 11 January, 2017;
originally announced January 2017.
-
The restricted Erlang-R Queue: Finite-size effects in service systems with returning customers
Authors:
Johan S. H. van Leeuwaarden,
Britt W. J. Mathijsen,
Fiona Sloothaak,
Galit B. Yom-Tov
Abstract:
Motivated by health care systems with repeated services that have both personnel (nurse and physician) and space (beds) constraints, we study a restricted version of the Erlang-R model. The space restriction policies we consider are blocking or holding in a pre-entrant queue. We develop many-server approximations for the system performance measures when either policy applies, and explore the conne…
▽ More
Motivated by health care systems with repeated services that have both personnel (nurse and physician) and space (beds) constraints, we study a restricted version of the Erlang-R model. The space restriction policies we consider are blocking or holding in a pre-entrant queue. We develop many-server approximations for the system performance measures when either policy applies, and explore the connection between them. We show that capacity allocation of both resources should be determined simultaneously, and derive the methodology to determine it explicitly. We show that the system dynamics is captured by the fraction of needy time in the network, and that returning customers should be accounted for both in steady-state and time-varying conditions. We demonstrate the application of our policies in two case studies of resource allocation in hospitals.
△ Less
Submitted 21 December, 2016;
originally announced December 2016.
-
Mesoscopic scales in hierarchical configuration models
Authors:
Remco van der Hofstad,
Johan S. H. van Leeuwaarden,
Clara Stegehuis
Abstract:
To understand mesoscopic scaling in networks, we study the hierarchical configuration model (HCM), a random graph model with community structure. The connections between the communities are formed as in a configuration model. We study the component sizes of the hierarchical configuration model at criticality when the inter-community degrees have a finite third moment. We find the conditions on the…
▽ More
To understand mesoscopic scaling in networks, we study the hierarchical configuration model (HCM), a random graph model with community structure. The connections between the communities are formed as in a configuration model. We study the component sizes of the hierarchical configuration model at criticality when the inter-community degrees have a finite third moment. We find the conditions on the community sizes such that the critical component sizes of the HCM behave similarly as in the configuration model. Furthermore, we study critical bond percolation on the HCM. We show that the ordered components of a critical HCM on $N$ vertices are of sizes $O(N^{2/3})$. More specifically, the rescaled component sizes converge to the excursions of a Brownian motion with parabolic drift, as for the scaling limit for the configuration model under a finite third moment condition.
△ Less
Submitted 8 December, 2016;
originally announced December 2016.
-
Universality of Power-of-$d$ Load Balancing in Many-Server Systems
Authors:
Debankur Mukherjee,
Sem C. Borst,
Johan S. H. van Leeuwaarden,
Philip A. Whiting
Abstract:
We consider a system of $N$ parallel single-server queues with unit exponential service rates and a single dispatcher where tasks arrive as a Poisson process of rate $λ(N)$. When a task arrives, the dispatcher assigns it to a server with the shortest queue among $d(N)$ randomly selected servers ($1 \leq d(N) \leq N$). This load balancing strategy is referred to as a JSQ($d(N)$) scheme, marking tha…
▽ More
We consider a system of $N$ parallel single-server queues with unit exponential service rates and a single dispatcher where tasks arrive as a Poisson process of rate $λ(N)$. When a task arrives, the dispatcher assigns it to a server with the shortest queue among $d(N)$ randomly selected servers ($1 \leq d(N) \leq N$). This load balancing strategy is referred to as a JSQ($d(N)$) scheme, marking that it subsumes the celebrated Join-the-Shortest Queue (JSQ) policy as a crucial special case for $d(N) = N$.
We construct a stochastic coupling to bound the difference in the queue length processes between the JSQ policy and a scheme with an arbitrary value of $d(N)$. We use the coupling to derive the fluid limit in the regime where $λ(N) / N \to λ< 1$ as $N \to \infty$ with $d(N) \to\infty$, along with the associated fixed point. The fluid limit turns out not to depend on the exact growth rate of $d(N)$, and in particular coincides with that for the JSQ policy. We further leverage the coupling to establish that the diffusion limit in the critical regime where $(N - λ(N)) / \sqrt{N} \to β> 0$ as $N \to \infty$ with $d(N)/(\sqrt{N} \log (N))\to\infty$ corresponds to that for the JSQ policy. These results indicate that the optimality of the JSQ policy can be preserved at the fluid-level and diffusion-level while reducing the overhead by nearly a factor O($N$) and O($\sqrt{N}/\log(N)$), respectively.
△ Less
Submitted 16 November, 2018; v1 submitted 2 December, 2016;
originally announced December 2016.
-
Asymptotic Optimality of Power-of-$d$ Load Balancing in Large-Scale Systems
Authors:
Debankur Mukherjee,
Sem C. Borst,
Johan S. H. van Leeuwaarden,
Philip A. Whiting
Abstract:
We consider a system of $N$ identical server pools and a single dispatcher where tasks arrive as a Poisson process of rate $λ(N)$. Arriving tasks cannot be queued, and must immediately be assigned to one of the server pools to start execution, or discarded. The execution times are assumed to be exponentially distributed with unit mean, and do not depend on the number of other tasks receiving servi…
▽ More
We consider a system of $N$ identical server pools and a single dispatcher where tasks arrive as a Poisson process of rate $λ(N)$. Arriving tasks cannot be queued, and must immediately be assigned to one of the server pools to start execution, or discarded. The execution times are assumed to be exponentially distributed with unit mean, and do not depend on the number of other tasks receiving service. However, the experienced performance (e.g. in terms of received throughput) does degrade with an increasing number of concurrent tasks at the same server pool. The dispatcher therefore aims to evenly distribute the tasks across the various server pools. Specifically, when a task arrives, the dispatcher assigns it to the server pool with the minimum number of tasks among $d(N)$ randomly selected server pools. This assignment strategy is called the JSQ$(d(N))$ scheme, as it resembles the power-of-$d$ version of the Join-the-Shortest-Queue (JSQ) policy, and will also be referred to as such in the special case $d(N) = N$.
We construct a stochastic coupling to bound the difference in the system occupancy processes between the JSQ policy and a scheme with an arbitrary value of $d(N)$. We use the coupling to derive the fluid limit in case $d(N) \to \infty$ and $λ(N)/N \to λ$ as $N \to \infty$, along with the associated fixed point. The fluid limit turns out to be insensitive to the exact growth rate of $d(N)$, and coincides with that for the JSQ policy. We further leverage the coupling to establish that the diffusion limit corresponds to that for the JSQ policy as well, as long as $d(N)/\sqrt{N} \log(N) \to \infty$, and characterize the common limiting diffusion process. These results indicate that the JSQ optimality can be preserved at the fluid-level and diffusion-level while reducing the overhead by nearly a factor O($N$) and O($\sqrt{N}/\log(N)$), respectively.
△ Less
Submitted 2 December, 2016;
originally announced December 2016.
-
Heavy-tailed configuration models at criticality
Authors:
Souvik Dhara,
Remco van der Hofstad,
Johan S. H. van Leeuwaarden,
Sanchayan Sen
Abstract:
We study the critical behavior of the component sizes for the configuration model when the tail of the degree distribution of a randomly chosen vertex is a regularly-varying function with exponent $τ-1$, where $τ\in (3,4)$. The component sizes are shown to be of the order $n^{(τ-2)/(τ-1)}L(n)^{-1}$ for some slowly-varying function $L(\cdot)$. We show that the re-scaled ordered component sizes conv…
▽ More
We study the critical behavior of the component sizes for the configuration model when the tail of the degree distribution of a randomly chosen vertex is a regularly-varying function with exponent $τ-1$, where $τ\in (3,4)$. The component sizes are shown to be of the order $n^{(τ-2)/(τ-1)}L(n)^{-1}$ for some slowly-varying function $L(\cdot)$. We show that the re-scaled ordered component sizes converge in distribution to the ordered excursions of a thinned Lévy process. This proves that the scaling limits for the component sizes for these heavy-tailed configuration models are in a different universality class compared to the Erdős-Rényi random graphs. Also the joint re-scaled vector of ordered component sizes and their surplus edges is shown to have a distributional limit under a strong topology. Our proof resolves a conjecture by Joseph, Ann. Appl. Probab. (2014) about the scaling limits of uniform simple graphs with i.i.d degrees in the critical window, and sheds light on the relation between the scaling limits obtained by Joseph and in this paper, which appear to be quite different. Further, we use percolation to study the evolution of the component sizes and the surplus edges within the critical scaling window, which is shown to converge in finite dimension to the augmented multiplicative coalescent process introduced by Bhamidi et. al., Probab. Theory Related Fields (2014). The main results of this paper are proved under rather general assumptions on the vertex degrees. We also discuss how these assumptions are satisfied by some of the frameworks that have been studied previously.
△ Less
Submitted 11 December, 2019; v1 submitted 2 December, 2016;
originally announced December 2016.
-
Mean-field limits for large-scale random-access networks
Authors:
Fabio Cecchi,
Sem C. Borst,
Johan S. H. van Leeuwaarden,
Philip A. Whiting
Abstract:
We establish mean-field limits for large-scale random-access networks with buffer dynamics and arbitrary interference graphs. While saturated-buffer scenarios have been widely investigated and yield useful throughput estimates for persistent sessions, they fail to capture the fluctuations in buffer contents over time, and provide no insight in the delay performance of flows with intermittent packe…
▽ More
We establish mean-field limits for large-scale random-access networks with buffer dynamics and arbitrary interference graphs. While saturated-buffer scenarios have been widely investigated and yield useful throughput estimates for persistent sessions, they fail to capture the fluctuations in buffer contents over time, and provide no insight in the delay performance of flows with intermittent packet arrivals. Motivated by that issue, we explore in the present paper random-access networks with buffer dynamics, where flows with empty buffers refrain from competition for the medium. The occurrence of empty buffers thus results in a complex dynamic interaction between activity states and buffer contents, which severely complicates the performance analysis. Hence we focus on a many-sources regime where the total number of nodes grows large, which not only offers mathematical tractability but is also highly relevant with the densification of wireless networks as the Internet of Things emerges. We exploit time scale separation properties to prove that the properly scaled buffer occupancy process converges to the solution of a deterministic initial-value problem, and establish the existence and uniqueness of the associated fixed point. This approach simplifies the performance analysis of networks with huge numbers of nodes to a low-dimensional fixed-point calculation. For the case of a complete interference graph, we demonstrate asymptotic stability, provide a simple closed-form expression for the fixed point, and prove interchange of the mean-field and steady-state limits. This yields asymptotically exact approximations for key performance metrics, in particular the stationary buffer content and packet delay distributions. The methodological framework that we develop easily extends to various model refinements as will be illustrated by several examples.
△ Less
Submitted 24 April, 2019; v1 submitted 29 November, 2016;
originally announced November 2016.
-
Epidemic spreading on complex networks with community structures
Authors:
Clara Stegehuis,
Remco van der Hofstad,
Johan S. H. van Leeuwaarden
Abstract:
Many real-world networks display a community structure. We study two random graph models that create a network with similar community structure as a given network. One model preserves the exact community structure of the original network, while the other model only preserves the set of communities and the vertex degrees. These models show that community structure is an important determinant of the…
▽ More
Many real-world networks display a community structure. We study two random graph models that create a network with similar community structure as a given network. One model preserves the exact community structure of the original network, while the other model only preserves the set of communities and the vertex degrees. These models show that community structure is an important determinant of the behavior of percolation processes on networks, such as information diffusion or virus spreading: the community structure can both \textit{enforce} as well as \textit{inhibit} diffusion processes. Our models further show that it is the mesoscopic set of communities that matters. The exact internal structures of communities barely influence the behavior of percolation processes across networks. This insensitivity is likely due to the relative denseness of the communities.
△ Less
Submitted 18 November, 2016;
originally announced November 2016.
-
Corrected mean-field model for random sequential adsorption on random geometric graphs
Authors:
Souvik Dhara,
Johan S. H. van Leeuwaarden,
Debankur Mukherjee
Abstract:
A notorious problem in mathematics and physics is to create a solvable model for random sequential adsorption of non-overlap** congruent spheres in the $d$-dimensional Euclidean space with $d\geq 2$. Spheres arrive sequentially at uniformly chosen locations in space and are accepted only when there is no overlap with previously deposited spheres. Due to spatial correlations, characterizing the f…
▽ More
A notorious problem in mathematics and physics is to create a solvable model for random sequential adsorption of non-overlap** congruent spheres in the $d$-dimensional Euclidean space with $d\geq 2$. Spheres arrive sequentially at uniformly chosen locations in space and are accepted only when there is no overlap with previously deposited spheres. Due to spatial correlations, characterizing the fraction of accepted spheres remains largely intractable. We study this fraction by taking a novel approach that compares random sequential adsorption in Euclidean space to the nearest-neighbor blocking on a sequence of clustered random graphs. This random network model can be thought of as a corrected mean-field model for the interaction graph between the attempted spheres. Using functional limit theorems, we characterize the fraction of accepted spheres and its fluctuations.
△ Less
Submitted 2 October, 2017; v1 submitted 15 November, 2016;
originally announced November 2016.
-
Local clustering in scale-free networks with hidden variables
Authors:
Remco van der Hofstad,
A. J. E. M. Janssen,
Johan S. H. van Leeuwaarden,
Clara Stegehuis
Abstract:
We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges and allows for negative degree correlations (disassortative mixing) due to infinite-variance degrees controlled by a structural cutoff $h_s$ and natural cutoff $h_c$. We show that local clust…
▽ More
We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges and allows for negative degree correlations (disassortative mixing) due to infinite-variance degrees controlled by a structural cutoff $h_s$ and natural cutoff $h_c$. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient $C$ scales with the network size $N$, as a function of $h_s$ and $h_c$. For scale-free networks with exponent $2<τ<3$ and the default choices $h_s\sim N^{1/2}$ and $h_c\sim N^{1/(τ-1)}$ this gives $C\sim N^{2-τ}\ln N$ for the universality class at hand. We characterize the extremely slow decay of $C$ when $τ\approx 2$ and show that for $τ=2.1$, say, clustering only starts to vanish for networks as large as $N=10^{11}$.
△ Less
Submitted 18 November, 2016; v1 submitted 9 November, 2016;
originally announced November 2016.
-
Networks of fixed-cycle intersections
Authors:
Marko Boon,
Johan van Leeuwaarden
Abstract:
We present an algorithmic method for analyzing networks of intersections with static signaling, with as primary example a line network that allows traffic flow over several intersections in one main direction. The method decomposes the network into separate intersections and treats each intersection in isolation using an extension of the fixed-cycle traffic-light (FCTL) queue. The network effects…
▽ More
We present an algorithmic method for analyzing networks of intersections with static signaling, with as primary example a line network that allows traffic flow over several intersections in one main direction. The method decomposes the network into separate intersections and treats each intersection in isolation using an extension of the fixed-cycle traffic-light (FCTL) queue. The network effects are modeled by matching the output process of one intersection with the input process of the next (downstream) intersection. This network analysis provides insight into wave phenomena due to vehicles experiencing progressive cascades of green lights and sheds light on platoon forming in case of imperfections. Our algorithm is shown to match results from extensive discrete-event simulations and can also be applied to more complex network structures.
△ Less
Submitted 9 November, 2016;
originally announced November 2016.