Load Balancing in Arbitrary Network Topologies with Stochastic Adversarial Input

We study the long-term (steady state) performance of a simple, randomized, local load balancing technique under a broad range of input conditions. We assume a system of n processors connected by an arbitrary network topology. Jobs are placed in the processors by a deterministic or randomized adversary. The adversary knows the current and past load distribution in the network and can use this information to place the new tasks in the processors. A node can execute one job per step, and can also participate in one load balancing operation in which it can move tasks to a direct neighbor in the network. In the protocol we analyze here, a node equalizes its load with a random neighbor in the graph. Our analysis of the protocol does not assume any particular input distribution. The input is generated by an arbitrary deterministic or probabilistic adversary subject only to some weak statistical properties. For stability and expected performance of the system we adopt the stochastic adversary model of [Borodin et al., J. ACM, 48 (2001), pp. 13--38]. For high-probability bounds we introduce a more restricted input model, the strongly bounded adversary. Assuming the stochastic adversarial input model, we show that if the adversary does not trivially overload the network (i.e., there is an integer $w\geq 1$ such that the expected number of new jobs in any interval of length $w$ is bounded by $\lambda nw$ for some $\lambda<1$), then the system is stable for any connected network topology, regardless of how the adversary allocates the new jobs between the processors. When the system is stable, the next performance parameter of interest is the waiting time of jobs. We develop expected and high probability bounds on the total load in the system and the waiting time of jobs in terms of the network topology. In particular, in the above stochastic adversary model, if the network is an expander graph, the expected wait of a task is O(w + log n), and in the strongly bounded adversary model the waiting time of a task is O(w + log n) with high probability. We contrast these results with the work stealing load balancing protocol, where we show that in sparse networks, the load in the system and the waiting time can be exponential in the network size.

[1]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1967 .

[2]  Rajmohan Rajaraman,et al.  An Adversarial Model for Distributed Dynamic Load Balancing , 2002, J. Interconnect. Networks.

[3]  Cheng-Zhong Xu,et al.  Iterative Dynamic Load Balancing in Multicomputers , 1994 .

[4]  Richard L. Tweedie,et al.  Markov Chains and Stochastic Stability , 1993, Communications and Control Engineering Series.

[5]  Allan Borodin,et al.  Adversarial queuing theory , 2001, JACM.

[6]  Bruce M. Maggs,et al.  Tight analyses of two local load balancing algorithms , 1995, STOC '95.

[7]  R. Pemantle,et al.  Moment conditions for a sequence with negative drift to be uniformly bounded in Lr , 1999, math/0404093.

[8]  Eli Upfal,et al.  A simple load balancing scheme for task allocation in parallel machines , 1991, SPAA '91.

[9]  W. Zhu,et al.  Load Balancing and Workstation Autonomy on Amoeba , 1995 .

[10]  S. Muthukrishnan,et al.  Dynamic Load Balancing by Random Matchings , 1996, J. Comput. Syst. Sci..

[11]  Michael Mitzenmacher,et al.  Analyses of Load Stealing Models Based on Families of Differential Equations , 2000, Theory of Computing Systems.

[12]  Bruce M. Maggs,et al.  Approximate load balancing on dynamic and asynchronous networks , 1993, STOC.

[13]  Reinhard Lüling,et al.  A dynamic distributed load balancing algorithm with provable good performance , 1993, SPAA '93.

[14]  Samuel Karlin,et al.  A First Course on Stochastic Processes , 1968 .

[15]  Leslie Ann Goldberg,et al.  The Natural Work-Stealing Algorithm is Stable , 2001, SIAM J. Comput..

[16]  Eli Upfal,et al.  The token distribution problem , 1989, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[17]  Yuval Rabani,et al.  Local divergence of Markov chains and the analysis of iterative load-balancing schemes , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[18]  W. Feller,et al.  An Introduction to Probability Theory and Its Application. , 1951 .

[19]  Jon M. Kleinberg,et al.  Stability of load balancing algorithms in dynamic adversarial systems , 2002, STOC '02.

[20]  Michael Mitzenmacher,et al.  Load balancing and density dependent jump Markov processes , 1996, Proceedings of 37th Conference on Foundations of Computer Science.

[21]  Eli Upfal,et al.  Stability and efficiency of a random local load balancing protocol , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..

[22]  Michael Mitzenmacher,et al.  Analyses of load stealing models based on differential equations , 1998, SPAA '98.

[23]  Friedhelm Meyer auf der Heide,et al.  Strongly Adaptive Token Distribution , 1993, ICALP.