Stochastic Models of Computer Communication Systems

(Read before the Royal Statistical Society at a meeting organized by the Research Section on Wednesday, May 8th, 1985, Professor J. B. Copas in the Chair) SUMMARY This paper describes some examples of the stochastic models found useful in the design and analysis of advanced computer and communication systems. Our major theme might be termed the control of contention. As illustrations of this theme we discuss concurrency control procedures for databases, dynamic channel assignment for cellular radio, and random access schemes for the control of a broadcast channel. We emphasize asymptotic properties of product-form distributions and we present some new results on the stability of acknowledgement based random access schemes. This paper is intended to describe to the Society some examples of the stochastic models found useful in the design and analysis of advanced computer and communication systems. The examples chosen are broadly concerned with what might be termed the control of contention, and an attempt has been made to provide enough of the technical background to motivate the models considered. In Section 2 we describe a probabilistic model, due to Mitra (1985), for conflicts anlong tran- sactions in a database. Such conflicts can arise in distributed computer systems, where to ensure the consistency of a database it is often necessary to forbid the concurrent execution of transactions involving common items: a transaction must then contend with other transactions for access to the items it requires. Mitra (1985) has shown that his model can be used to answer some important design questions concerning concurrency control procedures which use exclusive and non-exclusive locks. Mitra's results are based upon a product-form solution; we indicate how his asymptotic formulae can be extended beyond the range of light traffic and the assumption of an unstructured database. In Section 3 we discuss one of the many interesting problems which arise in connection with cellular radio. Cellular radio makes efficient use of a limited number of radio channels by allowing the repeated reuse of each channel in sufficiently separated spatial regions. The topic we consider is contention between different regions for the use of dynamically assigned channels. Everitt and Macfadyen (1983) have described an analytically tractable method of dynamic channel assign- ment, which they term the maximum packing strategy. Again a product form solution is involved: from this it is easy to obtain asymptotic formulae applicable in light traffic. These formulae establish the advantage of the strategy over a fixed channel assignment for low enough loss pro- babilities, but the advantage disappears as traffic and the number of channels increase. The real potential of dynamic schemes is their ability to cope automatically with traffic intensities which fluctuate in space and time.

[1]  Randolph Nelson,et al.  The Stochastic Cusp, Swallowtail, and Hyperbolic Umbilic Catastrophes as Manifest in a simple Communications Model , 1984, International Symposium on Computer Modeling, Measurement and Evaluation.

[2]  FayolleGuy,et al.  Stability and Optimal Control of the Packet Switching Broadcast Channel , 1977 .

[3]  Walter A. Rosenkrantz,et al.  Some Theorems on the Instability of the Exponential Back-Off Protocol , 1984, International Symposium on Computer Modeling, Measurement and Evaluation.

[4]  Donald F. Towsley,et al.  Random Multiple-Access Communication and Group Testing , 1984, IEEE Trans. Commun..

[5]  B. Stuck,et al.  An introduction to traffic handling characteristics of bus local area network distributed access methods , 1984, IEEE Communications Magazine.

[6]  A. Cohen On random fields , 1967 .

[7]  Bruce E. Hajek,et al.  Information of partitions with applications to random access communications , 1982, IEEE Trans. Inf. Theory.

[8]  Bruce Hajek,et al.  Decentralized dynamic control of a multiaccess broadcast channel , 1982 .

[9]  Stochastic Inequalities,et al.  HITTING-TIME AND OCCUPATION-TIME BOUNDS IMPLIED BY DRIFT ANALYSIS WITH APPLICATIONS , 1982 .

[10]  Anthony Unwin,et al.  Reversibility and Stochastic Networks , 1980 .

[11]  Debasis Mitra,et al.  Probabilistic Models and Asymptotic Results for Concurrent Processing with Exclusive and Non-Exclusive Locks , 1985, SIAM J. Comput..

[12]  R. Butterworth,et al.  Queueing Systems, Vol. II: Computer Applications. , 1977 .

[13]  N. L. Lawrie,et al.  Mathematical Computer Performance and Reliability , 1984 .

[14]  J. Lehoczky,et al.  Insensitivity of blocking probabilities in a circuit-switching network , 1984 .

[15]  Xerox Corp,et al.  The ethernet: a local area network: data link layer and physical layer specifications , 1981, CCRV.

[16]  Debasis Mitra,et al.  Probabilistic Models of Database Locking: Solutions, Computational Algorithms, and Asymptotics , 1984, JACM.

[17]  Valerie Isham,et al.  Non‐Negative Matrices and Markov Chains , 1983 .

[18]  Frank Kelly,et al.  On Auto-repeat Facilities and Telephone Network Performance , 1986 .

[19]  F. K. Hwang,et al.  An Optimum Nested Procedure in Binomial Group Testing , 1976 .

[20]  Robert Metcalfe,et al.  Ethernet: distributed packet switching for local computer networks , 1988, CACM.

[21]  J. Laurie Snell,et al.  Markov Random Fields and Their Applications , 1980 .

[22]  Toby Berger,et al.  The Poisson Multiple-Access Conflict Resolution Problem , 1981 .

[23]  Wing Shing Wong,et al.  Performance of Concurrency Control Algorithms with Nonexclusive Access , 1984, Performance.

[24]  Erol Gelenbe,et al.  Stability and Optimal Control of the Packet Switching Broadcast Channel , 1977, JACM.

[25]  Ralph L. Disney,et al.  Applied Probability— Computer Science: The Interface , 1982, Progress in Computer Science.

[26]  F. Kelly Blocking probabilities in large circuit-switched networks , 1986, Advances in Applied Probability.

[27]  B. Hajek Acknowledgement based random access transmission control - An equilibrium analysis , 1982 .

[28]  F. Spitzer Markov Random Fields on an Infinite Tree , 1975 .

[29]  F. Baccelli,et al.  Modelling and Performance Evaluation Methodology , 1984 .

[30]  Stavros Christodoulakis,et al.  Implications of certain assumptions in database performance evauation , 1984, TODS.

[31]  Robert Cole,et al.  Computer Communications , 1982, Springer New York.

[32]  Erol Gelenbe,et al.  Analysis and Synthesis of Computer Systems , 1980 .

[33]  T. Kahwa,et al.  A Hybrid Channel Assignment Scheme in Large-Scale, Cellular-Structured Mobile Communication Systems , 1978, IEEE Trans. Commun..

[34]  John Capetanakis,et al.  Tree algorithms for packet broadcast channels , 1979, IEEE Trans. Inf. Theory.

[35]  R. Tweedie Criteria for classifying general Markov chains , 1976, Advances in Applied Probability.

[36]  D. Brook On the distinction between the conditional probability and the joint probability approaches in the specification of nearest-neighbour systems , 1964 .

[37]  Stan Zachary,et al.  Markov random fields and Markov chains on trees , 1983 .

[38]  D. Towsley,et al.  On the instability of slotted ALOHA multiaccess algorithm , 1983 .

[39]  J. Massey Collision-Resolution Algorithms and Random-Access Communications , 1981 .

[40]  J. M. Akinpelu,et al.  The overload performance of engineered networks with nonhierarchical and hierarchical routing , 1984, AT&T Bell Laboratories Technical Journal.