Hostname: page-component-89b8bd64d-5bvrz Total loading time: 0 Render date: 2026-05-09T01:32:40.153Z Has data issue: false hasContentIssue false

Queueing in space

Published online by Cambridge University Press:  01 July 2016

Eitan Altman*
Affiliation:
INRIA
Hanoch Levy*
Affiliation:
Rutcor
*
* Postal address: INRIA Centre Sophia Antipolis, 2004 Route des Lucioles, 06560 Valbonne, France.
** Postal address: RUTCOR, Rutgers University, POB 5062, New Brunswick, NJ 08903–5062, USA. On leave from Tel-Aviv University.

Abstract

We consider a problem in which a single server must serve a stream of customers whose arrivals are distributed over a finite-size convex space. Under the assumption that the server has full information on the customer location, obvious service policies are the FCFS and the greedy (serve-the-closest-customer) approaches. These algorithms are, however, either inefficient (FCFS) or ‘unfair' (greedy).

We propose and study two alternative algorithms, the gated-greedy policy and the gated-scan policy, which are more ‘fair' than the pure greedy method. We show that the stability conditions of the gated-greedy are p < 1 (where p is the expected rate at which work arrives at the system), implying that the method is at least as efficient (in terms of system stability) as any other discipline, in particular the greedy one. For the gated-scan policy we show that for any p < 1 one can design a stable gated-scan policy; however, for any fixed gated-scan policy there exists p < 1 for which the policy is unstable. We evaluate the performance of the gated-scan policy, and present bounds for the performance of the gated-greedy policy.

These results are derived for systems in which the arrivals occur on a two-dimensional space (a square) but they are not limited to this configuration; rather they hold for more complex N-dimensional spaces, in particular for serving customers in (three-dimensional) convex space and serving customers on a line.

MSC classification

Information

Type
Research Article
Copyright
Copyright © Applied Probability Trust 1994 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Article purchase

Temporarily unavailable