Hostname: page-component-848d4c4894-ndmmz Total loading time: 0 Render date: 2024-06-02T18:30:06.330Z Has data issue: false hasContentIssue false

Large deviations and overflow probabilities for the general single-server queue, with applications

Published online by Cambridge University Press:  24 October 2008

N. G. Duffield
Affiliation:
School of Mathematical Sciences, Dublin City University, Dublin 9, Ireland. e-mail: duffieldn@dcu.ie
Neil O'connell
Affiliation:
Dublin Institute for Advanced Studies, 10 Burlington Road, Dublin 4, Ireland. e-mail: oconnell@stp.dias.ie

Abstract

We consider queueing systems where the workload process is assumed to have an associated large deviation principle with arbitrary scaling: there exist increasing scaling functions (at, vt, tR+) and a rate function I such that if (Wt, tR+) denotes the workload process, then

on the continuity set of I. In the case that at = vt = t it has been argued heuristically, and recently proved in a fairly general context (for discrete time models) by Glynn and Whitt[8], that the queue-length distribution (that is, the distribution of supremum of the workload process Q = supt≥0Wt) decays exponentially:

and the decay rate δ is directly related to the rate function I. We establish conditions for a more general result to hold, where the scaling functions are not necessarily linear in t: we find that the queue-length distribution has an exponential tail only if limt→∞at/vt is finite and strictly positive; otherwise, provided our conditions are satisfied, the tail probabilities decay like

Type
Research Article
Copyright
Copyright © Cambridge Philosophical Society 1995

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

REFERENCES

[1]Milton, Abramowitz and Stegun, Irene A. (eds.) Handbook of mathematical functions (Dover, 1965).Google Scholar
[2]David, Aldous. Probability approximations via the Poisson clumping heuristic (Springer-Verlag, 1989).Google Scholar
[3]Borovkov, A. A.. Asymptotic methods in queueing theory. (Wiley, 1984).Google Scholar
[4]Cheng-Shang, Chang. Stability, queue length and delay of deterministic and stochastic queueing networks. IEEE Trans. on Automatic Control 39 (1994), 913931.Google Scholar
[5]Kulkarni, V. and Rolski, T.. Fluid model driven by an Ornstein-Uhlenbeck process (preprint).Google Scholar
[6]Amir, Dembo and Ofer, Zeitoüni. Large deviation techniques and applications (Jones and Bartlett, 1993).Google Scholar
[7]Duffield, N. G.. Exponential bounds for queues with Markovian arrivals. Queueing Systems 17 (1994), 413430CrossRefGoogle Scholar
[8]Glynn, Peter W. and Ward, Whitt. Logarithmic asymptotics for steady-state tail probabilities in a single-server queue. J. Appl. Prob. 31A (1994), 131159CrossRefGoogle Scholar
[9]Kesidis, G., Walrand, J. and Chang, C. S.. Effective bandwidths for multiclass Markov fluids and other ATM Sources. IEEE/ACH Trans. Networking 1 (1993), 424428.CrossRefGoogle Scholar
[10]Leland, Will E., Taqqu, Murad S., Walter, Willinger and Wilson, Daniel V.. On the self-similar nature of Ethernet traffic. ACM SIOCOMM Computer Communications Review 23 (1993), 183193.CrossRefGoogle Scholar
[11]Lewis, J. T. and Pfister, C. E.. Thermodynamic probability theory: some aspects of large deviations. Theor. Prob. Appl, (to appear).Google Scholar
[12]Torgny, Lindvall. Lectures on the coupling method (Wiley, 1992).Google Scholar
[13]Mandelbrot, Benoit B. and Van Ness, John W.. Fractional Brownian motions, fractional noises and applications. SIAM Review 10 (1968), 422437.Google Scholar
[14]Marcus, M. B. and Shepp, L. A.. Sample behaviour of Gaussian processes. Proceedings of the Sixth Berkeley Symposium (1972).Google Scholar
[15]Ilkka, Norros. Studies on a model for connectionless traffic, based on fractional Brownian motion. Conference on Applied Probability in Engineering, Computer and communication sciences INRIA/ORSA/TIMS/SMAI, Paris 1993.Google Scholar
[16]Ilkka, Norros. A storage model with self-similar input. Queueing Systems 16 (1994), 387396.Google Scholar
[17]Norros, I., Roberts, J. W., Simonain, A. and Virtamo, J.. The superposition of variable bitrate sources in ATM multiplexers. IEEE J. Selected Areas in Commun. 9 (1991), 378387.CrossRefGoogle Scholar
[18]Jim, Pitman and Marc, Yor. A decomposition of Bessel bridges. Z. Wahr. verw. Gebeit 59 (1982), 425457.Google Scholar