A study of the dynamic behaviour of some workload allocation algorithms by means of catastrophe theory

被引:10
作者
Schreiber, FA
Baiguera, M
Bortolotto, G
Caglioti, V
机构
[1] Dipto. Elettron. Informazione - P.
关键词
algorithms stability evaluation; catastrophe theory; distributed database; soft real-time; workload allocation and balancing;
D O I
10.1016/S1383-7621(96)00118-X
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The dynamic behaviour of some workload allocation algorithms is studied to identify instability conditions induced either by an external overload situation or by a workload reallocation, triggered by the failure of some of the requested resources. We use concepts, drawn from that part of system theory which is known as Thom's Catastrophe theory, such as the Drift and the Potential Functions. The method is then applied to workload balancing in a Distributed Database system; however our method can be extended to other kind of systems which can be found in the telecommunication networks and in the distributed computing systems areas. We first deal with simple examples to show how the instability conditions show up, then we show its application to a well known allocation algorithm (Sender Initiated) which is known to be stable under overloads and this behaviour is confirmed.
引用
收藏
页码:605 / 624
页数:20
相关论文
共 19 条
[1]  
BAIGUERA M, 1995, THESIS POLITECNICO M
[2]  
BUTTAZZO GC, 1995, RESPONSIVE COMPUTING
[3]   ADAPTIVE LOAD SHARING IN HOMOGENEOUS DISTRIBUTED SYSTEMS [J].
EAGER, DL ;
LAZOWSKA, ED ;
ZAHORJAN, J .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1986, 12 (05) :662-675
[4]  
EAGER EL, 1986, PERFORMANCE EVALUATI, V6
[5]  
Ferrari D, 1988, P PERF 87 12 INT S C, P515
[6]  
HAC A, 1990, J SYSTEMS SOFTWARE
[7]   STOCHASTIC CATASTROPHE-THEORY IN COMPUTER-PERFORMANCE MODELING [J].
NELSON, R .
JOURNAL OF THE ACM, 1987, 34 (03) :661-685
[8]  
NELSON R, 1984, P PERFORMANCE, V84
[9]  
Poston T, 1978, Catastrophe Theory and Its Applications
[10]   RELIABILITY OF DISTRIBUTED PROGRAMS UNDER OVERLOADS [J].
ROTENSTREICH, S .
JOURNAL OF SYSTEMS AND SOFTWARE, 1989, 9 (01) :29-40