End-to-End Congestion Control for the Internet: Delays and Stability

Size: px
Start display at page:

Download "End-to-End Congestion Control for the Internet: Delays and Stability"

Transcription

1 End-to-End Congestion Control for the Internet: Delays and Stability Ramesh Johari and David Tan Statistical Laboratory, University of Cambridge March 16, 2000 Abstract Under the assumption that queueing delays will eventually become small relative to propagation delays, we derive stability results for a fluid flow model of end-to-end Internet congestion control. The theoretical results of the paper are intended to be decentralized and locally implemented: each end system needs knowledge only of its own roundtrip delay. Criteria for local stability and rate of convergence are completely characterized for a single resource, single user system. Stability criteria are also described for networks where all users share the same roundtrip delay. Numerical experiments investigate extensions to more general networks. Finally, through simulations, we are able to evaluate the relative importance of queueing delays and propagation delays on network stability. Introduction Changes in communication networks over the last five years have forced researchers to closely examine network congestion control, particularly for the Internet. However, the task has been significantly complicated by the globalization of networks: trial-and-error methods employed on small testbeds do not necessarily yield results scalable to a network as large as the Internet. Instead, an increasing emphasis is being placed on theoretical predictions of robust behavior, prior to implementation. At the level of theoretical abstraction we will consider, a network is comprised of users and resources. Each user wishes to employ one or more resources of the network. ithin this framework, our goal will be to formulate a congestion control algorithm which can remain stable under communication delays. Any suggestion of new congestion control algorithms for the Internet must address the following basic question: will the control be implemented by the resources, or by the users? As an example of the differences between these choices, we compare the TCP/IP model of the Internet with ATM networks. In TCP/IP, the intelligence of the congestion control is implemented by the end users: to signal congestion, routers simply drop packets. It is left to the end systems to detect these packet drops, and act accordingly. Conversely, in ATM networks, quality-of-service (QoS) is a key concern, and ensuring that QoS requirements are met is a task handled primarily by the links in the network. 1

2 hich viewpoint should we adopt? Arguments have been made at an economic level regarding the fairness benefits of end system congestion control [5]: it is suggested that end users are best equipped to adjust their flows so as to maximize utility, and hence congestion control should be implemented by asking resources to convey information on incipient congestion to intelligent end systems. However, it is not immediately clear that this type of congestion control is robust under communication delays in the network. Communication delay comprises two elements: propagation delay, and queueing delay. The propagation delay is the physical delay in transmission of data along a length of fiber (or through space, for a wireless network). The queueing delay is the delay experienced by data waiting to be served at resources within the network. e will work from the assumption that, in the future, queueing delays will become small relative to propagation delay, as Kelly argues in [10]. Router hardware and network capacity continue to improve rapidly, reducing queueing delays; on the other hand, propagation delays are fixed by the distances between nodes on the network, and the speed of light. In [10], Kelly uses several scaling regimes at queues in a network to support the claim that queueing delays will eventually become relatively small. Under this assumption, the choice of congestion control mechanism becomes much easier. If propagation delays are the primary source of communication delay in the network, then the choice of congestion control mechanism must be able to estimate propagation delays, and adjust the sending rate in response to these delays. The end users are naturally placed to perform this task; on the other hand, resources would be required to estimate the delays experienced by each flow passing through them a very difficult problem in a network on the scale of the Internet. The work of Chong et al. in [2, 3] is related to this point. In [2, 3], Chong et al. analyzed the equilibrium and stability of their proposed first-order rate-based flow control (FRFC) algorithm for a single bottleneck resource of multiple users with diverse roundtrip delays. In the FRFC algorithm, the rate allocated to each user is the difference between the observed queue length and the queue threshold, multiplied by a control gain. To maintain stability of such an algorithm, however, the resource needs knowledge of the propagation delays experienced by all users. For this reason, we will instead consider a model which implements end-to-end congestion control, in response to simple congestion indication signals from resources. In [11], Kelly et al. proposed two complementary congestion control algorithms. The FRFC algorithm is similar to the dual algorithm of [11]: it relies on the resource to implement the congestion control. In this paper, we will study the primal algorithm of [11], where the end user implements a TCP-like rate control algorithm which responds to congestion indication signals from resources. The packet-level queueing behavior at the resources is not modeled; instead, a deterministic fluid flow approximation is considered. e will represent a network by a set J of resources. Let a route r be a nonempty subset of J, and denote the set of all routes by R. e will ignore routing choices, and thus assume we can identify each user with one and only one route. Consider the primal algorithm of [11], with strictly positive gain parameters κ r, r R: d dt x r t κ r w r x r t µ j t r R (1) j r 2

3 where µ j t p j x s t j J (2) s: j s The first equation describes the time evolution of x r, the sending rate of user r. The second equation describes the generation of congestion indication signals at resource j, by means of a congestion indication function p j y. e will assume p j is increasing, nonnegative, and not identically zero. e may motivate the algorithm (1)-(2) as follows. Suppose that user r generates x r t packets at time t. If the total flow through resource j is y, we interpret p j y as the probability a packet at resource j receives a mark a congestion indication signal. Then µ j t is the probability a packet at resource j receives a mark at time t. e assume a packet may only be marked at most once. In this case, j r µ j t is the probability a packet from user r receives a mark at time t, and x r t j r µ j t is just the expected number of marks user r receives at time t. User r then adjusts x r t to reach a target number of marks per unit time w r. (Although the preceding discussion is at the packet level, notice that (1)-(2) is a fluid flow approximation.) In [11], the system (1)-(2) is shown to be asymptotically stable in the large, and hence convergent to a unique equilibrium point x given by: x r w r j r p j s: j s x s (3) The system (1)-(2) does not model propagation delays. e will add propagation delays as follows. Given a route r, for each resource j r we define a forward delay d 1 j r, and a return delay d 2 j r. The forward delay is the delay incurred in communication from the user to the resource; the return delay is the delay incurred in communication from the resource back to the user. In the current Internet, each route is subject to a roundtrip delay. e model this delay by assuming each route has an associated delay D r, such that d 1 j r d 2 j r D r for each j r. Consider now the following delayed difference equations analogous to the primal algorithm, where we assume that d 1 j r and d 2 j r are integer valued: x r t 1 x r t κ r w r x r t D r µ j t d 2 j r j r r R (4) where µ j t p j x s t d 1 s: j s j s j J (5) These are just discrete-time equations corresponding to the continuous-time equations (1)-(2). Suppose again that we consider x r t to model the number of packets generated by user r at time t. These packets experience a delay of d 1 j r before arriving at resource j; therefore, as before, µ j t gives the probability a packet at resource j receives a mark at time t. Packets leaving resource j experience a delay of d 2 j r before returning to user r. Thus, the total expected number of marks received by user r at time t is now given by x r t D r j r µ j t d 2 j r. Notice that the number 3

4 of marks received by user r at time t is proportional to the rate D r units of time ago: this is a direct result of the fact that d 1 j r d 2 j r D r for all j r. As before, user r adjusts x r t to reach a target number of marks per unit time w r. The delay structure we have assumed here is very similar to the current operation of TCP [9]. In TCP, the sender transmits packets to a receiver; for every packet received, an acknowledgment is transmitted back to the sender. All packets make a round trip from sender to receiver, and back to sender. As a result, the sum of forward and return delays is fixed for all resources on a given route. This sum is the roundtrip delay D r encountered in our previous development. e will focus in this paper on the engineering requirement that the network remain stable under communication delays; in particular, since queueing delays are assumed to be small, the key source of instability will be the propagation delay, as captured by the roundtrip delay D r. e primarily seek decentralized conditions for stability. Given any network with many users, the results of [11] give a global condition for stability of the lagged system. Here, we will pursue conditions which each individual user must satisfy to ensure that the system remains stable. e will consider stability conditions of the form (approximately): κ r D r route-dependent constant r R (6) Such a condition says that if the product κ r D r is less than some constant dependent on route topology and/or the network operating point, then the system (4)-(5) will be locally stable. In a typical network where the roundtrip delays may not be known, this condition means that selfclocking rate control algorithms will work well to maintain network stability. In a self-clocking algorithm, the sender uses an acknowledgement from the receiver to prompt a step forward. This gives the inverse dependence of the gain κ on the roundtrip delay D. (For more details on selfclocking algorithms, see [5] and [9].) The type of constraint described by (6) is very desirable in a large network such as the Internet. Implementing end-to-end congestion control would be very difficult if the route-dependent constant involved information not available to the user. Instead, the condition (6) allows stable behavior to result without any central control. e will study the form of the route-dependent constant, and also consider what this constant implies for resource design. The paper is organized as follows. In Section 1, we study a simplified model with one resource, and give a condition on κ which ensures the system is asymptotically stable. Next, we discuss rate of convergence for the one resource model in Section 2, completely characterizing convergence to equilibrium for the region of stability. e next turn our attention to the network scenario. In Section 3, we develop conditions for stability of a network where all routes have the same roundtrip delay (D r D for all r R), by linearization of the equations (4)-(5). The condition that d 1 j r d 2 j r! D r proves to be essential in developing these stability criteria. e also suggest two extensions to this model: one where we add completely nonadaptive users, and another where we add instantly adaptive users. In Section 4, we discuss a conjecture extending our results to networks with diverse roundtrip delays. This conjecture is investigated with numerical experiments. In Section 5, we give simulation results which add queueing and packet-level behavior to the theoretical model. In particular, we are able to further investigate how queueing delays and propagation delays affect network stability, and what it means for queueing delays to become negligible. Finally, we comment on the implications of our results for future networks in Section 6. 4

5 1 Stability criterion: one route, one resource Consider the network depicted in Figure 1, consisting of one resource and one route. The difference equation describing this system is: x t 1 x t" κ w x t D p x t D# $ % (7) where D d 1 d 2. e begin by considering the linearization of (7). Let the stable point be x, where w xp x, and suppose p is differentiable at this point with derivative p&. Then linearizing with x t' x y t, we obtain: y t 1 y t κ p xp& y t D( (8) neglecting higher order terms. Given a complex number λ, we try a solution of the form y t λ t. If such a solution exists, it is called a normal mode. Substituting in (8), we find that λ must satisfy the following equation the characteristic equation of (8): Thus, a solution y t* but such a solution converges to zero only if + λ + λ D) 1 λ D κ p xp& 0 (9) λ t exists only for those λ which are roots of the characteristic equation; 1. Because any solution of (8) is a linear combination of normal modes, a sufficient condition for the system (7) to be locally stable is that all roots of (9) have modulus less than unity. Conversely, if any one root of (9) has modulus greater than unity, then the system (7) will be unstable. Our first theorem will state conditions which are essentially necessary and sufficient for the fixed point of the system (7) to be locally stable. The strategy of proof is as follows. e first show that the maximum modulus of the roots of equation (9) is continuous in κ. Then we show that equation (9) has all roots with modulus less than unity for κ near the origin. Finally, we look for the smallest κ such that equation (9) has a root of unit modulus. Lemma 1 Let p λ κ be a polynomial in λ, with coefficients which are continuous functions of κ (where κ may be vector valued). Then the maximum modulus of the roots λ of p λ κ, 0 is continuous in κ. Proof. The roots of any polynomial are continuous functions of the coefficients [8]. If the coefficients are continuous functions of κ, this immediately implies the conclusion of the lemma. - Lemma 2 For sufficiently small κ, equation (9) has all roots with modulus less than unity. Proof. e define the polynomial p λ κ by: p λ κ λ D) 1 λ D κa where a p xp&. 0. Then the characteristic equation (9) is p λ κ 0. hen κ 0, the roots are λ 0 with multiplicity D and λ 1 with multiplicity 1. By direct computation, we find that p/ λ is nonzero at λ 1, κ 0. Thus, we can apply the Implicit Function Theorem to find an 5

6 open interval ε ε and a differentiable complex-valued function g κ such that 1 g 0, and λ g κ satisfies p λ κ 0 0 for ε κ ε. For such κ, differentiating p λ κ 0 0 with respect to κ yields: Evaluating this through at κ around κ 0: D 1 g κ D g& 0 yields g& g κ κ Dg κ D1 1 g& κ a 0 0, a. e take a Taylor series expansion of g κ 1 κa o κ % Thus, as κ increases away from zero, the root λ 1 initially moves approximately as 1 κa, and hence for sufficiently small κ this root will have modulus less than unity. For the root λ 0 of multiplicity D, we note that by taking κ even smaller if necessary, we can appeal to Lemma 1 to ensure that these D roots remain of modulus less than unity as κ increases away from zero. Thus, - for sufficiently small κ, equation (9) has all roots of modulus less than unity. Theorem 3 The system (7) is locally stable if: κ p xp& 2sin 2 2 2D 1 43 and unstable if: κ p xp& 5. 2sin 2 Proof. e can easily check the result for D y t D since the linearized system becomes: 1 κ p xp& $ y t ; so assume D 7 1 for the rest of the proof. By Lemma 1, the maximum modulus of the roots of equation (9) varies continuously with κ. Also we know that the system is locally stable for small κ from Lemma 2. Hence, for the first part of the theorem, it suffices to look for the smallest κ such that equation (9) has a root of unit modulus. Let the root be λ e 2iθ ; then equation (9) may be rewritten as: where a 2sin θe i88 2D) 19 θ1 : 2 κ p xp&. Hence we conclude that: where n is an integer. e choose n 2+ sinθ +; a θ 2 2D 1 is of unit modulus. Hence, substituting for θ in 2+ sinθ +% θ if a 2sin 28 2D) 19. This gives the first part of the theorem. a 2n 2D 1 0 since we are looking for the smallest positive a such that λ a, we see that there are no solutions for 6

7 - For the second part of the theorem, it suffices to prove that there exists a root λ re iθ of modulus r. 1 to equation (9) when a. 2sin θ<%/ 2, where θ<= / 2D 1. From (9), note that 1 aλ 1 D, and that as vectors in the complex plane, the angle between λ and 1 is θ. Thus, λ applying the cosine rule, we have: cosθ 1 r 2 a 2 r 1 2D Further, by equating imaginary parts in (9), we have: r 2r sin Dθ sin $ D 1 θ (10) (11) e know that for a 2sin θ<>/ 2, cosθ<? 1 2 and r 1. Suppose a. 2sin θ<>/ 2. Then the RHS of (10) is less than cosθ< for r 1. Notice that the LHS of (10) decreases from cosθ< to cos / D 1 $ for θ θ<" D) 1. To prove that a root of modulus greater than unity exists, it suffices to show that r increases from 1 to for θ θ<" D) 1 and that the RHS of (10) is increasing in r for r 7 1. From equation (11), dr Dsin $ D 1 θ cos Dθ D 1 cos $ D 1 θ sin Dθ dθ sin 2$ D 1 θ. 0 since sin Dθ. D 1 θ and cos $ D 1 θ A cos Dθ. 0 for θ θ<" D) 1 from 1 to for θ θ< D) 1. Differentiating the RHS of (10) with respect to r gives: d dr (10) 2 r 2 1 a 2 4D 2 a 2 r 1 2D 4r 2. So r increases which shows that the RHS of (10) is increasing in r for r 7 1, tending to r/ 2 when r is large. Thus a root of modulus greater than unity exists for which θ θ<" D) 1 when a. 2sin θ<>/ 2. This proves the second part of the theorem. 2 Rate of convergence: one route, one resource For the simplified case where we have only one resource, we may also study rate of convergence to the stable point. In this section, we consider this problem, via the theory of differential-difference equations. For convenience, we restate here a result due to Hayes [7] taken from Bellman and Cooke ([1], Theorem 13.8). Lemma 4 (Hayes) All the roots of be λ c λe λ parts if and only if: (1) b 1; and (2) b B c DC a 2 1 b2, where a 1 is the root of a that 0 a. If b 0, we take a 1 / , where b and c are real, have negative real btana such

8 e will study the rate of convergence of the system in Figure 1, through the following differentialdifference equation: where D d dt x t κ w x t D p x t D $ ( (12) d 1 d 2. This is just the continuous-time analog of the discrete-time equation (7). e study the stability of this simple system via its linearized version ([1], Theorem 11.2). Let the fixed point be x p where p p x and w xp. Then linearizing with x t' x y t, we obtain: d dt y t κ p xp& y t D % neglecting higher order terms. The corresponding characteristic equation, obtained by substituting y e st, is thus: which after substituting λ s sd, reduces to: κ p xp& e 1 sd κ p xp& D λe λ 0 (13) The fixed point is locally stable if all roots of the above equation have negative real part ([12], Section 9.4). For each D, we are interested in the maximum value of κ such that the system is locally stable. Theorem 5 The system (12) is locally stable if: and unstable if: κ p xp& κ p xp&,. Proof. A direct application of Lemma 4 to equation (13) with b 0 and c κd p xp&e. - Notice that the result from the differential-difference equation approach is just the corresponding discrete-time Theorem 3 with 2sin / 4D 2 $ replaced by / 2D. This is not surprising since the discrete-time system (7) is an approximation to the differential-difference equation (12). Suppose we rewrite equation (7) in the following form: x t 1/ 2 x t 1/ 2" κ w x t 1/ 2 2D 2D D 1/ 2 µ t 1/ 2 d 2 1/ 2 # and let t and D take values in F n/ 2 : n oddg. Then, setting t&a t 1/ 2 and replacing D by D 1/ 2, the bound for Theorem 3 becomes 2sin / 4D, which tends to / 2D as D H. Define a κ p xp&e ; then, from above, the linearization of (12) is: d dt y t 0 ay t D % (14) Suppose the system (14) is stable. Let λ< be the root of equation (13) with the smallest (in modulus) negative real part. Then the rate of convergence to the stable point is equal to + Re λ< + D 1 1. e will investigate how the rate of convergence depends on a in the region of stability 0 2D

9 - Lemma 6 The rate of convergence of the system (14) is monotonic decreasing from D 1 1 to 0 for a ed 1 1 2D 1 1. Proof. Let the root be λ γ δi where γ. 0. Then from equation (13): γe 1 γ cosδ δe 1 γ sin δ ad; (15) γe 1 γ sinδ δe 1 γ cosδ 0 (16) Notice that if γ δ satisfies the above equations, then so does γ δ. Hence, without loss of generality, we may assume that δ 7 0. Equation (15) gives: which on substitution into (16) yields: 2n δ γ δ tanδ (17) sinδ e1 δ: tan δ ad (18) 1 Observe that δ 2n 2 where n JI ) since tan δ 7 0 and sinδ 7 0 from equations (17)- (18). Also, from (17) γ is monotonic decreasing in δ from 1 to 0 for δ 0 / 2. Then the LHS of (18) is monotonic increasing in δ from e 1 1 to / 2 for δ 0 / 2. Hence, a root of equations (17)-(18) exists for δ 0 / 2 which is decreasing in γ as a increases from ed 1 1 to 2D 1 1. It remains to show that this is the root with the smallest γ. Notice that if δ/ sinδ is larger, then γ has to be larger for equation (18) to be satisfied. But δ/ sinδ K / 2 for n 0 and δ/ sin δ. / 2 for n. 0, so taking n 0 yields the root with the smallest γ. Then, since the rate of convergence is γd 1 1 -, we have the required result. Lemma 7 The rate of convergence of the system (14) is monotonic increasing and convex from 0 to D 1 1, and the convergence is nonoscillatory, for a ed 1 1. Proof. Consider the function λe λ when λ is real and negative. Suppose we maximize the function with respect to λ. e have: which equals zero when λ d dλ 0 λe λ 0 e λ λe λ 1, giving a maximum of e 1 1. Moreover, λe λ is increasing in λ for the interval 1 and concave decreasing for L 1 0. The function is shown in Figure 2, from which it is clear that equation (13) has 2 negative roots when a ed 1 1 and 1 negative root when a ed 1 1. Moreover, the modulus of the smaller root (in modulus) increases from 0 to 1 as a increases from 0 to ed 1 1, and is clearly a convex function of a. It remains to show that taking λ to be real yields the root with the smallest (in modulus) negative real part; this will also show that the convergence is nonoscillatory. First note that the modulus of the smaller real root is not greater than 1. Suppose there are complex roots for a K ed 1 1. Then using the same argument as in the proof of Lemma 6, we see that there are no roots for n 0, δ M 0, since the LHS of equation (18) is greater than e 1 1. Also, for n. 0, δ/ sin δ. / 2, so the complex root, if any, will have γ. 1. This completes the proof. e combine the above lemmas into the following theorem. 9

10 ed 1 1. The rate of convergence is monotonic increasing and convex from 0 to D 1 1, and the convergence is nonoscillatory, for a 0 ed 1 1. The rate of convergence is monotonic decreasing from D 1 1 to 0 for a ed 1 1 2D 1 1. In particular, the maximum rate of convergence to the equilibrium point x of (12) is achieved if and only if: Theorem 8 The maximum rate of convergence for the system (14) is D 1 1 when a κ p xp& and in this case, the equilibrium is nonoscillatory. Figure 3 illustrates the result of Theorem 8, showing how the rate of convergence for the system (14) varies with a 0 2D 1 1, the region of stability. Using the analogy from ordinary differential equations, we see that the system is over-damped for 0 a ed 1 1 and under-damped for ed 1 1 a 2D 1 1. The system is critically damped when a ed 1 1, and this also gives the optimal rate of convergence of D 1 1 or time constant of D. Intuitively, this makes sense since D is the roundtrip delay. The result of Theorem 8 has also been shown by Chong et al. [2] using essentially Lemma 4. However, their claim that the rate of convergence is a concave function of gain differs from what is depicted in Figure 3; in fact, by Lemma 7, the rate of convergence is convex for a ed Stability criteria: networks with constant roundtrip delay e wish now to formulate results analagous to those of Section 1 for general networks, i.e., systems described by the equations (4)-(5). The theory for multidimensional delayed difference equations is significantly more complex than in the one-dimensional case, as we shall discover; nonetheless, it is possible to prove a result analogous to Theorem 3 for networks, in the special case where D r D for all r R. e begin, as before, by linearizing the system about the stable point x x r r R, given by (3). For all j J, define p j p j j s x s ; assume that at this point p j is differentiable, and let p& j j s x s. Define y r t by x r t* x r κ 1: r 2 x 1: r 2 y r t ; then since j J A jr p j w r x 1 1, the p&j linearization of (4)-(5) yields: y r t 1N y r t κ r w r x 1 r 1 y r t D r (19) A jr κ 1: r 2 x 1: r 2 A js κ 1: s 2 x 1: 2 s p&jy s t d 1 j s d 2 j r O r R j J s R neglecting higher order terms. Fix λ QP. e now ask the question: does there exist a (possibly complex) vector α α r r R, such that y t* αλ t is a solution to this system of equations? If such an α exists, the solution is a normal mode. As before, local stability results if all normal modes satisfy + λ + 1. Our approach will be to find the conditions under which α exists, such that αλ t is a normal mode. Suppose such an α exists; then, substituting into (19): 1 ed α r λ t) 1 α r λ t κ r w r x 1 r 1 α r λ t1 D r A jr κ 1: r 2 x 1: r 2 A js κ 1: s 2 x 1: s 2 p&j j J s α sλ t1 d 18 jr s9#1 d 2 8 jr r9 r R R 10 0 r

11 T After cancelling λ t throughout, multiplying by λ D r, and applying the definition of D r, we have: λ D r) 1 λ D r αr κ r w r x 1 1 r α r j J s R A jr κ 1: 2 r x 1: 2 r λ d 18 jr r9 A js κ 1: 2 s x 1: 2 s λ 1 d 18 jr s9 p&j α s 0 r R (20) Define the following matrices: κ diag κ r r R ; diag w r r R ; X diag x r r R ; P&* diag p&j j J ; and A λ S A jr λ 1 d 18 jr r9 j J r R. Then we can express (20) as the following matrix equation: T diag λ D r) 1 λ D r r R κx 1 1 κ 1: 2 X 1: 2 A λ 1 1 T P& A λ X 1: 2 κ 1: 2U α 0 But this is possible if and only if the determinant of the matrix premultiplying α is zero, i.e., if and only if the following equation holds: det diag λ D r) 1 λ D r r R κx 1 1 κ 1: 2 X 1: 2 A λ 1 1 T P& A λ X 1: 2 κ 1: 2U 0 (21) The equation (21) is the characteristic equation for the system (19). A normal mode exists only for those λ which are roots of the characteristic equation. If all roots of (21) have modulus less than unity, then the system (19) will be asymptotically stable, and hence the stable point x will be locally stable for the system (4)-(5). e now investigate conditions to control the maximum modulus of the roots of the characteristic equation. e will write p λ κ for the left hand side of (21), to emphasize the changes in the characteristic equation as κ varies. e also make the following definition: C λ κ κ X 1 1 κ 1: 2 X 1: 2 A λ 1 1 T P& A λ X 1: 2 κ 1: 2 e have the following theorem, which gives stability criteria in the situation where D r all r R. D for Theorem 9 Suppose D r D for all r R. The system (4)-(5) is locally stable if the following condition is satisfied for all r R: κ r p j j r p& j x s 2sin 2 j r s: j s Proof. e will divide the proof into five steps. 2 2D 1 43 (22) Step 1. If 0 a 2sin 28 2D) 19, then no roots of λ D) 1 λ D a 0 have modulus equal to unity. This deduction follows from the proof of Theorem 3. Step 2. The maximum modulus of the roots λ of p λ κ 5 from Lemma 1. In fact, a small point of subtlety arises: p λ κ V 0 is continuous in κ. This follows 0 is not immediately a polynomial equation, as it involves terms which are powers of λ 1 1. However, this is easily rectified by multiplying through with a suitably large power of λ. 11

12 [ [ ] ] ] ] ] 0 has no roots of modulus equal to unity. Let κ satisfy the hypotheses of the theorem, and suppose there exists Step 3. Show that for any κ satisfying the hypotheses of the theorem, p λ κ = λ e iθ, 0 K θ K 2, such that p λ κ 0. Since w r x 1 1 r j r A jr p j, + λ +% 1, and all κ r, w r, x r, and p j are nonnegative, the hypotheses of the theorem yield: κ r w r x 1 1 r j J A jr κ r x r p&j sx Y r K κ r κ r κ r A jr λ d 18 jr r9 A js λ 1 d 18 jr s9 x s p&j j J 2sin 2 A jr p j j R p j j r j r 2 2D A jr A js λ d 18 jr r9z1 d 1 8 jr s9 x s p&j + s R j J Although the first line of this computation seems awkward, it is in fact the absolute row sum of row r of the matrix κ X 1 1 A λ 1 1 T P& A λ X. Since the spectral radius of any square matrix is bounded [0\[ by its maximum absolute row sum ([8], Chapter 8), we have the following bound (where denotes spectral radius): C λ κ ] s: j s x s p&j r κ X 1 1 κ 1: 2 X 1: 2 A λ 1 1 T P& A λ X 1: 2 κ 1: 2 ] ] κ X 1 1 κa λ 1 1 T P& A λ X ] ] 2sin 2 2 2D 1 \3 Thus, we can bound the spectral radius of C λ κ in (21). e now make the following observation: if D r Further, as λ D, then the characteristic equation can be written more simply as: det R λ D) 1 λ D I C λ κ 0 (23) e iθ, the matrix C λ κ is Hermitian. It is also positive definite, so we can write ΓΦΓ T C λ κ, where Γ is unitary and Φ diag φ r r R is the diagonal matrix of strictly positive eigenvalues of C λ κ. (Note that both Γ and Φ are dependent on λ and κ, though this has been suppressed in the notation.) By the bound computed above, we know that φ r 2sin 28 2D) 19 for all r R. Since Γ is unitary, we can factor it out of the characteristic equation: det diag λ D) 1 λ D φ r r R 0 But we are now taking the determinant of a diagonal matrix; and so, if λ is a root of unit modulus such that p λ κ 0, we must have: λ D) 1 λ D φ r 0 for φ r satisfying 0 φ r 2sin 28 2D) 19. This contradicts Step 1, and so Step 3 is proven. 12

13 j j Step 4. Show there exists a κ satisfying the hypotheses of the theorem, such that all roots λ of p λ κ = 0 have modulus less than unity. For convenience, we assume that R ^F 1 2$@$_ NG. Define R n `F 1 2@$$_ ng. e denote by p n λ κ, 0 the characteristic equation defined by the subnetwork of routes in R n ; mathematically, this corresponds to replacing C λ κ with the submatrix C λ κ a C λ κ rs r s R n in (23). (Although the number of components in κ may change depending on n, we will suppress this dependence and write κ for the vector of gain parameters, with the number of components understood from context.) The result is proven inductively on n. First suppose that n 1. e have shown in Theorem 3 that there exists a κ 1 satisfying the hypotheses of the theorem for which all roots of p 1 λ κ 0 have modulus less than unity. Now, inductively, assume there exist parameters κ 1 $$$4 κ n1 1 such that all roots λ of p n1 1 λ κ a 0 have modulus less than unity. e consider roots of the equation p n Then note the following relation: p n λ k 0 λ D) 1 λ D p n1 1 λ κ % λ κ a 0. Let k κ κ n This follows by decomposing the determinant which defines p n. Thus, there are a total of nd roots: nd 1 of these roots have modulus less than unity (including λ 0 of multiplicity D), and λ 1 has multiplicity 1. If we can ensure that a small increase in κ n from zero reduces the magnitude of the root λ 1, then an argument exactly analogous to the case n 1 would show that κ n can be chosen such that p n λ κ b 0 has all roots of modulus less than unity for gain parameters κ 1 $$$4 κ n. e proceed by using the Implicit Function Theorem, as before. By expanding the determinant which defines p n, we can write: p n λ κ where q n1 1 is defined by: q n1 1 λ κ det cd d ed λ D) 1 λ D p n1 1 λ κ κ n q n1 1 λ κ ; λ D) 1 λ D fcd d ed 1 $$ $$ $$ 0 0 First we differentiate p n with respect to λ, evaluating at 1 k : λ p n λ κ 8 1R k9. gih h h p n1 1 1 κ % C n λ κ 1 $$@_ κ n1 1 1 Now, since we know that p n1 1 has all roots of modulus less than unity at κ 1 $$@k κ n1 1, we can conclude that p n1 1 1 κ lm 0. So, applying the Implicit Function Theorem, there exists a differentiable complex-valued function h κ n and ε n. 0 such that h 0 5 1, and p n h κ n % κ n, 0 if ε n κ n ε n. As before, we proceed to compute the derivative of h κ n using the implicit definition in p n. Since h 0 0 1, and: h κ n D) 1 h κ n D p n1 1 h κ n ; κ κ n q n1 1 h κ n % κ 0 0 we conclude: h& 0 p n1 1 1 κ q n1 1 1 κ 13 0 gih h h

14 - But p n1 1 1 κ and q n1 1 1 κ are the following determinants: p n1 1 1 κ m det C n1 1 1 κ $ ; and q n1 1 1 κ m det C n 1 κ 1 $$$k κ n1 1 1 $ %. In both cases, these determinants are strictly positive, as they are the determinants of positive definite matrices. Thus, we have h& 0 q n1 1 1 κ $/ p n1 1 1 κ a n, where a n 0. This leads to the following Taylor expansion: h& κ n 1 κ n a n o κ n % So as κ n increases away from zero, the root λ 1 decreases in magnitude. By the same argument as in the proof of Theorem 3, this is sufficient to complete the inductive step: namely, we can choose a κ n satisfying the hypotheses of the theorem, and such that all roots λ of p n λ κ 0 have modulus less than unity. Q.E.D. Now, if we take n N, then p n p, and so we can find a vector κ hypotheses of the theorem such that all roots λ of p λ κ, will denote this κ by κ<. This completes Step 4. κ 1 $@$k κ N satisfying the 0 have modulus less than unity; we Step 5. Completion of proof. Now suppose that, for some κ satisfying the hypotheses of the theorem, p λ κ 0 has a root of modulus greater than unity. Consider the path κ t a tκ<6 1 t κ, for 0 K t K 1. All roots of p λ κ 1 $ V 0 have modulus less than unity by Step 4; so, by Step 2 (continuity of maximum modulus of roots), there exists t such that p λ κ 0 has a root λ of modulus unity, i.e., + λ +" 1. But, since κ t satisfies the hypotheses of the theorem (both κ< and κ satisfy the hypotheses of the theorem, as does any convex combination), this is a contradiction to Step 3. So we conclude that no such κ exists; i.e., for all κ satisfying the hypotheses of the 0 has all roots of modulus less than unity. theorem, p λ κ V The proof of Theorem 9 fails at Step 3 if all D r are not equal; at this point, the determinant defining (21) may not decompose into a product form. The generality in the result given here is that the delays d 1 j r and d 2 j r may be chosen arbitrarily, subject to the constraint that d 1 j r n d 2 j r a D for all j J, r R. Notice that the decomposition of Step 3 works because C λ κ is a Hermitian matrix when + λ + 1; this property is a direct result of the fact that d 1 j r _ d 2 j r n D r for all j J, r R, emphasizing the importance of the roundtrip delay in this analysis. 3.1 Nonadaptive users The simplest extension to the model (4)-(5) is to add users who act at intervals of time significantly longer than the roundtrip delays D r ; in fact, so slowly that their rates appear constant on the timescale of the D r. Intuitively, this is the description of a user with an infinite roundtrip delay : they set their rate, then update it on a time horizon far longer than the update times of most users in the system. e may formalize this model as follows. Suppose that R o R 2, and consider the following 14

15 - model: x r t 1 x r t" κ r w r x r t D r µ j t d 2 j r r ; (24) j r x u t6 x u u R 2 ; (25) where x u. 0 for all u R 2, and: µ j t6 p j x s t d 1 s : j s j s " x v p j J (26) v R 2 : j v The routes in R 2 are nonadaptive: they do not respond to congestion indication signals from the resource. e will show that if D r D for all r, Theorem 9 provides a sufficient stability condition for the system (24)-(26). As before, let x x r r R be the fixed point, with p j p j s R: j s x s and p& j s R: j s x s. Note that these definitions include the routes in both and R 2. e have the following theorem. Theorem 10 Suppose D r D for all r. The system (24)-(26) is locally stable if the following condition is satisfied for all r : κ r p j j r p&j j r x s 2sin 2 s R: j s 2 2D 1 3 (27) Proof. The linearization of the system (24)-(26) is given by (19) for all r R 2, with p j and p& j defined as above. Thus, the exact same proof as used for Theorem 9 goes through to give the result. 3.2 Instantly adaptive users e now consider the situation opposite to Section 3.1: users updating at time intervals significantly shorter than the roundtrip delays D r. e may model such users by assuming they reach equilibrium quickly indeed, instantaneously. Intuitively, this is the description of a user with zero roundtrip delay : equilibrium may be reached instantaneously because there is negligible lag in communication between the network and the user. e formalize the model as follows. Again, let R o R 2, and model the set of users in R 2 by: x u t w u j u µ j t u R 2 (28) The set of users in is modeled as before: x r t 1 x r t κ r w r x r t D r µ j t d 2 j r 15 j r r (29)

16 Finally, µ j t is defined as before, but with the modification that routes in x u t suffer no delay: µ j t6 p j x v t x s t d 1 j s j J (30) v R 2 : j v s : j s The existence and uniqueness of the equilibrium (3), demonstrated in [11], shows the system (28)- (30) is well defined. The routes in R 2 are instantly adaptive: they instantaneously achieve equilibrium given the current state of the network. Thus, they are users who update rates much more quickly than the users in. As before, the system has a unique equilibrium point x x r r R. Then, defining y r t* κ 1 1: r 2 x 1 1: r 2 x r t x r for r, and y u t x u t x u for u R 2, we can linearize to obtain: Let A R1 y r t 1N y r t κ r w r x 1 r 1 y r t D r A jr κ 1: r 2 x 1: r 2 A jv p&j v R 2 j z v t d 2 j r J A jr κ 1: r 2 x 1: r 2 A js κ 1: s 2 x 1: s 2 p&j s j y s t d 1 J y u tq x 2 u w1 1 u A jv A ju p& j v R 2 j y v t J A ju A js κ 1: s 2 x 1: s 2 p& j s j y s t d 1 J j s u j s d 2 R 2 j r O r ; λ n A jr λ 1 d 18 jr r9 j J r, and let A R2 A ju j J u R 2. Let X R1 diag x r r ; similarly, define R1, κ R1, X R2, and R2. e try a solution of the form αλ t. Letting α R1 α r r, α R2 α u u R 2, we have: A T R 2 P& A R2 X 1 R 2 2 R2 α R2 A T R 2 P& A R1 λ X 1: 2 κ 1: 2 α R1 and T diag λ Dr) 1 λ Dr r R2 κr1r1x 1 1 κ 1: 2 X 1: 2 A R1 λ 1 1 T P& A R1 λ X 1: 2 κ 1: 2 U α R1 κ 1: 2 X 1: 2 A R1 λ 1 1 T P& A R2 α R2 After substituting the first equation into the second, we obtain the characteristic equation for (28)- (30): det diag λ D r) 1 λ D r r R1 κ R1 R1 X 1 1 κ 1: 2 X 1: 2 A R1 λ 1 1 T P& A R1 λ X 1: 2 κ 1: 2 κ 1: 2 X 1: 2 A R1 λ 1 1 T P& A R2 A T R 2 P& A R2 X 1 2 R 2 R2 1 1 A T R 2 P& A R1 e make the following definitions: M P& 1: 2 A R2 X R2 1 1: 2 R 2 D λ κ R1 m κ R1 R1 X 1 1 κ 1: 2 X 1: 2 A R1 and λ 1 1 T P& 1: 2 I M I M T M 1 1 M T 16 0 λ X 1: 2 κ 1: 2 0 (31) P& 1: 2 A R1 λ X 1: 2 κ 1: 2

17 [ [ [ [ [ K [ [ [ [ [ { { { [ - Then the characteristic equation reduces to: det diag λ D r) 1 λ D r r R1 D λ κ 0 0 Notice the similar structure of D λ κ R1 and C λ κ ; this allows us to prove the following theorem. Theorem 11 Suppose D r D for all r. The system (28)-(30) is locally stable if the condition (22) is satisfied for all r. Proof. D λ κ R1 is identical in structure to C λ κ, but with P& replaced by P&r 1: 2 I M I M T M 1 1 M T P&s 1: 2 (note the latter matrix is independent of λ). Hence, we may use exactly the same proof as used for Theorem 9; the only difficulty arises in Step 3, where we showed that for κ satisfying the hypotheses of the theorem and λ e iθ, [ C λ κ 2sin 28 2D) 19. e therefore proceed to show that for κ R1 satisfying the hypotheses of the theorem, and λ such that + λ +A 1, D λ κ R1 2sin 28 2D) 19. e first show [ I M I M T M M [ T K 1. Note M is + J +itu+ R+ ; so write M UΣV T, where U is the + J +tv+ J + orthogonal matrix of eigenvectors of MM T, V is the + R+tv+ R+ orthogonal matrix of eigenvectors of M T M, and Σ is the + J +tv+ R+ matrix of singular values of M: Σ $$ i j 0 for i M j, and Σ Σ qq, where q min + J +wi+ R+x. This is the singular value decomposition (SVD) of M [8]. Substituting, and using V T V U T U VV T UU T I, we have: I M I M T M 1 1 M [ T I UΣV T I V Σ T ΣV T 1 1 V Σ T U [ [ T U I ΣV T V I Σ T Σ 1 1 V T V Σ U [ T I Σ I Σ T Σ 1 1 Σ T [ The last expression is the spectral radius of a diagonal matrix, where each entry is of the form 1 Σii/ 2 [ [ K + K [ [ [ Y Y Y Y 1 Σii =K 2 1; hence I M I M T M M T 1. The argument above also shows that I M I M T M M T is positive semidefinite; further, it is symmetric. If λ +y 1, then from the definition of D λ κ R1, we may write D λ κ R1 F G< HG, where F is diagonal and positive definite, H is real diagonal and positive definite with H 1, and C λ κ R1 F G< G. Using the bound for C λ κ R1 from our proof of Theorem 9: D λ κ R1 F G< HG max v:z vz 1{ F G< HG v v max Fv v v:z vz 1{ HGv Gv max Fv v v:z vz 1{ Gv Gv max Fv v G< Gv v v:z vz 1{ C λ κ R1 This completes the proof. 2sin 2 2 2D 1 A3 17

18 [ [ K The results of this subsection and the previous subsection add two extremes of users to the basic result of Theorem 9: those who act much more slowly, and much more quickly, than users with roundtrip delays D r. The result of Theorem 11 is particularly revealing. By showing that D [ λ κ R1 C [ λ κ R1, notice that the system with instantly adaptive users is, loosely, more stable than the basic system (4)-(5). This is to be expected, as instantly adaptive users damp oscillations in the system; in other words, the network is more stable if there are users who back off quickly when congestion increases. 4 Stability criteria: networks with diverse roundtrip delays As was noted above, the condition that D r D for all r R was essential to the proof of Theorem 9. e now wish to investigate extensions to Theorem 9, which remove the condition of constant roundtrip delay. Given the form of the bounds in Theorems 3 and 9, we may make the following conjecture: Conjecture 12 The system (4)-(5) is locally stable if the following condition is satisfied for all r R: κ r p j j r p&j x s 2sin 2 j r s: j s 2 2D r 1 _3 (32) This is just Theorem 9, without the stipulation that D r D for all r R. An immediate question arises: does there exist a counterexample to Conjecture 12? To attempt to answer this question, we generated 10,000 random networks, as follows. A random number of routes, from 1 to 5, and a random number of resources, from 1 to 5, were chosen. A random A matrix was then generated. For each j and r, D r and d 1 j r were randomly generated, with D r between 1 and 15; we then set d 2 j r V d 1 j r D r. Finally, we chose vectors x, p, and p& randomly, and fixed w according to equation (3). This allowed us to compute the critical value of κ r for each r R as predicted by equation (32). e randomly chose κ r to lie in the open interval between 0 and this critical value. For each of these 10,000 networks, we computed the maximum modulus of the roots of the characteristic equation (21). In every instance, the maximum modulus was strictly less than 1, so the network was locally stable. This experiment certainly suggests that Conjecture 12 might be true, and an interesting future research problem concerns finding a formal proof of Conjecture Simulations If we are to implement the stability criteria given here in actual networks, then an obvious question is how well our model of a network approximates that of a real system. Our model uses a fluid flow approximation instead of discrete data packets. Also, queues at the resources are not modeled at all. In this chapter, we will address these concerns through simulations, and compare with our earlier theoretical results. Our simulations involve one resource, modeled as a discrete-time queue, with several users. e will investigate stability of this stochastic system under various roundtrip delays and gain 18

19 parameters, and determine what it means for queueing delays to become negligible. e will then look more closely at instability in the system, revealing the phenomenon of phase-locking. Finally, we will investigate stability when users with different roundtrip delays interact with each other. 5.1 A discrete-time queue with threshold marking e will consider a stochastic model analogous to (4)-(5), with one resource and several users. e wish to model queueing effects, but on a discrete-time scale. The dynamics of such a queueing resource are modeled as: Q t Q t1 1 Y t 1 ) (33) where Q t is the queue length at time t, and Y t is the number of packets which arrive at the queue at time t. The interpretation of the model is as follows. Packets arrive at the queue as a (discrete-time) stochastic process Y 1 Y 2 $$$. At time t, the resource first adds Y t packets (if any) to the queue. If the queue is now nonempty, exactly one packet is served. Notice the similarity of these equations with the analysis of a (continuous-time) M/D/1 queue, examined at time points where individuals leave the queue; in that case, the queue length equation is Q t Q t1 1 1 ) Y t [6]. e will suppose that, for each t, Y t is a Poisson random variable of parameter y 1, independent of the past history of the process. This makes Q t a discrete time Markov chain. e will try to compute an invariant distribution n n 7 0 for this Markov chain. Letting p n ~} Y t n e 1 y y n / n!, we know that must satisfy: 0 p 0 p 1 0 p 0 1 ; 1 p 2 0 p 1 1 p 0 2 ; e may use these equations to calculate the generating function of, H s : H s 0. n s n n 0 0 e 1 y 1 s e1 y8 11 s9 s Since we know that lim s 1 H s 5 1, we conclude that 0 e y 1 y!. 0. This last result also implies that n. 0 for all n 7 0. Thus, Q possesses an invariant distribution, given by the coefficients of the power series of H s. e may interpret the parameter y as the mean number of packets per unit time which arrive at the queue. A simple choice for a congestion indication mechanism is a threshold marking scheme: we mark all arriving packets whenever the queue is at or above a threshold B. The user interprets the number of marks received as an indication of the level of congestion at the resource, and slows the sending rate accordingly. The corresponding congestion indication function p B y in our fluid flow model is just the probability that an arriving packet receives a mark. Suppose the queue is in equilibrium; then we wish to calculate the probability the queue is at or above B, given that a packet arrives: p B y } Q t 7 B+Y t. 0 0 } 19 Q t 7 B 1 B1 1 n ny 0

20 by independence of Q t and Y t. For a fixed value of B, we can compute a closed form expression for p B y by finding the first B terms of the power series for H s. Note that, in the simulations which follow, the queue will not necessarily be at equilibrium; thus, p B y is an approximation to the true marking probability. 5.2 The simulation model e are now ready to describe the model used for simulations. e will consider a set of users R sharing one resource, modeled as a discrete-time queue with threshold marking; let m r t be the number of marks received by user r at time t. e will suppose that each user maintains a sending rate x r t, updated as follows: x r t 1' x r t" κ r w r m r t# (34) At time t, user r generates packets according to a Poisson distribution with mean x r t. These packets suffer a propagation delay of d 1 r before arriving at the resource. At the resource, packets arriving at time t are added to the queue in random order, ensuring that no user receives priority at the queue. The resource then serves exactly one packet, if the queue is nonempty. Each packet returns to its original sender; a packet returning to user r suffers a propagation delay of d 2 r in transmission from the resource to the user. Thus, the marked packets received by user r at time t, m r t, left the resource d 2 r units of time earlier. e still define D r d 1 r n d 2 r ; however, notice that now the observed roundtrip delay consists of the propagation delay D r plus a random queueing delay. The last paragraph makes clear the analogy between our simulation and equations (4)-(5): in the fluid flow approximation, m r t is given by x r t D r µ t d 2 r, which we had described as the number of marks received by user r at time t. e are now explicitly modeling, at the packet level, the congestion indication behavior described by (4)-(5) but we are also adding to this model queueing at the resource. In Theorems 3 and 9, the stability criteria are expressed in terms of the stable point x p p&l. For our simulations, we can fix the stable point in advance. e begin by choosing x r for each user r R; then, given the threshold B, we can explicitly calculate p p B x r from the theory in the last section. Similarly, we can calculate p& p&b x r. (Note this is only sensible as long as x r 1, so the arrival rate does not exceed service capacity.) e then expect the rates to converge to x r at equilibrium, as long as w r x r p for each user. Further, we can use the triple x p p&r to determine the critical gain κ r for each user, from (32). 5.3 Simulation 1: Variance of rates Recall that Theorems 3 and 9 present sufficient conditions for local stability by means of the linearized system (19). In our simulations, however, we have implemented a stochastic model of the nonlinear system (4)-(5). hen the gain becomes large, we know the linearized system may not be stable and hence the nonlinear system is not guaranteed to be locally stable. However, the behavior of the stochastic model used for the simulations is significantly more complex. First, because p y H 1 as y H 1, we do not expect the rates to become arbitrarily large when the system is locally unstable. Instead, local instability of the nonlinear system (4)-(5) 20

21 T U is typically visible as large oscillations in the rates. These oscillations are due to the instability caused by the propagation delay D r. Because the simulations are stochastic, another significant type of instability may be present: a high variance of the rates at equilibrium. It has previously been shown that, for small κ, the variance of the rates scales approximately linearly with κ ([11], Equation 19). For a larger gain κ r, therefore, we expect stochastic fluctuations to increase the spread of the rates at equilibrium. The stochastic effects of modeling queueing at the resource contribute to random variation in the rates. Notice that both unstable behaviors will lead to a high sample variance of the rates x r t. In the first case, large oscillations in the rates will lead to a large variance. In the second case, stochastic fluctuations in the rates will lead to a large variance. Our goal is to investigate the relative importance of these two types of effects for different roundtrip delays D, and therefore better understand the relationship between propagation delay and queueing delay. e simulate 10 users with the same roundtrip delay. e let R ƒf 1$@$_ 10G, and fix D r D for all users. e set x r 0 075, and the threshold B 1. For this threshold, p y 1 e y 1 y, and p& y ye y. e calculate p and p& as described in the last subsection, and let w r x r p for all users. Define κ < D to be the critical gain as given by (32): κ< D 0 2sin p 28 2D) 19 p& r R x r e will investigate stability at six different roundtrip delays: D 100, 500, 1000, 5000, 10000, 50000, with d 1 r b d 2 r a D/ 2 for all r R. For each roundtrip delay, we ran simulations where, for all r R, κ r 0 005κ< D, κ r 0 05κ< D, κ r 0 1κ< κ r 1 25κ< D. Thus, there were a total of 26 simulations for each roundtrip delay D. For each r R, we initialized the rate to zero: x r 0n 0. Each simulation was run for 100D iterations. Over the last 10D iterations, we calculated the sample variance of each rate x r t, σr 2. In Figure 4, we have plotted the average variance for each simulation against the gain parameter κ r, where κ r is expressed as a multiple of κ< D. If the system behaved exactly according to the predictions made in Theorem 9, then we would expect variance to be near zero as long as κ r κ< D. However, for D 100, this is obviously not the case. As D increases, we move closer to the theoretical prediction, until at D the theoretical prediction is fairly accurate. Recall, however, that our fluid flow approximation presumes queueing delays are negligible. In Figure 4 we are observing the effects of modeling both queueing delays and propagation delays. At a short propagation delay D, i.e., D 100, the critical gain κ< D is relatively large. As discussed above, this leads to a high stochastic spread at equilibrium the random queueing delay is not negligible. As κ r increases away from zero, the variance rapidly increases. At first, this increase is primarily due to stochastic fluctuations in the rates. For larger κ, instability due to the propagation delay adds to the variance as well. For larger delays D, however, the critical gain κ< D is relatively small. The smaller gain parameter now averages the queueing behavior over a much longer time interval, and this reduces stochastic fluctuations in the rates. For κ r κ< D, therefore, neither the queueing delay nor the propagation delay are causing a large variance in the rates. As the gain κ r increases past the critical gain κ< D, large oscillations in the rates result. Local instability due to the propagation delay is observed. 21

Martingale Pricing Theory in Discrete-Time and Discrete-Space Models

Martingale Pricing Theory in Discrete-Time and Discrete-Space Models IEOR E4707: Foundations of Financial Engineering c 206 by Martin Haugh Martingale Pricing Theory in Discrete-Time and Discrete-Space Models These notes develop the theory of martingale pricing in a discrete-time,

More information

Revenue Management Under the Markov Chain Choice Model

Revenue Management Under the Markov Chain Choice Model Revenue Management Under the Markov Chain Choice Model Jacob B. Feldman School of Operations Research and Information Engineering, Cornell University, Ithaca, New York 14853, USA jbf232@cornell.edu Huseyin

More information

DRAFT. 1 exercise in state (S, t), π(s, t) = 0 do not exercise in state (S, t) Review of the Risk Neutral Stock Dynamics

DRAFT. 1 exercise in state (S, t), π(s, t) = 0 do not exercise in state (S, t) Review of the Risk Neutral Stock Dynamics Chapter 12 American Put Option Recall that the American option has strike K and maturity T and gives the holder the right to exercise at any time in [0, T ]. The American option is not straightforward

More information

Chapter 9 Dynamic Models of Investment

Chapter 9 Dynamic Models of Investment George Alogoskoufis, Dynamic Macroeconomic Theory, 2015 Chapter 9 Dynamic Models of Investment In this chapter we present the main neoclassical model of investment, under convex adjustment costs. This

More information

Maximizing the Spread of Influence through a Social Network Problem/Motivation: Suppose we want to market a product or promote an idea or behavior in

Maximizing the Spread of Influence through a Social Network Problem/Motivation: Suppose we want to market a product or promote an idea or behavior in Maximizing the Spread of Influence through a Social Network Problem/Motivation: Suppose we want to market a product or promote an idea or behavior in a society. In order to do so, we can target individuals,

More information

Lecture Quantitative Finance Spring Term 2015

Lecture Quantitative Finance Spring Term 2015 implied Lecture Quantitative Finance Spring Term 2015 : May 7, 2015 1 / 28 implied 1 implied 2 / 28 Motivation and setup implied the goal of this chapter is to treat the implied which requires an algorithm

More information

Handout 8: Introduction to Stochastic Dynamic Programming. 2 Examples of Stochastic Dynamic Programming Problems

Handout 8: Introduction to Stochastic Dynamic Programming. 2 Examples of Stochastic Dynamic Programming Problems SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 8: Introduction to Stochastic Dynamic Programming Instructor: Shiqian Ma March 10, 2014 Suggested Reading: Chapter 1 of Bertsekas,

More information

1 The Solow Growth Model

1 The Solow Growth Model 1 The Solow Growth Model The Solow growth model is constructed around 3 building blocks: 1. The aggregate production function: = ( ()) which it is assumed to satisfy a series of technical conditions: (a)

More information

Advanced Topics in Derivative Pricing Models. Topic 4 - Variance products and volatility derivatives

Advanced Topics in Derivative Pricing Models. Topic 4 - Variance products and volatility derivatives Advanced Topics in Derivative Pricing Models Topic 4 - Variance products and volatility derivatives 4.1 Volatility trading and replication of variance swaps 4.2 Volatility swaps 4.3 Pricing of discrete

More information

4 Reinforcement Learning Basic Algorithms

4 Reinforcement Learning Basic Algorithms Learning in Complex Systems Spring 2011 Lecture Notes Nahum Shimkin 4 Reinforcement Learning Basic Algorithms 4.1 Introduction RL methods essentially deal with the solution of (optimal) control problems

More information

Chapter 5 Finite Difference Methods. Math6911 W07, HM Zhu

Chapter 5 Finite Difference Methods. Math6911 W07, HM Zhu Chapter 5 Finite Difference Methods Math69 W07, HM Zhu References. Chapters 5 and 9, Brandimarte. Section 7.8, Hull 3. Chapter 7, Numerical analysis, Burden and Faires Outline Finite difference (FD) approximation

More information

4: SINGLE-PERIOD MARKET MODELS

4: SINGLE-PERIOD MARKET MODELS 4: SINGLE-PERIOD MARKET MODELS Marek Rutkowski School of Mathematics and Statistics University of Sydney Semester 2, 2016 M. Rutkowski (USydney) Slides 4: Single-Period Market Models 1 / 87 General Single-Period

More information

Asymmetric Information: Walrasian Equilibria, and Rational Expectations Equilibria

Asymmetric Information: Walrasian Equilibria, and Rational Expectations Equilibria Asymmetric Information: Walrasian Equilibria and Rational Expectations Equilibria 1 Basic Setup Two periods: 0 and 1 One riskless asset with interest rate r One risky asset which pays a normally distributed

More information

Final exam solutions

Final exam solutions EE365 Stochastic Control / MS&E251 Stochastic Decision Models Profs. S. Lall, S. Boyd June 5 6 or June 6 7, 2013 Final exam solutions This is a 24 hour take-home final. Please turn it in to one of the

More information

Characterization of the Optimum

Characterization of the Optimum ECO 317 Economics of Uncertainty Fall Term 2009 Notes for lectures 5. Portfolio Allocation with One Riskless, One Risky Asset Characterization of the Optimum Consider a risk-averse, expected-utility-maximizing

More information

,,, be any other strategy for selling items. It yields no more revenue than, based on the

,,, be any other strategy for selling items. It yields no more revenue than, based on the ONLINE SUPPLEMENT Appendix 1: Proofs for all Propositions and Corollaries Proof of Proposition 1 Proposition 1: For all 1,2,,, if, is a non-increasing function with respect to (henceforth referred to as

More information

Lecture 7: Bayesian approach to MAB - Gittins index

Lecture 7: Bayesian approach to MAB - Gittins index Advanced Topics in Machine Learning and Algorithmic Game Theory Lecture 7: Bayesian approach to MAB - Gittins index Lecturer: Yishay Mansour Scribe: Mariano Schain 7.1 Introduction In the Bayesian approach

More information

Pricing Dynamic Solvency Insurance and Investment Fund Protection

Pricing Dynamic Solvency Insurance and Investment Fund Protection Pricing Dynamic Solvency Insurance and Investment Fund Protection Hans U. Gerber and Gérard Pafumi Switzerland Abstract In the first part of the paper the surplus of a company is modelled by a Wiener process.

More information

The Value of Information in Central-Place Foraging. Research Report

The Value of Information in Central-Place Foraging. Research Report The Value of Information in Central-Place Foraging. Research Report E. J. Collins A. I. Houston J. M. McNamara 22 February 2006 Abstract We consider a central place forager with two qualitatively different

More information

Random Variables and Probability Distributions

Random Variables and Probability Distributions Chapter 3 Random Variables and Probability Distributions Chapter Three Random Variables and Probability Distributions 3. Introduction An event is defined as the possible outcome of an experiment. In engineering

More information

Essays on Some Combinatorial Optimization Problems with Interval Data

Essays on Some Combinatorial Optimization Problems with Interval Data Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university

More information

Lecture 5: Iterative Combinatorial Auctions

Lecture 5: Iterative Combinatorial Auctions COMS 6998-3: Algorithmic Game Theory October 6, 2008 Lecture 5: Iterative Combinatorial Auctions Lecturer: Sébastien Lahaie Scribe: Sébastien Lahaie In this lecture we examine a procedure that generalizes

More information

A No-Arbitrage Theorem for Uncertain Stock Model

A No-Arbitrage Theorem for Uncertain Stock Model Fuzzy Optim Decis Making manuscript No (will be inserted by the editor) A No-Arbitrage Theorem for Uncertain Stock Model Kai Yao Received: date / Accepted: date Abstract Stock model is used to describe

More information

Online Appendix: Extensions

Online Appendix: Extensions B Online Appendix: Extensions In this online appendix we demonstrate that many important variations of the exact cost-basis LUL framework remain tractable. In particular, dual problem instances corresponding

More information

A Decentralized Learning Equilibrium

A Decentralized Learning Equilibrium Paper to be presented at the DRUID Society Conference 2014, CBS, Copenhagen, June 16-18 A Decentralized Learning Equilibrium Andreas Blume University of Arizona Economics ablume@email.arizona.edu April

More information

Practical example of an Economic Scenario Generator

Practical example of an Economic Scenario Generator Practical example of an Economic Scenario Generator Martin Schenk Actuarial & Insurance Solutions SAV 7 March 2014 Agenda Introduction Deterministic vs. stochastic approach Mathematical model Application

More information

THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE

THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE GÜNTER ROTE Abstract. A salesperson wants to visit each of n objects that move on a line at given constant speeds in the shortest possible time,

More information

13.3 A Stochastic Production Planning Model

13.3 A Stochastic Production Planning Model 13.3. A Stochastic Production Planning Model 347 From (13.9), we can formally write (dx t ) = f (dt) + G (dz t ) + fgdz t dt, (13.3) dx t dt = f(dt) + Gdz t dt. (13.33) The exact meaning of these expressions

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter Microeconomics of Consumer Theory The two broad categories of decision-makers in an economy are consumers and firms. Each individual in each of these groups makes its decisions in order to achieve

More information

IEOR E4703: Monte-Carlo Simulation

IEOR E4703: Monte-Carlo Simulation IEOR E4703: Monte-Carlo Simulation Simulating Stochastic Differential Equations Martin Haugh Department of Industrial Engineering and Operations Research Columbia University Email: martin.b.haugh@gmail.com

More information

Socially-Optimal Design of Crowdsourcing Platforms with Reputation Update Errors

Socially-Optimal Design of Crowdsourcing Platforms with Reputation Update Errors Socially-Optimal Design of Crowdsourcing Platforms with Reputation Update Errors 1 Yuanzhang Xiao, Yu Zhang, and Mihaela van der Schaar Abstract Crowdsourcing systems (e.g. Yahoo! Answers and Amazon Mechanical

More information

An Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking

An Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking An Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking Mika Sumida School of Operations Research and Information Engineering, Cornell University, Ithaca, New York

More information

A class of coherent risk measures based on one-sided moments

A class of coherent risk measures based on one-sided moments A class of coherent risk measures based on one-sided moments T. Fischer Darmstadt University of Technology November 11, 2003 Abstract This brief paper explains how to obtain upper boundaries of shortfall

More information

Self-organized criticality on the stock market

Self-organized criticality on the stock market Prague, January 5th, 2014. Some classical ecomomic theory In classical economic theory, the price of a commodity is determined by demand and supply. Let D(p) (resp. S(p)) be the total demand (resp. supply)

More information

Economics 2010c: Lecture 4 Precautionary Savings and Liquidity Constraints

Economics 2010c: Lecture 4 Precautionary Savings and Liquidity Constraints Economics 2010c: Lecture 4 Precautionary Savings and Liquidity Constraints David Laibson 9/11/2014 Outline: 1. Precautionary savings motives 2. Liquidity constraints 3. Application: Numerical solution

More information

ELEMENTS OF MATRIX MATHEMATICS

ELEMENTS OF MATRIX MATHEMATICS QRMC07 9/7/0 4:45 PM Page 5 CHAPTER SEVEN ELEMENTS OF MATRIX MATHEMATICS 7. AN INTRODUCTION TO MATRICES Investors frequently encounter situations involving numerous potential outcomes, many discrete periods

More information

1 Dynamic programming

1 Dynamic programming 1 Dynamic programming A country has just discovered a natural resource which yields an income per period R measured in terms of traded goods. The cost of exploitation is negligible. The government wants

More information

EC316a: Advanced Scientific Computation, Fall Discrete time, continuous state dynamic models: solution methods

EC316a: Advanced Scientific Computation, Fall Discrete time, continuous state dynamic models: solution methods EC316a: Advanced Scientific Computation, Fall 2003 Notes Section 4 Discrete time, continuous state dynamic models: solution methods We consider now solution methods for discrete time models in which decisions

More information

Online Appendix (Not intended for Publication): Federal Reserve Credibility and the Term Structure of Interest Rates

Online Appendix (Not intended for Publication): Federal Reserve Credibility and the Term Structure of Interest Rates Online Appendix Not intended for Publication): Federal Reserve Credibility and the Term Structure of Interest Rates Aeimit Lakdawala Michigan State University Shu Wu University of Kansas August 2017 1

More information

THE current Internet is used by a widely heterogeneous

THE current Internet is used by a widely heterogeneous 1712 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 11, NOVEMBER 2005 Efficiency Loss in a Network Resource Allocation Game: The Case of Elastic Supply Ramesh Johari, Member, IEEE, Shie Mannor, Member,

More information

STOCHASTIC CALCULUS AND BLACK-SCHOLES MODEL

STOCHASTIC CALCULUS AND BLACK-SCHOLES MODEL STOCHASTIC CALCULUS AND BLACK-SCHOLES MODEL YOUNGGEUN YOO Abstract. Ito s lemma is often used in Ito calculus to find the differentials of a stochastic process that depends on time. This paper will introduce

More information

Dynamic Portfolio Execution Detailed Proofs

Dynamic Portfolio Execution Detailed Proofs Dynamic Portfolio Execution Detailed Proofs Gerry Tsoukalas, Jiang Wang, Kay Giesecke March 16, 2014 1 Proofs Lemma 1 (Temporary Price Impact) A buy order of size x being executed against i s ask-side

More information

Financial Econometrics

Financial Econometrics Financial Econometrics Volatility Gerald P. Dwyer Trinity College, Dublin January 2013 GPD (TCD) Volatility 01/13 1 / 37 Squared log returns for CRSP daily GPD (TCD) Volatility 01/13 2 / 37 Absolute value

More information

1102 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 3, MARCH Genyuan Wang and Xiang-Gen Xia, Senior Member, IEEE

1102 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 3, MARCH Genyuan Wang and Xiang-Gen Xia, Senior Member, IEEE 1102 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 51, NO 3, MARCH 2005 On Optimal Multilayer Cyclotomic Space Time Code Designs Genyuan Wang Xiang-Gen Xia, Senior Member, IEEE Abstract High rate large

More information

Online Appendix Optimal Time-Consistent Government Debt Maturity D. Debortoli, R. Nunes, P. Yared. A. Proofs

Online Appendix Optimal Time-Consistent Government Debt Maturity D. Debortoli, R. Nunes, P. Yared. A. Proofs Online Appendi Optimal Time-Consistent Government Debt Maturity D. Debortoli, R. Nunes, P. Yared A. Proofs Proof of Proposition 1 The necessity of these conditions is proved in the tet. To prove sufficiency,

More information

Lecture 17: More on Markov Decision Processes. Reinforcement learning

Lecture 17: More on Markov Decision Processes. Reinforcement learning Lecture 17: More on Markov Decision Processes. Reinforcement learning Learning a model: maximum likelihood Learning a value function directly Monte Carlo Temporal-difference (TD) learning COMP-424, Lecture

More information

A Comparison Of Stochastic Systems With Different Types Of Delays

A Comparison Of Stochastic Systems With Different Types Of Delays A omparison Of Stochastic Systems With Different Types Of Delays H.T. Banks, Jared atenacci and Shuhua Hu enter for Research in Scientific omputation, North arolina State University Raleigh, N 27695-8212

More information

KIER DISCUSSION PAPER SERIES

KIER DISCUSSION PAPER SERIES KIER DISCUSSION PAPER SERIES KYOTO INSTITUTE OF ECONOMIC RESEARCH http://www.kier.kyoto-u.ac.jp/index.html Discussion Paper No. 657 The Buy Price in Auctions with Discrete Type Distributions Yusuke Inami

More information

SHORT-TERM RELATIVE ARBITRAGE IN VOLATILITY-STABILIZED MARKETS

SHORT-TERM RELATIVE ARBITRAGE IN VOLATILITY-STABILIZED MARKETS SHORT-TERM RELATIVE ARBITRAGE IN VOLATILITY-STABILIZED MARKETS ADRIAN D. BANNER INTECH One Palmer Square Princeton, NJ 8542, USA adrian@enhanced.com DANIEL FERNHOLZ Department of Computer Sciences University

More information

3.2 No-arbitrage theory and risk neutral probability measure

3.2 No-arbitrage theory and risk neutral probability measure Mathematical Models in Economics and Finance Topic 3 Fundamental theorem of asset pricing 3.1 Law of one price and Arrow securities 3.2 No-arbitrage theory and risk neutral probability measure 3.3 Valuation

More information

1 Answers to the Sept 08 macro prelim - Long Questions

1 Answers to the Sept 08 macro prelim - Long Questions Answers to the Sept 08 macro prelim - Long Questions. Suppose that a representative consumer receives an endowment of a non-storable consumption good. The endowment evolves exogenously according to ln

More information

Competitive Market Model

Competitive Market Model 57 Chapter 5 Competitive Market Model The competitive market model serves as the basis for the two different multi-user allocation methods presented in this thesis. This market model prices resources based

More information

On Existence of Equilibria. Bayesian Allocation-Mechanisms

On Existence of Equilibria. Bayesian Allocation-Mechanisms On Existence of Equilibria in Bayesian Allocation Mechanisms Northwestern University April 23, 2014 Bayesian Allocation Mechanisms In allocation mechanisms, agents choose messages. The messages determine

More information

1 Consumption and saving under uncertainty

1 Consumption and saving under uncertainty 1 Consumption and saving under uncertainty 1.1 Modelling uncertainty As in the deterministic case, we keep assuming that agents live for two periods. The novelty here is that their earnings in the second

More information

Department of Mathematics. Mathematics of Financial Derivatives

Department of Mathematics. Mathematics of Financial Derivatives Department of Mathematics MA408 Mathematics of Financial Derivatives Thursday 15th January, 2009 2pm 4pm Duration: 2 hours Attempt THREE questions MA408 Page 1 of 5 1. (a) Suppose 0 < E 1 < E 3 and E 2

More information

Efficiency and Herd Behavior in a Signalling Market. Jeffrey Gao

Efficiency and Herd Behavior in a Signalling Market. Jeffrey Gao Efficiency and Herd Behavior in a Signalling Market Jeffrey Gao ABSTRACT This paper extends a model of herd behavior developed by Bikhchandani and Sharma (000) to establish conditions for varying levels

More information

1 Appendix A: Definition of equilibrium

1 Appendix A: Definition of equilibrium Online Appendix to Partnerships versus Corporations: Moral Hazard, Sorting and Ownership Structure Ayca Kaya and Galina Vereshchagina Appendix A formally defines an equilibrium in our model, Appendix B

More information

Dynamic Replication of Non-Maturing Assets and Liabilities

Dynamic Replication of Non-Maturing Assets and Liabilities Dynamic Replication of Non-Maturing Assets and Liabilities Michael Schürle Institute for Operations Research and Computational Finance, University of St. Gallen, Bodanstr. 6, CH-9000 St. Gallen, Switzerland

More information

Problem 1: Random variables, common distributions and the monopoly price

Problem 1: Random variables, common distributions and the monopoly price Problem 1: Random variables, common distributions and the monopoly price In this problem, we will revise some basic concepts in probability, and use these to better understand the monopoly price (alternatively

More information

Part 3: Trust-region methods for unconstrained optimization. Nick Gould (RAL)

Part 3: Trust-region methods for unconstrained optimization. Nick Gould (RAL) Part 3: Trust-region methods for unconstrained optimization Nick Gould (RAL) minimize x IR n f(x) MSc course on nonlinear optimization UNCONSTRAINED MINIMIZATION minimize x IR n f(x) where the objective

More information

Log-linear Dynamics and Local Potential

Log-linear Dynamics and Local Potential Log-linear Dynamics and Local Potential Daijiro Okada and Olivier Tercieux [This version: November 28, 2008] Abstract We show that local potential maximizer ([15]) with constant weights is stochastically

More information

Stochastic Programming and Financial Analysis IE447. Midterm Review. Dr. Ted Ralphs

Stochastic Programming and Financial Analysis IE447. Midterm Review. Dr. Ted Ralphs Stochastic Programming and Financial Analysis IE447 Midterm Review Dr. Ted Ralphs IE447 Midterm Review 1 Forming a Mathematical Programming Model The general form of a mathematical programming model is:

More information

A Game Theoretic Approach to Promotion Design in Two-Sided Platforms

A Game Theoretic Approach to Promotion Design in Two-Sided Platforms A Game Theoretic Approach to Promotion Design in Two-Sided Platforms Amir Ajorlou Ali Jadbabaie Institute for Data, Systems, and Society Massachusetts Institute of Technology (MIT) Allerton Conference,

More information

17 MAKING COMPLEX DECISIONS

17 MAKING COMPLEX DECISIONS 267 17 MAKING COMPLEX DECISIONS The agent s utility now depends on a sequence of decisions In the following 4 3grid environment the agent makes a decision to move (U, R, D, L) at each time step When the

More information

Week 2 Quantitative Analysis of Financial Markets Hypothesis Testing and Confidence Intervals

Week 2 Quantitative Analysis of Financial Markets Hypothesis Testing and Confidence Intervals Week 2 Quantitative Analysis of Financial Markets Hypothesis Testing and Confidence Intervals Christopher Ting http://www.mysmu.edu/faculty/christophert/ Christopher Ting : christopherting@smu.edu.sg :

More information

Handout 4: Deterministic Systems and the Shortest Path Problem

Handout 4: Deterministic Systems and the Shortest Path Problem SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas

More information

Chapter 7: Portfolio Theory

Chapter 7: Portfolio Theory Chapter 7: Portfolio Theory 1. Introduction 2. Portfolio Basics 3. The Feasible Set 4. Portfolio Selection Rules 5. The Efficient Frontier 6. Indifference Curves 7. The Two-Asset Portfolio 8. Unrestriceted

More information

Modelling Returns: the CER and the CAPM

Modelling Returns: the CER and the CAPM Modelling Returns: the CER and the CAPM Carlo Favero Favero () Modelling Returns: the CER and the CAPM 1 / 20 Econometric Modelling of Financial Returns Financial data are mostly observational data: they

More information

LECTURE 2: MULTIPERIOD MODELS AND TREES

LECTURE 2: MULTIPERIOD MODELS AND TREES LECTURE 2: MULTIPERIOD MODELS AND TREES 1. Introduction One-period models, which were the subject of Lecture 1, are of limited usefulness in the pricing and hedging of derivative securities. In real-world

More information

A new PDE-based approach for construction scheduling and resource allocation. Paul Gabet, Julien Nachef CE 291F Project Presentation Spring 2014

A new PDE-based approach for construction scheduling and resource allocation. Paul Gabet, Julien Nachef CE 291F Project Presentation Spring 2014 A new PDE-based approach for construction scheduling and resource allocation Paul Gabet, Julien Nachef CE 291F Project Presentation Spring 2014 Problem Statement What is the schedule of a project? A chronological

More information

A THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES

A THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES Proceedings of ALGORITMY 01 pp. 95 104 A THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES BEÁTA STEHLÍKOVÁ AND ZUZANA ZÍKOVÁ Abstract. A convergence model of interest rates explains the evolution of the

More information

Problem 1: Random variables, common distributions and the monopoly price

Problem 1: Random variables, common distributions and the monopoly price Problem 1: Random variables, common distributions and the monopoly price In this problem, we will revise some basic concepts in probability, and use these to better understand the monopoly price (alternatively

More information

STOCHASTIC REPUTATION DYNAMICS UNDER DUOPOLY COMPETITION

STOCHASTIC REPUTATION DYNAMICS UNDER DUOPOLY COMPETITION STOCHASTIC REPUTATION DYNAMICS UNDER DUOPOLY COMPETITION BINGCHAO HUANGFU Abstract This paper studies a dynamic duopoly model of reputation-building in which reputations are treated as capital stocks that

More information

Constrained Sequential Resource Allocation and Guessing Games

Constrained Sequential Resource Allocation and Guessing Games 4946 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 11, NOVEMBER 2008 Constrained Sequential Resource Allocation and Guessing Games Nicholas B. Chang and Mingyan Liu, Member, IEEE Abstract In this

More information

Information Acquisition under Persuasive Precedent versus Binding Precedent (Preliminary and Incomplete)

Information Acquisition under Persuasive Precedent versus Binding Precedent (Preliminary and Incomplete) Information Acquisition under Persuasive Precedent versus Binding Precedent (Preliminary and Incomplete) Ying Chen Hülya Eraslan March 25, 2016 Abstract We analyze a dynamic model of judicial decision

More information

1 Shapley-Shubik Model

1 Shapley-Shubik Model 1 Shapley-Shubik Model There is a set of buyers B and a set of sellers S each selling one unit of a good (could be divisible or not). Let v ij 0 be the monetary value that buyer j B assigns to seller i

More information

IEOR E4602: Quantitative Risk Management

IEOR E4602: Quantitative Risk Management IEOR E4602: Quantitative Risk Management Risk Measures Martin Haugh Department of Industrial Engineering and Operations Research Columbia University Email: martin.b.haugh@gmail.com Reference: Chapter 8

More information

The Stigler-Luckock model with market makers

The Stigler-Luckock model with market makers Prague, January 7th, 2017. Order book Nowadays, demand and supply is often realized by electronic trading systems storing the information in databases. Traders with access to these databases quote their

More information

Optimal Dam Management

Optimal Dam Management Optimal Dam Management Michel De Lara et Vincent Leclère July 3, 2012 Contents 1 Problem statement 1 1.1 Dam dynamics.................................. 2 1.2 Intertemporal payoff criterion..........................

More information

Bonus-malus systems 6.1 INTRODUCTION

Bonus-malus systems 6.1 INTRODUCTION 6 Bonus-malus systems 6.1 INTRODUCTION This chapter deals with the theory behind bonus-malus methods for automobile insurance. This is an important branch of non-life insurance, in many countries even

More information

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017 Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017 The time limit for this exam is four hours. The exam has four sections. Each section includes two questions.

More information

Targeting Nominal GDP or Prices: Expectation Dynamics and the Interest Rate Lower Bound

Targeting Nominal GDP or Prices: Expectation Dynamics and the Interest Rate Lower Bound Targeting Nominal GDP or Prices: Expectation Dynamics and the Interest Rate Lower Bound Seppo Honkapohja, Bank of Finland Kaushik Mitra, University of Saint Andrews April 22, 2013; preliminary, please

More information

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2017

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2017 ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2017 These notes have been used and commented on before. If you can still spot any errors or have any suggestions for improvement, please

More information

Markets Do Not Select For a Liquidity Preference as Behavior Towards Risk

Markets Do Not Select For a Liquidity Preference as Behavior Towards Risk Markets Do Not Select For a Liquidity Preference as Behavior Towards Risk Thorsten Hens a Klaus Reiner Schenk-Hoppé b October 4, 003 Abstract Tobin 958 has argued that in the face of potential capital

More information

CHOICE THEORY, UTILITY FUNCTIONS AND RISK AVERSION

CHOICE THEORY, UTILITY FUNCTIONS AND RISK AVERSION CHOICE THEORY, UTILITY FUNCTIONS AND RISK AVERSION Szabolcs Sebestyén szabolcs.sebestyen@iscte.pt Master in Finance INVESTMENTS Sebestyén (ISCTE-IUL) Choice Theory Investments 1 / 65 Outline 1 An Introduction

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Learning MDP March May, 2013 MDP MDP: S, A, P, R, γ, µ State can be partially observable: Partially Observable MDPs () Actions can be temporally extended: Semi MDPs (SMDPs) and Hierarchical

More information

Log-Robust Portfolio Management

Log-Robust Portfolio Management Log-Robust Portfolio Management Dr. Aurélie Thiele Lehigh University Joint work with Elcin Cetinkaya and Ban Kawas Research partially supported by the National Science Foundation Grant CMMI-0757983 Dr.

More information

Inter-Session Network Coding with Strategic Users: A Game-Theoretic Analysis of Network Coding

Inter-Session Network Coding with Strategic Users: A Game-Theoretic Analysis of Network Coding Inter-Session Network Coding with Strategic Users: A Game-Theoretic Analysis of Network Coding Amir-Hamed Mohsenian-Rad, Jianwei Huang, Vincent W.S. Wong, Sidharth Jaggi, and Robert Schober arxiv:0904.91v1

More information

Antino Kim Kelley School of Business, Indiana University, Bloomington Bloomington, IN 47405, U.S.A.

Antino Kim Kelley School of Business, Indiana University, Bloomington Bloomington, IN 47405, U.S.A. THE INVISIBLE HAND OF PIRACY: AN ECONOMIC ANALYSIS OF THE INFORMATION-GOODS SUPPLY CHAIN Antino Kim Kelley School of Business, Indiana University, Bloomington Bloomington, IN 47405, U.S.A. {antino@iu.edu}

More information

Square-Root Measurement for Ternary Coherent State Signal

Square-Root Measurement for Ternary Coherent State Signal ISSN 86-657 Square-Root Measurement for Ternary Coherent State Signal Kentaro Kato Quantum ICT Research Institute, Tamagawa University 6-- Tamagawa-gakuen, Machida, Tokyo 9-86, Japan Tamagawa University

More information

Online Appendix for Military Mobilization and Commitment Problems

Online Appendix for Military Mobilization and Commitment Problems Online Appendix for Military Mobilization and Commitment Problems Ahmer Tarar Department of Political Science Texas A&M University 4348 TAMU College Station, TX 77843-4348 email: ahmertarar@pols.tamu.edu

More information

Liquidity and Risk Management

Liquidity and Risk Management Liquidity and Risk Management By Nicolae Gârleanu and Lasse Heje Pedersen Risk management plays a central role in institutional investors allocation of capital to trading. For instance, a risk manager

More information

The Fixed Income Valuation Course. Sanjay K. Nawalkha Gloria M. Soto Natalia A. Beliaeva

The Fixed Income Valuation Course. Sanjay K. Nawalkha Gloria M. Soto Natalia A. Beliaeva Interest Rate Risk Modeling The Fixed Income Valuation Course Sanjay K. Nawalkha Gloria M. Soto Natalia A. Beliaeva Interest t Rate Risk Modeling : The Fixed Income Valuation Course. Sanjay K. Nawalkha,

More information

Applications of Good s Generalized Diversity Index. A. J. Baczkowski Department of Statistics, University of Leeds Leeds LS2 9JT, UK

Applications of Good s Generalized Diversity Index. A. J. Baczkowski Department of Statistics, University of Leeds Leeds LS2 9JT, UK Applications of Good s Generalized Diversity Index A. J. Baczkowski Department of Statistics, University of Leeds Leeds LS2 9JT, UK Internal Report STAT 98/11 September 1998 Applications of Good s Generalized

More information

Haiyang Feng College of Management and Economics, Tianjin University, Tianjin , CHINA

Haiyang Feng College of Management and Economics, Tianjin University, Tianjin , CHINA RESEARCH ARTICLE QUALITY, PRICING, AND RELEASE TIME: OPTIMAL MARKET ENTRY STRATEGY FOR SOFTWARE-AS-A-SERVICE VENDORS Haiyang Feng College of Management and Economics, Tianjin University, Tianjin 300072,

More information

Casino gambling problem under probability weighting

Casino gambling problem under probability weighting Casino gambling problem under probability weighting Sang Hu National University of Singapore Mathematical Finance Colloquium University of Southern California Jan 25, 2016 Based on joint work with Xue

More information

Approximate Revenue Maximization with Multiple Items

Approximate Revenue Maximization with Multiple Items Approximate Revenue Maximization with Multiple Items Nir Shabbat - 05305311 December 5, 2012 Introduction The paper I read is called Approximate Revenue Maximization with Multiple Items by Sergiu Hart

More information

THE OPTIMAL ASSET ALLOCATION PROBLEMFOR AN INVESTOR THROUGH UTILITY MAXIMIZATION

THE OPTIMAL ASSET ALLOCATION PROBLEMFOR AN INVESTOR THROUGH UTILITY MAXIMIZATION THE OPTIMAL ASSET ALLOCATION PROBLEMFOR AN INVESTOR THROUGH UTILITY MAXIMIZATION SILAS A. IHEDIOHA 1, BRIGHT O. OSU 2 1 Department of Mathematics, Plateau State University, Bokkos, P. M. B. 2012, Jos,

More information

Smooth pasting as rate of return equalisation: A note

Smooth pasting as rate of return equalisation: A note mooth pasting as rate of return equalisation: A note Mark hackleton & igbjørn ødal May 2004 Abstract In this short paper we further elucidate the smooth pasting condition that is behind the optimal early

More information

Course notes for EE394V Restructured Electricity Markets: Locational Marginal Pricing

Course notes for EE394V Restructured Electricity Markets: Locational Marginal Pricing Course notes for EE394V Restructured Electricity Markets: Locational Marginal Pricing Ross Baldick Copyright c 2018 Ross Baldick www.ece.utexas.edu/ baldick/classes/394v/ee394v.html Title Page 1 of 160

More information