2019
DOI: 10.1016/j.peva.2019.102039
|View full text |Cite
|
Sign up to set email alerts
|

Diffusion limits for networks of Markov-modulated infinite-server queues

Abstract: This paper studies the diffusion limit for a network of infinite-server queues operating under Markov modulation (meaning that the system's parameters depend on an autonomously evolving background process). In previous papers on (primarily single-node) queues with Markov modulation, two variants were distinguished: one in which the server speed is modulated, and one in which the service requirement is modulated (i.e., depends on the state of the background process upon arrival). The setup of the present paper,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
27
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(28 citation statements)
references
References 26 publications
1
27
0
Order By: Relevance
“…the discussion above (25). This is likely to carry over to the modulated setting of Remark 5.4, when also speeding up the background process, in line with results found for networks of modulated infinite-server queues in [18,56]. In more general terms, it would also be interesting to further explore the relationship between linear stochastic fluid networks and infinite-server queueing networks; see already, for example, [49,66].…”
Section: Linear Stochastic Fluid Networksupporting
confidence: 71%
“…the discussion above (25). This is likely to carry over to the modulated setting of Remark 5.4, when also speeding up the background process, in line with results found for networks of modulated infinite-server queues in [18,56]. In more general terms, it would also be interesting to further explore the relationship between linear stochastic fluid networks and infinite-server queueing networks; see already, for example, [49,66].…”
Section: Linear Stochastic Fluid Networksupporting
confidence: 71%
“…by the boundedness of f , [1,Proposition 3.2] and [17,Theorem 5.2]. Thus, we can replace 1(J n (s) = k) by π k for all k ∈ K in (4.9), when we let (n, T ) → ∞.…”
Section: 3mentioning
confidence: 99%
“…The system operates in the "averaged" Halfin-Whitt (H-W) regime, namely, it is critically loaded in an average sense, but it may be underloaded or overloaded for a given state of the environment. This situation is different from the standard H-W regime for many-server queues, which requires that the system is critically loaded as the arrival rates and number of servers get large; see, e.g., [2,7,16,17]. policies, i.e., work-conserving and non-preemptive polices.…”
Section: Introductionmentioning
confidence: 96%
See 1 more Smart Citation
“…. , n. As shown in [18,Section 3], this (·) can be considered the fluid limit [29] corresponding to M (N ) (·).…”
Section: Scaling Limit: Functional Central Limit Theoremmentioning
confidence: 99%