A Comparison of Fair Sharing Algorithms for Regulating Search as a Service API

2021 ◽  
Vol 8 (6) ◽  
pp. 16-34
Author(s):  
Sikha Bagui ◽  
Evorell Fridge

Providers of a Search as a Service (SaaS) environment must ensure that their users will not monopolize the service or use more than their fair share of resources. Fair sharing algorithms have long been used in computer networking to balance access to a router or switch, and some of these algorithms have also been applied to the control of queries submitted to search engine APIs. If a search query’s execution cost can be reliably estimated, fair sharing algorithms can be applied to the input of a SaaS API to ensure everyone has equitable access to the search engine. The novelty of this paper lies in presenting a Single-Server Max-Min Fair Deficit Round Robin algorithm, a modified version of the Multi-Server Max-Min Fair Deficit Round Robin algorithm. The Single-Server Max-Min Fair Deficit Round Robin algorithm is compared to three other fair sharing algorithms, token-bucket, Deficit Round Robin (DRR), and Peng and Plale’s [1] Modified Deficit Round Robin (MDRR) in terms of three different usage scenarios, balanced usage, unbalanced usage as well as an idle client usage, to determine which is the most suitable fair sharing algorithm for use in regulating traffic to a SaaS API. This research demonstrated that the Single-Server Max-Min Fair DRR algorithm provided the highest throughput of traffic to the search engine while also maintaining a fair balance of resources among clients by re-allocating unused throughput to clients with saturated queues so a max-min allocation was achieved.

2007 ◽  
Vol 24 (02) ◽  
pp. 223-243 ◽  
Author(s):  
SRINIVAS R. CHAKRAVARTHY

We consider a multi-server queueing model in which arrivals occur according to a Markovian arrival process (MAP). There is a single-server and additional (backup) servers are added or removed depending on sets of thresholds. The service times are assumed to be exponential and the servers are assumed to be homogeneous. A comparison of this model to the classical MAP/M/c queueing model through an optimization problem yields some interesting results that are useful in practical applications. For example, we notice that positively correlated arrival process appears to benefit with the threshold type queueing model. We also give the minimum delay costs and the associated maximum setup costs so that the threshold type queueing model is to be preferred over the classical MAP/M/c model.


2004 ◽  
Vol 05 (03) ◽  
pp. 233-247 ◽  
Author(s):  
RYUNG CHON ◽  
KOUHEI TAKEDA ◽  
TOMOYA ENOKIDO ◽  
MAKOTO TAKIZAWA

We discuss a novel role locking protocol (RLP) to prevent illegal information flow among objects in a role-based access control (RBAC) model. In this paper, we define a conflicting relation among roles "a role R1 conflicts with another role R2" to show that illegal information flow may occur if a transaction associated with role R1 is performed before another transaction with role R2. Here, we introduce a role lock on an object to abort a transaction with role R1 if another transaction with role R2 had been already performed on the object. Role locks are not released even if transactions issuing the role locks commit. After data in an object o1 flow to another object o2, if the object o1 is updated, the data in the object o2 is independent of the object o1, i.e. obsolete. A role lock on an object can be released if information brought into the object is obsolete. We discuss how to release obsolete role locks. We also discuss how to implement the role locking protocol in single-server and multi-server systems.


Sign in / Sign up

Export Citation Format

Share Document