skip to main content
article
Free Access

Pricing computer services: queueing effects

Published:01 March 1985Publication History
Skip Abstract Section

Abstract

This article studies the effects of queueing delays, and users' related costs, on the management and control of computing resources. It offers a methodology for setting price, utilization, and capacity, taking into account the value of users' time, and it examines the implications of alternative control structures, determined by the financial responsibility assigned to the data processing manager.

References

  1. 1 Bronner, L. Overview of the capacity planning process for production data processing, IBM Sysf. I. 19, 1 (1960), 4-27.Google ScholarGoogle Scholar
  2. 2 Cotton, I. W. Microeconomics and the market for computer services. Compuf. Sum 7,2 (June 1975), 95-111. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Gouger. J.D. Techniques for estimating system benefits. In Advanced System Development/Feasibility Techniques, Gouger, Colter and Knapp, Eds. Wiley, N.Y., 1962. pp. 489-499.Google ScholarGoogle Scholar
  4. 4 Gushing, B.E. Pricing internal computer services: The basic issues. Manage. Account. 57,4 (Apr. 1976). 47-50.Google ScholarGoogle Scholar
  5. 5 Dearden. J. and Nolan, R.L. How to control the computer resource. Harvard Bus. Rev. 51, 6 (Nov.-Dec. 1973). 66-76.Google ScholarGoogle Scholar
  6. 6 Dolan, R.J. Priority pricing models for congested systems. Ph.D. dissertation, Graduate School of Management, University of Rochester, N.Y. 1976.Google ScholarGoogle Scholar
  7. 7 Dolan, R.J. Incentive mechanisms for priority queueing problems. Bell /. Econ. 9. 2 (1978), 421-436.Google ScholarGoogle Scholar
  8. 8 Drury, D.H. A survey of data processing chargeback practices. Infor, l&4 (Nov. 1980), 342-353.Google ScholarGoogle Scholar
  9. 9 Gladney, H.M., Johnson, D.L. and Stone, R.L. Computer installation accounting, IBM Sysf. J 14, 4 (1975). 314-339.Google ScholarGoogle Scholar
  10. 10 Greenberger, M. The priority problem and computer time-sharing. Manage. Sci. 12, 7 (1966), 666-906.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 Heyman. D.P., and Sobel. M.J. Stochastic Models in Operations Research, Volume I: Stochastic Processes and Operating Characteristics, McGraw-Hill. N.Y., 1982.Google ScholarGoogle Scholar
  12. 12 Horngren. CT. Cosf Accourrfirlg: A Managerial Emphasis, 5th ed. Prentice-Hall. Englewood Cliffs, N.J. 1982.Google ScholarGoogle Scholar
  13. 13 Jensen, M.C. Economics of management of university computing resources. Working Paper. Graduate School of Management, University of Rochester. N.Y. Apr. 1977.Google ScholarGoogle Scholar
  14. 14 Kleijnen, J.P.C. Computers and Profits: Quantifying Financial Benefits of Information, Addison-Wesley, Reading, Mass. 1980. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15 Kleijnen. J.P.C., and Van Reeken. A.J. Principles of computer charging in a university-type organization. Commun. ACM 26, 11 (Nov. 1983), 926-932. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16 Kleijnen, J.P.C. Quantifying the benefits of information systems. Eur. J Oper. Res. 15, 1 (1984), 38-45.Google ScholarGoogle Scholar
  17. 17 Luerhmann, A.W. and Nevison. J.M. Computer use under a freeaccess policy. Science 184,414O (May 1974). 957-961.Google ScholarGoogle Scholar
  18. 18 Marchand, M.G., Priority pricing. Manage. Sci. 20, 3 (1974), 1131- 1140.Google ScholarGoogle Scholar
  19. 19 Naor, P. On the regulation of queue size by levying tolls. Economefrica 37, 1 (1969), 15-24.Google ScholarGoogle ScholarCross RefCross Ref
  20. 20 Nolan, R.L. Management Accounfing and Control of Dafa Processing, National Association of Accountants, N.Y., (1977).Google ScholarGoogle Scholar
  21. 21 Pick, R.A., and Whinston. A.B. An internal computer charging mechanism for revealing user preferences. Working Paper. Krannert School of Management, Purdue University. West Lafayette, Ind., 1982.Google ScholarGoogle Scholar
  22. 22 Rose, C.A. A measurement procedure for queueing network models of computer systems. Comput. Suw. 10, 3 (1976), 263-260. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23 Sharpe. W.F. The Economics ojCompufers. Columbia Univ. Press, N.Y. 1969. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24 Sobczak. J.J. Pricing computer usage. Dafamafion 20, 2 (Feb. 1974). 61-64.Google ScholarGoogle Scholar
  25. 25 Steiner, P.O. Peak loads and efficient pricing. Q. I. Econ. 71,4 (1957), 565-610.Google ScholarGoogle Scholar
  26. 26 Wheelock. A.R. Service or profit center? Dafamafion 28, 5 (May 1962), 167-176.Google ScholarGoogle Scholar
  27. 27 Williamson, 0. Peak load pricing and optimal capacity under indivisibility constraints. Am. Econ. Rev. 56. 4 (1966), 810-827.Google ScholarGoogle Scholar
  28. 28 Yechiali. U. On optimal balking rules and toll charges in the GI/M/l queueing process. Oper. Res. 19, 2 (1971), 346-370.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. 29 Yechiali, U. Customers' optimal joining rules for the GI/M/s queue. Manage. Sri. 18, 7 (19721, 434-443.Google ScholarGoogle Scholar
  30. 30 Yechiali, U. How long will you wait for what you really want? In Proceedings of fhe Conference on Stochastic Confrol and Optimization, (Free University, Amsterdam, Apr. 5-6, 1979).Google ScholarGoogle Scholar

Index Terms

  1. Pricing computer services: queueing effects

                    Recommendations

                    Reviews

                    Ernest A Kallman

                    .abstract This article studies the effects of queueing delays, and users' related costs, on the management and control of computing resources. It offers a methodology for setting price, utilization, and capacity, taking into account the value of users' time, and it examines the implications of alternative control structures, determined by the financial responsibility assigned to the data processing manager. — Author's Abstract This paper should be of value to the Data Processing (DP) manager seeking more (financial) control over the DP operation whether or not there is some form of chargeout system in place. If there is one, its value may be questioned by the author's conclusions. If there is not one, the manager will be guided to an appropriate one by this paper. In addition the paper will be helpful in “proving” to management that the installation is operating at an efficiency level that is appropriate to its service requirements. The author raises a number of issues and demonstrates some conditions that run counter to intuition and, in some cases, common computing practice. Among them are: (1)When computing centers set prices to cover their costs, if delay costs are considered, such cost recovery would lead to under-utilization of resources. He suggests deficit pricing to encourage use and provide maximum organizational benefits. (2)“Self-regulated” queueing or failure to take queueing effects into account is unworkable and leads to congestion. The solution is imposition of queueing-related charges. (3)When computing centers are organized as profit centers there is a danger of monopoly pricing. With queueing delays the situation becomes extreme since the profit center arrangement often reduces available capacity and the relative utilization of this capacity. (4)In defending the level of a computer center's utilization the author's results show that “taking users' delay costs into account, seemingly low utilization ratios are often optimal.” By his own admission, the author's methodology is geared to business DP systems with regularly scheduled tasks and clear cost/benefit data. But he does have suggestions for handling situations with irregular demand, such as research and educational institutions and those situations faced with discontinuous costs or cyclical demand over time. An extensive appendix discusses the implications of Peak-Load Pricing to the author's methodology.

                    Access critical reviews of Computing literature here

                    Become a reviewer for Computing Reviews.

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in

                    Full Access

                    • Published in

                      cover image Communications of the ACM
                      Communications of the ACM  Volume 28, Issue 3
                      March 1985
                      94 pages
                      ISSN:0001-0782
                      EISSN:1557-7317
                      DOI:10.1145/3166
                      Issue’s Table of Contents

                      Copyright © 1985 ACM

                      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 1 March 1985

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • article

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader