Exchange Message-Throttle Saturation Slippage Playbook

2026-03-28 · finance

Exchange Message-Throttle Saturation Slippage Playbook

Modeling Per-Port Messaging Limits as a First-Class Execution Risk (Not Just an Infra Alert)

Why this note: Many execution desks model spread, impact, and fill risk, but treat exchange/session message throttles as “ops incidents.” In reality, throttle saturation is a repeatable microstructure regime that changes cancel/replace behavior, queue aging, and forced aggression costs.


1) Failure Mode in One Sentence

When cancel/replace bursts hit per-session message limits, you lose quote agility exactly when market conditions demand it, and slippage tails blow out through stale queue exposure + late forced crossing.


2) Production Objective (Add Throttle-Risk Term)

For action (a) in context (x):

[ J(a|x)=\mathbb{E}[IS|x,a] + \lambda,\text{CVaR}_{q}(IS|x,a) + \eta,\text{MissRisk}(x,a) + \rho,\text{ThrottleRisk}(x,a) ]

Where:

If you don’t price (\text{ThrottleRisk}), the router overuses high-churn tactics in already saturated sessions.


3) Minimal Throttle Dynamics You Can Actually Deploy

Model session capacity with token-bucket state (conceptual):

[ B_{t+\Delta}=\min(B_{\max},; B_t + r\Delta - m_t) ]

Define latent throttle regime (S_t \in {\text{GREEN},\text{AMBER},\text{RED}}):

A simple HMM or Markov-switching classifier over telemetry is enough; do not wait for perfect exchange internals.


4) Telemetry Contract (Required Fields)

Per child-order decision and per session/port window:

A) Message-Budget Signals

B) Exchange Response Signals

C) Execution Consequence Signals

D) Context Features

Without this contract, throttle incidents become anecdotal and impossible to model.


5) Label Design (Don’t Use Rejects Only)

Use three labels:

  1. HardThrottleEvent
    • direct business-level rejects attributable to rate limits
  2. SoftThrottleEvent
    • reject=0 but ack-latency and pending-unacked jump above calibrated regime thresholds
  3. ThrottleCostEvent
    • realized incremental IS linked to stale queue + delayed cancel/replace + forced aggression

Only labeling hard rejects misses the majority of cost (soft saturation often dominates PnL drag).


6) Modeling Stack (Practical)

Layer A — Throttle Onset Hazard

Estimate (P(\text{AMBER/RED in }\tau | x_t, a_t)) with survival/discrete-hazard model.

Layer B — Regime-Conditional Slippage

Model IS distribution conditioned on regime:

[ p(IS|x,a)=\sum_s p(IS|x,a,S=s),P(S=s|x,a) ]

Use quantile models for p50/p90/p99 to keep tail control actionable.

Layer C — Counterfactual Burst Simulator

Replay message streams with token-bucket approximation to estimate:

This gives router-safe policy comparisons before rollout.


7) KPIs That Expose Hidden Throttle Tax

  1. Throttle Probability Calibration Error (TPCE) [ TPCE = \hat p_{throttle} - p_{throttle,emp} ]

  2. Reject-With-Residual Ratio (RWRR)

  1. Stale-Quote Cost per 1k Messages (SQC-1k)
  1. Forced-Aggression Uplift (FAU) [ FAU = IS_{forced_agg} - IS_{planned_path} ]

  2. Throttle Recovery Half-Life (TRH)

If SQC-1k and FAU rise while fill-rate looks stable, you’re paying hidden throttle rent.


8) Control Policy (GREEN → SAFE)

Use hysteresis + minimum dwell times to avoid flapping.


9) Rollout Blueprint

  1. Shadow phase (2 weeks): compute throttle states + SQC/FAU only.
  2. Paper control: replay AMBER/RED actions on historical message traces.
  3. Canary by session: low-notional symbols, strict rollback triggers.
  4. Promotion gates: improve p95/p99 IS and reduce reject/stale metrics without completion collapse.
  5. Drills: synthetic burst storms (open/close/news windows) and verify SAFE fallback.

10) Common Mistakes


11) Fast Implementation Checklist

[ ] Log per-session message budget proxies + ack/reject telemetry
[ ] Label HARD + SOFT throttle events, not rejects only
[ ] Add ThrottleRisk term to routing objective
[ ] Build regime-conditioned IS tails (p90/p99)
[ ] Ship GREEN/AMBER/RED/SAFE controller with hysteresis
[ ] Gate rollout on SQC-1k + FAU + completion reliability

References


TL;DR

Exchange/session messaging throttles are not just infrastructure alerts; they are a predictable slippage regime. Model throttle onset and soft saturation explicitly, price throttle risk in action selection, and deploy a regime controller that reduces low-value churn before reject cascades force expensive aggression.