1 Introduction

Ubiquity of power-law has been well established across variety of systems [1]. If X is a random variable following  power-law distribution then there exists a positive parameter k such that the Complementary Cumulative Distribution Function (CCDF) behaves as

$$\begin{aligned} P\{X> x\} \sim x^{-k}, \qquad x>x_{\text {min}}. \end{aligned}$$
(1)

It can be noted from (1) that the graph of CCDF with x on log–log scale is a straight line with slope k. The presence of power-law also leads to long-tail behavior in a system [2]. One of the widely observed power-law distribution in computer communication networks is Pareto. Many empirical studies on various types of network traffic also validate the presence of power-law characteristics [3]. This is in contrast to traditional voice networks which exhibit exponentially distributed inter-arrival time. Thus, it becomes imperative to examine the impact of power-law distributed traffic on the performance of network systems. Such a study is essential for determining appropriate resource (for example buffers) dimensioning in network systems like routers and gateways. The requirement of proper number of buffers in routers has been emphasized by Ghosh et al. [4] by observing that improper and large buffers may result in longer queueing delays based on the analysis utilizing M/M/1 and M/D/1 queueing models.

1.1 Motivation

Several studies on various types of applications and networks traffic also suggest inapplicability of models based on exponential distribution. For example, statistical analysis of mobile data traffic reveals that inter reference time of file (time difference between successive requests of a file) as well as the inter-session time (time difference between two sessions of a client) is well described by lognormal distribution [5]. Investigation on the cyberlocker service traffic on cloud platform confirms that inter arrival time of cyberlocker traffic flows can be best modelled by hybrid lognormal and gamma distribution [6]. It is worth to mention the findings by Mitzenmacher [7] here, “lognormal and power law distributions connect quite naturally, and hence, it is not surprising that lognormal distributions have arisen as a possible alternative to power law distributions across many fields”. Power-law is ubiquitous. Access pattern of file downloads in global file hosting platforms at cloud [8] and DNS queries [9] also follow power-law. A similar behavior is observed for video traffic stream [10]. Empirical studies of web and peer-to-peer network traffic also establish that inter-arrival time follows two mode Weibull distribution and Weibull-Pareto distribution respectively [11]. Kokoszka et al. [12] analyze the inter-arrival time between consecutive anomalies in the Internet and tail probabilities are found to decay following power-law. A model to evaluate the performance of Wi-fi network using power-law distribution for ON periods has been built in [13]. The emergence of power-law is also reported in satellite network [14]. The most evolving trend in networking domain is Internet of Things (IoT). After collecting and analyzing sensors data from IoT-based smart home applications, generalized Pareto distribution is found to describe the inter-arrival time of packets in [15]. The requirement for developing simple models based on Pareto and Weibull distribution to capture traffic characteristics of access as well as backbone networks is emphasized in [16]. The presence of power-law in mobile network of an operator in France has been reported in [17]. A good summary of the appearance of power-law in diverse types of network is compiled in [18] recently.

The power-law behavior in network traffic has severe impact on the performance of network systems, for example, high queueing delays. The performance analysis of network systems is carried out using models from queueing theory like M/G/1, \(M/G/\infty\) with service time G following Pareto or other long-tail distribution [19]. These models do not represent an actual real network system. Also, these models become analytically intractable and only provide approximate asymptotic results, for example, upper bound on blocking probability is estimated from buffer overflow probability [20,21,22]. The blocking probability relates to the probability with which buffers inside a network system are full. The blocking probability is computed using finite buffer queueing models. Recently, bounds on queue and packet loss distribution are obtained for finite buffer system under the assumption of Poisson arrivals [23]. However, the Poisson assumption based queueing models are useful only for voice networks and classical data networks as they fail to capture the features of traffic exhibited in modern days’ integrated communication networks. Thus, there is a requirement to develop appropriated models capturing the traffic characteristics of the modern networks.

1.2 Role of Maximum Entropy Framework in Networks’ Performance Evaluation

An alternate mechanism for deriving the results of queueing theory is based on maximum entropy framework exploiting the Jaynes maximum entropy principle (MEP) which states that the most appropriate probability distribution given some prior information about the system is the one which maximizes entropy of the system [24]. Prior information is usually available in the form of moments. MEP using Shannon entropy has been successfully employed to recover the results of M/M/1 queueing systems [24] when arithmetic mean is the characterizing moment. While applying MEP to queueing systems, there is no assumptions made about the probability distribution of arrivals and services, rather the queueing system is treated as a black box and only the indices like mean number of customers in the system, mean utilization etc. are considered [25]. Kouvatsos [26] has derived the expression for steady state probability distribution of G/G/1 queueing system using MEP when information about first two moments of arrival and service distributions are available. It is important to note that the power exponent k in (1) usually lies between 2 and 3 and the second order moment (i.e. variance) becomes infinite in this range. Hence, one cannot use the results of G/G/1 model to analyze the queueing system driven by power law distributed arrivals and service. Thus, other entropy measures has been explored to model these systems. Shachi and Karmeshu [27, 28] have used MEP with Tsallis entropy measure to obtain the results for broadband networks depicting power-law behavior. Amit and Karmeshu [29, 30] have applied MEP with Shannon entropy when geometric mean or shifted geometric mean of system size is specified as constraint to generate power-law behavior. The importance of geometric mean in relation to power-law has been discussed in the literature. As pointed out in [31], for majority of the power law distributions like Pareto, first moment or arithmetic mean is not defined and application of geometric mean thus becomes logical. Visser [32] concludes that the logarithmic average i.e. geometric mean plays an important role seems to have a connection with the fact that logarithmic scales are ubiquitous in classifying many natural and social phenomena. Following this, Amit and Karmeshu [29] note that geometric mean is an unbiased measure for lognormal distribution that approximates tail of many distributions showing power-law behavior.

1.3 Contributions

It is worth highlighting that the packets size in networks does not remain fixed. In the context of wireless Long Term Evolution (LTE) networks, packets lengths are found to follow Pareto distribution [33]. The same pattern is expected to present in 5G wireless networks [34]. Thus, it becomes essential to develop models considering power-law distributed service time as well. To the best of our knowledge, there is no literature available that considers power-law distributed arrival and service processes and obtain closed-form expressions for performance measures. These models facilitate in performance evaluation of systems such as routers, gateways, servers on cloud etc. in modern computer communication networks. Motivated by the these findings, an infinite capacity \(Pow/Pow/1/\infty\) where both inter-arrival time of packets as well as service time follow power-law distribution has been proposed by Sharma [35] using maximum entropy approach with geometric mean and utilization as constraints. This paper extends the framework presented in [35] to finite buffer Pow/Pow/1/K and Pow/Pow/K/K models. The closed-form expressions for queue length distribution and various performance measures are obtained in terms of traffic intensity. The results of performance analysis are found to be in close agreement with past empirical studies. This paper is an extension of [35] and makes following contributions:

  1. 1.

    A single server finite buffer model Pow/Pow/1/K is proposed and closed-form formula for blocking probability is derived in terms of traffic intensity.

  2. 2.

    The above model is extended to include multiple servers viz. Pow/Pow/K/K, the loss system and modified Erlang loss formula is obtained.

  3. 3.

    The applications of both newly proposed models in computing buffer requirements is illustrated.

The paper is organized into five sections. The \(Pow/Pow/1/\infty\) model is reproduced from [35] in Sect. 2 and closed form expressions for steady-state queue length distribution and various performance measures in terms of traffic intensity are presented. The finite buffer queueing system Pow/Pow/1/K is proposed in Sect. 3. The multi-server generalization of the finite buffer model is presented in Sect. 4. The last Sect. 5 discusses the findings and application of the proposed models in congestion control algorithm’s design as well as concludes the paper.

2 \(Pow/Pow/1/\infty\) Model

The model as proposed in [35] is presented in this section for completeness. Consider a network system such as a router or where packets arrive following a stochastic process such that inter-arrival time of the packets is explained by power-law distribution. Since, the packets may vary in size and some studies have confirmed it to be characterized by power-law distribution [33, 34], the processing time of the packets at the system can also be modeled by power-law distribution. Let random variable N represent the number of packets inside the system. The probability that there are n packets at a network system at any given instant of time is \(P(N=n) = p_n\). Given this, the Shannon entropy for the system is given by

$$\begin{aligned} S=-\sum _{n=0}^{\infty } p_n \ln p_n \end{aligned}$$
(2)

Assuming that prior information about the number of packets is available in the form of geometric mean G of non-zero queue size as

$$\begin{aligned} \sum _{n=1}^{\infty } \left( \ln n\right) p_n = \ln G \end{aligned}$$
(3)

and system utilization

$$\begin{aligned} U=1-p_0 = \rho \end{aligned}$$
(4)

where \(\rho\) is the traffic intensity. The normalization constraint is

$$\begin{aligned} \sum _{n=0}^{\infty } p_n = 1. \end{aligned}$$
(5)

Employing MEP, the most objective probability distribution of number of packets is obtained by maximizing Shannon entropy (2) subject to (3), (4) and (5) as constraints. The optimization problem can be solved by Largrange’s multiplier method. The Lagrangian function in this case becomes

$$\begin{aligned} L = -\sum _{n=0}^{\infty } p_n \ln p_n + \kappa \left[ \ln G - \sum _{n=1}^{\infty } \left( \ln n\right) p_n\right] + \mu \left[ 1-U-p_0\right] +\gamma \left[ 1-\sum _{n=0}^{\infty } p_n\right] . \end{aligned}$$
(6)

Differentiating (6) with respect to \(p_n\) and equating to zero gives

$$\begin{aligned} -\left( 1+\ln p_n\right) -\kappa \ln n -\gamma =0,~~n \ne 0 \end{aligned}$$
(7)

and

$$\begin{aligned} -\left( \ln p_0 +1\right) -\mu - \gamma = 0. \end{aligned}$$
(8)

Solving (7) and (8) using constraints (4) and (5) results in

$$\begin{aligned} p_n = Z^{-1} U n^{-\kappa } \end{aligned}$$
(9)

where \(Z=\sum _{n=1}^{\infty } n^{-\kappa }\) is normalization constant. In order to compute Z, we consider \(\left\{ \frac{1}{n^{\kappa }}, \kappa >1 \right\}\), which is a strictly decreasing sequence of positive numbers. Thus, taking \(f(x)=\frac{1}{x^{\kappa }}\), the normalization constant can be approximated by integral as \(Z=\sum _{n=1}^{\infty } n^{-\kappa } \approx \int _1^{\infty } x^{-\kappa } dx\) transforming (9) into

$$\begin{aligned} p_n = U \kappa \left( 1-\frac{1}{\kappa }\right) n^{-\kappa }, \qquad \kappa > 1,~ n \ge 1. \end{aligned}$$
(10)

The Lagrange’s parameter \(\kappa\) can be computed by substituting (10) in (3) viz.,

$$\begin{aligned} U \left( \kappa -1\right) \sum _{n=1}^{\infty } \left( \ln n\right) n^{-\kappa } = \ln G. \end{aligned}$$
(11)

Replacing summation by integral in (11), the expression for \(\kappa\) becomes

$$\begin{aligned} \kappa = 1 + \frac{U}{\ln G}. \end{aligned}$$
(12)

Postulating \(\frac{1}{\kappa }=\rho\), (10) becomes

$$\begin{aligned} p_n = \left( 1-\rho \right) n^{-1/\rho },\qquad n \ge 1, ~~\rho < 1. \end{aligned}$$
(13)

This is steady state probability distribution of the number of packets at a network system, also known as queue length distribution and is a power-law distribution. This is similar to the asymptotic behavior of the stationary queue length distribution obtained by [19] for M/G/1 with service time following power-tail distribution. Using (4), one can easily express \(p_n\) in terms of \(p_0\) as

$$\begin{aligned} p_n=n^{-1/\rho } p_0, \qquad n \ge 1,~~\rho <1. \end{aligned}$$
(14)

2.1 Performance Measures

For analytical tractability of the performance evaluation of the \(Pow/Pow/1/\infty\) queue, the fluid flow approximation is considered such that the number of packets arriving to the queue is assumed to be so large that it appears to be continuous flow of fluid. Under this approximation, discreteness of the random variable N can be neglected and it can be treated as a continuous random variable X, (chapter 2 of [36]). Fluid flow is a good approximation under heavy-traffic condition.

For computing quality of service (QoS) parameters, the average number of packets in the system, known as mean queue length, is required. The mean queue length for this model is

$$\begin{aligned} \bar{N} = \sum _{n=1}^{\infty } n p_n = \left( 1-\rho \right) \sum _{n=1}^{\infty } n^{-\left( \frac{1}{\rho }-1\right) }. \end{aligned}$$
(15)

Using fluid flow approximation, (15) becomes

$$\begin{aligned} \bar{N} = \frac{\rho \left( 1-\rho \right) }{\left( 1-2 \rho \right) }, \qquad \rho <1/2. \end{aligned}$$
(16)

One can also compute the closed form expression for variance of number of packets \(\sigma ^2\) in the system under fluid flow approximation as

$$\begin{aligned} \sigma ^2 = \rho \left( 1-\rho \right) \left[ \frac{1}{1-3\rho } - \frac{\rho \left( 1-\rho \right) }{{\left( 1-2\rho \right) }^2}\right] , \qquad \rho <1/3. \end{aligned}$$
(17)

The variance of number of packets become infinite as \(\rho\) tends to 1/3.

One important QoS parameter is overflow probability which is the probability of exceeding a given buffer size \(\omega\) viz.,

$$\begin{aligned} P(n>\omega ) = \sum _{n=\omega +1}^{\infty } \left( 1-\rho \right) n^{-1/\rho } \end{aligned}$$
(18)

which under heavy traffic can be simplified into

$$\begin{aligned} P(n>\omega ) = \left( \frac{\rho }{1-\rho }\right) {\left( \omega +1\right) }^{-\left( \frac{1-\rho }{\rho }\right) }. \end{aligned}$$
(19)

It is clear from (19) that the overflow probability also follows power-law in buffer sizes asymptotically

$$\begin{aligned} P(n>\omega ) \sim \omega ^{-\left( \frac{1-\rho }{\rho }\right) }. \end{aligned}$$
(20)

This result is in conformity with the one obtained by [37]. The average waiting time of the packets at network system can be computed by using Little’s law and is given by

$$\begin{aligned} \overline{W} = \frac{1}{\lambda }\left[ \frac{\rho \left( 1-\rho \right) }{1-2\rho }\right] . \end{aligned}$$
(21)

Here, \(\lambda\) is the mean arrival rate of packets at the network system.

The performance measures are analyzed numerically to get deeper insight into \(Pow/Pow/1/\infty\) queueing system.

2.2 Numerical Results

This subsection contains the numerical results evaluating performance of \(Pow/Pow/1/\infty\) system. Table 1 shows the probability of number of packets, as obtained from (13) for various values of \(\rho\). As expected, the probability is initially low and then increases with \(\rho\).

Since the performance measures are derived using fluid flow approximation, it becomes imperative to examine its accuracy. The comparison of exact mean queue length (15) is carried out with approximated mean queue length (16) and results are presented in Table 2. The approximated mean queue length starts matching with exact mean queue length as traffic intensity parameter \(\rho\) increases. This is expected as fluid flow approximation provides accurate results under heavy traffic.

Table 1 Probabilities in \(Pow/Pow/1/\infty\) Queue
Table 2 Comparison of approximated and exact mean queue length of \(Pow/Pow/1/\infty\)

The mean number of packets (16) viz. mean queue length is plotted for various values of traffic intensity \(\rho\) in Fig. 1.

Fig. 1
figure 1

Behavior of mean queue length of \(Pow/Pow/1/\infty\) with \(\rho\)

The mean queue length for \(Pow/Pow/1/\infty\) queue remains lower for small values of \(\rho\). As the traffic intensity crosses 0.3, the mean queue length increases fast. The mean queue length increases abruptly towards infinite as \(\rho\) approaches to 0.5 in case of \(Pow/Pow/1/\infty\) system. These results comply to earlier empirical studies [38]. Hence, the proposed model captures the real network traffic burstiness.

Fig. 2
figure 2

Variance of number of packets in \(Pow/Pow/1/\infty\) queue

Fig. 3
figure 3

Power-law behavior of overflow probability in \(Pow/Pow/1/\infty\) queue

The variance of number of packets (17) shows interesting property as shown in Fig. 2. The variance is not significant for lower values of \(\rho\) but increases sharply as \(\rho\) approaches 0.3. This is due to bursty nature of the input traffic.

The behavior of overflow probability (19) is plotted for various values of traffic intensity in Fig. 3 on log–log scale. The plot is a straight line for all values of traffic intensity confirming the presence of power-law behavior in overflow probability. For a given value of overflow probability, (19) can be used to compute number of buffers \(\omega\). Norros [39] provides a closed form expression for calculating buffer requirement, referred as Norros formula, when input traffic is governed by fractional Brownian motion process and service rate is constant. The Norros formula is

$$\begin{aligned} b = \frac{\rho ^{\frac{1}{2(1-H)}}}{{\left( 1-\rho \right) }^{\frac{H}{1-H}}}, \qquad 1/2 \le H<1. \end{aligned}$$
(22)

Here, H is the Hurst parameter measuring the degree of long range dependence. The buffer requirement as obtained from (19) for overflow probability of 0.01 is compared with Norros formula for \(H=0.938\) in Fig. 4. Both \(Pow/Pow/1/\infty\) and Norros formula result in approximately same number of buffers for lower value of traffic intensity. However, as the traffic intensity increases, the buffer requirement is higher for \(Pow/Pow/1/\infty\) system as compared to Norros formula. The reason is because Norros formula has been derived assuming constant service time, however, it is considered to be following power-law distribution in the proposed model.

Fig. 4
figure 4

Comparison of buffer requirements of \(Pow/Pow/1/\infty\) with Norros formula

Fig. 5
figure 5

Behavior of average waiting time in \(Pow/Pow/1/\infty\) with \(\rho\)

The average waiting time (21) for different values of mean arrival rates is shown in Fig. 5. The average waiting time of packets in the system increases fast as \(\rho\) approaches to 0.5. This behavior of average waiting time is identical to the real network traffic where a sharp rise in mean delay is observed around \(50\%\) utilization [38].

3 Finite Buffer Pow/Pow/1/K Model

In practice, network systems have finite number of buffers K where packets get stored and wait for processing. The performance of such a system can be analyzed by using Pow/Pow/1/K queueing model. Following the same notations as used in Sect. 2, the Shannon entropy of the finite buffer system becomes

$$\begin{aligned} S=-\sum _{n=0}^{K} p_n \ln p_n. \end{aligned}$$
(23)

Since, geometric mean is considered to be characterizing moment for generating power-law [32], it is assumed that prior knowledge about the number of packets is available in the form of geometric mean

$$\begin{aligned} \sum _{n=1}^{K} \left( \ln n\right) p_n = \ln ~G. \end{aligned}$$
(24)

The system utilization

$$\begin{aligned} U=1-p_0 =\rho . \end{aligned}$$
(25)

and normalization constant

$$\begin{aligned} \sum _{n=0}^{K} p_n = 1. \end{aligned}$$
(26)

are two other constraints. Following the same optimization procedure as outlined in Sect. 2, the queue-length distribution of finite buffer system can be derived as

$$\begin{aligned} p_n = C^{-1} U n^{-\mu } \end{aligned}$$
(27)

where \(C=\sum _{n=1}^{K} n^{-\mu }\) and \(\mu\) is the Lagragnge’s parameter corresponding to (24). To compute C, we again consider \(\left\{ \frac{1}{n^{\mu }}, \mu >1 \right\}\) which is a strictly decreasing sequence of positive numbers. Thus, taking \(f(x)=\frac{1}{x^{\mu }}\), the summation can be approximated by integral in (27) transforming it into

$$\begin{aligned} p_n = \frac{U \left( \mu -1\right) n^{-\mu }}{\left( 1-K^{1-\mu }\right) }, \qquad \mu > 1,~ n \ge 1. \end{aligned}$$
(28)

Resembling the substituation for Lagrange’s parameter in previous Sect. 2, putting \(\frac{1}{\mu }=\rho\), (28) becomes

$$\begin{aligned} p_n =\frac{\left( 1-\rho \right) n^{-1/\rho }}{1-K^{\frac{-\left( 1-\rho \right) }{\rho }}},\qquad n \ge 1, ~~\rho < 1. \end{aligned}$$
(29)

Drawing analogy from the application of MEP for driving results of Poisson arrivals based queueing models [24], the form (29) can be regarded as the steady state probability distribution of the number of packets in Pow/Pow/1/K system, also known as queue length distribution. It is to be noted that queue length distribution follows power-law. The queue length distribution (29) can also be re-written in terms of \(p_0\) using (25) as

$$\begin{aligned} p_n= \frac{n^{-1/\rho }}{1-K^{\frac{-\left( 1-\rho \right) }{\rho }}} p_0, \qquad n \ge 1,~~\rho <1. \end{aligned}$$
(30)

The performance of the Pow/Pow/1/K system is studied in the next subsection.

3.1 Performance Measures and Analysis

For deriving closed form solutions for various performance measures of the system, the fluid flow approximation is used as discussed in Sect. 2. The important QoS measure in case of finite buffer queueing system is blocking probability. Given a value of blocking probability, the network designers can use blocking probability closed-form expression to compute the buffer requirement at the network systems. Using (29), the blocking probability in case of Pow/Pow/1/K is given by

$$\begin{aligned} p_K = \frac{\left( 1-\rho \right) K^{\frac{-1}{\rho }}}{1-K^{\frac{-\left( 1-\rho \right) }{\rho }}} \end{aligned}$$
(31)

which also follows power-law. This is also clear from Fig. 6 where blocking probability (31) is plotted on log–log scale. Power-law behavior in blocking probability implies that increasing buffer sizes does not help to reduce the probability significantly.

Fig. 6
figure 6

Power-law behavior of blocking probability

Fig. 7
figure 7

Variation of blocking probability with buffer sizes

The variation of blocking probability with buffer sizes for different value of utilization is shown in Fig. 7. The blocking probability is higher for higher values of utilization.

Table 3 Buffer size for given blocking probability

The closed-form of blocking probability (31) can be used to compute the required buffers at a network system. Some results of buffer sizes for corresponding blocking probability are presented in Table 3. Since buffers are integers, the calculated values are rounded off to nearest integer. It is observed that the buffer requirement is very less for low utilisation and increases sharply for higher utilization for specified blocking probability.

The expression for mean queue length can also be computed as

$$\begin{aligned} \overline{N} = \sum _{n=1}^K n p_n = \sum _{n=1}^K \frac{\left( 1-\rho \right) n^{\frac{-1}{\rho }+1}}{1-K^{\frac{-\left( 1-\rho \right) }{\rho }}} \end{aligned}$$
(32)

which can be simplified into

$$\begin{aligned} \overline{N} = \frac{\left( 1-\rho \right) \rho \left( 1-K^{\frac{-\left( 1-2\rho \right) }{\rho }}\right) }{\left( 1-2\rho \right) \left( 1-K^{-\frac{\left( 1-\rho \right) }{\rho }}\right) }, \qquad \rho \ne 1/2. \end{aligned}$$
(33)

It would be imperative to examine the finite buffer power-law queueing system for multiple servers and it is discussed in the next section.

4 Multi-server Extension—Loss System: Pow/Pow/K/K

Finite buffer multi-server queueing system, also known as loss system, has well known applications for telecommunication systems. At a computer communication network system, ports represent servers. The channels are servers in case of wireless communication networks. Such systems are loss systems because the packets are lost if all the servers/ports/channels are busy. Using MEP, when arithmetic mean of number of packets is available as constraint, a model of loss system is developed in [40]. This model is useful when network traffic shows exponential behavior, for example, in case of voice traffic. However, present day communication network traffic depict different characteristics in the form of power-law behavior. The notations used in [40] are closely followed in this section. Consider a system with K servers, each server can be in two states viz. idle (0) or busy (1). Then, the state space of the system is \(S={\{0, 1\}}^K\) with \(\textbf{x}=\{x_1, x_2,..., x_K\}\in S\) as system state where \(x_i =1\) implies that the server i is busy. As discussed in [40], function f maps the state space S to a reduced state space M such that the number of busy servers or ports is

$$\begin{aligned} f(\textbf{x}) = \sum _{i=1}^K x_i, \qquad \textbf{x} \in S. \end{aligned}$$
(34)

The function f divides the state space S into equivalence classes

$$\begin{aligned}{}[n]=\left\{ \textbf{x} \in S : f(\textbf{x}) =n \right\} , \qquad n \in M =\left\{ 0, 1, ...,K\right\} . \end{aligned}$$
(35)

The probability of system been in state \(\textbf{x}\) is given by \(p_x\). It is assumed that the prior knowledge about the geometric mean of the number of packets in the system and utilization is available i.e.

$$\begin{aligned} \sum _{\textbf{x} \in S} (\ln f(\textbf{x})) p_x =\ln G \end{aligned}$$
(36)

and

$$\begin{aligned} 1 - p_0 = U = \rho \end{aligned}$$
(37)

The normalization constant is

$$\begin{aligned} \sum _{\textbf{x} \in S} p_x = 1. \end{aligned}$$
(38)

When the Shannon entropy (23) is maximized with constraints (36), (37) and (38), the state probability distribution in steady state turns out to be

$$\begin{aligned} p_x = \frac{U {\left[ f(\textbf{x})\right] }^{-\alpha }}{\sum _{\textbf{x} \in S}{\left[ f(\textbf{x})\right] }^{-\alpha }} \end{aligned}$$
(39)

where \(\alpha\) is the Lagrange’s parameter. Since the cardinality of the equivalence classes [n] is \(\left( {\begin{array}{c}N\\ n\end{array}}\right)\), the probability distribution (39) on reduced state space can be expressed by

$$\begin{aligned} b\left( n\right) =\left( {\begin{array}{c}K\\ n\end{array}}\right) \frac{U\cdot n^{-\alpha }}{\sum _{i=1}^K \left( {\begin{array}{c}K\\ i\end{array}}\right) i^{-\alpha }} \end{aligned}$$
(40)

Substituting \(\rho =\frac{1}{\alpha }\), the steady state probability distribution (40) turns into

$$\begin{aligned} b\left( n\right) =\left( {\begin{array}{c}K\\ n\end{array}}\right) \frac{\rho \cdot n^{\frac{-1}{\rho }}}{\sum _{i=1}^K \left( {\begin{array}{c}K\\ i\end{array}}\right) i^{\frac{-1}{\rho }}}. \end{aligned}$$
(41)

The probability that all the servers are busy i.e. blocking probability in this case can be derived from (41) as

$$\begin{aligned} b(K) = \frac{\rho \cdot K^{\frac{-1}{\rho }}}{\sum _{i=1}^K \left( {\begin{array}{c}K\\ i\end{array}}\right) i^{\frac{-1}{\rho }}} \end{aligned}$$
(42)

which plays the same role in power-law queueing system as the well-known Erlang’s loss formula does for Poisson arrivals based queueing system. Thus, (42) can be regarded as generlized Erlang loss formula.

Fig. 8
figure 8

Behavior of state probability distribution for \(\rho =0.1\)

Fig. 9
figure 9

Behavior of state probability distribution for \(\rho =0.5\) and \(\rho =0.9\)

The state probability distribution b(n) is plotted for \(\rho =0.1\) in Fig. 8. Interestingly, the state probability shows bimodal behavior corresponding to periods of low and high load. But as the \(\rho\) is increased, the bimodal behavior disappears, as shown in Fig. 9 indicating only high load on the system. The similar behavior is also observed in [27]. The comparison of state probability distribution (42) with Erlang loss model is presented in Table 4. The blocking probability is high for all values of maximum buffer size N and utilisation \(\rho\) in case of Pow/Pow/K/K system as compared to Erlang loss formula. It implies that more buffers are required at a system in case network is driven by power-law traffic.

Table 4 Comparison of state probability distribution b(N) with Erlang loss formula

5 Discussion and Conclusion

Extending the MEP framework proposed in [35], two finite buffer models are proposed in this paper where both inter-arrival and service times follow power-law distribution. First, an infinite buffer model \(Pow/Pow/1/\infty\) has been discussed [35]. The numerical study and analysis of the model shows that such a queueing system explodes at very low utilization viz. mean number of packets shows sharp rise as \(\rho\) tends to 0.5, the variance of number of packets starts to explode as \(\rho\) approaches to 0.3. These results are in agreement with real traffic studies of network with LRD behavior [38].

A finite buffer queueing system Pow/Pow/1/K has been proposed to generate closed form expressions for queue length distribution, QoS measures viz. blocking probability and mean queue length. The queue length distribution and blocking probability are found to depict power-law. The numerical results validate that the blocking probability formula can be used to compute the buffer requirements. The analysis validates that the buffers will be occupied sharply as the utilization of the system increases to \(50\%\) introducing longer delays at low utilization. This is in conformity with the empirical studies carried out in the past [38]. The model is extended to multiple servers and state probability distribution for loss system Pow/Pow/K/K are derived. The state probability distribution shows bimodal behavior at low utilization which turns into uni-modal at high utilization. A comparative study of numerical results of Pow/Pow/K/K with Erlang loss model is carried out and it is observed that the blocking probability is very high in case Pow/Pow/K/K system. These results are of significant importance to network designers facilitating them in dimensioning resources at network systems and in developing efficient admission and congestion control policies.

An exemplary application of the proposed models is in the congestion control at a network system. One of the famous congestion avoidance algorithm for gateway systems is random early detection (RED) [41]. The gateway system detects congestion by calculating mean queue size upon arrival of every packet. When the mean queue size crosses a pre-specified threshold, the gateway starts dropping packets with some dropping probability. In order to find the initial value of mean queue size, a procedure is proposed in [41] that allows minimum number of packets L to arrive at the gateway and then computes mean queue size. The mean queue length formula (33) can be used to compute mean queue sizes in the RED algorithm. This requires the knowledge of utilization \(\rho\). One way to approximate the server utilization is by CPU utilization. All operating systems supports system calls to obtain utilization of CPU. Thus, the requirement to wait for L packets in RED does not exist. The expression for overflow probability (19) can be utilized for calculating dropping probability. Also, the probability of occupancy of buffers between two thresholds viz. \({\textrm{min}}_{th}\) and \({\textrm{max}}_{th}\) can be computed using (13) as

$$\begin{aligned} p_b = \int _{min_{th}}^{max_{th}} (1-\rho )x^{-1/\rho } dx \end{aligned}$$
(43)

A thourgh comparative analysis of the aforementioned methods in RED algorithm is an area of future work.