Abstract
In this paper, queueing behavior of the Internet router employing priority based partial buffer sharing mechanism under synchronous self-similar traffic input is investigated. Input traffic is modelled by Markov modulated Poisson process (MMPP). In view of wavelength division multiplexing technology, output port of the router is modelled as multi-server (MMPP/D/c/K) queueing system. Service times (packet lengths) are assumed to be deterministic as the traffic under consideration is slotted synchronous. Performance measures, namely, high priority and low priority packet loss probabilities, and mean length of non-critical and critical periods against the system parameters and traffic parameters are computed by means of matrix-geometric methods and approximate Markovian model. These results are useful in dimensioning the router to provide differentiated services and quality of service guarantee.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
Both local area network (LAN) and wide area network (WAN) traffic are proved to be self-similar and long-range dependent (LRD) [7, 11, 16]. Markov modulated Poisson process (MMPP) is employed to emulate the self-similar traffic [2, 9, 22]. Queueing system with MMPP input process can be used to investigate the queueing behavior of network nodes such as routers or switches. Internet router with wavelength division multiplexing (WDM) guarantees the quality of service (QoS). The router consists of N input fiber lines, N output fiber lines, and each fiber line has K wavelength channels and a wavelength converter pool of size c, \( \left( {0 \le c \le K} \right) \) dedicated to each output fiber line. In general, networks are divided into two categories: one is synchronous (slotted) and other is asynchronous (unslotted) [18]. In the case of first one, all the packets have same size and arrive at regular intervals [6, 17, 23]. In asynchronous networks, packets are of variable lengths [4, 19, 21]. In this paper, synchronous router with self-similar traffic input is modelled as \( {\text{MMPP/D/c/K}} \) queueing system. Therefore, performance study of Internet router is equivalent to solving a problem of \( {\text{MMPP/D/c/K}} \) queueing system.
On the other hand, Broadband integrated services digital network (B–ISDN) is to provide different kinds of communication services such as video phone, video conferencing, data and voice in more efficient way. This kind of high demand traffic results in congestion problems. We can handle these problems with some priority mechanism. One of such mechanisms is space priority mechanism. There are several strategies by which we can implement this mechanism. One of such strategies is partial buffer sharing (PBS) mechanism [20, 24]. In this scheme, a threshold is set on both high priority and low priority packets. On or below the threshold, all arriving packets are allowed, when the buffer occupancy exceeds the threshold, low priority packets will be rejected. High priority packets will be lost if the buffer is full. It is clear that if the threshold is relatively high, then the high priority packet loss will be high. Whereas, if the threshold is relatively low, then low priority packets will be lost excessively. The threshold setting induces two time periods, namely, critical and non-critical periods [19, 24]. The critical period is the time period during which buffer occupancy of the queueing system is on or above threshold level and the non-critical period is the time period during which buffer occupancy is below the threshold level. This way, there is a trade-off between threshold setting and packet loss. Hence, optimal threshold setting is very important in buffer dimensioning. Priority queue models are briefly discussed below. In paper [23], the queueing analysis of infinite buffer priority system with MMPP input is investigated with an assumption that the delay sensitive cells and non-delay sensitive cells arrive at two separate queues. This scheme is not realistic as the buffers consist of limited number of fiber delay lines (FDLs) with fixed granularity. The loss behavior of finite buffer space priority queues with discrete batch Markovian arrival process (D–BMAP) has been analyzed [24] which is not the case, since the router under consideration is handling self-similar traffic which is modelled by continuous-time Markov process. In papers [17, 19], router is modelled as single-server queueing system which is not appropriate for the reason mentioned in the first paragraph. In this paper, WDM Internet router with self-similar traffic input is modelled as \( {\text{MMPP/D/c/K}} \) queueing system with PBS mechanism to investigate its queueing behavior.
The rest of the paper is organized as follows: In Sect. 2, fundamentals of self-similar process and MMPP arrival process are briefed. Queueing model of the router and \( {\text{MMPP/D/c/K}} \) queueing system employing PBS mechanism is discussed in Sect. 3. In Sect. 4, numerical results are presented graphically. Finally, conclusion is given in Sect. 5.
2 Fundamemtals of self-similar process and Markov modulated Poisson process (MMPP) arrival process
In this section, we present the fundamentals of self-similar process and MMPP arrival process. The definition of exact second-order self-similar processes is given as follows [22]. If we consider X as a second-order stationary process with variance \( \sigma^{2} \), and divide time axis into disjoint intervals of unit length, we could define \( X = \{ X_{t} /t = 1,\,2,\,3, \ldots \} \) to be the number of points (packet arrivals) in the \( t^{th} \) interval. A new sequence \( X^{(m)} = \left\{ {X_{t}^{(m)} } \right\} \), where
is the average of the original sequence in m non-overlapping blocks. Then the process X is defined as an exact second-order self-similar process with the Hurst parameter, H, if
where \( \beta_{1} = 2 - 2H \). For the self-similarity and long range dependent (LRD), Hurst parameter, \( \frac{1}{2} < H < 1 \), i.e., \( 0 < \beta_{1} < 1 \).
Next we present the fundamentals of MMPP arrival process [21]. The MMPP is the doubly stochastic Poisson process whose arrival rate is given by \( \lambda^{*} [J_{t} ] \), where \( J_{t} \), \( t \ge 0 \) is an m-state Markov process. The MMPP has m arrival rates \( \lambda_{1} ,\lambda_{2} , \ldots ,\lambda_{m} \), of a Poisson process according to an m-state continuous-time Markov chain. The arrivals occur according to a Poisson of rate \( \lambda_{j} \), when the Markov chain is in state \( j,\,\,\,1 \le j \le m \). The MMPP is characterized by the matrices \( Q \) and \( \varLambda \), (inhomogeneous), where \( Q \) is the infinitesimal generator matrix and \( \varLambda \) is the diagonal matrix with Poisson arrival rates, are given as follows:
where \( c_{i} = \sum\nolimits_{\begin{subarray}{l} j = 1 \\ j \ne i \end{subarray} }^{m} {c_{ij} } \) for \( i = 1,\,2, \ldots ,\,m \) and
The steady state vector of the Markov chain is \( \pi \) such that \( \pi Q = 0,\,\pi e = 1 \), where e is the column vector of length m consisting of all 1. The mean arrival rate \( \lambda \) of MMPP is given by \( \lambda = \pi \varLambda e \). In the 2-state case, \( Q \), \( \varLambda \), and \( \pi \) are given as follows:
Let \( N_{t} ,\,t \ge 0 \), be the number of arrivals in \( (0,t] \), for the stationary MMPP, the mean of N t is,
The variance of N t is,
The interesting feature of MMPP is that a superposition of MMPPs is still MMPP. Special cases of the MMPP are the switched Poisson process (SPP), which is a two-state MMPP, and the interrupted Poisson process (IPP), which is an SPP with one of the arrival rates being zero, we take \( \lambda_{2} = 0 \).
3 Queueing model of the router and MMPP/D/c/K queueing system employing partial buffer sharing (PBS) mechanism
Consider the WDM synchronous \( N \times N \) router with each output fiber line consisting of K wavelength channels and a wavelength converter pool of size c. Buffer depth then is \( K - c \). Such a router with self-similar traffic input can be modelled as \( {\text{MMPP/D/c/K}} \) queueing system. The operation and multi-server queueing model of the router employing PBS mechanism is shown in Fig. 1. For the simplicity, two priority traffics are considered. The threshold is set at the level \( K - 2c - d + 1 \), where d is a positive integer. The low priority packets can only access first \( K - 2c - d \) buffer spaces and the high priority packets are for the whole buffer space. The threshold setting induces two time periods, namely, non-critical period and critical period [19, 24]. Non-critical period is the time period during which buffer occupancy is below the threshold level and critical period is the time period during which buffer occupancy is on or above threshold. Each priority traffic is characterized by MMPP process. Assume that high priority (class 1) packets and low priority (class 2) packets arrive at the system according to MMPPs of the states m 1 and m 2, respectively. These MMPPs are governed by the matrices \( \left\{ {Q(1),\,\varLambda (1)} \right\} \) and \( \left\{ {Q(2),\varLambda (2)} \right\} \), respectively. The service time is generally and identically distributed with distribution function \( H(t) \). Let \( B_{m}^{(k)} (t), \) \( \{ m \ge 0,\,k = 1,2\} \) be the matrices whose \( (i,j)^{th} \) element is the probability that given departure of class k at time 0, there is at least one packet left in the system and the process is in state i, the next departure of class k occurs no later than time t with the process in state j, during the service time there are m packets. We consider the Markov chain \( \{ (L_{n} ,J_{n} )/n \ge 0\} \) at the departure epochs of the queueing system on the state space \( U = \{ (b,(i,j))/0 \le b \le K - c,\,\,1 \le i \le m_{1} ,\,\,1 \le j \le m_{2} \} , \) where \( L_{n} \) denotes the buffer occupancy and \( J_{n} \) denotes the phase of superposed MMPP. For convenience, a queueing system is said to be at level b, if buffer occupancy is equal to b (excluding the ones in service). We ignore the time spent in a state and consider only the number of packets arrived during the sojourn time. Therefore, pertinent system is embedded Markov chain and has the following irreducible transition probability matrix P (with the dimension \( \left( {K - c + 1} \right)m_{1} m_{2} \, \times \,\left( {K - c + 1} \right)m_{1} m_{2} \)):
where
In Eqs. (9) and (10), the elements of row and column outside the matrices \( P_{1} \) and \( P_{2} \) are state spaces of the Markov chain and the elements of first (\( c + 1 \)) rows are identical. \( B_{i}^{(1)} ,i \ge 0 \), consists of the conditional probabilities that there are i high priority packet arrivals. \( B_{i}^{(2)} ,i \ge 0 \), consists of the conditional probabilities that there are i low priority packet arrivals.
i.e., \( B_{i} = B_{0}^{(1)} \otimes B_{i}^{(2)} + B_{1}^{(1)} \otimes B_{i - 1}^{(2)} + B_{2}^{(1)} \otimes B_{i - 2}^{(2)} + \cdots + B_{r}^{(1)} \otimes B_{i - r}^{(2)} + \cdots + B_{i}^{(1)} \otimes B_{0}^{(2)} \).
B i is the matrix consists of the conditional probabilities that there are i high priority and low priority packet arrivals and the general term \( B_{r}^{(1)} \otimes B_{i - r}^{(2)} \) is the matrix consists of the conditional probabilities that there are \( r \) high priority packet arrivals and \( i - r \) low priority packet arrivals.
\( C_{l} \) is the matrix consists of the conditional probabilities that there are \( l \) packet arrivals. In the above sum, the general term \( B_{r}^{(1)} \otimes \sum\nolimits_{j = l - r}^{\infty } {B_{j}^{(2)} } \, = B_{r}^{(1)} \otimes \left( {B_{l - r}^{(2)} + B_{l - r + 1}^{(2)} + B_{l - r + 2}^{(2)} + \cdots } \right) \) is the matrix consists of the conditional probabilities that there are r high priority packet arrivals and at least there are \( l - r \) low priority packet arrivals.
\( B_{{}}^{(2)} = \sum\nolimits_{i = 0}^{\infty } {B_{i}^{(2)} } \) consists of the conditional probabilities that there are \( \ge 0 \) low priority packet arrivals.
\( A(p) \) is the matrix consists of the conditional probabilities that there are \( p \) packet arrivals.
In the above sum, the general term \( B_{p + r}^{(1)} \otimes \sum\nolimits_{j = 0}^{\infty } {B_{j}^{(2)} } \, = B_{p + r}^{(1)} \otimes \left( {B_{0}^{(2)} + B_{1}^{(2)} + B_{2}^{(2)} + \cdots } \right) \) is the matrix consists of the conditional probabilities that there are \( p + r \) high priority packet arrivals and \( \ge 0 \) low priority packet arrivals. All the above elements (matrices) are derived using the addition law and multiplication law of probabilities and the matrices \( B_{m}^{(k)} (t) \) satisfies the following equation [9],
We assume that service time follows deterministic distribution. The brief description of deterministic distribution is as follows [13]. Let \( Y \) be continuous and non-negative random variable of deterministic (degenerate) distribution. The probability density function (pdf) of \( Y \) is a Derac-delta function at \( h \). The Derac-delta (Impulse) function \( \delta (t) \) is defined as \( \mathop {\lim }\limits_{\varepsilon \to 0} \,F_{\varepsilon } (t) \), where,
Clearly, \( \int\nolimits_{0}^{\infty } {\delta (t)dt = 1} \), and the Laplace–Stieltjes transform (LST) of \( \int\nolimits_{0}^{\infty } {e^{ - st} \delta (t)dt = 1} \) and
The cumulative distribution function of the deterministic distribution is a unit step function (at \( h \)),
The mean is \( E[Y] = ( - 1)\left[ {\frac{{d\overline{f} (s)}}{ds}} \right]_{s = 0} = \left[ {he^{ - sh} } \right]_{s = 0} = h \), and \( E[Y^{2} ] = ( - 1)^{2} \left[ {\frac{{d^{2} \overline{f} (s)}}{{ds^{2} }}} \right]_{s = 0} = \left[ {h^{2} e^{ - sh} } \right]_{s = 0} = h^{2} \).
Then the variance is \( Var[Y] = E[Y^{2} ] - E[Y]^{2} = h^{2} - [ - h]^{2} = 0 \).
When the service time is deterministic and is h units/packet, the Eq. (14) reduces to
The matrices of counting function \( B_{m}^{(k)} (h) \) can be computed following the procedure [6, 17]. We drop the superscript ‘\( k \)’ for convenience and the procedure holds good for both high priority and low priority packets. From the Eq. (18), we have
For \( m = 0 \) in Eq. (19), we have
where \( I \) is the identity matrix of designated dimension.
For \( w,n \ge 1 \), let \( G(n,w) \) be the coefficient of \( z^{w - 1} \) in \( \frac{{\left[ {(Q - \varLambda + \varLambda z)h} \right]\,^{n} }}{n!} \), nth term of the series on right hand side of Eq. (19). Then we have
\( G(n,w) = 0 \), if \( w > n + 1 \), and
Now, multiply on both sides of above equation by \( \left[ {\frac{(Q - \varLambda + \varLambda z)h}{n + 1}} \right] \), we obtain
In above equation, equating the coefficients of like powers of \( z \), we obtain,
Equating the coefficients of \( z^{n} \) in the Eq. (19), we get
The fundamental arrival rate of class \( k \) packets is \( \lambda^{(k)} = \pi (k)\varLambda (k)\,e \), where \( \pi (k) \) is the steady state probability vector of \( Q(k) \). The traffic intensity \( \rho = \left( {\lambda^{(1)} + \lambda^{(2)} } \right)\,h/c \). Let \( x = (x_{0} ,x_{1} , \ldots ,x_{K - c} ) \), where \( x_{q} = (x_{q,(1,1)} ,x_{q,(1,2)} , \ldots ,x_{{q,(m_{1} ,m_{2} )}} ) \), for \( q = 0,1, \ldots ,K - c \), when \( x_{q,(l,m)} \) is the conditional probability that there are \( q \) packets in the system given that embedded Markov chain is in the \( (l,m) \) state. Therefore, we have \( xP = x,\,\,\,xe = 1 \), where \( e \) is the column vector consisting of all 1. Then, in the steady state, high priority packet loss probability \( P^{hp} \) and low priority packet loss probability \( P^{lp} \), respectively, are derived as follows [6, 24]. Let \( PL^{hp} \) denote the number of high priority packets lost due to the fact that buffer is full. Then the expected value of \( PL^{hp} \)
This is obtained by considering the last column of the \( (K - c + 1)\, \times \,(K - c + 1) \) block transition probability matrix \( P \) as that column consists of matrices containing conditional probabilities that the buffer is full. Then high priority packet loss probability \( P^{hp} \) is given by
where \( \lambda E[H(t)] \) is the number of packet arrivals during the mean service time. Let \( PL^{lp} \) denote the number of low priority packets lost due to the fact that buffer occupancy exceeds the threshold. Then expected value of \( PL^{lp} \)
This is obtained by considering the last \( (d + c) \) columns of the \( (K - c + 1)\, \times \,(K - c + 1) \) block transition probability matrix \( P \) as these columns consists of matrices containing conditional probabilities that the buffer occupancy is greater than or equal to threshold. The low priority packet loss probability \( P^{lp} \) is given by
In general, problem of computing performance measures such as packet loss probability is reduced to the problem of computing steady state probability vector of pertinent Markov system. The embedded Markov chain of buffer occupancy considered in the Sect. 3 consists of repeated states and boundary states. The steady state probability distribution for the repeating portion of the \( P \) satisfies geometric form. M. F. Neuts [14] has taken the advantage of this particular form and developed to solve for steady state probability distribution. This technique is called matrix-geometric method and this domain popularity known as matrix-geometric solutions. Taking the advantage of this matrix-geometric form, alternate and suitable methods are proposed [3, 12, 24]. In the paper [24], input process is assumed to be discrete batch Markovian arrival process (D–BMAP) and the pertinent queueing system is of single-server. Here we have extended it to multi-server queueing system with continuous input process. In view of threshold setting we decompose the state space \( U \) into two subsets:
and
This partition of \( U \) makes the transition probability matrix \( P \) decomposed as follows:
where
The sub-matrices \( P_{nc} \), \( P_{nc,c} \), \( P_{c,nc}^{*} \), and \( P_{c} \) are the left upper part, right upper part, left lower part, and right lower part of the matrix \( P \) with dimensions of \( (K - 2c - d + 1)m_{1} m_{2} \, \times \,(K - 2c - d + 1)m_{1} m_{2} \), \( (K - 2c - d + 1)m_{1} m_{2} \, \times \,(d + c)m_{1} m_{2} \), \( (d + c)m_{1} m_{2} \, \times \,(K - 2c - d + 1)m_{1} m_{2} \) and \( (d + c)m_{1} m_{2} \, \times \,(d + c)m_{1} m_{2} \), respectively. These sub-matrices govern the transitions from \( U_{nc} \) into itself, from \( U_{nc} \) into \( U_{c} \), from \( U_{c} \) into \( U_{nc} \) and from \( U_{c} \) into itself, respectively. Next, we derive the mean length of non-critical and critical periods that occur alternately. For non-critical period, the transition probability matrix (TPM) of the absorbing Markov chain that has transient states \( U_{nc} \) and absorbing state \( U_{c} \) is given by
Similarly, in the case of critical period, the TPM of the absorbing Markov chain that has transient states \( U_{c} \) and absorbing states \( U_{nc} \) is given by
where \( P_{c,nc} \) is the last \( (cm_{1} m_{2} ) \) columns of the matrix \( P_{c,nc}^{*} \). This is followed from the fact that for a critical period it suffices to attain the buffer level \( K - 2c - d + 1 \) rather than all other below levels which is the starting point of non-critical period of each cycle except the first one. The absorbing probability vectors \( \alpha_{K - 2c - d} \) and \( \beta \) of the Markovian chain \( P^{nc} \) and \( P^{c} \) described in the paper [24] are given by,
and
where \( S_{nc} \) be the sub-matrix of \( [I - P_{nc} ]^{ - 1} \) which consists of the last \( (cm_{1} m_{2} ) \) rows in \( [I - P_{nc} ]^{ - 1} \). That is, the matrices absorbing probability vectors \( \alpha_{K - 2c - d} \) and \( \beta \) are steady state probability vectors of \( S_{nc} P_{nc,c} [I - P_{c} ]^{ - 1} P_{c,nc} \) and \( [I - P_{c} ]^{ - 1} P_{c,nc} S_{nc} P_{nc,c} \), respectively. The average length of non-critical and critical periods are \( E[L_{nc} ] \) and \( E[L_{c} ] \), respectively, given by
and
The average total number of high priority packets lost during a critical period is \( E[PL^{hpc} ] \),
The average total number of low priority packets lost during a critical period is \( E[PL^{lpc} ] \),
where \( P_{nc,c}^{hp} \) and \( P_{c}^{hp} P_{c}^{hp} \) are the high priority packet loss during a critical period and \( P_{nc,c}^{lp} P_{nc,c}^{lp} \) and \( P_{c}^{lp} \) are the low priority packet loss during a critical period, and are given below, for \( l > 0 \),
The high priority packet loss probability \( P^{hp} \) and low priority packet loss probability \( P^{lp} \) are
and
Algorithm of this model is briefly given in “Appendix 1” section.
4 Numerical results
Using the Eqs. (37, 38, 45, 46), the steady state packet loss probabilities and mean length of non-critical and critical periods are computed [24]. The generalized variance based Markovian fitting method proposed in [22] is employed to emulate the self-similar traffic for both high priority and low priority packet traffic. The mean arrival rate (\( \lambda \)) and variance (\( \sigma^{2} \)) of the self-similar traffic is set to be 1 and 0.6, respectively [22], the interested time-scale range to emulate self-similarity is over \( [10^{2} ,10^{7} ] \), [6, 7]. The fitting parameters of resultant MMPP are given by the matrices placed in “Appendix 2” section. It is shown in the papers [2, 22] that in order to emulate self-similar traffic well, the minimum number of states of the resultant MMPPs must be greater than or equal to 16. That is, both \( m_{1} \) and \( m_{2} \) must be ≥16. So each class is here characterized by \( 16 \times 16 \) matrices. Such a high dimensional MMPP for both high priority and low priority traffic results in computational complexity. In order to reduce the computational complexity, we use approximate model [17], which is based on the papers [1, 8]. The resultant 16-state MMAP of low priority packets is approximated by a 2-state Markovian arrival process (MAP). By applying this approximated model, the computational complexity is reduced by \( 8^{3} = 512 \) times [4]. For the validation of proposed model, we compare analytic results with that of simulation results when the number of servers is 1. In this case, the system capacity (\( K \)) and traffic intensity (\( \rho \)) are set to be 15 and 0.8, respectively, then buffer depth of the router is 14. We also demonstrated three cases of the Hurst parameters; \( H = 0.7 \), \( H = 0.8 \) and \( H = 0.9 \). From Figs. 2, 3 and 4, depict the packet loss probability against threshold (\( d \)). Analytical results are compared with that of simulation results [5]. In [5], for simulation results, Fractional Brownian Traffic (FBT) is used as input process. The FBT is based on Fractional Brownian Motion (FBM) [15] and can be used as standard self-similar traffic. FBT is a Gaussian process with self-similar characteristics. The random midpoint displacement (RMD) algorithm [10] is used to generate FBT. We could observe that the analytical results and fractional Brownian traffic (FBT) simulation results [15] in the case of \( H = 0.7 \) and \( H = 0.8 \) are closer, and in the case of \( H = 0.9 \) there is some discrepancy. Next, we take multi-server queueing model \( {\text{MMPP/D/c/K}} \), the number of servers (\( c \)) is set to be 4, the system capacity (\( K \)) is set to be 20 then buffer depth of the router is 16 and two different traffic corresponding to the Hurst parameter values \( H = 0.7 \) and \( H = 0.8 \), and the results are presented in Figs. 5, 6, 7, 8, 9, 10 and 11. From Fig. 5, we observe that the high priority packet loss probability decrease and the low priority packet loss probability increase as the threshold increases. In order to find out the optimal level of the threshold, we illustrate a plot of high priority packet loss probabilities against the low priority ones at various \( d \) in Fig. 6. We could find out that the optimal level of the threshold is the one located nearest to the left lower corner of the plot, which is around \( b = 5 \). We also include the numerical results of the queueing systems \( M/D/4/20 \) without \( {\text{PBS}} \) and \( M/D/4/20 \) with \( {\text{PBS}} \) in the Figs. 7 and 8. That is, input process here is Poisson. From Figs. 7, 8 depict the variation of packet loss probability against traffic intensity and buffer capacity, respectively. From Fig. 7, it is clear that packet loss probability increase as traffic intensity increases. From Fig. 8, we observe that of high priority and low priority packet loss probabilities both decrease as the buffer capacity increases. From Fig. 9, we observe that the mean length of non-critical periods (ELNC) and critical periods (ELC) are decreases as the threshold increases. From Figs. 10 and 11, depict the variation of mean length at the optimum level of threshold against traffic intensity and buffer capacity, respectively. From Fig. 10, it is clear that the mean length of non-critical periods decrease and critical periods increases as traffic intensity increases. From Fig. 11, we observe that the mean length of non-critical and critical periods both increase as the buffer capacity increases.
5 Conclusion
Loss behavior of synchronous router employing PBS mechanism to provide differentiated services under Markovian modelled self-similar traffic input is investigated. The performance measures, namely, the steady state high priority and low priority packet loss probabilities, and average length of non-critical and critical periods, are computed and presented graphically. To reduce the computation complexity, the original high dimensional MMPP of the low priority packets is approximated by 2-state MAP. With this analysis, we can locate the optimal threshold position of buffer to obtain the greatest performance.
References
Altiok, T.: On the phase-type approximations of general distributions. IIE Trans. 17, 110–116 (1985)
Andersen, A.T., Niesen, B.F.: A Markovian approach for modeling packet traffic with long-range dependence. IEEE J. Sel. Areas Commun. 16, 719–732 (1998)
Blondia, C.: The N/G/1 finite capacity queue. Commun. Stat. Stoch. Models 5, 273–294 (1989)
Callegati, F.: Approximation modeling of optical buffers for variable length packets. Photon Netw. Commun. 3, 383–390 (2001)
Chang, C.H.: Performance Evaluation on WDM Optical Packet Switches with Self-Similar Traffic. Ph. D. Thesis. National Taiwan University, Taiwan. 99–138 (2008)
Chen, C.Y., Chang, C.H., Perati, M.R., Shao, S.K., Wu, J.: Performance analysis of WDM optical packet switches employing wavelength conversion under Markovian modeled self-similar traffic input. 2007 Workshop on High Performance on Switching and Routing (HPSR’07). 1–6 (2007)
Crovella, M.E., Bestavros, A.: Self-similarity in World Wide Web traffic: evidence and possible causes. IEEE/ACM Trans. Netw. 5, 835–846 (1997)
Diamond, J.E., Alfa, A.S.: On approximating higher order MAPs with MAPs of order two. Queueing Syst. 34, 269–288 (2000)
Kasahara, S.: Internet traffic modeling: Markovian approach to self-similar traffic and prediction of loss probability for finite queues. IEICE Transactions on Communications. E84-B, 2134–2141 (2001)
Lau, W.C., Erramilli, G., Wang, J., Willinger, W.: Self-similar traffic generation: The random midpoint displacement algorithm and its properties. IEEE International Conference on Communications (ICC’95). 1, 466–472 (1995)
Leland, W.E., Taqqu, M.S., Willinger, W., Wilson, D.V.: On the self-similar nature of Ethernet traffic (extended version). IEEE/ACM Trans. Netw. 2, 1–15 (1994)
Lucantoni, D.M., Hellstern, K.S.M., Neuts, M.F.: A single-server queue with server vacations and a class of nonrenewal arrival processes. Adv. Appl. Probab. 22, 676–705 (1990)
Medhi, J.: Stochastic processes. In: Medhi, J. (ed.) Random Variables and Stochastic Process. 3, pp. 17–22. New Age International, New Delhi (2009)
Neuts, M.F.: Matrix Geometric Solutions in Stochastic Models—An Algorithmic Approach. Johns Hopkins University Press, Baltimore (1981)
Norros, I.: On the use of fractional Brownian motion in the theory of connectionless networks. IEEE J. Sel. Areas Commun. 13, 953–962 (1995)
Paxson, V., Floyd, S.: Wide area traffic: the failure of Poisson modeling. IEEE/ACM Trans. Netw. 3, 226–244 (1995)
Perati, M.R., Shao, S.K., Chang, C.H., Wu, J.: An efficient approximate Markovian model for optical packet switches employing partial buffer sharing mechanism under self-similar traffic input. IEEE Workshop on High Performance Switching and Routing (HPSR 2007). 1–7 (2007)
Qiao, C., Yoo, M., Yu, Z.X.: Optical burst switching (OBS); a new paradigm for an optical internet. J. High Speed Netw. 8, 69–84 (1999)
Reddy, P.M., Kumar, L.P.R., Reddy, D.M., Kumar, K.S.: Performance analysis of Internet router employing partial buffer sharing mechanism under Markovian modeled self-similar variable length packet input traffic. Int. J. Pure Appl. Math. 67, 407–421 (2011)
Riberio, M.R.N., O’Mahony, M.J.: Improvements on performance of photonic packet switching nodes by priority assignment and buffer sharing. IEEE International Conference on Communications (ICC 2000). 3, 1738–1742 (2000)
Sampath, K.K., Malla, R.P., Adilakshmi, T.: Performance study of WDM OPS employing tunable converter sharing under self-similar variable length packet traffic. 18th IEEE International Conference on Networks (ICON). 114–117 (2012)
Shao, S.K., Perati, M.R., Tsai, M.G., Tsao, H.W., Wu, J.: Generalized variance-based Markovian fitting for self-similar traffic modeling. IEICE Trans. Commun. 88, 1493–1502 (2005)
Venkataramani, B., Bose, S.K., Srivathsan, K.R.: Queueing analysis of a non-preemptive MMPP/D/1 priority system. Comput. Commun. 20, 999–1018 (1997)
Wang, Y.C., Lin, C.W., Lu, C.C.: Loss behavior in space priority queue with batch Markovian arrival process-discrete time case. Perform. Eval. 41, 269–293 (2000)
Acknowledgments
The authors wish to acknowledge the Department of Science and Technology (DST), Government of India for its funding under the major research project (MRP) scheme with Grant Number: SR/S4/MS:530/08.
Author information
Authors and Affiliations
Corresponding author
Appendices
Appendix 1
Here we give the algorithmic steps to compute the required performance measures \( P^{hp} \), \( P^{lp} \), \( E[L_{c} ] \), and \( E[L_{nc} ] \).
-
Step 1. Compute \( S_{nc} \) (the last (\( cm_{1} m_{2} \)) rows of \( \left( {I - P_{nc} } \right)^{ - 1} \)) and \( \left( {I - P_{c} } \right)^{ - 1} \).
-
Step 2. Compute the steady state probability vectors \( \alpha_{K - 2c - d} \) and \( \beta \) by using \( \alpha_{K - 2c - d} = \left[ {0,0, \ldots ,0,1} \right]\left( {I - T} \right)^{ - 1} \) and \( \beta = \left[ {0,0, \ldots ,0,1} \right]\left( {I - V} \right)^{ - 1} \), respectively, where \( T \) is the \( \left( {cm_{1} m_{2} } \right)\, \times \,\left( {cm_{1} m_{2} } \right) \) stochastic matrix \( S_{nc} P_{nc,c} \left( {I - P_{c} } \right)^{ - 1} P_{c,nc} \) in Eq. (35) in which the last column is replaced by the column vector \( \left[ { - 1, - 1, \ldots , - 1,0} \right]^{t} \) and \( V \) is the \( \left( {(d + c)m_{1} m_{2} \times (d + c)m_{1} m_{2} } \right) \) stochastic matrix \( \left( {I - P_{c} } \right)^{ - 1} P_{c,nc} S_{nc} P_{nc,c} \) in Eq. (36) in which the last column is replaced by the column vector \( \left[ { - 1, - 1, \ldots , - 1,0} \right]^{t} \).
-
Step 3. Compute \( \alpha_{K - 2c - d} S_{nc} \) and \( \beta \left( {I - P_{c} } \right)^{ - 1} \).
-
Step 4. Compute \( \left( {\sum\nolimits_{l = 1}^{\infty } {lP_{nc,c}^{hp} (l)} } \right)e \), \( \left( {\sum\nolimits_{l = 1}^{\infty } {lP_{c}^{hp} (l)} } \right)e \), \( \left( {\sum\nolimits_{l = 1}^{\infty } {lP_{nc,c}^{lp} (l)} } \right)e \) and \( \left( {\sum\nolimits_{l = 1}^{\infty } {lP_{c}^{lp} (l)} } \right)e \).
-
Step 5. Compute \( E[L_{nc} ] \) and \( E[L_{c} ] \) by using Eqs. (37) and (38), respectively.
-
Step 6. Compute \( P^{hp} \) and \( P^{lp} \) by using Eqs. (45) and (46), respectively.
Appendix 2
The MMPPs are characterized by the infinitesimal generator matrix \( Q \) and arrival rate matrix \( \varLambda \), are given below, respectively. These matrices are fitted by equating the variance of MMPP and self-similar traffic.
-
Case 1. The self-similar process with Hurst parameter \( H = 0.7 \), \( \lambda = 1 \), \( \sigma^{2} = 0.6 \).
-
Case 2. The self-similar process with Hurst parameter \( H = 0.8 \), \( \lambda = 1 \), \( \sigma^{2} = 0.6 \).
-
Case 3. The self-similar process with Hurst parameter \( H = 0.9 \), \( \lambda = 1 \), \( \sigma^{2} = 0.6 \)
Rights and permissions
About this article
Cite this article
Gudimalla, R.K., Perati, M.R. Loss behavior of internet router with priority based self-similar synchronous traffic-multi server queueing system with Markovian input. OPSEARCH 54, 283–305 (2017). https://doi.org/10.1007/s12597-016-0284-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12597-016-0284-3