Abstract
We consider a single-line queuing system with an infinite buffer that receives two Poisson flows of customers with different intensities. Customers of the first type have preemptive priority over customers of the second type. In addition, at the time of the end of servicing, a high-priority customer with some probability can drop all low-priority customers in the queue. Serving both types of customers has an exponential distribution with different parameters. We show expressions for calculating stationary probabilities in this system, the probability of servicing a low-priority customer in terms of the generating function, and a formula for the average number of customers of the second type.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
Consider a queuing system (QS) with two input flows, where customers of the first flow have preemptive priority over customers of the second flow, and at the time of the end of service, a high-priority customer can drop all low-priority customers with some probability.
This phenomenon, when a customer drops other customers from the buffer when it leaves, is called a renovation. The class of systems with renovation arose as a result of the development of the ideas of QS with negative customers [1]. The difference is that negative customers are a separate type of customers and they either "kill” or push out ordinary customers when they arrive rather than leave, and they themselves do not require servicing. There is an extensive literature on systems with negative customers, a detailed overview of which can be found, for example, in [2] starting with the earliest work on the topic, or in [3] with a discussion of more recent publications. In turn, we will mention only a few works reflecting various areas of research. In particular, in [4, 5] systems with negative customers and limited sojourn times are studied, in [6–10] systems with negative customers and retrial calls are presented, a number of works [11–16] is devoted to the study of such systems in discrete time. In addition, there are works that consider systems with group arrivals of customers, and some of them assume correlated input flows [16–20]; we also note a number of publications covering the characteristics of the so-called QS with revenue [21–25], and the above categories do not exclude mutual intersections and the imposition of additional conditions; for example, in [6, 13, 16, 18, 20, 26] considered systems also contain walks or vacations of devices during periods of inactivity. We also note a number of recent foreign works [27–29], which contain the corresponding bibliography.
One of the first works on systems with renovation was [30], where the stationary probability distribution was obtained in terms of a generating function. In later publications [31–33], a different method for finding the desired probabilities was proposed and some temporal characteristics were found. At the same time, the concept of a generalized renovation was introduced, when not all customers are dropped from the buffer, but a random number with a given distribution.
Note that a generalized renovation can be thought of as an Active Queue Management (AQM) mechanism. Such mechanisms imply a decision to deny a request for service, depending on the state of the system, in order to limit the number of customers in the queue. The simplest, but often optimal, is the threshold control strategy [34, 35]. In other cases, various stochastic algorithms are widely used, in particular RED (Random Early Detection), according to which the probability of failure increases linearly over a certain interval of the number of customers. Usually, a decision is made at the time of the arrival of the customer, but nothing prevents it from being made at the time of the withdrawal of the customer (in relation to existing or future customers). Following this approach, the work [36] compares a generalized renovation with RED-like algorithms. Key research findings on AQM can be found in [37, 38].
The stochastic dropping model considered in this work can also be considered as a variation of AQM. In particular, the model effectively limits the number of type 2 customers; for any intensity of their arrival the system remains ergodic, which can be important in the case of DDoS (Distributed Denial of Service) attacks (see below).
A classical system with two types of customers and preemptive priority was introduced in [39], which also derived, in particular, the ergodicity condition, the downtime probability, the mean and variance of the number of low-priority customers, etc. Note that the concept of renovation can be generalized to systems with priorities in many ways. We will adhere to the direction set by publications [40, 41], where it was assumed that high-priority customers (type 1), when leaving, with some probability drop all low-priority customers (type 2). Thus, type 1 customers play the role of negative customers for type 2 customers, but with the above differences.
Practical interest in the queuing systems considered above can be motivated as follows. First, such models can help analyze the behavior of computer and telecommunication systems under the conditions of data loss, which can be caused by all sorts of reasons, from simple breakdowns and optimizing work in this way to the impatience of users of such systems [40]. The drop mechanism can also be used to regulate the traffic flow and differentiated user experience policy [42, 43]. All of these possibilities can be realized within different AQM strategies.
In addition, we can talk about the analysis (monitoring) of information security threats, since network security is a rather important problem both from a theoretical point of view and from the point of view of engineering applications. There are many types of network attacks (viruses, worms, trojans, DDoS attacks) that can cause significant disruptions and severe problems in the operation of computer networks. Most of the research in this area concentrates on methods of detecting attacks and responding, and there are not many works devoted to the analytical study of this problem, despite the fact that this could contribute to an increase in knowledge about the behavior of malicious programs and, accordingly, improve the quality of assessing their impact on the system [44–47].
Thus, the QS that we analyze here can emulate the operation of an information system subject to various kinds of attacks in order to disrupt its activity or gain unauthorized access to data. The system receives its usual user flow of customers (customers of type 2) but from time to time receives a conditional "viral” request (request of type 1). In case of a passive attack, the malicious application simply leaves the system. This situation can be regarded as the fact that the security system recognized the threat and processed it, preventing it from being harmful. Otherwise, when the security system failed to cope with the threat or the attack turned out to be active, this malicious customer drops the entire stream of "good” customers.
The study of the system considered in this work originated in [41], but there some results were obtainedFootnote 1 only for the special case of deterministic dropping when a request leaves (with probability one); in particular, that work derived a formula for the probability of downtime. The work [40] considered a similar system with non-preemptive priority, but it turned out to be more complex for theoretical analysis. Note that for small average servicing time of a type 2 request, the characteristics of systems with preemptive and non-preemptive priority should be similar.
Since the terminology for updating systems with priorities has not yet been adopted, we will call the model under consideration a system with stochastic dropping.
Note that this system is an intermediate case between the classic system with preemptive priority without dropping [39] and a system with deterministic dropping [41], so we can expect that its characteristics will also fall in the middle, and characteristics in extreme cases can be obtained by passing to the corresponding limit. Theoretical and numerical analysis confirms this assumption.
The paper is organized as follows: in the second section we describe the mathematical model of the QS and formulas for the distribution of the number of customers in the system; in the third section, a method for calculating the probability of system downtime is described; in the fourth, we pay the most attention to calculating the average number of type 2 customers; in the fifth, to finding the probability of servicing a customer of type 2, and in the sixth section, we give a numerical example.
2 Mathematical Model
Two types of customers flow into a single-line queuing system with an infinite buffer. The flows entering the system are Poisson with intensity λ1 for customers of type 1 and intensity λ2 for customers of type 2. Servicing times of customers have an exponential distribution with parameters μ1 and μ2 respectively. Customers of type 1 have preemptive priority compared to customers of type 2, i.e., if there are customers in the queue from both streams for servicing, a high-priority customer is selected, and a low-priority customer can be selected for servicing only if there are no customers of type 1 in the queue. In addition, if at the time of the arrival of a high-priority customer there is a customer of type 2, then its servicing is immediately interrupted and it returns to the head of the queue, and the type 1 customer arrives at the device. Customers of a given flow are served in the order of their arrival. Moreover, at the end of service, a high-priority customer on the device can either simply leave the system with probability p, or with probability q it can also drop all customers of the second type from the buffer, p + q = 1.
Operation of this QS can be described by the Markov process X(t) = {ν1(t), ν2(t)}, where ν1(t) and ν2(t) are the number of customers of the first (i) and second (j) type, with a discrete set of states X = {(i, j), i ⩾ 0, j ⩾ 0} (Fig. 1).
The first question is regarding the ergodicity of the system. Since customers of type 2 have no effect on customers of type 1, the behavior of ν1(t) will be the same as in the corresponding M∣M∣1 system, with the ergodicity condition ρ1 < 1, ρi = λi/μi, i = 1, 2. At the same time, since sometimes customers of type 2 are dropped entirely (at intervals with a finite average), then ν2(t) cannot tend to infinity, regardless of ρ2. Thus, the condition for the ergodicity of the system is ρ1 < 1, and here lies a qualitative difference with the classical system [39], where the condition for ergodicity was ρ1 + ρ2 < 1. In what follows, we will assume that condition ρ1 < 1 is fulfilled by default.
We denote by pi,j, i ⩾ 0, j ⩾ 0 the stationary probability that there are i high-priority customers and j low-priority customers in the system. A stationary distribution exists and satisfies the following system of equilibrium equations:
We introduce notation for marginal probabilities:
Since customers of type 2 do not affect high-priority customers in any way, the distribution of the number of high-priority customers will correspond to the distribution of the number of customers in the QS of type M∣M∣1, i.e.,
where the ergodicity condition ρ1 < 1 must hold.
Next, we introduce the notation for the generating function
Then it holds that
Now let us find an expression for the generating function. To do this, we multiply Eqs. (1)–(4) by uivj and sum over all possible values of i and j, getting
After transformations, we get that
Then the distribution of the number of low-priority customers is described by the expression
and the distribution of the number of customers of the first and second types is given by the formula
Next, we find the zeros of the denominator in (6), i.e., roots of the quadratic polynomial with respect to the variable u
Let us prove that 0 < u2(v) < 1 given that ρ1 = λ1/μ1 < 1. To do this, consider the behavior of the function λ1u(1 − u) + λ2u(1 − v) + μ1(u − p) from the denominator of (6). For u = 0 we get − μ1p < 0, for u = 1 we get λ2(1 − v) + μ1(1 − p) > 0, 0 < p < 1. Since the graph of this function is a parabola whose branches are directed downward (Fig. 2), we can conclude that the root of the quadratic polynomial lying in the interval from 0 to 1 exists and, moreover, it will be the smaller root of this polynomial.
Due to the fact that the generating function B(u, v) is a continuous function for u, v ∈ [0, 1], when we substitute (u2, v), 0 < u2 < 1, into the expression (6) the numerator must turn to zero simultaneously with the denominator. Therefore, we have
where, as we recall,
Thus, the expression for B(0, v) becomes
and for a complete solution of the problem it remains only to find the probability of system downtime p0,0.
3 Probability of System Downtime
Consider the denominator of the expression (8). Since v ∈ [0, 1], at the extreme points of the segment the expression takes the value μ2u2 > 0 for v = 0 and for v = 1, the value μ1v(u2 − p). Let us find its sign. Due to the fact that from the denominator of (6)
where λ1u2(1 − u2) > 0 and λ2u2(1 − v) > 0, we can conclude that μ1(u2 − p) < 0. This means that there exists v* ∈ (0, 1) such that the denominator (8) vanishes, which means that the numerator (8) must also vanish:
which, taking into account 0 < u2(v) < 1, implies that
Knowing p0,0, we can calculate all stationary probabilities and characteristics of the system.
Now let us show that the behavior of p0,0 on both boundaries of the segment p ∈ [0, 1] corresponds to the results obtained earlier in [39, 41].
Case 1 Let p → 0; then we need to prove that
where the expression for z2 is [41]
For p → 0, for any value of v it holds that u2 → 0. Therefore, to find v* we obtain the asymptotic expansion of the expression for u2 using the Taylor formula for p → 0:
and now
Next, we equate the denominator in (8) to zero and get
We substitute asymptotic expressions (11) and (12) into the right-hand side of this equality, getting
and as a result, after passing to the limit for p → 0, we obtain the equation
which exactly matches the equation from [41] for computing 0 < z2 < 1. Thus, the convergence of p0,0 to \({p}_{0,0}^{(0)}\) follows automatically from v* → z2, u2 → 0.
Case 2. Let ρ1 + ρ2 < 1. Let p → 1. Then we need to prove that
where the expression for \({p}_{0,0}^{(1)}\) is taken from [39]. Since p → 1, it follows that v* → 1 and u2 → 1. Let us introduce the notation ε = 1 − v, then ε → 0, q → 0. Further, using the asymptotic expansion of u2 with the Taylor formula in a similar way, we can write that
Then
Equality (13) for v → 1, u2 → 1, p → 1 implies that
i.e., for ε, q → 0
and therefore
Then
which corresponds to the classic result from [39].
4 Average Number of Type 2 Customers in the System
The average number of low-priority customers in the system is
After the appropriate transformations, we get
where
The average sojourn time in the system for a low-priority customer can be calculated using Little’s formula, i.e., it holds that
where v2 is the average sojourn time of a type 2 customer in the system, and then
which means that the average sojourn time for a low-priority customer in the queue is
The average number of high-priority customers in the system, the average sojourn time of high-priority customer in the queue and in the system is determined using well-known formulas for the M∣M∣1 QS since they are not influenced by customers of the second type.
5 Probability of Service for a Type 2 Customer
Now let us determine the probability of servicing a low-priority customer. Note that this is not an easy task, since the fate of a customer depends not only on the state of the system at the time of its arrival, but also on further development of events.
To do this, we introduce the value si,j, the probability that a type 2 customer will be serviced if there are i high-priority and j low-priority customers in front of it (taking into account the order on the device).
The following situations are possible (Fig. 3):
-
1)
if there are i customers of the first type and j customers of the second type in the system before a low-priority customer, then with probability λ1/(λ1 + μ1) a new priority customer can enter the system and take the place in front of the considered low-priority one (not necessarily immediately in front of it), i.e., there will now be (i + 1) high-priority customers, or with probability μ1/(λ1 + μ1) the first customer can be serviced and at the same time with probability p it will simply leave the system without dropping low-priority customers, then there will by i − 1 high-priority customers before the second type customer (Fig. 3a);
-
2)
if there are only j of the second type in the system before a low-priority customer, then with probability λ1/(λ1 + μ2) a priority customer can enter the system and take place before the considered low-priority customer, or with probability μ2/(λ1 + μ2) a customer of type 2 can be serviced (Fig. 3b);
-
3)
if there are no other customers in the system before the low-priority customer, then with probability λ1/(λ1 + μ2) a priority customer can enter the system and take the place in front of the considered low-priority customer, or with probability μ2/(λ1 + μ2) a customer of the second type will be serviced successfully.
Note that the arrival of new low-priority customers in the system does not in any way affect the servicing of low-priority customers already in the system; therefore, these events are not taken into account anywhere. Let us compose the system of equations
We will look for a solution (15) in the form
then by substituting (18) into (15) for i = 1 we can write that
i.e., we get a quadratic equation with respect to the variable γ
The solution to the equation is
We choose a root in the range from 0 to 1, i.e., γ2. Thus, we get that
Now we substitute the resulting solution for si,j into (16), from which we can express s0,j as
Next, we substitute (19) for i = 1 and j = 0 into (17), which will allow us to express the probability of s0,0 explicitly:
Hence,
where
Thus, we obtain the formula for the required probabilities
Now, having determined the values of si,j, we can express the probability of servicing a low-priority customer
where B(γ2, δ) is defined by the expression for the generating function (5).
Note that for p → 1 we have γ2 → 1, δ → 1 and p(serv) → 1, which is consistent with p(serv) = 1 in the classical system [39]. On the other hand, for p → 0 we have γ2 → 0, δ → μ2/(λ1 + μ2) and
which is the correct result in the special case q = 1 (deterministic dropping) considered in [41].
6 Numerical Example
Let us illustrate the behavior of the average number of low-priority customers in the system and the probability of their servicing, as well as the probability of downtime, depending on the value of the probability p. Let λ1 = 1, λ2 = 2, μ1 = 3, μ2 = 4.
As we can see from the plots (Fig. 4) and the table, the average number of low-priority customers in the system increases with an increase in p, and the probability p0,0 itself decreases. Moreover, we note that the probability of downtime in the classical QS without the possibility of dropping low-priority customers, calculated by the formula from [39]
is equal to 0.16667 (or 1/6), and the average number of low-priority customers in the same classical system, described by the formula from [39]
is exactly 5. Thus, as the probability of dropping customers of the second type q approaches zero, the values N2 and p0,0 tend to the corresponding values \({N}_{2}^{(1)}\) and \({p}_{0,0}^{(1)}\) for the classical system with no dropping, as expected. On the other hand, from [41] we know the probability of downtime at p = 0, which turns out to be equal to \({p}_{0,0}^{(0)}\approx 0.426925\), which is also consistent with the table. As for the probability of servicing customers of the second type p(serv), it naturally tends to one as p grows (Fig. 5).
7 Conclusion
In this work we consider a QS with preemptive priority of type 1 customers over type 2 customers and stochastic dropping. We have derived and presented expressions for calculating the stationary probabilities of the system, probability of downtime, probability of servicing a low-priority customer (in terms of the generating function), and a formula for the average number of customers of the second type. We have compared our results with previously known for extreme cases and showed that they are obtained by the corresponding passage to the limit.
Notes
At the same time, logical errors were made in (4) and (17).
References
Gelenbe, E., Glynn, P. & Sigman, K. Queues with Negative Arrivals 28(no. 1), 245–250 (1991).
Do, T. V. Bibliography on G-Networks, Negative Customers and Applications. Math. Comput. Model. 53, 205–212 (2011).
Caglayan, M. G-Networks and Their Applications to Machine Learning, Energy Packet Networks and Routing: Introduction to the Special Issue. Prob. Eng. Inform. Sci. 31(no. 4), 381–395 (2017).
Malinkovskii, Yu.V. and Borodin, N.N.Queueing Networks with Finite Number of Flows of Negative Customers and with Limited Sojourn Time, Probl. Fiz., Mat. Tekh., 2017, no. 1, pp. 64–68.
Malinkovskii, Yu. V. Stationary Probability Distribution for States of G-Networks with Constrained Sojourn Time. Autom. Remote Control 78(no. 10), 1857–1866 (2017).
Dimitriou, I. A Mixed Priority Retrial Queue with Negative Arrivals, Unreliable Server and Multiple Vacations. Appl. Math. Model. 37, 1295–1309 (2013).
Rajkumar, M. An (s, S) Retrial Inventory System with Impatient and Negative Customers. Int. J. Math. Oper. Res. 6, 106–122 (2014).
Farkhadov, M. and Fedorova, E.Asymptotic Analysis of Retrial Queue M∣M∣1 with Negative Calls Under Heavy Load Condition, in Proc. 20th Int. Conf. "Distributed Computer and Communication Networks: Control, Computation, Communications” (DCCN-2017), Moscow: TEKHNOSFERA, 2017, pp. 470–475.
Farkhadov, M. & Fedorova, E. Retrial Queue M∣M∣1 with Negative Calls Under Heavy Load Condition. Commun. Comput. Inform. Sci. 700, 406–416 (2017).
Zidani, N., Spiteri, P. & Djellab, N. Numerical Solution for the Performance Characteristics of the M∣M∣C∣K Retrial Queue with Negative Customers and Exponential Abandonments by Using Value Extrapolation Method. RAIRO-Oper. Res. 53, 767–786 (2019).
Kyung, C. Chae, Hyun, M. Park & Won, S. Yang A GI∣Geo∣1 Queue with Negative and Positive Customers. Appl. Math. Model. 34, 1662–1671 (2010).
Wang, J., Huang, Y. & Dai, Z. A Discrete-Time On-Off Source Queueing System with Negative Customers. Comput. Ind. Eng. 61, 1226–1232 (2011).
Gao, Sh, Wang, J. & Zhang, D. Discrete-Time GIX∣Geo∣1∣N Queue with Negative Customers and Multiple Working Vacations. J. Korean Stat. Soc. 42, 515–528 (2013).
Wang, J., Huang, Y. & Do, T. A Single-Server Discrete-Time Queue with Correlated Positive and Negative Customer Arrivals. Appl. Math. Model. 37, 6212–6224 (2013).
Lee, D.H. and Kim, K.Analysis of Repairable Geo∣G∣1 Queues with Negative Customers, Appl. Math. Model., 2014, Article ID 350621.
Senthil, VadivuA., Arumuganathan, R. & Senthil, KumarM. Analysis of Discrete-Time Queues with Correlated Arrivals, Negative Customers and Server Interruption. RAIRO-Oper. Res. 50, 67–81 (2016).
Klimenok, V. I. & Dudin, A. N. A BMAP∣PH∣N Queue with Negative Customers and Partial Protection of Service. Commun. Statist. Simulat. Comput. 41(no. 7), 1062–1082 (2012).
Rajadurai, P., Chandrasekaran, M. & Saravanarajan, M. C. Steady State Analysis of Batch Arrival Feedback Retrial Queue with Two Phases of Service, Negative Customers, Bernoulli Vacation and Server Breakdown. Int. J. Math. Oper. Res. 7, 519–546 (2015).
Singh, C.J., Jain, M., Kaur, S., and Meena, R.K.Retrial Bulk Queue with State Dependent Arrival and Negative Customers, Proc. Sixth Int. Conf. on Soft Computing for Problem Solving: SocProS 2016, vol. 2: Advances in Intelligent Systems and Computing, Patiala, India, Switzerland: Springer, 2017, vol. 547, pp. 290–301.
Ayyappan, G. and Thamizhselvi, P.Transient Analysis of \({M}^{[{X}_{1}]},{M}^{[{X}_{2}]}/{G}_{1},{G}_{2}/1\) Retrial Queueing System with Priority Services, Working Vacations and Vacation Interruption, Emergency Vacation, Negative Arrival and Delayed Repair, Int. J. Appl. Comput. Math., 2018, vol. 4, article number 77.
Matalytski, M. A. Forecasting Anticipated Incomes in the Markov Networks with Positive and Negative Customers. Autom. Remote Control 78(no. 5), 815–825 (2017).
Lee, D.H.Optimal Pricing Strategies and Customers’ Equilibrium Behavior in an Unobservable M∣M∣1 Queueing System with Negative Customers and Repair, Math. Probl. Eng., 2017, article ID 8910819.
Matalytski, M. Finding Expected Revenues in G-network with Multiple Classes of Positive and Negative Customers Probability in the Engineering and Informational Sciences. Prob. Eng. Inform. Sci. 33(no. 1), 105–120 (2019).
Matalytski, M. Analysis of the Network with Multiple Classes of Positive and Negative Customers at a Transient Regime. Prob. Eng. Inform. Sci. 33(no. 2), 172–185 (2019).
Sun, K. & Wang, J. Equilibrium Joining Strategies in the Single Server Queues with Negative Customers. Int. J. Comput. Math. 96(no. 6), 1169–1191 (2019).
Xiu-li, Xu, Xian-ying, Wang, Xiao-feng, Song & Xiao-qing, Li Fluid Model Modulated by an M∣M∣1 Working Vacation Queue with Negative Customer. Acta. Math. Appl. Sin.-E. 34(no. 2), 404–415 (2018).
Chin, C.H., Koh, S.K., Tan, Y.F., Pooi, A.H., and Goh, Y.K.Stationary Queue Length Distribution of A Continuous-Time Queueing System with Negative Arrival, J. Phys. Conf., 2018, vol. 1132, article ID 012057.
Peng, Y. The MAP/G/1 G-queue with Unreliable Server and Multiple Vacations. Informatica 43(no. 4), 545–550 (2019).
Gupta, U., Kumar, N., and Barbhuiya, F.A Queueing System with Batch Renewal Input and Negative Arrivals, arXiv:2002.08209v1, 2020.
Kreinin, A. Queueing Systems with Renovation. J. Appl. Math. Stoch. Anal. 10(no. 4), 431–443 (1997).
Bocharov, P. P. & Zaryadov, I. S. Queueing Systems with Renovation. Stationary Probability Distribution. Vest. Ross. Univ. Druzh. Narod., Ser. "Mat. Informat. Fiz.” no. 1-2, 14–23 (2007).
Zaryadov, I. S. & Pechinkin, A. V. Stationary Time Characteristics of the GI∣M∣n∣∞ System with Some Variants of the Generalized Renovation Discipline. Autom. Remote Control 70(no. 12), 2085–2097 (2009).
Zaryadov, I. S. The GI∣M∣n∣∞ Queuing System with Generalized Renovation. Autom. Remote Control 71(no. 4), 663–671 (2010).
Grishunina, Y. B. Optimal Control of Queue in the M∣G∣1∣∞ System with Possibility of Customer Admission Restriction. Autom. Remote Control 76(no. 3), 433–445 (2015).
Agalarov, Ya. M. & Shorgin, V. S. About the Problem of Profit Maximization in G∣M∣1 Queuing Systems with Threshold Control of the Queue. Informat. Primen. 11(no. 4), 55–64 (2017).
Konovalov, M. G. & Razumchik, R. V. Comparison of Two Active Queue Management Schemes through the M∣D∣1∣N Queue. Inform. Appl. 12(no. 4), 9–15 (2018).
Adams, R. Active Queue Management: A Survey. IEEE Commun. Surveys Tutorials 15(no. 3), 1425–1476 (2013).
Sh, Anup & Ashok, B. A Survey on Active Queue Management Techniques. Int. J. Eng. Comput. Sci. 5, 18993–18997 (2016).
White, H. & Christie, LeeS. Queuing with Preemptive Priorities or with Breakdown. Oper. Res. 6(no. 1), 79–95 (1958).
Zaryadov, I. S. & Gorbunova, A. V. Analysis of the Characteristics of a Queueing System with Two Input Flows, Non-Preemptive Priority, and Dropping. Sovr. Inform. Tekhnol. IT-Obrazovanie no. 10, 388–393 (2014).
Zaryadov, I. S. & Gorbunova, A. V. The Analysis of Queueing System with Two Input Flows and Stochastic Drop Mechanism. Bull. Peopl. Friends. Univ. Russ., Ser. Math., Informat., Phys. no. 2, 33–37 (2015).
Zaryadov, I. S. & Korol’kova, A. V. The Application of Model with General Renovation to the Analysis of Characteristics of Active Queue Management with Random Early Detection (RED). T-Comm–Telekom. Transport no. 7, 84–88 (2011).
Chydzinski, A. and Mrozowski, P.Queues with Dropping Functions and General Arrival Processes, PLoS ONE, 2016, vol. 11, article ID 0150702.
Wang, Y., Lin, Ch, Li, Q.-L. & Fang, Y. A Queueing Analysis for the Denial of Service (DoS) Attacks in Computer Networks. Comput. Networks 51, 3564–3573 (2007).
Imamverdiyev, Y. & Nabiyev, B. Queuing Model for Information Security Monitoring Systems. PIT 07(no. 1), 28–32 (2016).
Kammas, P., Komninos, T., and Stamatiou, Y.C.Queuing Theory Based Models for Studying Intrusion Evolution and Elimination in Computer Networks, Fourth Int. Conf. on Information Assurance and Security, Napoli, Italy, 2008, pp. 167–171.
Ariba, Y., Gouaisbaut, F., Rahme, S. & Labit, Y. Traffic Monitoring in Transmission Control Protocol/Active Queue Management Networks through a Time-Delay Observer. IET Control Theory A 6(no. 2), 506–517 (2012).
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Gorbunova, A., Lebedev, A. Queueing System with Two Input Flows, Preemptive Priority, and Stochastic Dropping. Autom Remote Control 81, 2230–2243 (2020). https://doi.org/10.1134/S0005117920120073
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1134/S0005117920120073