571 research outputs found

    ANALYSIS OF BULK ARRIVALS IN QUEUEING MODELS

    Get PDF
           Present paper surveys the literature on bulk queueing models. The concept of bulk arrivals and bulk services has gained a tremendous significance in present situations. Due to congestion problem everywhere (banks, metro stations, bus stops, railway reservation, traffic … etc.) researchers have to focus their attention to develop models and mechanism to deal with the same. A number of models have been developed in the area of queueing theory incorporating bulk queueing models. These bulk queueing models can be applied to resolve the congestion problems. Through this survey, an attempt has been made to review the work done on bulk queues, modeling various phenomenons. The goal is to provide sufficient information to analysts, managers and industry people who are interested in using queueing theory to model congestion problems and want to locate the details of relevant models

    Analysis of a discrete-time single-server queue with an occasional extra server

    Get PDF
    We consider a discrete-time queueing system having two distinct servers: one server, the "regular" server, is permanently available, while the second server, referred to as the "extra" server, is only allocated to the system intermittently. Apart from their availability, the two servers are identical, in the sense that the customers have deterministic service times equal to 1 fixed-length time slot each, regardless of the server that processes them. In this paper, we assume that the extra server is available during random "up-periods", whereas it is unavailable during random "down-periods". Up-periods and down-periods occur alternately on the time axis. The up-periods have geometrically distributed lengths (expressed in time slots), whereas the distribution of the lengths of the down-periods is general, at least in the first instance. Customers enter the system according to a general independent arrival process, i.e., the numbers of arrivals during consecutive time slots are i.i.d. random variables with arbitrary distribution. For this queueing model, we are able to derive closed-form expressions for the steady-state probability generating functions (pgfs) and the expected values of the numbers of customers in the system at various observation epochs, such as the start of an up-period, the start of a down-period and the beginning of an arbitrary time slot. At first sight, these formulas, however, appear to contain an infinite number of unknown constants. One major issue of the mathematical analysis turns out to be the determination of these constants. In the paper, we show that restricting the pgf of the down-periods to be a rational function of its argument, brings about the crucial simplification that the original infinite number of unknown constants appearing in the formulas can be expressed in terms of a finite number of independent unknowns. The latter can then be adequately determined based on the bounded nature of pgfs inside the complex unit disk, and an extensive use of properties of polynomials. Various special cases, both from the perspective of the arrival distribution and the down-period distribution, are discussed. The results are also illustrated by means of relevant numerical examples. Possible applications of this type of queueing model are numerous: the extra server could be the regular server of another similar queue, helping whenever an idle period occurs in its own queue; a geometric distribution for these idle times is then a very natural modeling assumption. A typical example would be the situation at the check-in counter at a gate in an airport: the regular server serves customers with a low-fare ticket, while the extra server gives priority to the business-class and first-class customers, but helps checking regular customers, whenever the priority line is empty. (C) 2017 Elsevier B.V. All rights reserved

    Delay and Capacity in Ad Hoc Mobile Networks with f-cast Relay Algorithms

    Get PDF

    Socio-economic aware data forwarding in mobile sensing networks and systems

    Get PDF
    The vision for smart sustainable cities is one whereby urban sensing is core to optimising city operation which in turn improves citizen contentment. Wireless Sensor Networks are envisioned to become pervasive form of data collection and analysis for smart cities but deployment of millions of inter-connected sensors in a city can be cost-prohibitive. Given the ubiquity and ever-increasing capabilities of sensor-rich mobile devices, Wireless Sensor Networks with Mobile Phones (WSN-MP) provide a highly flexible and ready-made wireless infrastructure for future smart cities. In a WSN-MP, mobile phones not only generate the sensing data but also relay the data using cellular communication or short range opportunistic communication. The largest challenge here is the efficient transmission of potentially huge volumes of sensor data over sometimes meagre or faulty communications networks in a cost-effective way. This thesis investigates distributed data forwarding schemes in three types of WSN-MP: WSN with mobile sinks (WSN-MS), WSN with mobile relays (WSN-HR) and Mobile Phone Sensing Systems (MPSS). For these dynamic WSN-MP, realistic models are established and distributed algorithms are developed for efficient network performance including data routing and forwarding, sensing rate control and and pricing. This thesis also considered realistic urban sensing issues such as economic incentivisation and demonstrates how social network and mobility awareness improves data transmission. Through simulations and real testbed experiments, it is shown that proposed algorithms perform better than state-of-the-art schemes.Open Acces

    Performance Modelling and Optimisation of Multi-hop Networks

    Get PDF
    A major challenge in the design of large-scale networks is to predict and optimise the total time and energy consumption required to deliver a packet from a source node to a destination node. Examples of such complex networks include wireless ad hoc and sensor networks which need to deal with the effects of node mobility, routing inaccuracies, higher packet loss rates, limited or time-varying effective bandwidth, energy constraints, and the computational limitations of the nodes. They also include more reliable communication environments, such as wired networks, that are susceptible to random failures, security threats and malicious behaviours which compromise their quality of service (QoS) guarantees. In such networks, packets traverse a number of hops that cannot be determined in advance and encounter non-homogeneous network conditions that have been largely ignored in the literature. This thesis examines analytical properties of packet travel in large networks and investigates the implications of some packet coding techniques on both QoS and resource utilisation. Specifically, we use a mixed jump and diffusion model to represent packet traversal through large networks. The model accounts for network non-homogeneity regarding routing and the loss rate that a packet experiences as it passes successive segments of a source to destination route. A mixed analytical-numerical method is developed to compute the average packet travel time and the energy it consumes. The model is able to capture the effects of increased loss rate in areas remote from the source and destination, variable rate of advancement towards destination over the route, as well as of defending against malicious packets within a certain distance from the destination. We then consider sending multiple coded packets that follow independent paths to the destination node so as to mitigate the effects of losses and routing inaccuracies. We study a homogeneous medium and obtain the time-dependent properties of the packet’s travel process, allowing us to compare the merits and limitations of coding, both in terms of delivery times and energy efficiency. Finally, we propose models that can assist in the analysis and optimisation of the performance of inter-flow network coding (NC). We analyse two queueing models for a router that carries out NC, in addition to its standard packet routing function. The approach is extended to the study of multiple hops, which leads to an optimisation problem that characterises the optimal time that packets should be held back in a router, waiting for coding opportunities to arise, so that the total packet end-to-end delay is minimised

    Modeling the human as a controller in a multitask environment

    Get PDF
    Modeling the human as a controller of slowly responding systems with preview is considered. Along with control tasks, discrete noncontrol tasks occur at irregular intervals. In multitask situations such as these, it has been observed that humans tend to apply piecewise constant controls. It is believed that the magnitude of controls and the durations for which they remain constant are dependent directly on the system bandwidth, preview distance, complexity of the trajectory to be followed, and nature of the noncontrol tasks. A simple heuristic model of human control behavior in this situation is presented. The results of a simulation study, whose purpose was determination of the sensitivity of the model to its parameters, are discussed

    Handling Mobility in IoT applications based on the MQTT protocol

    Full text link
    © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Connectivity clearly plays an important role in Internet of Things (loT) solutions, and the efficient handling of mobility is crucial for the overall performance of loT applications. Currently, the most widely adopted protocols for loT and Machine to Machine (M2M) environments, namely MQTT, CoAP or LWM2M, are directly dependent on the TCP/IP protocol suite. This suite is highly reliable when using wired networks, but it is not the best solution in the presence of intermittent connections. In this work we provide a solution to improve MQTT with an emphasis on mobile scenarios. The advantage of the solution we propose is making the system more immune to changes in the point of attachment of mobile devices. This way we avoid loT service developers having to explicitly consider this issue. Moreover, our solution does not need extra support from the network through protocols like MobilelP or LISP. The obtained results show that our proposal, based on intermediate buffering, guarantees that there is no information loss during hand-off periods due to node mobility; furthermore, based on discrete event simulation results, we determine the maximum number of sources and the required amount of buffers for a mobile node.This work was partially supported by the Ministerio de Economía y Competitividad, Programa Estatal de Investigación, Desarrollo e Innovación Orientada a los Retos de la Sociedad, Proyectos I+D+I 2014, Spain, under Grant TEC2014-52690-R.Luzuriaga Quichimbo, JE.; Cano Escribá, JC.; Tavares De Araujo Cesariny Calafate, CM.; Manzoni, P.; Perez, M.; Boronat, P. (2015). Handling Mobility in IoT applications based on the MQTT protocol. IEEE. https://doi.org/10.1109/ITechA.2015.7317403

    On M/G/1 system under NT policies with breakdowns, startup and closedown

    Get PDF
    AbstractThis paper studies the vacation policies of an M/G/1 queueing system with server breakdowns, startup and closedown times, in which the length of the vacation period is controlled either by the number of arrivals during the vacation period, or by a timer. After all the customers are served in the queue exhaustively, the server is shutdown (deactivates) by a closedown time. At the end of the shutdown time, the server immediately takes a vacation and operates two different policies: (i) The server reactivates as soon as the number of arrivals in the queue reaches to a predetermined threshold N or the waiting time of the leading customer reaches T units; and (ii) The server reactivates as soon as the number of arrivals in the queue reaches to a predetermined threshold N or T time units have elapsed since the end of the closedown time. If the timer expires or the number of arrivals exceeds the threshold N, then the server reactivates and requires a startup time before providing the service until the system is empty. If some customers arrive during this closedown time, the service is immediately started without leaving for a vacation and without a startup time. We analyze the system characteristics for each scheme
    corecore