27,445 research outputs found

    Heavy-traffic analysis of k-limited polling systems

    Get PDF
    In this paper we study a two-queue polling model with zero switch-over times and kk-limited service (serve at most kik_i customers during one visit period to queue ii, i=1,2i=1,2) in each queue. The arrival processes at the two queues are Poisson, and the service times are exponentially distributed. By increasing the arrival intensities until one of the queues becomes critically loaded, we derive exact heavy-traffic limits for the joint queue-length distribution using a singular-perturbation technique. It turns out that the number of customers in the stable queue has the same distribution as the number of customers in a vacation system with Erlang-k2k_2 distributed vacations. The queue-length distribution of the critically loaded queue, after applying an appropriate scaling, is exponentially distributed. Finally, we show that the two queue-length processes are independent in heavy traffic

    A Markov Chain Model Checker

    Get PDF
    Markov chains are widely used in the context of performance and reliability evaluation of systems of various nature. Model checking of such chains with respect to a given (branching) temporal logic formula has been proposed for both the discrete [17,6] and the continuous time setting [4,8]. In this paper, we describe a prototype model checker for discrete and continuous-time Markov chains, the Erlangen Twente Markov Chain Checker (EMC2(E \vdash MC^2), where properties are expressed in appropriate extensions of CTL. We illustrate the general bene ts of this approach and discuss the structure of the tool. Furthermore we report on first successful applications of the tool to non-trivial examples, highlighting lessons learned during development and application of (EMC2(E \vdash MC^2)

    Wireless Communication in Process Control Loop: Requirements Analysis, Industry Practices and Experimental Evaluation

    Get PDF
    Wireless communication is already used in process automation for process monitoring. The next stage of implementation of wireless technology in industrial applications is for process control. The need for wireless networked control systems has evolved because of the necessity for extensibility, mobility, modularity, fast deployment, and reduced installation and maintenance cost. These benefits are only applicable given that the wireless network of choice can meet the strict requirements of process control applications, such as latency. In this regard, this paper is an effort towards identifying current industry practices related to implementing process control over a wireless link and evaluates the suitability of ISA100.11a network for use in process control through experiments

    Random Fluid Limit of an Overloaded Polling Model

    Get PDF
    In the present paper, we study the evolution of an overloaded cyclic polling model that starts empty. Exploiting a connection with multitype branching processes, we derive fluid asymptotics for the joint queue length process. Under passage to the fluid dynamics, the server switches between the queues infinitely many times in any finite time interval causing frequent oscillatory behavior of the fluid limit in the neighborhood of zero. Moreover, the fluid limit is random. Additionally, we suggest a method that establishes finiteness of moments of the busy period in an M/G/1 queue.Comment: 36 pages, 2 picture

    A transient analysis of polling systems operating under exponential time-limited service disciplines

    Get PDF
    In the present article, we analyze a class of time-limited polling systems. In particular, we will derive a direct relation for the evolution of the joint queue-length during the course of a server visit. This will be done both for the pure and the exhaustive exponential time-limited discipline for general service time requirements and preemptive service. More specifically, service of individual customers is according to the preemptive-repeat-random strategy, i.e., if a service is interrupted, then at the next server visit a new service time will be drawn from the original service-time distribution. Moreover, we incorporate customer routing in our analysis, such that it may be applied to a large variety of queueing networks with a single server operating under one of the before-mentioned time-limited service disciplines. We study the time-limited disciplines by performing a transient analysis for the queue length at the served queue. The analysis of the pure time-limited discipline builds on several known results for the transient analysis of the M/G/1 queue. Besides, for the analysis of the exhaustive discipline, we will derive several new results for the transient analysis of an M/G/1 during a busy period. The final expressions (both for the exhaustive and pure case) that we obtain for the key relations generalize previous results by incorporating customer routing or by relaxing the exponentiality assumption on the service times. Finally, based on the interpretation of these key relations, we formulate a conjecture for the key relation for any branching-type service discipline operating under an exponential time-limit

    A method for analyzing the performance aspects of the fault-tolerance mechanisms in FDDI

    Get PDF
    The ability of error recovery mechanisms to make the Fiber Distributed Data Interface (FDDI) satisfy real-time performance constraints in the presence of errors is analyzed. A complicating factor in these analyses is the rarity of the error occurrences, which makes direct simulation unattractive. Therefore, a fast simulation technique, called injection simulation, which makes it possible to analyze the performance of FDDI, including its fault tolerance behavior, was developed. The implementation of injection simulation for polling models of FDDI is discussed, along with simulation result
    corecore