M/G/c/K PERFORMANCE MODELS

Size: px
Start display at page:

Download "M/G/c/K PERFORMANCE MODELS"

Transcription

1 M/G/c/K PERFORMANCE MODELS J. MacGregor Smith Department of Mechanical and Industrial Engineering, University of Massachusetts Amherst, Massachusetts Abstract Multi-server performance models of queueing systems are very appropriate modelling tools for manufacturing, telecommunication, transportation and facility modelling applications. Exact computation of performance measures of multi-server queueing systems remains an intractable problem. Approximations of these performance measures are important to quickly and accurately reveal the performance of a system. This is desirable for both performance evaluation as well as optimization of these systems. Two-moment approximation formulas are presented for performance modelling of multi-server systems involving servers of, 3, 4, and 5 servers. Extensive computational results are provided to evaluate the approximation results against simulation, known tabular results, and other approximation formulas. Extensions of the two-moment methodology to larger multi-server systems are also discussed. Keywords: M/G/c/K Performance Models Introduction M/G/c/K models are difficult to construct because the memoryless property of the exponential distribution no longer obtains. Knowledge of the number of customers at time t is no longer adequate to predict the number of customers at time t + t. One needs to know how long the lead customer in the system has been in service. Approximations for the performance measures of these systems are important not only for effective estimates of the performance measures of these systems but for optimization and their extensions to networks of M/G/c/K systems. M/G/c/K models are important in practice because most systems often have multiple servers with finite buffers. Manufacturing systems, facilities, telecommunication, and transportation systems abound with examples of multiple servers and finite waiting room. In this paper we outline the problem background in, discuss the mathematical models in 3, the methodology in 4 and the experimental results in 5. 6 concludes the paper. Problem Background Exact solutions to M/G/c/K queueing systems are only possible for the special cases of single servers, exponential service, or no waiting room at all. We will explore approximations based on a two-moment approach for estimating the blocking probability in M/G/c/K systems, then extend this methodology for estimating the other performance measures of these M/G/c/K systems. Figure 1 arrays some of the approaches to our problem. Mathematical Models Assumptions The main assumptions that we will make is that we are looking at Poisson arrival processes with arrival rate λ and multiple servers c with the same cumulative distribution B(t) with mean service rate µ. There is a finite amount of waiting room at the queue K c which includes the room for the servers. Customers will try to enter the queue if they are not blocked, otherwise,

2 M/G/1/K Embedded Markov Chain Regenerative Analysis Busy Period Analysis Gross and Harris, [6] Cooper, [1] Tijms, [15, 17] Tijms, [15, 17] Cooper, [1] M/G/c/K Diffusion Approximation Gaver and Shedler, 1973 [3, 4] Gelenbe, 1975[5] Yao and Buzacott, 1985 [19] Kimura [7],[10] Whitt [18] M/G/c/K Approximation Approaches Infinite Probabilities Two-Moment Approximation Simulation Schweitzer and Konheim, 1978[13] Tijms, [15, 16, 17] Sakasegawa, Miyazawa, and Yamazaki 1993[1] Kimura 1996[8, 9] Tijms, [15, 16, 17] Kimura 1996[8, 9] Nozaki and Ross[11] Figure 1: M/G/c/K Morphological Tree they are lost from the system with the blocking probability denoted as p K. Also, we will restrict our traffic intensity ρ<1 and only examine s 1 since this is most applicable to many of the applications. We can also relax these latter two assumptions and examine ρ 1,s > 1 and utilize the same methodology described in the paper. M/M/1/K Expression The blocking probability for an M/M/1/K system with ρ<1is well-known and is shown on the left of (1): (1 ρ) ρk ln( p K 1 ρ+p p K = 1 ρ K+1 K = K ρ ) (1) ln(ρ) If we relax the integrality of K, we can express K in terms of ρ and p K and arrive at a closedform expression for the buffer size which is the largest integer as shown on the right of (1). M/G/1/K Approximations Since the two-moment approximations of Tijms and Kimura, [15, 8, 9] are the foundation of the approach, they will be described in some detail. In order to describe Tijm s and Kimura s approximations, an additional bit of notation is needed at this point in the paper. B ɛ (M) is defined as the Markovian expression for the optimal buffer size as a function of the blocking probability and the threshold blocking probability, p K (ɛ). Also, B ɛ (D) is the expression of the optimal buffer size for a Deterministic service process. Tijm s two-moment approximation [, 15, 17] relies on a weighted combination of an exact (if available) expression of the M/D/1/K blocking probability as well as the blocking probability

3 of the M/M/1/K formula. B T ɛ (s )=s B ɛ (M)+(1 s )B ɛ (D) () Of course, if exact expressions are available for both formulas, then Tijm s approximation is exact for the two extreme cases. Kimura, on the other hand, also has a two-moment approximation that turns out to be a little simpler and is the one built upon since it utilizes Markovian approximations as its basis. His expression is: B ɛ (s )=B ɛ (M)+NINT{1/(s 1) ρb ɛ (M)} (3) where NINT is the nearest integer. As argued in this paper, this weighted combination of the optimal buffer values of Markovian systems is a very effective strategy. The key element in his approximation is the term from equation 3 (s 1) ρ which is actually based on the graph on the left, seen in Figure. 3.5 Functional form of theta() Functional form of theta() 3 s = s = 3 s = 4 s = s = modified approx. s = modified approx. s = 0.5 s = theta(g) theta(g) Figure : Kimura s Approximation on the left and modified on the right The θ(g) on the y-axis in Figure is used by Kimura to describe how the variability of the service time cdf B(t) of the queue affects the buffer size. Thus, a square root function of ρ is a very reasonable functional approximation for this problem. After much experimentation by the author, it was realized that when s [0, 1] the formula should be more appropriately modified to the formula on the left below: { (s 1) ρ (s 1) ρ } e s e, However, when s > 1, then the formula should be the version on the right above. What these modifications do are to dampen the square root approximation of the previous formula, see Figure on the right. Two-moment Methodology The two-moment approach allows one to develop closed form expressions for the performance measures of M/G/c/K systems which then can be translated into an effective numerical tool for measuring performance. The methodology which underlies our approach is the following:

4 Step 1.0 Fix c, then estimate K in closed form for the M/G/c/K model as a function of the threshold blocking probability p K and s. Step.0 Given K in closed form, use a two-moment approach to estimate p K (s ). Step 3.0 Estimate L q for the system with the same two-moment methodology, then utilizing p K and L q, estimate W q and finally W, L The methodology is totally dependent on fixing c which is only reasonable and then one must treat each case separately. This is tedious, but once this is done for the desired c value, everything else follows. The methodology is flexible in that better approximations for p k can then yield better performance measures overall. Derivation of p K Recall the formula for the exact continuous buffer size for the M/M/1/K formula: K = ln( p K 1 ρ+p K ρ ) ln(ρ) Here, Kimura s expression for the approximation of the optimal buffer size can be used with the above explicit formula. It is important to note here that the space for the server is subtracted in order to estimate the true buffer space in the queue: ( ln( p K 1 ρ+p K ρ ) ) 1 +1/ ( s 1 ) ( ln( p K ln(ρ) s 1 ρ+p K ρ ) ) 1 ln(ρ) Now we factor the terms of the above expression to give the following simplified expression for the optimal buffer size in M/G/1/K formulas: ( ( ) ln ln (ρ) )(+ s s ) s K = pk 1 ρ+pk ρ ln(ρ) If s =1, then the formula yields the same expression as for the c =1formula, when we subtract the space for the server. As an added side benefit for developing the closed form expression for the optimal buffer, if we invert the last expression we can obtain the blocking probability for the M/G/1/K system as: p K = ρ + s + K+ s s s s s (ρ 1) ρ s +K+ s s +1 + s s s 1 1 (4) (5) This is the key methodology as we shall argue and the foundation of all that is to follow. M/G/c/K Performance The p K for the M/G//K system based upon the previous methodology is given as: p K =ρ + s s s s s +K s ( µ + λ) ρ s s s +K + s s s λ µ λ 1 (6) L q for the M/G//K system based upon our methodology is very complex, so we will utilize simply the numerical formula to demonstrate its effectiveness.

5 Experimental Results We shall evaluate our approach against simulation, known tabular results and the twomoment approximation of Nozaki-Ross given below: Wq = E[S ] E[S] K 1 j=c (λe[s])j (K c) E[S](λ(E[S])K c!c j c c!c K c [ c 1 0 (λe[s]) j j! + K 1 (λe[s]) j j=c ](c λe[s]) c!c j c (7) This is quite a complicated expression and needs to be fixed for the particular value of c to be practical. To be fair to Nozaki-Ross, our approach and Nozaki-Ross work exactly when the service is Exponential(µ). However, as we shall show, Nozaki-Ross seems to be very unstable when ρ 1 for more general squared coefficients of variation. M/G//K As can be seen in the Figures 3, for deterministic service times s =0, the two-moment approximation developed in this paper slightly overestimates the W q measure but follows closely the behavior of the simulation model, while Nozaki-Ross starts out well for low ρ, it then completely goes awry. Table 3 gives a very detailed comparison of the two-moment approximation for P k,l q,w g,l,w against the results of Seelen, et. al, for P ks,l qs and the comparison of W q against Nozaki-Ross W qn. The approximation does very well with P k,l q against Seelen et. al. and behaves very well as opposed to Nozaki-Ross. It is actually the closeness of the blocking probability expression p K vs. p Ks in the first two columns of Table 3 that is so encouraging here. Expressions and results developed for the M/G/3/K and M/G/4/K are not included here for the sake of brevity. M/G/5/K The blocking probability for the M/G/5/K system is shown below: 5 s s 5 s + K + 65 ρ s s s µ 3 ( 5 µ + λ) p K = 5 s s 5 s + K + 65 ρ s s s µ 3 λ + 10 µ 4 +96λµ 3 +36λ µ +8λ 3 µ + λ 4 (8) As one can imagine, the closed form expression for L q is very complex and not fathomable. However, when it is translated into a numerical expression, we find the following numerical results. As can be seen in the Figures 4, the two-moment approximation developed in this paper overestimates the W q measure but follows closely the behavior of the simulation model, while Nozaki-Ross starts out well, but then again completely goes awry. Table 4 gives a very detailed comparison of the two-moment approximation for P k,l q,w g,l,w against the results of Seelen, et. al, for P k,l q and the comparison of W q against Nozaki-Ross. The approximation does very well with P k,l q against Seelen et. al. and also behaves very well as opposed to Nozaki-Ross. Summary and Conclusions This paper has presented a two-moment methodology for generating the performance measures of M/G/c/K queues. The key to the methodology is the development of an approximation for the blocking probability of these general multi-server systems. Numerical experiments were presented for the approach and compared with digital simulation results as well as the

6 two-moment approximation of Nozaki-Ross. The proposed methodology was shown to be very robust and accurate for a number of multi-server systems. REFERENCES [1] Cooper, Robert, Introduction to Queueing Theory North-Holland. [] De Kok, A.G. and H. Tijms, A Two-moment approximation for a Buffer Design Problem Requiring a Small Rejection Probability, Performance Evaluation 5, [3] Gaver, D. and Shedler, G.S., Processor Utilization in Multi-programming Systems via Diffusion Approximations. Operations Research.1, [4] Gaver, D. and Shedler, G.S., Approximate Models for Processor Utilization in Multiprogrammed Computer Systems. SIAM J. of Computing./3, [5] Gelenbe, E., On approximate Computer System Models, JACM (), [6] Gross, D. and C. Harris, Fundamentals of Queueing Theory. Wiley. [7] Kimura, T.,1985. Refining Diffusion Approximations for GI/G/1 Queues: A Tight Discretization Method, Teletraffic Congress, [8] Kimura, T., A Transform-Free Approximation for the Finite Capacity M/G/s Queue, Operations Research. 44(6), [9] Kimura, T., Optimal Buffer Design of an M/G/s Queue with Finite Capacity, Commun. Statist.-Stochastic Models, 1(1), [10] Kimura, T., 000. Equivalence Relations in the Approximations for the M/G/s/s + r Queue, Mathematical and Computer Modelling [11] Nozaki, S. and S. Ross, Approximations in Finite-Capacity Multi-server Queues with Poisson Arrivals, J. Appl.Prob, 15, [1] Sakasegawa, H., M. Miyazawa, and G. Yamazaki, Evaluating the Overflow Probability using the Infinite Queue. Operations Research 39, [13] Schweitzer, P. and A. Konheim, Buffer Overflow Calculations using an Infinitecapacity Model, Stochastic Proc. Appl. 6, [14] Seelen, L.P., H. Tijms, and M.H. VanHoorn, Tables for Multi-Server Queues. North- Holland. [15] Tijms, Henk, Stochastic Modeling and Analysis. New York:Wiley. [16] Tijms, Henk, 199. Heuristics for Finite-Buffer Queues, Probability in the Engineering and Informational Sciences 6, [17] Tijms, Henk, Stochastic Models: An Algorithmic Approach. New York:Wiley [18] Whitt, W. 004, A Diffusion Approximation fo rthe G/GI/n/m Queue. Operations Research,5 (6), [19] Yao, D. and Buzacott, J.A., Queueing Models for a Flexible Machining Station Part 1: The Diffusion Approximation. EJOR19,

7 M/D//K=3 System M/D//K=1 System 0.5 analytical nozaki-ross simulation.5 analytical nozaki-ross simulation Average Queue Waiting Time (Wq) Average Queue Waiting Time (Wq) K= K= K= K= K= Figure 3: Comparison of performance measures for M/G//K, s = 1

8 M/D/5/K=6 System M/D/5/K=15 System 0 analytical nozaki-ross simulation analytical nozaki-ross simulation Average Queue Waiting Time (Wq) Average Queue Waiting Time (Wq) K= K= K= K= K= Figure 4: Comparison of performance measures M/G/5/K, s = 1

OPTIMAL DESIGN OF NETWORKS OF GENERAL FINITE MULTI-SERVER QUEUES

OPTIMAL DESIGN OF NETWORKS OF GENERAL FINITE MULTI-SERVER QUEUES OPTIMAL DESIGN OF NETWORKS OF GENERAL FINITE MULTI-SERVER QUEUES Frederico R. B. Cruz- e-mail: fcruz@est.ufmg.br Federal University of Minas Gerais, Department of Statistics Av. Antônio Carlos, 6627-31270-901

More information

TELCOM 2130 Queueing Theory. David Tipper Associate Professor Graduate Telecommunications and Networking Program. University of Pittsburgh

TELCOM 2130 Queueing Theory. David Tipper Associate Professor Graduate Telecommunications and Networking Program. University of Pittsburgh TELCOM 2130 Queueing Theory David Tipper Associate Professor Graduate Telecommunications and Networking Program University of Pittsburgh Learning Objective To develop the modeling and mathematical skills

More information

Advanced Internet Technologies

Advanced Internet Technologies Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/

More information

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012 Queuing Systems Queuing theory establishes a powerful tool in modeling and performance analysis of many complex systems, such as computer networks, telecommunication systems, call centers, manufacturing

More information

Analytic Performance Models for Bounded Queueing Systems

Analytic Performance Models for Bounded Queueing Systems Analytic Performance Models for Bounded Queueing Systems Praveen Krishnamurthy Roger D. Chamberlain Praveen Krishnamurthy and Roger D. Chamberlain, Analytic Performance Models for Bounded Queueing Systems,

More information

EP2200 Queueing theory and teletraffic systems

EP2200 Queueing theory and teletraffic systems EP2200 Queueing theory and teletraffic systems Viktoria Fodor Laboratory of Communication Networks School of Electrical Engineering Lecture 1 If you want to model networks Or a complex data flow A queue's

More information

Available online at ScienceDirect. Procedia Computer Science 54 (2015 ) 24 30

Available online at   ScienceDirect. Procedia Computer Science 54 (2015 ) 24 30 Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 54 (2015 ) 24 30 Eleventh International Multi-Conference on Information Processing-2015 (IMCIP-2015) Performance Evaluation

More information

Data Network Protocol Analysis & Simulation

Data Network Protocol Analysis & Simulation Module Details Title: Long Title: Data Network PENDING APPROVAL Data Network Module Code: EE509 Credits: 7.5 NFQ Level: 9 Field of Study: Electronic Engineering Valid From: 2017/18 (Sep 2017) Module Delivered

More information

Teletraffic theory I: Queuing theory

Teletraffic theory I: Queuing theory Teletraffic theory I: Queuing theory Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2716/ 1. Place of the course TLT-2716 is a part of Teletraffic theory five

More information

WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT

WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 014 WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT Y. J. Lee Department of Technology

More information

Queuing Networks Modeling Virtual Laboratory

Queuing Networks Modeling Virtual Laboratory Queuing Networks Modeling Virtual Laboratory Dr. S. Dharmaraja Department of Mathematics IIT Delhi http://web.iitd.ac.in/~dharmar Queues Notes 1 1 Outline Introduction Simple Queues Performance Measures

More information

Performance of Cloud Computing Centers with Multiple Priority Classes

Performance of Cloud Computing Centers with Multiple Priority Classes Performance of Cloud Computing Centers with Multiple Priority Classes Wendy Ellens, Miroslav Živković, Jacob Akkerboom, Remco Litjens, Hans van den Berg Performance of Networks and Systems TNO Delft, the

More information

ON NEW STRATEGY FOR PRIORITISING THE SELECTED FLOW IN QUEUING SYSTEM

ON NEW STRATEGY FOR PRIORITISING THE SELECTED FLOW IN QUEUING SYSTEM ON NEW STRATEGY FOR PRIORITISING THE SELECTED FLOW IN QUEUING SYSTEM Wojciech Burakowski, Halina Tarasiuk,RyszardSyski Warsaw University of Technology, Poland Institute of Telecommunications 00-665-Warsaw,

More information

Read Chapter 4 of Kurose-Ross

Read Chapter 4 of Kurose-Ross CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures

More information

Stochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego

Stochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego Stochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego http://www.math.ucsd.edu/~williams 1 OUTLINE! What is a Stochastic Processing Network?! Applications!

More information

Using Queuing theory the performance measures of cloud with infinite servers

Using Queuing theory the performance measures of cloud with infinite servers Using Queuing theory the performance measures of cloud with infinite servers A.Anupama Department of Information Technology GMR Institute of Technology Rajam, India anupama.a@gmrit.org G.Satya Keerthi

More information

Using linear programming to analyze and optimize stochastic flow lines

Using linear programming to analyze and optimize stochastic flow lines Noname manuscript No. (will be inserted by the editor) Using linear programming to analyze and optimize stochastic flow lines Stefan Helber, Katja Schimmelpfeng, Raik Stolletz and Svenja Lagershausen Leibniz

More information

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015)

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Cross Traffic Estimate Model for Optical Burst Switching Networks Yujue WANG 1, Dawei NIU 2, b,

More information

EP2200 Queueing theory and teletraffic systems

EP2200 Queueing theory and teletraffic systems EP2200 Queueing theory and teletraffic systems Viktoria Fodor Laboratory of Communication Networks School of Electrical Engineering Lecture 1 If you want to model networks Or a complex data flow A queue's

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

TCP performance analysis through. processor sharing modeling

TCP performance analysis through. processor sharing modeling TCP performance analysis through processor sharing modeling Pasi Lassila a,b, Hans van den Berg a,c, Michel Mandjes a,d, and Rob Kooij c a Faculty of Mathematical Sciences, University of Twente b Networking

More information

Introduction to Queuing Systems

Introduction to Queuing Systems Introduction to Queuing Systems Queuing Theory View network as collections of queues FIFO data-structures Queuing theory provides probabilistic analysis of these queues Examples: Average length Probability

More information

Application of QNA to analyze the Queueing Network Mobility Model of MANET

Application of QNA to analyze the Queueing Network Mobility Model of MANET 1 Application of QNA to analyze the Queueing Network Mobility Model of MANET Harsh Bhatia 200301208 Supervisor: Dr. R. B. Lenin Co-Supervisors: Prof. S. Srivastava Dr. V. Sunitha Evaluation Committee no:

More information

Mean Value Analysis and Related Techniques

Mean Value Analysis and Related Techniques Mean Value Analysis and Related Techniques 34-1 Overview 1. Analysis of Open Queueing Networks 2. Mean-Value Analysis 3. Approximate MVA 4. Balanced Job Bounds 34-2 Analysis of Open Queueing Networks Used

More information

Application of Importance Sampling in Simulation of Buffer Policies in ATM networks

Application of Importance Sampling in Simulation of Buffer Policies in ATM networks Application of Importance Sampling in Simulation of Buffer Policies in ATM networks SAMAD S. KOLAHI School of Computing and Information Systems Unitec New Zealand Carrington Road, Mt Albert, Auckland NEW

More information

Packet Loss Process under Bounded Delay

Packet Loss Process under Bounded Delay Packet Loss Process under Bounded Delay Jianming Liu, Xiaohong Jiang, Achille Pattavina Graduate School of Information Sciences, Tohoku University, Sendai, Japan Email: jiang@ecei.tohoku.ac.jp Department

More information

Staffing and Scheduling in Multiskill and Blend Call Centers

Staffing and Scheduling in Multiskill and Blend Call Centers Staffing and Scheduling in Multiskill and Blend Call Centers 1 Pierre L Ecuyer GERAD and DIRO, Université de Montréal, Canada (Joint work with Tolga Cezik, Éric Buist, and Thanos Avramidis) Staffing and

More information

Simulation Studies of the Basic Packet Routing Problem

Simulation Studies of the Basic Packet Routing Problem Simulation Studies of the Basic Packet Routing Problem Author: Elena Sirén 48314u Supervisor: Pasi Lassila February 6, 2001 1 Abstract In this paper the simulation of a basic packet routing problem using

More information

Scientific Computing: An Introductory Survey

Scientific Computing: An Introductory Survey Scientific Computing: An Introductory Survey Chapter 13 Random Numbers and Stochastic Simulation Prof. Michael T. Heath Department of Computer Science University of Illinois at Urbana-Champaign Copyright

More information

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing Husnu Saner Narman Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science University of Oklahoma,

More information

Queuing Networks. Renato Lo Cigno. Simulation and Performance Evaluation Queuing Networks - Renato Lo Cigno 1

Queuing Networks. Renato Lo Cigno. Simulation and Performance Evaluation Queuing Networks - Renato Lo Cigno 1 Queuing Networks Renato Lo Cigno Simulation and Performance Evaluation 2014-15 Queuing Networks - Renato Lo Cigno 1 Moving between Queues Queuing Networks - Renato Lo Cigno - Interconnecting Queues 2 Moving

More information

Teletraffic theory (for beginners)

Teletraffic theory (for beginners) Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles

More information

Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras

Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture 16 Cutting Plane Algorithm We shall continue the discussion on integer programming,

More information

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Leah Rosenbaum Mohit Agrawal Leah Birch Yacoub Kureh Nam Lee UCLA Institute for Pure and Applied

More information

PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS

PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS THE UNIVERSITY OF NAIROBI DEPARTMENT OF ELECTRICAL AND INFORMATION ENGINEERING FINAL YEAR PROJECT. PROJECT NO. 60 PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS OMARI JAPHETH N. F17/2157/2004 SUPERVISOR:

More information

Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras

Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture 32 Multiple Server Queueing Models In this lecture, we continue our discussion

More information

Modeling and Simulation (An Introduction)

Modeling and Simulation (An Introduction) Modeling and Simulation (An Introduction) 1 The Nature of Simulation Conceptions Application areas Impediments 2 Conceptions Simulation course is about techniques for using computers to imitate or simulate

More information

Brief Literature Review of the Queuing Problem

Brief Literature Review of the Queuing Problem ISSN 2091-1521 (Print) 2091-153X (Online) International Journal of Operational Research/Nepal - IJORN - 2016, Vol. 5, Issue 1 Brief Literature Review of the Queuing Problem Yogesh Shukla 1 & Dr R.K. Shrivastav

More information

UNIT 4: QUEUEING MODELS

UNIT 4: QUEUEING MODELS UNIT 4: QUEUEING MODELS 4.1 Characteristics of Queueing System The key element s of queuing system are the customer and servers. Term Customer: Can refer to people, trucks, mechanics, airplanes or anything

More information

nalysis, Control, and Design of Stochastic Flow Systems Limited Storage

nalysis, Control, and Design of Stochastic Flow Systems Limited Storage nalysis, Control, and Design of Stochastic Flow Systems 1 / 42 Analysis, Control, and Design of Stochastic Flow Systems with Limited Storage Stanley B. Gershwin Department of Mechanical Engineering Massachusetts

More information

QSOLVE : AN OBJECT-ORIENTED SOFTWARE TOOL FOR TEACHING QUEUEING THEORY

QSOLVE : AN OBJECT-ORIENTED SOFTWARE TOOL FOR TEACHING QUEUEING THEORY QSOLVE : AN OBJECT-ORIENTED SOFTWARE TOOL FOR TEACHING QUEUEING THEORY Fernando C. Castaño Mariño e Paulo R. L. Gondim System Engineering Department - Instituto Militar de Engenharia - IME (Rio de Janeiro

More information

Approximate Linear Programming for Average-Cost Dynamic Programming

Approximate Linear Programming for Average-Cost Dynamic Programming Approximate Linear Programming for Average-Cost Dynamic Programming Daniela Pucci de Farias IBM Almaden Research Center 65 Harry Road, San Jose, CA 51 pucci@mitedu Benjamin Van Roy Department of Management

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

Queueing Networks. Lund University /

Queueing Networks. Lund University / Queueing Networks Queueing Networks - Definition A queueing network is a network of nodes in which each node is a queue The output of one queue is connected to the input of another queue We will only consider

More information

Introduction to Performance Engineering and Modeling

Introduction to Performance Engineering and Modeling Introduction to Performance Engineering and Modeling Dr. Michele Mazzucco Software Engineering Group Michele.Mazzucco@ut.ee http://math.ut.ee/~mazzucco What is Performance Engineering? Whether you design,

More information

Motivation: Wireless Packet-Based Transport

Motivation: Wireless Packet-Based Transport Wireless Networks I: Protocols & Architectures Hans-Peter Schwefel, Haibo Wang, Petar Popovski Mm1 IP Mobility Support (hps) Mm2 Wireless Multicast (hw) Mm3 Ad-hoc networks (pp) Mm4 Introduction to performance

More information

Method for Automatic Construction of Queuing System Models

Method for Automatic Construction of Queuing System Models International Conference on Modelling, Simulation and Applied Mathematics (MSAM 215) Method for Automatic Construction of Queuing System Models Eimutis Valakevicius * Department of Mathematical Modeling

More information

Approximation for single-channel multi-server queues and queuing networks with generally distributed inter-arrival and service times

Approximation for single-channel multi-server queues and queuing networks with generally distributed inter-arrival and service times Scholars' Mine Doctoral Dissertations Student Theses and Dissertations Summer 016 Approximation for single-channel multi-server queues and queuing networks with generally distributed inter-arrival and

More information

Modelling traffic congestion using queuing networks

Modelling traffic congestion using queuing networks Sādhanā Vol. 35, Part 4, August 2010, pp. 427 431. Indian Academy of Sciences Modelling traffic congestion using queuing networks TUSHAR RAHEJA Mechanical Engineering Department, Indian Institute of Technology

More information

Software Tools for Network Modelling

Software Tools for Network Modelling 6 th International Conference on Applied Informatics Eger, Hungary, January 27 31, 2004. Software Tools for Network Modelling Attila Kuki a, János Sztrik b, Günter Bolch c a Department of Information Technology

More information

Chapter 16. Microscopic Traffic Simulation Overview Traffic Simulation Models

Chapter 16. Microscopic Traffic Simulation Overview Traffic Simulation Models Chapter 6 Microscopic Traffic Simulation 6. Overview The complexity of traffic stream behaviour and the difficulties in performing experiments with real world traffic make computer simulation an important

More information

Introduction to the course

Introduction to the course Introduction to the course Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/ moltchan/modsim/ http://www.cs.tut.fi/kurssit/tlt-2706/ 1. What is the teletraffic theory? Multidisciplinary

More information

Table 9.1 Types of Scheduling

Table 9.1 Types of Scheduling Table 9.1 Types of Scheduling Long-term scheduling Medium-term scheduling Short-term scheduling I/O scheduling The decision to add to the pool of processes to be executed The decision to add to the number

More information

Multi-threaded, discrete event simulation of distributed computing systems

Multi-threaded, discrete event simulation of distributed computing systems Multi-threaded, discrete event simulation of distributed computing systems Iosif C. Legrand California Institute of Technology, Pasadena, CA, U.S.A Abstract The LHC experiments have envisaged computing

More information

Performance Modeling of Proxy Cache Servers

Performance Modeling of Proxy Cache Servers Journal of Universal Computer Science, vol. 2, no. 9 (2006), 39-53 submitted: 3/2/05, accepted: 2/5/06, appeared: 28/9/06 J.UCS Performance Modeling of Proxy Cache Servers Tamás Bérczes, János Sztrik (Department

More information

LATTICE networks are widely used, for example, in distributed parallel computation [2], distributed

LATTICE networks are widely used, for example, in distributed parallel computation [2], distributed SUBMITTED TO IEEE/ACM TANSACTIONS ON NETWOKING 1 Lattice Networks: Capacity Limits, Optimal outing and Queueing Behavior Guillermo Barrenetxea, Student Member, IEEE, Baltasar Beferull-Lozano, Member, IEEE,

More information

Time-Step Network Simulation

Time-Step Network Simulation Time-Step Network Simulation Andrzej Kochut Udaya Shankar University of Maryland, College Park Introduction Goal: Fast accurate performance evaluation tool for computer networks Handles general control

More information

AN APPROXIMATE INVENTORY MODEL BASED ON DIMENSIONAL ANALYSIS. Victoria University, Wellington, New Zealand

AN APPROXIMATE INVENTORY MODEL BASED ON DIMENSIONAL ANALYSIS. Victoria University, Wellington, New Zealand AN APPROXIMATE INVENTORY MODEL BASED ON DIMENSIONAL ANALYSIS by G. A. VIGNAUX and Sudha JAIN Victoria University, Wellington, New Zealand Published in Asia-Pacific Journal of Operational Research, Vol

More information

ROORKEE COLLEGE OF ENGINEERING

ROORKEE COLLEGE OF ENGINEERING ROORKEE COLLEGE OF ENGINEERING OPERATIONS RESEARCH LECTURE NOTES RAHUL BHARTI Assistant Professor RCE, ROORKEE Introduction The mathematical models which tells to optimise (minimize or maximise) the objective

More information

DD2429 Computational Photography :00-19:00

DD2429 Computational Photography :00-19:00 . Examination: DD2429 Computational Photography 202-0-8 4:00-9:00 Each problem gives max 5 points. In order to pass you need about 0-5 points. You are allowed to use the lecture notes and standard list

More information

Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions

Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions Eser Gemikonakli University of Kyrenia, Kyrenia, Mersin 10, Turkey Abstract In this study, the aim

More information

Microscopic Traffic Simulation

Microscopic Traffic Simulation Microscopic Traffic Simulation Lecture Notes in Transportation Systems Engineering Prof. Tom V. Mathew Contents Overview 2 Traffic Simulation Models 2 2. Need for simulation.................................

More information

Cover sheet for Assignment 3

Cover sheet for Assignment 3 Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach

More information

Network Traffic Characterisation

Network Traffic Characterisation Modeling Modeling Theory Outline 1 2 The Problem Assumptions 3 Standard Car Model The Packet Train Model The Self - Similar Model 4 Random Variables and Stochastic Processes The Poisson and Exponential

More information

3 INTEGER LINEAR PROGRAMMING

3 INTEGER LINEAR PROGRAMMING 3 INTEGER LINEAR PROGRAMMING PROBLEM DEFINITION Integer linear programming problem (ILP) of the decision variables x 1,..,x n : (ILP) subject to minimize c x j j n j= 1 a ij x j x j 0 x j integer n j=

More information

Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation

Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation November 2010 Nelson Shaw njd50@uclive.ac.nz Department of Computer Science and Software Engineering University of Canterbury,

More information

Pierre A. Humblet* Abstract

Pierre A. Humblet* Abstract Revised March 1980 ESL-P-8 0 0 GENERALIZATION OF HUFFMAN CODING TO MINIMIZE THE PROBABILITY OF BUFFER OVERFLOW BY Pierre A. Humblet* Abstract An algorithm is given to find a prefix condition code that

More information

Flexible Servers in Understaffed Tandem Lines

Flexible Servers in Understaffed Tandem Lines Flexible Servers in Understaffed Tandem Lines Abstract We study the dynamic assignment of cross-trained servers to stations in understaffed lines with finite buffers. Our objective is to maximize the production

More information

Äriprotsesside modelleerimine ja automatiseerimine Loeng 8 Järjekorrateooria ja äriprotsessid. Enn Õunapuu

Äriprotsesside modelleerimine ja automatiseerimine Loeng 8 Järjekorrateooria ja äriprotsessid. Enn Õunapuu Äriprotsesside modelleerimine ja automatiseerimine Loeng 8 Järjekorrateooria ja äriprotsessid Enn Õunapuu enn@cc.ttu.ee Kava Järjekorrateooria Näited Järeldused Küsimused Loengu eesmärk Loengu eesmärgiks

More information

12.1 Formulation of General Perfect Matching

12.1 Formulation of General Perfect Matching CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Perfect Matching Polytope Date: 22/02/2008 Lecturer: Lap Chi Lau Scribe: Yuk Hei Chan, Ling Ding and Xiaobing Wu In this lecture,

More information

Virtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements

Virtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements Proceedings of the Applied Telecommunication Symposium (part of Advanced Simulation Technologies Conference) Seattle, Washington, USA, April 22 26, 21 Virtual Circuit Blocking Probabilities in an ATM Banyan

More information

Optimal Control of a Production-Inventory System with both Backorders and Lost Sales

Optimal Control of a Production-Inventory System with both Backorders and Lost Sales Optimal Control of a Production-Inventory System with both Backorders and Lost Sales Saif Benjaafar Mohsen ElHafsi 2 Tingliang Huang 3 Industrial & Systems Engineering, Department of Mechanical Engineering,

More information

Lecture 7 Quantitative Process Analysis II

Lecture 7 Quantitative Process Analysis II MTAT.03.231 Business Process Management Lecture 7 Quantitative Process Analysis II Marlon Dumas marlon.dumas ät ut. ee 1 Process Analysis 2 Process Analysis Techniques Qualitative analysis Value-Added

More information

XLVI Pesquisa Operacional na Gestão da Segurança Pública

XLVI Pesquisa Operacional na Gestão da Segurança Pública JOINT BUFFER AND SERVER ALLOCATION IN GENERAL FINITE QUEUEING NETWORKS F. R. B. Cruz Departamento de Estatística, Universidade Federal de Minas Gerais, 31.270-901 Belo Horizonte MG fcruz@est.ufmg.br T.

More information

A Distribution-Sensitive Dictionary with Low Space Overhead

A Distribution-Sensitive Dictionary with Low Space Overhead A Distribution-Sensitive Dictionary with Low Space Overhead Prosenjit Bose, John Howat, and Pat Morin School of Computer Science, Carleton University 1125 Colonel By Dr., Ottawa, Ontario, CANADA, K1S 5B6

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Volume 5, No. 2, May -June, 2013, ISSN

Volume 5, No. 2, May -June, 2013, ISSN ABSTRACT Simulation Tool for Queuing Models: QSIM Pratiksha Saxena, Lokesh Sharma Gautam Buddha University, Department of Mathematics, School of Applied Sciences, Gautam Buddha University, Greater Noida,

More information

What We ll Do... Random

What We ll Do... Random What We ll Do... Random- number generation Random Number Generation Generating random variates Nonstationary Poisson processes Variance reduction Sequential sampling Designing and executing simulation

More information

Perspectives on Network Calculus No Free Lunch but Still Good Value

Perspectives on Network Calculus No Free Lunch but Still Good Value ACM Sigcomm 2012 Perspectives on Network Calculus No Free Lunch but Still Good Value Florin Ciucu T-Labs / TU Berlin Jens Schmitt TU Kaiserslautern Outline Network Calculus (NC): A Theory for System Performance

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

Optimal Policies for Control of Peers in Online Multimedia Services

Optimal Policies for Control of Peers in Online Multimedia Services Proceedings of the 46th IEEE Conference on Decision and Control New Orleans, LA, USA, Dec. 12-14, 27 Optimal Policies for Control of Peers in Online Multimedia Services Young Myoung Ko, Jean-François Chamberland,

More information

Binary floating point encodings

Binary floating point encodings Week 1: Wednesday, Jan 25 Binary floating point encodings Binary floating point arithmetic is essentially scientific notation. Where in decimal scientific notation we write in floating point, we write

More information

4.1 QUANTIZATION NOISE

4.1 QUANTIZATION NOISE DIGITAL SIGNAL PROCESSING UNIT IV FINITE WORD LENGTH EFFECTS Contents : 4.1 Quantization Noise 4.2 Fixed Point and Floating Point Number Representation 4.3 Truncation and Rounding 4.4 Quantization Noise

More information

Reals 1. Floating-point numbers and their properties. Pitfalls of numeric computation. Horner's method. Bisection. Newton's method.

Reals 1. Floating-point numbers and their properties. Pitfalls of numeric computation. Horner's method. Bisection. Newton's method. Reals 1 13 Reals Floating-point numbers and their properties. Pitfalls of numeric computation. Horner's method. Bisection. Newton's method. 13.1 Floating-point numbers Real numbers, those declared to be

More information

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom Telecommunication Systems 0 (1998)?? 1 Blocking of dynamic multicast connections Jouni Karvo a;, Jorma Virtamo b, Samuli Aalto b and Olli Martikainen a a Helsinki University of Technology, Laboratory of

More information

An algorithm for Performance Analysis of Single-Source Acyclic graphs

An algorithm for Performance Analysis of Single-Source Acyclic graphs An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs

More information

Quantitative Models for Performance Enhancement of Information Retrieval from Relational Databases

Quantitative Models for Performance Enhancement of Information Retrieval from Relational Databases Quantitative Models for Performance Enhancement of Information Retrieval from Relational Databases Jenna Estep Corvis Corporation, Columbia, MD 21046 Natarajan Gautam Harold and Inge Marcus Department

More information

Random Number Generators

Random Number Generators 1/17 Random Number Generators Professor Karl Sigman Columbia University Department of IEOR New York City USA 2/17 Introduction Your computer generates" numbers U 1, U 2, U 3,... that are considered independent

More information

Chapter 15 Introduction to Linear Programming

Chapter 15 Introduction to Linear Programming Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of

More information

COPYRIGHTED MATERIAL. Introduction. Chapter 1

COPYRIGHTED MATERIAL. Introduction. Chapter 1 Chapter 1 Introduction Performance Analysis, Queuing Theory, Large Deviations. Performance analysis of communication networks is the branch of applied probability that deals with the evaluation of the

More information

Markov Model Based Congestion Control for TCP

Markov Model Based Congestion Control for TCP Markov Model Based Congestion Control for TCP Shan Suthaharan University of North Carolina at Greensboro, Greensboro, NC 27402, USA ssuthaharan@uncg.edu Abstract The Random Early Detection (RED) scheme

More information

Model suitable for virtual circuit networks

Model suitable for virtual circuit networks . The leinrock Independence Approximation We now formulate a framework for approximation of average delay per packet in telecommunications networks. Consider a network of communication links as shown in

More information

Scheduling Unsplittable Flows Using Parallel Switches

Scheduling Unsplittable Flows Using Parallel Switches Scheduling Unsplittable Flows Using Parallel Switches Saad Mneimneh, Kai-Yeung Siu Massachusetts Institute of Technology 77 Massachusetts Avenue Room -07, Cambridge, MA 039 Abstract We address the problem

More information

SENSITIVITY OF OUTPUT PERFORMANCE MEASURES TO INPUT DISTRIBUTIONS IN QUEUEING NETWORK MODELING. Donald Gross Denise M.

SENSITIVITY OF OUTPUT PERFORMANCE MEASURES TO INPUT DISTRIBUTIONS IN QUEUEING NETWORK MODELING. Donald Gross Denise M. Proceedings of the 1998 Winter Simulation Conference D.J. Medeiros, E.F. Watson, J.S. Carson and M.S. Manivannan, eds. SENSITIVITY OF OUTPUT PERFORMANCE MEASURES TO INPUT DISTRIBUTIONS IN QUEUEING NETWORK

More information

Discrete Time Batch Arrival Queue with Multiple Vacations

Discrete Time Batch Arrival Queue with Multiple Vacations International Journal of Engineering Research Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 7 (July 2017), PP.49-55 Discrete Time Batch Arrival Queue with Multiple Vacations

More information

Fundamentals of Queueing Models

Fundamentals of Queueing Models Fundamentals of Queueing Models Michela Meo Maurizio M. Munafò Michela.Meo@polito.it Maurizio.Munafo@polito.it TLC Network Group - Politecnico di Torino 1 Modeling a TLC network Modelization and simulation

More information

Bluetooth Time Division Duplex - Exact Analysis as a Polling System

Bluetooth Time Division Duplex - Exact Analysis as a Polling System CCIT Report 414, Technion Dept. of Electrical Engineering, Feb. 003. Bluetooth Time Division Duplex - Exact Analysis as a Polling System Gil Zussman 1, Adrian Segall 1, and Uri Yechiali 1 Department of

More information

Dimensioning Links for IP Telephony

Dimensioning Links for IP Telephony Dimensioning Links for IP Telephony Ian Marsh (SICS/KTH) Bengt Ahlgren, Anders Andersson (SICS) Olof Hagsand (Dynarc) ianm@sics.se Columbia University, USA Monday 2nd April, 2001 http://www.sics.se/ ianm/talks/columbia.

More information

The Effectiveness NGN/IMS Networks in the Establishment of a Multimedia Session

The Effectiveness NGN/IMS Networks in the Establishment of a Multimedia Session American Journal of Networks and Communications 2018; 7(1): 1-5 http://www.sciencepublishinggroup.com/j/ajnc doi: 10.11648/j.ajnc.20180701.11 ISSN: 2326-893X (Print); ISSN: 2326-8964 (Online) The Effectiveness

More information

Traffic Modeling of Communication Networks

Traffic Modeling of Communication Networks EÖTVÖS LORÁND UNIVERSITY, BUDAPEST Traffic Modeling of Communication Networks PÉTER VADERNA THESES OF PHD DISSERTATION Doctoral School: Physics Director: Prof. Zalán Horváth Doctoral Program: Statistical

More information