The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] queueing(93hit)

1-20hit(93hit)

  • Cost-Effective Service Chain Construction with VNF Sharing Model Based on Finite Capacity Queue

    Daisuke AMAYA  Takuji TACHIBANA  

     
    PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1361-1371

    Service chaining is attracting attention as a promising technology for providing a variety of network services by applying virtual network functions (VNFs) that can be instantiated on commercial off-the-shelf servers. The data transmission for each service chain has to satisfy the quality of service (QoS) requirements in terms of the loss probability and transmission delay, and hence the amount of resources for each VNF is expected to be sufficient for satisfying the QoS. However, the increase in the amount of VNF resources results in a high cost for improving the QoS. To reduce the cost of utilizing a VNF, sharing VNF instances through multiple service chains is an effective approach. However, the number of packets arriving at the VNF instance is increased, resulting in a degradation of the QoS. It is therefore important to select VNF instances shared by multiple service chains and to determine the amount of resources for the selected VNFs. In this paper, we propose a cost-effective service chain construction with a VNF sharing model. In the proposed method, each VNF is modeled as an M/M/1/K queueing model to evaluate the relationship between the amount of resources and the loss probability. The proposed method determines the VNF sharing, the VNF placement, the amount of resources for each VNF, and the transmission route of each service chain. For the optimization problem, these are applied according to our proposed heuristic algorithm. We evaluate the performance of the proposed method through a simulation. From the numerical examples, we show the effectiveness of the proposed method under certain network topologies.

  • Performance Modeling of Bitcoin Blockchain: Mining Mechanism and Transaction-Confirmation Process Open Access

    Shoji KASAHARA  

     
    INVITED PAPER

      Pubricized:
    2021/06/09
      Vol:
    E104-B No:12
      Page(s):
    1455-1464

    Bitcoin is one of popular cryptocurrencies widely used over the world, and its blockchain technology has attracted considerable attention. In Bitcoin system, it has been reported that transactions are prioritized according to transaction fees, and that transactions with high priorities are likely to be confirmed faster than those with low priorities. In this paper, we consider performance modeling of Bitcoin-blockchain system in order to characterize the transaction-confirmation time. We first introduce the Bitcoin system, focusing on proof-of-work, the consensus mechanism of Bitcoin blockchain. Then, we show some queueing models and its analytical results, discussing the implications and insights obtained from the queueing models.

  • From Homogeneous to Heterogeneous: An Analytical Model for IEEE 1901 Power Line Communication Networks in Unsaturated Conditions

    Sheng HAO  Huyin ZHANG  

     
    PAPER-Network

      Pubricized:
    2019/02/20
      Vol:
    E102-B No:8
      Page(s):
    1636-1648

    Power line communication (PLC) networks play an important role in home networks and in next generation hybrid networks, which provide higher data rates (Gbps) and easier connectivity. The standard medium access control (MAC) protocol of PLC networks, IEEE 1901, uses a special carrier sense multiple access with collision avoidance (CSMA/CA) mechanism, in which the deferral counter technology is introduced to avoid unnecessary collisions. Although PLC networks have achieved great commercial success, MAC layer analysis for IEEE 1901 PLC networks received limited attention. Until now, a few studies used renewal theory and strong law of large number (SLLN) to analyze the MAC performance of IEEE 1901 protocol. These studies focus on saturated conditions and neglect the impacts of buffer size and traffic rate. Additionally, they are valid only for homogeneous traffic. Motivated by these limitations, we develop a unified and scalable analytical model for IEEE 1901 protocol in unsaturated conditions, which comprehensively considers the impacts of traffic rate, buffer size, and traffic types (homogeneous or heterogeneous traffic). In the modeling process, a multi-layer discrete Markov chain model is constructed to depict the basic working principle of IEEE 1901 protocol. The queueing process of the station buffer is captured by using Queueing theory. Furthermore, we present a detailed analysis for IEEE 1901 protocol under heterogeneous traffic conditions. Finally, we conduct extensive simulations to verify the analytical model and evaluate the MAC performance of IEEE 1901 protocol in PLC networks.

  • Analysis of the State of ECN on the Internet

    Chun-Xiang CHEN  Kenichi NAGAOKA  

     
    PAPER

      Pubricized:
    2019/02/27
      Vol:
    E102-D No:5
      Page(s):
    910-919

    ECN, as a decisive approach for TCP congestion control, has been proposed for many years. However, its deployment on the Internet is much slower than expected. In this paper, we investigate the state of the deployment of ECN (Explicit Congestion Notification) on the Internet from a different viewpoint. We use the data set of web domains published by Alexa as the hosts to be tested. We negotiate an ECN-Capable and a Not ECN-Capable connections with each host and collect all packets belonging to the connections. By analyzing the header fields of the TCP/IP packets, we dig out the deployment rate, connectivity, variation of round-trip time and time to live between the Not ECN-Capable and ECN-Capable connections as well as the rate of IPv6-Capable web servers. Especially, it is clear that the connectivity is different from the domains (regions on the Internet). We hope that the findings acquired from this study would incentivize ISPs and administrators to enable ECN in their network systems.

  • Queueing Delay Analysis and Optimization of Statistical Data Aggregation and Transmission Systems

    Hideaki YOSHINO  Kenko OTA  Takefumi HIRAGURI  

     
    PAPER-Network

      Pubricized:
    2018/04/02
      Vol:
    E101-B No:10
      Page(s):
    2186-2195

    Data aggregation, which is the process of summarizing a large amount of data, is an effective method for saving limited communication resources, such as radio frequency and sensor-node energy. Packet aggregation in wireless LAN and sensed-data aggregation in wireless sensor networks are typical examples. We propose and analyze two queueing models of fundamental statistical data aggregation schemes: constant interval and constant aggregation number. We represent each aggregation scheme by a tandem queueing network model with a gate at the aggregation process and a single server queue at a transmission process. We analytically derive the stationary distribution and Laplace-Stieltjes transform of the system time for each aggregation and transmission process and of the total system time. We then numerically evaluate the stationary mean system time characteristics and clarify that each model has an optimal aggregation parameter (i.e., an optimal aggregation interval or optimal aggregation number), that minimizes the mean total system time. In addition, we derive the explicit optimal aggregation parameter for a D/M/1 transmission model with each aggregation scheme and clarify that it provides accurate approximation of that of each aggregation model. The optimal aggregation interval was determined by the transmission rate alone, while the optimal aggregation number was determined by the arrival and transmission rates alone with explicitly derived proportional constants. These results can provide a theoretical basis and a guideline for designing aggregation devices, such as IoT gateways.

  • vEPC Optimal Resource Assignment Method for Accommodating M2M Communications

    Kazuki TANABE  Hiroki NAKAYAMA  Tsunemasa HAYASHI  Katsunori YAMAOKA  

     
    PAPER

      Pubricized:
    2017/09/19
      Vol:
    E101-B No:3
      Page(s):
    637-647

    The 5G mobile network environment has been studied and developed, and the concept of a vEPC (Virtualized Evolved Packet Core) has been introduced as a framework for Network Functions Virtualization (NFV). Machine-to-Machine (M2M) communications in 5G networks require much faster response than are possible in 4G networks. However, if both the control plane (C-plane) and the data plane (D-plane) functions of the EPC are migrated into a single vEPC server, M2M devices and other user equipments (UEs) share the same resources. To accommodate delay-sensitive M2M sessions in vEPC networks, not only signaling performance on the C-plane but also packet processing performance on the D-plane must be optimized. In this paper, we propose a method for optimizing resource assignment of C-plane and D-plane Virtualized Network Functions (VNFs) in a vEPC server, called the vEPC-ORA method. We distinguish the communications of M2M devices and smartphones and model the vEPC server by using queueing theory. Numerical analysis of optimal resource assignment shows that our proposed method minimizes the blocking rates of M2M sessions and smartphone sessions. We also confirmed that the mean packet processing time is kept within the allowable delay for each communication type, as long as the vEPC server has enough VM resources. Moreover, we study a resource granularity effect on the optimal resource assignment. Numerical analysis under a fixed number of hardware resources of MME and S/P-GW is done for various resource granularities of the vEPC server. The evaluation results of numerical analyses showed that the vEPC-ORA method derives the optimal resource assignment in practical calculation times.

  • Bufferbloat Avoidance with Frame-Dropping Threshold Notification in Ring Aggregation Networks

    Yu NAKAYAMA  Kaoru SEZAKI  

     
    PAPER-Network

      Pubricized:
    2016/08/22
      Vol:
    E100-B No:2
      Page(s):
    313-322

    In recent years, the reduced cost and increased capacity of memory have resulted in a growing number of buffers in switches and routers. Consequently, today's networks suffer from bufferbloat, a term that refers to excess frame buffering resulting in high latency, high jitter, and low throughput. Although ring aggregation is an efficient topology for forwarding traffic from multiple, widely deployed user nodes to a core network, a fairness scheme is needed to achieve throughput fairness and avoid bufferbloat, because frames are forwarded along ring nodes. N Rate N+1 Color Marking (NRN+1CM) was proposed to achieve per-flow fairness in ring aggregation networks. The key idea of NRN+1CM is to assign a color that indicates the dropping priority of a frame according to the flow-input rate. When congestion occurs, frames are selectively discarded based on their color and the frame-dropping threshold. Through the notification process for the frame-dropping threshold, frames are discarded at upstream nodes in advance, avoiding the accumulation of a queuing delay. The performance of NRN+1CM was analyzed theoretically and evaluated with computer simulations. However, its ability to avoid bufferbloat has not yet been proven mathematically. This paper uses an M(n)/M/1/K queue model to demonstrate how bufferbloat is avoided with NRN+1CM's frame-dropping threshold-notification process. The M(n)/M/1/K queue is an M/M/1/K queuing system with balking. The state probabilities and average queue size of each ring node were calculated with the model, proving that the average queue size is suppressed in several frames, but not in the most congested queue. Computer simulation results confirm the validity of the queue model. Consequently, it was logically deducted from the proposed M(n)/M/1/K model that bufferbloat is successfully avoided with NRN+1CM independent of the network conditions including the number of nodes, buffer sizes, and the number and types of flows.

  • Threshold Relaxation and Holding Time Limitation Method for Accepting More General Calls under Emergency Trunk Reservation

    Kazuki TANABE  Sumiko MIYATA  Ken-ichi BABA  Katsunori YAMAOKA  

     
    PAPER

      Vol:
    E99-A No:8
      Page(s):
    1518-1528

    In emergency situations, telecommunication networks become congested due to large numbers of call requests. Also, some infrastructure breaks down, so undamaged communication resources must be utilized more efficiently. Therefore, several lines in telephone exchanges are generally reserved for emergency calls whose users communicate crucial information. The number of lines reserved for emergency calls is determined by a threshold, on a trunk reservation control method. To accept both required emergency calls and more general calls, the traffic intensity of arriving emergency calls should be estimated in advance, and a threshold should be configured so that the number of reserved lines becomes lower than the estimation. Moreover, we propose that the holding time for general calls should be positively limited. By guaranteeing the holding time sufficient for communicating essential information, holding time limitation reduces long-period calls so more general calls are accepted. In this paper, we propose a new CAC method to utilize undamaged communication resources more efficiently during emergencies. Our proposed method accepts more general calls by collaboratively relaxing the threshold of trunk reservation and limiting holding time of general calls. This method is targeted at not only the telephone exchange but also various systems on networks, e.g. base stations of the wireless network or SIP servers. With our method, the threshold is configured in consideration of the ratio of traffic intensities estimated in advance. We modeled the telephone exchange as a queueing loss system and calculated call-blocking rates of both emergency and general calls by using computer simulation. The comparison with the conventional holding time limitation method showed that our proposed method accepts the required number of emergency calls by appropriately relaxing the threshold, while suppressing the increase in call-blocking of general calls.

  • Queuing Systems for the Internet Open Access

    Maciej STASIAK  

     
    INVITED PAPER

      Vol:
    E99-B No:6
      Page(s):
    1234-1242

    This article proposes a versatile model of a multiservice queueing system with elastic traffic. The model can provide a basis for an analysis of telecommunications and computer network systems, internet network systems in particular. The advantage of the proposed approach is a possibility of a determination of delays in network nodes for a number of selected classes of calls offered in modern telecommunications networks.

  • Availability Analysis of a Multibase System with Lateral Resupply between Bases

    Naoki OKUDA  Nobuyuki TAMURA  Tetsushi YUGE  Shigeru YANAGI  

     
    PAPER

      Vol:
    E98-A No:10
      Page(s):
    2084-2090

    In this paper, we study on an availability analysis for a multibase system with lateral resupply of spare items between bases. We construct a basic model that a spare item of a base is transported for operation to another base without spare upon occurrence of failure, and simultaneously, the base that supplies the spare item receives the failed item of the other base for repair. We propose an approximation method to obtain the availability of the system and show the accuracy of the solution through numerical experiments. Also, two modified models are constructed to show the efficiency of the basic model. The two models modify the assumption on the lateral resupply of spare items between bases in the basic model. We numerically illustrate that the basic model can increase the availability of the system compared with the two modified models through Monte Carlo simulation.

  • Optimal Threshold Configuration Methods for Flow Admission Control with Cooperative Users

    Sumiko MIYATA  Katsunori YAMAOKA  Hirotsugu KINOSHITA  

     
    PAPER-Network

      Vol:
    E97-B No:12
      Page(s):
    2706-2719

    We have proposed a novel call admission control (CAC) method for maximizing total user satisfaction in a heterogeneous traffic network and showed their effectiveness by using the optimal threshold from numerical analysis [1],[2]. With these CAC methods, it is assumed that only selfish users exist in a network. However, we need to consider the possibility that some cooperative users exist who would agree to reduce their requested bandwidth to improve another user's Quality of Service (QoS). Under this assumption, conventional CAC may not be optimal. If there are cooperative users in the network, we need control methods that encourage such user cooperation. However, such “encourage” control methods have not yet been proposed. Therefore, in this paper, we propose novel CAC methods for cooperative users by using queueing theory. Numerical analyses show their effectiveness. We also analyze the characteristics of the optimal control parameter of the threshold.

  • Statistical Channel Modeling for Aeronautical Cognitive Radio Communications

    Chao ZHANG  Junzhou YU  

     
    LETTER

      Vol:
    E97-A No:11
      Page(s):
    2170-2173

    Due to the high speed mobile environment, the aeronautical Cognitive Radio (CR) communications base on the channel with the time-variant stochastic non-continuous spectrum. The traditional fading channel models, such as Rayleigh, Rice, Nakagami-m and multipath channel models, can not describe the whole property of the channels of CR communications. In this letter, the statistical channel modeling scheme for aeronautical CR communications is proposed with a M/M/s(1) queuing model, which properly describes the random spectrum occupation of the primary users, i.e. aircrafts in aeronautical communications. The proposed channel model can be easily utilized in the channel simulation to testify the validity and efficiency of the aeronautical CR communications.

  • A Queueing Model of a Multi-Service System with State-Dependent Distribution of Resources for Each Class of Calls

    Slawomir HANCZEWSKI  Maciej STASIAK  Joanna WEISSENBERG  

     
    PAPER

      Vol:
    E97-B No:8
      Page(s):
    1592-1605

    This paper presents a new, accurate multi-service model of a queueing system with state-dependent distribution of resources for each class of calls. The analysis of the considered queueing system was carried out at both the microstate and macrostate levels. The proposed model makes it possible to evaluate averaged parameters of queues for individual classes of calls that are offered to the system. In addition, the paper proposes a new algorithm for a determination of the occupancy distribution in the queueing system at the microstate level. The results of the calculations are compared with the results of a digital simulation for multi-service queueing systems with state-independent distribution of resources.

  • Joint Tracking of Performance Model Parameters and System Behavior Using a Multiple-Model Kalman Filter

    Zhen ZHANG  Shanping LI  Junzan ZHOU  

     
    PAPER-Software Engineering

      Vol:
    E96-D No:6
      Page(s):
    1309-1322

    Online resource management of a software system can take advantage of a performance model to predict the effect of proposed changes. However, the prediction accuracy may degrade if the performance model does not adapt to the changes in the system. This work considers the problem of using Kalman filters to track changes in both performance model parameters and system behavior. We propose a method based on the multiple-model Kalman filter. The method runs a set of Kalman filters, each of which models different system behavior, and adaptively fuses the output of those filters for overall estimates. We conducted case studies to demonstrate how to use the method to track changes in various system behaviors: performance modeling, process modeling, and measurement noise. The experiments show that the method can detect changes in system behavior promptly and significantly improve the tracking and prediction accuracy over the single-model Kalman filter. The influence of model design parameters and mode-model mismatch is evaluated. The results support the usefulness of the multiple-model Kalman filter for tracking performance model parameters in systems with time-varying behavior.

  • F-DSA: A Fast Dynamic Slot Assignment Protocol for Ad Hoc Networks

    Jong-Kwan LEE  Kyu-Man LEE  JaeSung LIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:12
      Page(s):
    3902-3905

    In this letter, we propose a fast dynamic slot assignment (F-DSA) protocol to reduce timeslot access delay of a newly arrived node in ad hoc networks. As there is no central coordinator, a newly arrived node needs separate negotiation with all the neighboring nodes for assigning slots to itself. Thus, it may result in network join delay and this becomes an obstacle for nodes to dynamically join and leave networks. In order to deal with this issue better, F-DSA simplifies the slot assignment process. It provides frequent opportunities to assign slots by using mini-slots to share control packets in a short time. Numerical analysis and extensive simulation show that F-DSA can significantly reduce the timeslot access delay compared with other existing slot assignment protocols. In addition, we investigate the effect of the mini-slot overhead on the performance.

  • Performance Analysis of Non-saturated IEEE 802.11 DCF Networks

    Linbo ZHAI  Xiaomin ZHANG  Gang XIE  

    This letter was withdrawn by the authors. The withdrawal procedure has been completed on July 23, 2012.
     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E95-B No:7
      Page(s):
    2509-2512

    This letter presents a model with queueing theory to analyze the performance of non-saturated IEEE 802.11 DCF networks. We use the closed queueing network model and derive an approximate representation of throughput which can reveal the relationship between the throughput and the total offered load under finite traffic load conditions. The accuracy of the model is verified by extensive simulations.

  • System Dwelling Times of Secondary Call in Cognitive Radio Systems

    Jungchae SHIN  Yutae LEE  Ho-Shin CHO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:7
      Page(s):
    2170-2173

    In this paper, a preemptive priority queueing model is developed to derive the system dwelling time of secondary calls in a cognitive radio system in which a primary call's reoccupation of the channel is modeled as a preemptive event that forces a secondary call to attempt a spectrum handover. The suspension of secondary call service which may happen when the immediate spectrum handover fails, is included in our computation of the system dwelling time. The results are helpful in evaluating cognitive radio systems in terms of service delay and in determining system design parameters such as required buffer size and system capacity.

  • Dynamic Channel Adaptation for IP Based Split Spectrum Femto/Macro Cellular Systems

    Kyungmin PARK  Chungha KOH  Kangjin YOON  Youngyong KIM  

     
    LETTER

      Vol:
    E94-B No:3
      Page(s):
    694-697

    In femto/macro cellular networks, the stability and fairness problems caused by the unplanned and random characteristic of femtocells must be solved. By applying queueing theory in IP based femto/macro cellular networks, we found the stability condition, and described two kinds of cell section policies of users. As a main contribution, we provided the adaptive channel distribution algorithm which minimizes the average packet sojourn time at transmitting systems and keeps the whole systems stable and fair among cells. Through experiments in various environments, we analyzed the influence of channel reuse factor, cell selection policies, and the number of femtocells on system performance.

  • Energy Saving Scheme with an Extra Active Period for LAN Switches

    Hitomi TAMURA  Ritsuko TOMIHARA  Yutaka FUKUDA  Kenji KAWAHARA  Yuji OIE  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E93-B No:12
      Page(s):
    3542-3554

    An immense number of LAN switches are currently in use worldwide. Therefore, methods that can reduce the energy consumption of these devices are of great practical interest. A simple way to save power in LAN switches is to switch the interfaces to sleep mode when no packets are buffered and to keep the interfaces in active mode while there are packets to be transmitted. Although this would appear to be the most effective energy saving scheme, mode switching gives rise to in-rush current, which can cause electrical damage to devices. This problem arises from excessive mode switching, which should be avoided. Thus, the main objective is to develop a method by which to reduce the number of mode switchings that result in short-duration sleep modes because these switchings do not contribute greatly to energy efficiency but can damage the device. To this end, a method is adopted whereby the interface is kept in active mode for an "extra" period of time after all packets have been flushed from the buffer. This period is the "extra active period (EAP)" and this scheme protects the device at the expense of energy saving efficiency. In this paper, this scheme is evaluated analytically in terms of its power reduction ratio and frequency of mode changes by modifying the M/M/1 and IPP/M/1 queuing models. The numerical results show how the duration of the extra active period degrades the energy saving performance while reducing the number of mode changes. We analytically show an exact trade-off between the power reduction ratio and the average number of turn-ons in the EAP model with Poisson packet arrival. Furthermore, we extend the scheme to determine the EAP dynamically and adaptively depending on the short-term utilization of the interface and demonstrate the effectiveness of the extended scheme by simulation. The newly developed scheme will enable LAN switches to be designed with energy savings in mind without exceeding the constraints of the device.

  • Probabilistic Priority Message Checking Modeling Based on Controller Area Networks

    Cheng-Min LIN  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E93-B No:8
      Page(s):
    2171-2175

    Although the probabilistic model checking tool called PRISM has been applied in many communication systems, such as wireless local area network, Bluetooth, and ZigBee, the technique is not used in a controller area network (CAN). In this paper, we use PRISM to model the mechanism of priority messages for CAN because the mechanism has allowed CAN to become the leader in serial communication for automobile and industry control. Through modeling CAN, it is easy to analyze the characteristic of CAN for further improving the security and efficiency of automobiles. The Markov chain model helps us to model the behaviour of priority messages.

1-20hit(93hit)