QUEUE BEHAVIOR WHEN USING A HIERARCHICAL MODEL

  • A. Kovalenko
  • О. Lyashenko
  • О. Danilenko
Keywords: computer network, packet delay, traffic, heavy tail

Abstract

Processes that have long-term dependencies can generate a much heavier tail in the traffic process than the traditional input Poisson process. The purpose of the article is to study the behavior of computer network queues when using a hierarchical model using the example of a queue to a server. The based model. To study the behavior of a single queue of multifractal traffic generated by a hierarchical model, we consider a two-level hierarchical model in which the recovery process passes through traffic generation periods and periods when traffic generation is absent. Each period of traffic generation consists, in turn, of several similar periods of lower levels and periods of unavailability of traffic. The results of the study. The proposed model is used at the input of the server queue to calculate the distribution of the tail of the queue content process, that is, the traffic generation processes are modeled on-off. Its asymptotic behavior is modeled on samples that are obtained at control restore points. Using the obtained results, it was proved that the content process manifests a power dependence of behavior at the time points of recovery. On this basis, using the Laplace transformation, the obtained expressions for calculating the development in time of the heavy tail of the traffic process. Conclusions. An approach to determining the behavior of queues using the hierarchical model has been developed. The direction of further research is to investigate the interaction of the processes of formation of queues with heavy tails.

Downloads

Download data is not yet available.

References

1. Кучук Г.А. Метод оценки характеристик АТМ-трафика / Г.А. Кучук // Інформаційно-керуючі системи на залізничному транспорті, – 2003. – № 6. – С. 44–48.
2. Кучук Г. А., Можаєв О. О., Воробйов О. В. Метод агрегування фрактального трафіка. Радіоелектронні та комп'ютерні системи. 2006. № 6 (18). С. 181–188.
3. Saravana, Balaji B,, Karthikeyan, N.K. and Raj Kumar, R.S., (2018), “Fuzzy service conceptual ontology system for cloud service recommendation”, Computers & Electrical Engineering, Vol. 69, pp. 435–446.
4. Saravana, Balaji B., Mohamed, Uvaze Ahamed, Eswaran C. and Kannan R., (2019), “Prediction-based Lossless Image Compression”, Lecture Notes in Computational Vision and Biomechanics (Springer), Vol. 30, No 1, pp.1749 – 17961, DOI: https://doi.org/10.1007/978-3-030-00665-5_161
5. Кучук Г. А. Фрактальный гауссовский шум в трафиковых трассах / Г.А. Кучук // Системи обробки інформації. – 2004. – № 3(31). – С. 91-100.
6. Кучук Г.А. Аналіз та моделі самоподібного трафіка / Г.А. Кучук, О.О. О.В. Можаев, Воробйов // Авиационнокосмическая техника и технология. – 2006. – Вып. 9 (35). – С. 173-180.
7. Amin Salih M., Potrus M.Y. A Method for Compensation of TCP Throughput Degrading During Movement Of Mobile Node. ZANCO Journal of Pure and Applied Sciences. 2015. Vol. 27, No 6. P. 59–68.
8. Gomathi, B, Karthikeyan, N.K. and Saravana, Balaji B., (2018), “Epsilon-Fuzzy Dominance Sort Based Composite Discrete Artificial Bee Colony optimization for Multi-Objective Cloud Task Scheduling Problem”, International Journal of Business Intelligence and Data Mining, Vol. 13, Issue 1-3, pp. 247-266, DOI: https://doi.org/10.1504/IJBIDM.2018.088435
9. Dhivakar B., Saravanan S.V., Sivaram M., Krishnan R.A. Statistical Score Calculation of Information Retrieval Systems using Data Fusion Technique”. Computer Science and Engineering. 2012. Vol. 2, Issue 5. pp.43-45. doi: http://doi.org/10.5923/j.computer.20120205.01
10. Sivaram, M., Batri, K., Amin Salih, Mohammed and Porkodi V. (2019), “Exploiting the Local Optima in Genetic Algorithm using Tabu Search”, Indian Journal of Science and Technology, Volume 12, Issue 1, doi: http://doi.org/10.17485/ijst/2019/v12i1/139577
11. Kuchuk G., Nechausov S., Kharchenko, V. Two-stage optimization of resource allocation for hybrid cloud data store. International Conference on Information and Digital Technologies. 2015. P. 266-271.
12. Ruban, I. Redistribution of base stations load in mobile communication networks / I. Ruban, H. Kuchuk, A. Kovalenko // Innovative technologies and scientific solutions for industries. – 2017. – No 1 (1) – P. 75-81.
13. Коваленко А.А. Сучасний стан та тенденції розвитку комп'ютерних систем об'єктів критичного застосування / А.А. Коваленко, Г.А. Кучук // Системи управління, навігації та зв’язку. – Полтава . ПНТУ, 2018. – Вип. 1(47). – С. 110- 113. DOI : https://doi.org/10.26906/SUNZ.2018.1.110
14. Кучук Г. А. Модель процесса эволюции топологической структуры компьютерной сети системы управления объектом критического применения / Г.А. Кучук, А.А. Коваленко, А.А. Янковский // Системи обробки інформації. – 2014. – № 7(123). – С. 93-96.
15. Кучук Г. А. Метод параметрического управления передачей данных для модификации транспортных протоколов беспроводных сетей / Г.А. Кучук, А.С. Мохаммад, А.А. Коваленко // Системи обробки інформації. – 2011. – № 8(98). – С. 211-218.
16. Кучук Г.А. Метод мінімізації середньої затримки пакетів у віртуальних з’єднаннях мережі підтримки хмарного сервісу / Г.А. Кучук, А.А. Коваленко, Н.В. ЛуковаЧуйко // Системи управління, навігації та зв’язку. – Полтава . ПНТУ, 2017. – Вип. 2(42). – С. 117-120.
17. Sivaram, M., Yuvaraj, D., Amin Salih, Mohammed, Porkodi, V. and Manikandan V. (2018), “The Real Problem Through a Selection Making an Algorithm that Minimizes the Computational Complexity”, International Journal of Engineering and Advanced Technology, Vol. 8, iss. 2, 2018, pp. 95-100.
18. Sivaram, M., Porkodi, V., Mohammed, A.S., Manikandan V. Detection of Accurate Facial Detection Using Hybrid Deep Convolutional Recurrent Neural Network. ICTACT Journal on Soft Computing. 2019. Vol. 09, Issue 02. pp. 1844-1850.
19. Mohammed, A. S. Optimal Forecast Model for Erbil Traffic Road Data. ZANCO Journal of Pure and Applied Sciences. 2017. Vol. 29, No 5. P. 137–145. DOI: https://doi.org/10.21271/ZJPAS.29.5.15
20. Amin Salih M., Yuvaraj D., Sivaram M., Porkodi V. Detection And Removal Of Black Hole Attack In Mobile Ad Hoc Networks Using Grp Protocol. International Journal of Advanced Research in Computer Science. Vol. 9, No 6. P. 1–6, DOI: http://dx.doi.org/10.26483/ijarcs.v9i6.6335
Published
2019-04-11
How to Cite
Kovalenko A. Queue behavior when using a hierarchical model / A. Kovalenko, LyashenkoО., DanilenkoО. // Control, Navigation and Communication Systems. Academic Journal. – Poltava: PNTU, 2019. – VOL. 2 (54). – PP. 110-113. – doi:https://doi.org/10.26906/SUNZ.2019.2.110.

Most read articles by the same author(s)