[go: up one dir, main page]

 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (17)

Search Parameters:
Keywords = finite queueing networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 1762 KiB  
Article
Dynamic Framing and Power Allocation for Real-Time Wireless Networks with Variable-Length Coding: A Tandem Queue Approach
by Yuanrui Liu, Xiaoyu Zhao, Wei Chen and Ying-Jun Angela Zhang
Network 2024, 4(3), 367-389; https://doi.org/10.3390/network4030017 - 27 Aug 2024
Viewed by 507
Abstract
Ensuring high reliability and low latency poses challenges for numerous applications that require rigid performance guarantees, such as industrial automation and autonomous vehicles. Our research primarily concentrates on addressing the real-time requirements of ultra-reliable low-latency communication (URLLC). Specifically, we tackle the challenge of [...] Read more.
Ensuring high reliability and low latency poses challenges for numerous applications that require rigid performance guarantees, such as industrial automation and autonomous vehicles. Our research primarily concentrates on addressing the real-time requirements of ultra-reliable low-latency communication (URLLC). Specifically, we tackle the challenge of hard delay constraints in real-time transmission systems, overcoming this obstacle through a finite blocklength coding scheme. In the physical layer, we encode randomly arriving packets using a variable-length coding scheme and transmit the encoded symbols by truncated channel inversion over parallel channels. In the network layer, we model the encoding and transmission processes as tandem queues. These queues backlog the data bits waiting to be encoded and the encoded symbols to be transmitted, respectively. This way, we represent the system as a two-dimensional Markov chain. By focusing on instances when the symbol queue is empty, we simplify the Markov chain into a one-dimensional Markov chain, with the packet queue being the system state. This approach allows us to analytically express power consumption and formulate a power minimization problem under hard delay constraints. Finally, we propose a heuristic algorithm to solve the problem and provide an extensive evaluation of the trade-offs between the hard delay constraint and power consumption. Full article
Show Figures

Figure 1

Figure 1
<p>Research flow chart.</p>
Full article ">Figure 2
<p>System model.</p>
Full article ">Figure 3
<p>Transition diagram of <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>q</mi> <mn>1</mn> </msub> <mrow> <mo>[</mo> <mi>t</mi> <mo>]</mo> </mrow> <mo>,</mo> <msub> <mi>q</mi> <mn>2</mn> </msub> <mrow> <mo>[</mo> <mi>t</mi> <mo>]</mo> </mrow> <mo>)</mo> <mo>=</mo> <mrow> <mo>(</mo> <mi>K</mi> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>. The other queue states are similar to the transition diagram. The diagram also depicts the evolution of the system state over time slots. In the embedded Markov chain, we focus exclusively on the time slots indicated by the red arrows.</p>
Full article ">Figure 4
<p>The average power of the hard-delay-constrained policy, which changes with the hard delay constraint.</p>
Full article ">Figure 5
<p>The transmission power changes with the threshold of truncated inversion.</p>
Full article ">Figure 6
<p>A comparison between the first heuristic algorithm and the second heuristic algorithm.</p>
Full article ">Figure 7
<p>The numerical result of the gradient descent policy, which changes with the iteration number.</p>
Full article ">Figure 8
<p>A comparison of the CSIT and CSIR schemes.</p>
Full article ">
30 pages, 4741 KiB  
Article
Optimisation of Buffer Allocations in Manufacturing Systems: A Study on Intra and Outbound Logistics Systems Using Finite Queueing Networks
by Mohamed Amjath, Laoucine Kerbache, James MacGregor Smith and Adel Elomri
Appl. Sci. 2023, 13(17), 9525; https://doi.org/10.3390/app13179525 - 23 Aug 2023
Cited by 3 | Viewed by 2844
Abstract
Optimal buffer allocations can significantly improve system throughput by managing variability and disruptions in manufacturing or service operations. Organisations can minimise waiting times and bottlenecks by strategically placing buffers along the flow path, leading to a smoother and more efficient production or service [...] Read more.
Optimal buffer allocations can significantly improve system throughput by managing variability and disruptions in manufacturing or service operations. Organisations can minimise waiting times and bottlenecks by strategically placing buffers along the flow path, leading to a smoother and more efficient production or service delivery process. Determining the optimal size of buffers poses a challenging dilemma, as it involves balancing the cost of buffer allocation, system throughput, and waiting times at each service station. This paper presents a framework that utilises finite queueing networks for performance analysis and optimisation of topologies, specifically focusing on buffer allocations. The proposed framework incorporates a finite closed queuing network to model the intra-logistics material transfer process and a finite open queueing network to model the outbound logistics process within a manufacturing setup. The generalised expansion method (GEM) is employed to calculate network performance measures of the system, considering the blocking phenomenon. Discrete event simulation (DES) models are constructed using simulation software, integrating optimisation configurations to determine optimal buffer allocations to maximise system throughput. The findings of this study have significant implications for decision-making processes and offer opportunities to enhance the efficiency of manufacturing systems. By leveraging the proposed framework, organisations can gain valuable insights into supply chain performance, identify potential bottlenecks, and optimise buffer allocations to achieve improved operational efficiency and overall system throughput. Full article
(This article belongs to the Special Issue Design and Optimization of Manufacturing Systems)
Show Figures

Figure 1

Figure 1
<p>Classification of supply chain mapping hierarchy concerning planning levels and focus.</p>
Full article ">Figure 2
<p>Co-occurrence network of keywords in buffer allocation and queueing networks for manufacturing systems.</p>
Full article ">Figure 3
<p>GEM steps for a tandem network (adapted from Kerbache and Smith [<a href="#B73-applsci-13-09525" class="html-bibr">73</a>]).</p>
Full article ">Figure 4
<p>Steps of optimisation approach used in Anylogic software.</p>
Full article ">Figure 5
<p>Process flowchart for the inter-facility material transfer operations.</p>
Full article ">Figure 6
<p>Layout plan of SM’s raw material storages and billet plant.</p>
Full article ">Figure 7
<p>DES model for SM inter-facility material transfer operations.</p>
Full article ">Figure 8
<p>Process flowchart of outbound logistics at SM.</p>
Full article ">Figure 9
<p>DES model for outbound logistics process.</p>
Full article ">Figure A1
<p>Optimisation run window—scenario 2.</p>
Full article ">Figure A2
<p>Optimisation run window—scenario 3.</p>
Full article ">Figure A3
<p>Optimisation run window—scenario 4.</p>
Full article ">Figure A4
<p>Optimisation run window—scenario 5.</p>
Full article ">
23 pages, 510 KiB  
Article
Analysis of a Collision-Affected M/GI/1/ /N Retrial Queuing System Considering Negative Customers and Transmission Errors
by Wei Xu, Liwei Liu, Linhong Li, Zhen Wang and Sabine Wittevrongel
Mathematics 2023, 11(16), 3532; https://doi.org/10.3390/math11163532 - 16 Aug 2023
Viewed by 935
Abstract
This paper considers a retrial G-queue with collisions, transmission errors, and a finite number of sources, where service and repair time are both general distributions. The number of sources (terminals) is finite and a source cannot generate new requests until the channel (server) [...] Read more.
This paper considers a retrial G-queue with collisions, transmission errors, and a finite number of sources, where service and repair time are both general distributions. The number of sources (terminals) is finite and a source cannot generate new requests until the channel (server) finishes its work, i.e., the rate at which new primary requests are generated varies inversely with the number of data frame (customer) in the system. A collision occurs when service requests arrive at a busy channel, and transmission errors prevent data frames from leaving the system after completing service. Two types of arrivals are considered. Negative customers will break down the system in the busy state and remove the customer under service. The application of our model is indicated, with a particular emphasis on communication networks such as the local-area networks (LAN) with CSMA/CD protocol. Recursive formulas have been derived to calculate the stationary joint distributions and the Laplace transform of reliability function by applying the discrete transformations method along with the supplementary variables technique (SVT). Furthermore, the comparative performance and reliability analysis have been conducted numerically. Numerical examples are provided to investigate the sensitivity of different parameters on performance measures and reliability indicators. Full article
Show Figures

Figure 1

Figure 1
<p>The state transition diagram of the corresponding model under exponential assumption.</p>
Full article ">Figure 2
<p>Main performance indicators vs. <math display="inline"><semantics> <mi>λ</mi> </semantics></math>.</p>
Full article ">Figure 3
<p>Main performance indicators vs. <span class="html-italic">N</span>.</p>
Full article ">Figure 4
<p>The steady-state availability vs. <math display="inline"><semantics> <mi>λ</mi> </semantics></math>.</p>
Full article ">Figure 5
<p>The failure frequency vs. <math display="inline"><semantics> <mi>λ</mi> </semantics></math>.</p>
Full article ">Figure 6
<p>The failure frequency and steady-state availability vs. <span class="html-italic">N</span>.</p>
Full article ">
14 pages, 558 KiB  
Article
Evaluation of the Accuracy of the Analytical Model of a Queuing System with a Finite-Compression Mechanism in Relation to Real Service Disciplines
by Sławomir Hanczewski and Joanna Weissenberg
Electronics 2023, 12(15), 3343; https://doi.org/10.3390/electronics12153343 - 4 Aug 2023
Viewed by 752
Abstract
The article presents the findings of a study that evaluates the feasibility of using an analytical model for a multi-service queuing system with a SDFIFO queuing service discipline and finite compression mechanism to approximate queuing systems with different queuing service disciplines (e.g., FIFO, [...] Read more.
The article presents the findings of a study that evaluates the feasibility of using an analytical model for a multi-service queuing system with a SDFIFO queuing service discipline and finite compression mechanism to approximate queuing systems with different queuing service disciplines (e.g., FIFO, cFIFO) while also incorporating finite compression. The evaluation involves comparing results obtained from an analytical model with those of simulation studies. The study considers the blocking probability and average queue length as factors. Additionally, two types of compressed traffic were analysed: elastic and adaptive. These are characteristic of modern telecommunications networks, particularly in multimedia applications. This paper is an extended version of our paper published in 4th CoBCom 2022. Full article
Show Figures

Figure 1

Figure 1
<p>Diagram of a multi-service queuing system with finite compression mechanism.</p>
Full article ">Figure 2
<p>Queuing system with FIFO discipline.</p>
Full article ">Figure 3
<p>Queuing system with cFIFO discipline.</p>
Full article ">Figure 4
<p>Queuing system with virtual FIFO queues.</p>
Full article ">Figure 5
<p>Queuing system with virtual FIFO queues for each class offered to the system with the overtaking calls process.</p>
Full article ">Figure 6
<p>Queuing system with virtual vcFIFO discipline.</p>
Full article ">Figure 7
<p>Relative error of blocking probability of the class 1 call S1–S3.</p>
Full article ">Figure 8
<p>Relative error of blocking probability of the class 2 call S1–S3.</p>
Full article ">Figure 9
<p>Relative error of blocking probability of the class 3 call S1–S3.</p>
Full article ">Figure 10
<p>Relative error of blocking probability of the class 1 call S4–S6.</p>
Full article ">Figure 11
<p>Relative error of blocking probability of the class 2 call S4–S6.</p>
Full article ">Figure 12
<p>Relative error of blocking probability of the class 3 call S4–S6.</p>
Full article ">Figure 13
<p>Relative error of average queue length for systems S1–S3.</p>
Full article ">Figure 14
<p>Relative error of average queue length for systems S4–S6.</p>
Full article ">
15 pages, 899 KiB  
Article
Balancing Tradeoffs in Network Queue Management Problem via Forward–Backward Sweeping with Finite Checkpoints
by Amr Radwan, Taghreed Ali Alenezi, Wejdan Alrashdan and Won-Joo Hwang
Symmetry 2023, 15(7), 1395; https://doi.org/10.3390/sym15071395 - 10 Jul 2023
Viewed by 1091
Abstract
Network queue management can be modelled as an optimal control problem and is aimed at controlling the dropping rate, in which the state and control variables are the instantaneous queue length and the dropping rate, respectively. One way to solve it is by [...] Read more.
Network queue management can be modelled as an optimal control problem and is aimed at controlling the dropping rate, in which the state and control variables are the instantaneous queue length and the dropping rate, respectively. One way to solve it is by using an indirect method, namely forward–backward sweeping based on the Pontryagin minimum principle to derive control the trajectory of the dropping rate. However, there exists some performance balance issues in the network queue, such as memory usage versus runtime of the algorithm, or dropping rate versus network queue length. Many researchers have exploited symmetry for constrained systems, controllers, and model predictive control problems to achieve an exponential memory reduction and simple, intuitive optimal controllers. In this article, we introduce the integration of the checkpointing method into forward–backward sweeping to address such balancing issues. Specifically, we exploit the revolve algorithm in checkpointing and choose a finite number of checkpoints to reduce the complexity. Both numerical and simulation results in a popular network simulator (ns-2) are provided through two experiments: varying bandwidth and offered load, which solidify our proposal in comparison to other deployed queue management algorithms. Full article
(This article belongs to the Special Issue Symmetry in System Theory, Control and Computing)
Show Figures

Figure 1

Figure 1
<p>Optimal Control Queue Model.</p>
Full article ">Figure 2
<p>Forward Sweep: <math display="inline"><semantics><mrow><msub><mi>x</mi><mi>i</mi></msub><mo>=</mo><msub><mi>F</mi><mi>i</mi></msub><mrow><mo>(</mo><msub><mi>x</mi><mrow><mi>i</mi><mo>−</mo><mn>1</mn></mrow></msub><mo>,</mo><msub><mi>u</mi><mrow><mi>i</mi><mo>−</mo><mn>1</mn></mrow></msub><mo>,</mo><msub><mi>t</mi><mrow><mi>i</mi><mo>−</mo><mn>1</mn></mrow></msub><mo>)</mo></mrow><mo>,</mo><mspace width="2.84526pt"/><mi>i</mi><mo>=</mo><mn>1</mn><mo>,</mo><mo>…</mo><mo>,</mo><mi>N</mi></mrow></semantics></math>; Backward Sweep: <math display="inline"><semantics><mrow><msub><mi>ψ</mi><mrow><mi>i</mi><mo>−</mo><mn>1</mn></mrow></msub><mo>=</mo><msub><mover accent="true"><mi>F</mi><mo>¯</mo></mover><mi>i</mi></msub><mrow><mo>(</mo><msub><mi>ψ</mi><mi>i</mi></msub><mo>,</mo><msub><mi>x</mi><mrow><mi>i</mi><mo>−</mo><mn>1</mn></mrow></msub><mo>,</mo><msub><mi>u</mi><mrow><mi>i</mi><mo>−</mo><mn>1</mn></mrow></msub><mo>,</mo><msub><mi>t</mi><mrow><mi>i</mi><mo>−</mo><mn>1</mn></mrow></msub><mo>)</mo></mrow><mo>,</mo><mspace width="2.84526pt"/><mi>i</mi><mo>=</mo><mi>N</mi><mo>,</mo><mo>…</mo><mo>,</mo><mn>1</mn></mrow></semantics></math>.</p>
Full article ">Figure 3
<p>Reversal Schedule <span class="html-italic">S</span> with <math display="inline"><semantics><mrow><mi>N</mi><mo>(</mo><mi>S</mi><mo>)</mo><mo>=</mo><mn>6</mn></mrow></semantics></math> and <math display="inline"><semantics><mrow><mi>c</mi><mo>(</mo><mi>S</mi><mo>)</mo><mo>=</mo><mn>2</mn></mrow></semantics></math>.</p>
Full article ">Figure 4
<p>Runtime of FBSM-AQM algorithm versus number of checkpoints.</p>
Full article ">Figure 5
<p>Simulation topology.</p>
Full article ">Figure 6
<p>Queue length results.</p>
Full article ">Figure 7
<p>Packet drop rate results.</p>
Full article ">Figure 8
<p>Bottleneck link utilization results.</p>
Full article ">
27 pages, 1316 KiB  
Article
Modeling a Linux Packet-Capturing System with a Queueing System with Vacations
by Luis Zabala, Josu Doncel and Armando Ferro
Mathematics 2023, 11(7), 1663; https://doi.org/10.3390/math11071663 - 30 Mar 2023
Cited by 1 | Viewed by 1508
Abstract
Monitoring the evolution of the state of networks is an important issue to ensure that many applications provide the required quality of service. The first step in network-monitoring systems consists of capturing packets; that is, packets arrive at the system through a network [...] Read more.
Monitoring the evolution of the state of networks is an important issue to ensure that many applications provide the required quality of service. The first step in network-monitoring systems consists of capturing packets; that is, packets arrive at the system through a network interface card and are placed into system memory. Then, in this first stage, and usually in relation to the operating system, packets are treated and transferred from the capturing buffer to a higher-layer processing, for instance, to be analyzed in the next step of the system. In this work, we focus on the capturing stage. In particular, we focus on a Linux packet-capturing system. We model it as a single server queue. Taking into account that the server can be in charge not only of the capturing process but also of other tasks, we consider that the queue has vacations, i.e., there is some time when the capturing process cannot be carried out. We also assume that the queue has a finite buffer. We consider three different models and present a rigorous analysis of the derived Markov chain of each of the models. We provide standard performance metrics in all cases. We also evaluate the performance of these models in a real packet-capture probe. Full article
Show Figures

Figure 1

Figure 1
<p>Linux packet-capture mechanism.</p>
Full article ">Figure 2
<p>Finite queueing system to represent hardirq and softirq processing and vacations.</p>
Full article ">Figure 3
<p>Diagram of processings and vacations.</p>
Full article ">Figure 4
<p>State-transition diagram of model M1.</p>
Full article ">Figure 5
<p>State-transition diagram of model M2.</p>
Full article ">Figure 6
<p>Evaluation scenarios: V1, V2, and V3.</p>
Full article ">Figure 7
<p>Results of normalized capture throughput for different scenarios (V1, V2, and V3).</p>
Full article ">Figure 8
<p>Results of normalized capture throughput for different budgets and scenario V1.</p>
Full article ">Figure 9
<p>Results of softirq frequency for different scenarios (V1, V2, and V3).</p>
Full article ">Figure 10
<p>Results of mean number of packets in softirq for different scenarios (V1, V2, and V3).</p>
Full article ">
13 pages, 4124 KiB  
Article
Cyclical Trends of Network Load Fluctuations in Traffic Jamming
by Bosiljka Tadić
Dynamics 2022, 2(4), 449-461; https://doi.org/10.3390/dynamics2040026 - 7 Dec 2022
Cited by 1 | Viewed by 2026
Abstract
The transport of information packets in complex networks is a prototype system for the study of traffic jamming, a nonlinear dynamic phenomenon that arises with increased traffic load and limited network capacity. The underlying mathematical framework helps to reveal how the macroscopic jams [...] Read more.
The transport of information packets in complex networks is a prototype system for the study of traffic jamming, a nonlinear dynamic phenomenon that arises with increased traffic load and limited network capacity. The underlying mathematical framework helps to reveal how the macroscopic jams build-up from microscopic dynamics, depending on the posting rate, navigation rules, and network structure. We investigate the time series of traffic loads before congestion occurs on two networks with structures that support efficient transport at low traffic or higher traffic density, respectively. Each node has a fixed finite queue length and uses next-nearest-neighbour search to navigate the packets toward their destination nodes and the LIFO queueing rule. We find that when approaching the respective congestion thresholds in these networks, the traffic load fluctuations show a similar temporal pattern; it is described by dominant cyclical trends with multifractal features and the broadening of the singularity spectrum regarding small-scale fluctuations. The long-range correlations captured by the power spectra show a power-law decay with network-dependent exponents. Meanwhile, the short-range correlations dominate at the onset of congestion. These findings reveal inherent characteristics of traffic jams inferred from traffic load time series as warning signs of congestion, complementing statistical indicators such as increased travel time and prolonged queuing in different transportation networks. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Networks’ giant clusters on which traffic simulations are performed: <italic>Webgraph</italic> (<bold>left</bold>) and <italic>Statnet</italic> (<bold>right</bold>). See the text for these networks’ properties. Lower panels: Distribution of the shortest-path distances <inline-formula><mml:math id="mm103"><mml:semantics><mml:mrow><mml:mi>P</mml:mi><mml:mo>(</mml:mo><mml:mi>d</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:semantics></mml:math></inline-formula> vs. distance <italic>d</italic> between pairs of nodes, and hyperbolicity parameter <inline-formula><mml:math id="mm104"><mml:semantics><mml:msub><mml:mi>δ</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:semantics></mml:math></inline-formula> vs. minimal distance <inline-formula><mml:math id="mm105"><mml:semantics><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:semantics></mml:math></inline-formula>, see text, on these two graphs, as indicated in the legend.</p>
Full article ">Figure 2
<p>Example of time series of the number of created, active, still in traffic, and delivered packets monitored during the simulations of transport on <italic>Webgraph</italic> for the posting rate <inline-formula><mml:math id="mm106"><mml:semantics><mml:mrow><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mn>0.4</mml:mn><mml:mo>≳</mml:mo><mml:msub><mml:mi>R</mml:mi><mml:mi>c</mml:mi></mml:msub></mml:mrow></mml:semantics></mml:math></inline-formula> (<bold>left</bold>). The standard deviations <inline-formula><mml:math id="mm107"><mml:semantics><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>n</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:semantics></mml:math></inline-formula> fluctuation function of Equation (<xref ref-type="disp-formula" rid="FD2-dynamics-02-00026">2</xref>) for <inline-formula><mml:math id="mm108"><mml:semantics><mml:mrow><mml:mi>q</mml:mi><mml:mo>=</mml:mo><mml:mn>2</mml:mn></mml:mrow></mml:semantics></mml:math></inline-formula>, vs. time interval <italic>n</italic> for these time series (<bold>right</bold>); the same colour code applies to both panels.</p>
Full article ">Figure 3
<p>Traffic on the <italic>Webgraph</italic>: Time series of the network load (<bold>bottom left</bold>) and their power spectra (<bold>top left</bold>) for different values of the posting rate <italic>R</italic> indicated in the top panel. The <bold>bottom right</bold> panel shows a close-up of the traffic load time series for the posting rate <inline-formula><mml:math id="mm109"><mml:semantics><mml:mrow><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mn>0.35</mml:mn></mml:mrow></mml:semantics></mml:math></inline-formula> with its cyclic trend (red line) and the detrended signal (cyan); the corresponding power spectra of these signals are shown in the <bold>top right</bold> panel, as indicated in the legend.</p>
Full article ">Figure 4
<p>Same as <xref ref-type="fig" rid="dynamics-02-00026-f003">Figure 3</xref> but for the traffic load on the <italic>Statnet</italic>. The corresponding values of the posting rate <italic>R</italic> are indicated in the top left panel. The traffic time series in the bottom right panel is for the posting rate <inline-formula><mml:math id="mm110"><mml:semantics><mml:mrow><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mn>0.7</mml:mn></mml:mrow></mml:semantics></mml:math></inline-formula>, showing its cyclic trend (red line), the detrended signal (cyan), and the corresponding power spectra in the top right panel.</p>
Full article ">Figure 5
<p>For the fixed packet generation rate <inline-formula><mml:math id="mm111"><mml:semantics><mml:mrow><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mn>0.1</mml:mn></mml:mrow></mml:semantics></mml:math></inline-formula> in the <italic>Webgraph</italic> (<bold>top raw</bold>) and <italic>Statnet</italic> (<bold>bottom row</bold>): left panel shows the fluctuation function <inline-formula><mml:math id="mm112"><mml:semantics><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mi>q</mml:mi></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>n</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:semantics></mml:math></inline-formula> vs. <italic>n</italic> for <inline-formula><mml:math id="mm113"><mml:semantics><mml:mrow><mml:mi>q</mml:mi><mml:mo>∈</mml:mo><mml:mo>[</mml:mo><mml:mo>−</mml:mo><mml:mn>4.5</mml:mn><mml:mo>,</mml:mo><mml:mn>4.5</mml:mn><mml:mo>]</mml:mo></mml:mrow></mml:semantics></mml:math></inline-formula>, of the traffic load’s trend, which is shown by the red line in the corresponding right panel. The segment of the load time series <inline-formula><mml:math id="mm114"><mml:semantics><mml:mrow><mml:msub><mml:mi>N</mml:mi><mml:mi>p</mml:mi></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:semantics></mml:math></inline-formula> vs. <italic>t</italic> is demonstrated by the black line, while fluctuations around the trend are shown as the green line. The straight lines indicate the fitted segments of the fluctuation function curves corresponding to the generalised Hurst exponent.</p>
Full article ">Figure 6
<p>Left panels: The fluctuation function <inline-formula><mml:math id="mm115"><mml:semantics><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mi>q</mml:mi></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>n</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:semantics></mml:math></inline-formula> vs. <italic>n</italic> for the traffic load trends with jamming in pre-congestion flow, at <inline-formula><mml:math id="mm116"><mml:semantics><mml:mrow><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mn>0.35</mml:mn></mml:mrow></mml:semantics></mml:math></inline-formula> in <italic>Webgraph</italic> (<bold>top</bold>) and <inline-formula><mml:math id="mm117"><mml:semantics><mml:mrow><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mn>0.7</mml:mn></mml:mrow></mml:semantics></mml:math></inline-formula> in <italic>Statnet</italic> (<bold>bottom</bold> panel). The generalised Hurst exponent <inline-formula><mml:math id="mm118"><mml:semantics><mml:msub><mml:mi>H</mml:mi><mml:mi>q</mml:mi></mml:msub></mml:semantics></mml:math></inline-formula> vs. amplification parameter <italic>q</italic> for two posting rates, indicated in the legends for <italic>Webgraph</italic> (<bold>top</bold>) and <italic>Statnet</italic> (<bold>bottom</bold> panel).</p>
Full article ">Figure 7
<p><inline-formula><mml:math id="mm119"><mml:semantics><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mi>q</mml:mi></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>n</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:semantics></mml:math></inline-formula> vs. <italic>n</italic> for the fluctuation around identified trends studied in <xref ref-type="fig" rid="dynamics-02-00026-f005">Figure 5</xref> and <xref ref-type="fig" rid="dynamics-02-00026-f006">Figure 6</xref>, for different networks and posting rates, as indicated in the legend. The slopes of the dashed and dotted lines are <inline-formula><mml:math id="mm120"><mml:semantics><mml:mrow><mml:mn>1.02</mml:mn><mml:mo>±</mml:mo><mml:mn>0.05</mml:mn></mml:mrow></mml:semantics></mml:math></inline-formula> and <inline-formula><mml:math id="mm121"><mml:semantics><mml:mrow><mml:mn>1.33</mml:mn><mml:mo>±</mml:mo><mml:mn>0.07</mml:mn></mml:mrow></mml:semantics></mml:math></inline-formula>, respectively. Different lines in each panel correspond to <inline-formula><mml:math id="mm122"><mml:semantics><mml:mrow><mml:mi>q</mml:mi><mml:mo>=</mml:mo><mml:mn>4</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>0.5</mml:mn><mml:mo>,</mml:mo><mml:mo>−</mml:mo><mml:mn>0.5</mml:mn><mml:mo>,</mml:mo><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mo>−</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>−</mml:mo><mml:mn>4</mml:mn></mml:mrow></mml:semantics></mml:math></inline-formula>, top to bottom.</p>
Full article ">
16 pages, 452 KiB  
Article
Study on Transient Queue-Size Distribution in the Finite-Buffer Model with Batch Arrivals and Multiple Vacation Policy
by Wojciech M. Kempa and Rafał Marjasz
Entropy 2021, 23(11), 1410; https://doi.org/10.3390/e23111410 - 27 Oct 2021
Viewed by 1567
Abstract
The transient behavior of the finite-buffer queueing model with batch arrivals and generally distributed repeated vacations is analyzed. Such a system has potential applications in modeling the functioning of production systems, computer and telecommunication networks with energy saving mechanism based on cyclic monitoring [...] Read more.
The transient behavior of the finite-buffer queueing model with batch arrivals and generally distributed repeated vacations is analyzed. Such a system has potential applications in modeling the functioning of production systems, computer and telecommunication networks with energy saving mechanism based on cyclic monitoring the queue state (Internet of Things, wireless sensors networks, etc.). Identifying renewal moments in the evolution of the system and applying continuous total probability law, a system of Volterra-type integral equations for the time-dependent queue-size distribution, conditioned by the initial buffer state, is derived. A compact-form solution for the corresponding system written for Laplace transforms is obtained using an algebraic approach based on Korolyuk’s potential method. An illustrative numerical example presenting the impact of the service rate, arrival rate, initial buffer state and single vacation duration on the queue-size distribution is attached as well. Full article
Show Figures

Figure 1

Figure 1
<p>Impact of service rate on probability <math display="inline"><semantics> <mrow> <mi mathvariant="bold">P</mi> <mo>{</mo> <mi>X</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> <mo>=</mo> <mn>1</mn> <mspace width="0.166667em"/> <mo>|</mo> <mspace width="0.166667em"/> <mi>X</mi> <mo>(</mo> <mn>0</mn> <mo>)</mo> <mo>=</mo> <mn>0</mn> <mo>}</mo> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 2
<p>Impact of arrival rate on probability <math display="inline"><semantics> <mrow> <mi mathvariant="bold">P</mi> <mo>{</mo> <mi>X</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> <mo>=</mo> <mn>1</mn> <mspace width="0.166667em"/> <mo>|</mo> <mspace width="0.166667em"/> <mi>X</mi> <mo>(</mo> <mn>0</mn> <mo>)</mo> <mo>=</mo> <mn>0</mn> <mo>}</mo> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 3
<p>Impact of initial buffer state on probability <math display="inline"><semantics> <mrow> <mi mathvariant="bold">P</mi> <mo>{</mo> <mi>X</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> <mo>=</mo> <mn>1</mn> <mspace width="0.166667em"/> <mo>|</mo> <mspace width="0.166667em"/> <mi>X</mi> <mo>(</mo> <mn>0</mn> <mo>)</mo> <mo>=</mo> <mn>0</mn> <mo>}</mo> </mrow> </semantics></math> for different <math display="inline"><semantics> <mrow> <msup> <mi>n</mi> <mo>′</mo> </msup> <mi>s</mi> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 4
<p>Impact of single vacation duration on probability <math display="inline"><semantics> <mrow> <mi mathvariant="bold">P</mi> <mo>{</mo> <mi>X</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> <mo>=</mo> <mn>1</mn> <mspace width="0.166667em"/> <mo>|</mo> <mspace width="0.166667em"/> <mi>X</mi> <mo>(</mo> <mn>0</mn> <mo>)</mo> <mo>=</mo> <mn>0</mn> <mo>}</mo> </mrow> </semantics></math> for <math display="inline"><semantics> <mrow> <mi>λ</mi> <mo>=</mo> <mn>450</mn> </mrow> </semantics></math> packets/s.</p>
Full article ">Figure 5
<p>Impact of single vacation duration on probability <math display="inline"><semantics> <mrow> <mi mathvariant="bold">P</mi> <mo>{</mo> <mi>X</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> <mo>=</mo> <mn>1</mn> <mspace width="0.166667em"/> <mo>|</mo> <mspace width="0.166667em"/> <mi>X</mi> <mo>(</mo> <mn>0</mn> <mo>)</mo> <mo>=</mo> <mn>0</mn> <mo>}</mo> </mrow> </semantics></math> for <math display="inline"><semantics> <mrow> <mi>λ</mi> <mo>=</mo> <mn>600</mn> </mrow> </semantics></math> packets/s.</p>
Full article ">Figure 6
<p>Impact of single vacation duration on probability <math display="inline"><semantics> <mrow> <mi mathvariant="bold">P</mi> <mo>{</mo> <mi>X</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> <mo>=</mo> <mn>1</mn> <mspace width="0.166667em"/> <mo>|</mo> <mspace width="0.166667em"/> <mi>X</mi> <mo>(</mo> <mn>0</mn> <mo>)</mo> <mo>=</mo> <mn>0</mn> <mo>}</mo> </mrow> </semantics></math> for <math display="inline"><semantics> <mrow> <mi>λ</mi> <mo>=</mo> <mn>750</mn> </mrow> </semantics></math> packets/s.</p>
Full article ">Figure 7
<p>Comparison of the <math display="inline"><semantics> <mrow> <mi mathvariant="bold">P</mi> <mo>{</mo> <mi>Y</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> <mo>=</mo> <mn>1</mn> <mspace width="0.166667em"/> <mo>|</mo> <mspace width="0.166667em"/> <mi>Y</mi> <mo>(</mo> <mn>0</mn> <mo>)</mo> <mo>=</mo> <mn>0</mn> <mo>}</mo> </mrow> </semantics></math> probability distribution for the compound Poisson process, obtained: (1) by numerical calculations using the formula (<a href="#FD28-entropy-23-01410" class="html-disp-formula">28</a>)—black line on the graph; (2) as a statistical result of a 10,000th random sample—the red squares in the diagram.</p>
Full article ">Figure 8
<p>Comparison of the <math display="inline"><semantics> <mrow> <mi mathvariant="bold">P</mi> <mo>{</mo> <mi>Y</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> <mo>=</mo> <mn>1</mn> <mspace width="0.166667em"/> <mo>|</mo> <mspace width="0.166667em"/> <mi>Y</mi> <mo>(</mo> <mn>0</mn> <mo>)</mo> <mo>=</mo> <mn>0</mn> <mo>}</mo> </mrow> </semantics></math> probability distribution for the simple Poisson process, obtained: (1) by numerical calculations using the formula (<a href="#FD28-entropy-23-01410" class="html-disp-formula">28</a>)—black line on the graph; (2) as a statistical result of a 10,000th random sample—the red squares in the diagram.</p>
Full article ">
15 pages, 1740 KiB  
Communication
Traffic Signal Control Using Hybrid Action Space Deep Reinforcement Learning
by Salah Bouktif, Abderraouf Cheniki and Ali Ouni
Sensors 2021, 21(7), 2302; https://doi.org/10.3390/s21072302 - 25 Mar 2021
Cited by 35 | Viewed by 4279
Abstract
Recent research works on intelligent traffic signal control (TSC) have been mainly focused on leveraging deep reinforcement learning (DRL) due to its proven capability and performance. DRL-based traffic signal control frameworks belong to either discrete or continuous controls. In discrete control, the DRL [...] Read more.
Recent research works on intelligent traffic signal control (TSC) have been mainly focused on leveraging deep reinforcement learning (DRL) due to its proven capability and performance. DRL-based traffic signal control frameworks belong to either discrete or continuous controls. In discrete control, the DRL agent selects the appropriate traffic light phase from a finite set of phases. Whereas in continuous control approach, the agent decides the appropriate duration for each signal phase within a predetermined sequence of phases. Among the existing works, there are no prior approaches that propose a flexible framework combining both discrete and continuous DRL approaches in controlling traffic signal. Thus, our ultimate objective in this paper is to propose an approach capable of deciding simultaneously the proper phase and its associated duration. Our contribution resides in adapting a hybrid Deep Reinforcement Learning that considers at the same time discrete and continuous decisions. Precisely, we customize a Parameterized Deep Q-Networks (P-DQN) architecture that permits a hierarchical decision-making process that primarily decides the traffic light next phases and secondly specifies its the associated timing. The evaluation results of our approach using Simulation of Urban MObility (SUMO) shows its out-performance over the benchmarks. The proposed framework is able to reduce the average queue length of vehicles and the average travel time by 22.20% and 5.78%, respectively, over the alternative DRL-based TSC systems. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Structure of MP-DQN architecture.</p>
Full article ">Figure 2
<p>Overview of the framework structure for traffic signal control with Phase and Duration control.</p>
Full article ">Figure 3
<p>Example of the state vector extracted from the intersection environment.</p>
Full article ">Figure 4
<p>Example of the agent’s action that is applied to the traffic light.</p>
Full article ">Figure 5
<p>Flow diagram describing the dynamic of the proposed framework.</p>
Full article ">Figure 6
<p>Learning curves of the proposed framework for (<b>a</b>) Average Travel Time, (<b>b</b>) Average Waiting Time and (<b>c</b>) Average Queue Length over episodes.</p>
Full article ">Figure 7
<p>Travel Time Training Curves Comparison of Hybrid Framework Against Discrete and Continuous Benchmarks.</p>
Full article ">Figure 8
<p>Queue Length performance comparison of Hybrid approach versus Discrete and Continuous baselines during traffic simulation.</p>
Full article ">
11 pages, 1504 KiB  
Article
Transmission of Trading Orders through Communication Line with Relativistic Delay
by Peter B. Lerner
Int. J. Financial Stud. 2021, 9(1), 12; https://doi.org/10.3390/ijfs9010012 - 26 Feb 2021
Cited by 1 | Viewed by 2265
Abstract
The notion of “relativistic finance” became ingrained in the public imagination and has been asserted in many mass-media reports. However, despite an observed drive of the most reputable Wall Street firms to establish their servers ever closer to the trading hubs, there is [...] Read more.
The notion of “relativistic finance” became ingrained in the public imagination and has been asserted in many mass-media reports. However, despite an observed drive of the most reputable Wall Street firms to establish their servers ever closer to the trading hubs, there is surprisingly little concrete information related to the relativistic delay of the trading orders. There is an underlying assumption that faster electronics are always beneficial to the stability of the network. In this paper, the author proposes a modified M/M/G queue theory to describe the propagation of the trading signal with finite velocity. Based on this theory, we demonstrate that, even if the reaction time of the system is negligible, the propagating signal is distorted by simple acts of trading along the transmission line. Full article
Show Figures

Figure 1

Figure 1
<p>(<b>A</b>) Relativistic light cone. Only part <span class="html-italic">x</span> &gt; 0 is drawn for clarity. (<b>B</b>) Schematic shape of the random signal propagating across the line. The upper axis shows “Buy” and “Sell” orders separately, and the lower axis shows the sum of the orders. The vertical axis may correspond to the number of shares traded, or to the aggregate dollar volume, depending on the organization of the trading venue and the type of order. (<b>C</b>) “Topology” of the trading network. Exchange is located at point A, and the imbalances are absorbed (cleared) at point B. Traders are distributed along the line AB, according to the Poisson law.</p>
Full article ">Figure 2
<p>Space/time propagation of the signal in the trading system. The signal propagates from the lower left corner of the frame to the upper right corner parallel to the diagonal. The purple line indicates <math display="inline"><semantics> <mrow> <mi>τ</mi> <mo>=</mo> <mi>x</mi> <mo>/</mo> <mi>c</mi> <mo>−</mo> <mn>0.5</mn> <mi>a</mi> </mrow> </semantics></math> (the signal is in the future with respect to an observer at the origin), the green line is <math display="inline"><semantics> <mrow> <mi>τ</mi> <mo>=</mo> <mi>x</mi> <mo>/</mo> <mi>c</mi> <mo>−</mo> <mn>0.25</mn> <mi>a</mi> </mrow> </semantics></math> (signal approaches the origin), and the yellow line is <math display="inline"><semantics> <mrow> <mi>τ</mi> <mo>=</mo> <mi>x</mi> <mo>/</mo> <mi>c</mi> <mo>+</mo> <mn>0.25</mn> <mi>a</mi> </mrow> </semantics></math> (the signal passes the origin). One might consider <span class="html-italic">a</span> as a crude measure of the reaction time of the trading system. Values for the parameters of the Equations (9), (11), and (12) used for all figures are λ = 1.5<span class="html-italic">a</span>, <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mi>β</mi> <mo>˜</mo> </mover> <mrow> <mn>11</mn> </mrow> </msub> <mo>=</mo> <msub> <mover accent="true"> <mi>β</mi> <mo>˜</mo> </mover> <mrow> <mn>22</mn> </mrow> </msub> <mo>=</mo> <mn>0.6</mn> <mi>a</mi> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mn>12</mn> </mrow> </msub> <mo>=</mo> <mo> </mo> <msub> <mi>β</mi> <mrow> <mn>21</mn> </mrow> </msub> <mo>=</mo> <mn>0.3</mn> <mi>a</mi> </mrow> </semantics></math> and were chosen for the best visual appearance of plots. Hyperbolic structure in the left quadrant indicates the space/time region where the signal is indistinguishable from the noise.</p>
Full article ">Figure 3
<p>The shape of the pulse in arbitrary units (a response to the delta function) in the cases (<b>A</b>) <math display="inline"><semantics> <mrow> <mi>τ</mi> <mo>=</mo> <mi>x</mi> <mo>/</mo> <mi>c</mi> <mo>−</mo> <mn>0.5</mn> <mi>a</mi> </mrow> </semantics></math>, (<b>B</b>) <math display="inline"><semantics> <mrow> <mi>τ</mi> <mo>=</mo> <mi>x</mi> <mo>/</mo> <mi>c</mi> <mo>−</mo> <mn>0.25</mn> <mi>a</mi> </mrow> </semantics></math>, and (<b>C</b>) <math display="inline"><semantics> <mrow> <mi>τ</mi> <mo>=</mo> <mi>x</mi> <mo>/</mo> <mi>c</mi> <mo>+</mo> <mn>0.25</mn> <mi>a</mi> </mrow> </semantics></math>. The spatial coordinate is measured in the units <span class="html-italic">c·a</span> (see Equation (5)).</p>
Full article ">Figure 4
<p>Autocorrelation of the square of the Green function kernel <math display="inline"><semantics> <mrow> <mi mathvariant="normal">I</mi> <mrow> <mo>(</mo> <mi mathvariant="sans-serif">τ</mi> <mo>)</mo> </mrow> <mo>=</mo> <msubsup> <mstyle displaystyle="true"> <mo>∫</mo> </mstyle> <mrow> <mo>−</mo> <mn>10</mn> </mrow> <mrow> <mn>10</mn> </mrow> </msubsup> <msup> <mi>K</mi> <mn>2</mn> </msup> <mo stretchy="false">(</mo> <mi>x</mi> <mo>,</mo> <mfrac> <mi>x</mi> <mi>v</mi> </mfrac> <mo>−</mo> <mi>τ</mi> <mo stretchy="false">)</mo> <mi>d</mi> <mi>x</mi> </mrow> </semantics></math> (see Equation (14) in the text), as a function of time delay and <span class="html-italic">v</span> = 0.75<span class="html-italic">c</span>. Limits of integration are arbitrary as a truncation to approximate [−∞, +∞] with the necessary accuracy.</p>
Full article ">Figure 5
<p>Kullback–Leibler distance (Equation (15)) between Green functions kernels as a function of time delay and <span class="html-italic">v</span> = 0.75<span class="html-italic">c</span>. A small negative tail is spurious and is related to numerical approximations.</p>
Full article ">
28 pages, 2094 KiB  
Article
MAC Performance Analysis for Reliable Power-Line Communication Networks with ARQ Scheme
by Sheng Hao and Huyin Zhang
Sensors 2021, 21(1), 196; https://doi.org/10.3390/s21010196 - 30 Dec 2020
Cited by 6 | Viewed by 2069
Abstract
Power-line communication (PLC) networks have been increasingly used for constructing industrial IoT (internet of things) and home networking systems due to their low-cost installation and broad coverage feature. To guarantee the transmission reliability, ARQ (automatic repeat request) scheme is introduced into the link [...] Read more.
Power-line communication (PLC) networks have been increasingly used for constructing industrial IoT (internet of things) and home networking systems due to their low-cost installation and broad coverage feature. To guarantee the transmission reliability, ARQ (automatic repeat request) scheme is introduced into the link layer of reliable PLC networks, which allows the retransmission of a data frame several times so that it has a higher probability to be correctly received. However, current studies of performance analysis for PLC MAC (medium access control) protocol (i.e., IEEE 1901) do not take into account of the impact of ARQ scheme. To resolve this problem, we propose an analytical model to investigate the MAC performance of IEEE 1901 protocol for reliable PLC networks with ARQ scheme. In the modeling process, we first establish a PLC channel model to reflect the impacts of PLC channel types (containing Rayleigh fading and Log-normal fading), additive non-Gaussian noise feature and ARQ scheme on data transmission at link layer. Next, we employ Renewal theory and Queueing dynamics to capture the transmission attempt behavior of executing IEEE 1901 protocol in the unsaturated environment with finite transit buffer size. On the basis of combining these two models, we derive the closed-form expressions of 1901 MAC metrics considering the influence of the ARQ scheme. Furthermore, we prove that the proposed analytical model has the convergence property. Finally, we evaluate the MAC performance of 1901 protocol for reliable PLC networks with ARQ scheme and verify the proposed analytical model. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

Figure 1
<p>Transmission attempt process using ARQ scheme.</p>
Full article ">Figure 2
<p>Modeling steps of the proposed analytical model.</p>
Full article ">Figure 3
<p>The relationship between <math display="inline"><semantics> <msub> <mi>π</mi> <mi>a</mi> </msub> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>A</mi> <msub> <mi>r</mi> <mi>a</mi> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>1901’s time sequence for reliable PLC networks with ARQ scheme.</p>
Full article ">Figure 5
<p>The MAC performance of 1901 protocol with different <span class="html-italic">N</span>.</p>
Full article ">Figure 6
<p>The MAC performance of 1901 protocol with different <math display="inline"><semantics> <mi>λ</mi> </semantics></math>.</p>
Full article ">Figure 7
<p>The MAC performance of 1901 protocol with different ζ.</p>
Full article ">Figure 8
<p>The numerical values of outage probability <math display="inline"><semantics> <msub> <mi>P</mi> <mi>o</mi> </msub> </semantics></math> with different <math display="inline"><semantics> <mi>ζ</mi> </semantics></math>.</p>
Full article ">Figure 9
<p>The numerical values of outage probability <math display="inline"><semantics> <msub> <mi>P</mi> <mi>o</mi> </msub> </semantics></math> with different <math display="inline"><semantics> <msub> <mi>P</mi> <mi>I</mi> </msub> </semantics></math>.</p>
Full article ">Figure 10
<p>The MAC performance of 1901 protocol with different <span class="html-italic">P</span><sub><span class="html-italic">I</span></sub>.</p>
Full article ">Figure 11
<p>The MAC performance of 1901 protocol with different <math display="inline"><semantics> <mi mathvariant="script">K</mi> </semantics></math>.</p>
Full article ">Figure 12
<p>The numerical values of outage probability <math display="inline"><semantics> <msub> <mi>P</mi> <mi>o</mi> </msub> </semantics></math> with different <math display="inline"><semantics> <mi mathvariant="script">K</mi> </semantics></math>.</p>
Full article ">Figure 13
<p>The MAC performance of 1901 protocol with different <span class="html-italic">K</span>.</p>
Full article ">Figure A1
<p>The relationship between iteration times and convergence precision under the impact of transit buffer size <span class="html-italic">K</span>.</p>
Full article ">
18 pages, 498 KiB  
Article
Probabilistic Analysis of a Buffer Overflow Duration in Data Transmission in Wireless Sensor Networks
by Wojciech M. Kempa
Sensors 2020, 20(20), 5772; https://doi.org/10.3390/s20205772 - 12 Oct 2020
Cited by 3 | Viewed by 2110
Abstract
One of the most important problems of data transmission in packet networks, in particular in wireless sensor networks, are periodic overflows of buffers accumulating packets directed to a given node. In the case of a buffer overflow, all new incoming packets are lost [...] Read more.
One of the most important problems of data transmission in packet networks, in particular in wireless sensor networks, are periodic overflows of buffers accumulating packets directed to a given node. In the case of a buffer overflow, all new incoming packets are lost until the overflow condition terminates. From the point of view of network optimization, it is very important to know the probabilistic nature of this phenomenon, including the probability distribution of the duration of the buffer overflow period. In this article, a mathematical model of the node of a wireless sensor network with discrete time parameter is proposed. The model is governed by a finite-buffer discrete-time queueing system with geometrically distributed interarrival times and general distribution of processing times. A system of equations for the tail cumulative distribution function of the first buffer overflow period duration conditioned by the initial state of the accumulating buffer is derived. The solution of the corresponding system written for probability generating functions is found using the analytical approach based on the idea of embedded Markov chain and linear algebra. Corresponding result for next buffer overflow periods is obtained as well. Numerical study illustrating theoretical results is attached. Full article
Show Figures

Figure 1

Figure 1
<p>Conditional probabilities <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mo>Δ</mo> <mo stretchy="false">^</mo> </mover> <mi>n</mi> </msub> <mrow> <mo stretchy="false">(</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics></math> for geometric processing distribution, <math display="inline"><semantics> <mrow> <mi>ϱ</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>, 5 and 10.</p>
Full article ">Figure 2
<p>Conditional probabilities <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mo>Δ</mo> <mo stretchy="false">^</mo> </mover> <mi>n</mi> </msub> <mrow> <mo stretchy="false">(</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics></math> for deterministic processing distribution, <math display="inline"><semantics> <mrow> <mi>ϱ</mi> <mo>=</mo> <mn>1.00</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>5</mn> </mrow> </semantics></math> and 10.</p>
Full article ">Figure 3
<p>Conditional probabilities <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mo>Δ</mo> <mo stretchy="false">^</mo> </mover> <mi>n</mi> </msub> <mrow> <mo stretchy="false">(</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics></math> for bounded discrete processing distribution, <math display="inline"><semantics> <mrow> <mi>ϱ</mi> <mo>=</mo> <mn>1.25</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>5</mn> </mrow> </semantics></math> and 10.</p>
Full article ">Figure 4
<p>Conditional probabilities <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mo>Δ</mo> <mo stretchy="false">^</mo> </mover> <mi>n</mi> </msub> <mrow> <mo stretchy="false">(</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics></math> for geometric processing distribution, <math display="inline"><semantics> <mrow> <mi>ϱ</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>, 5 and 10.</p>
Full article ">Figure 5
<p>Conditional probabilities <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mo>Δ</mo> <mo stretchy="false">^</mo> </mover> <mi>n</mi> </msub> <mrow> <mo stretchy="false">(</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics></math> for deterministic processing distribution, <math display="inline"><semantics> <mrow> <mi>ϱ</mi> <mo>=</mo> <mn>1.00</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>5</mn> </mrow> </semantics></math> and 10.</p>
Full article ">Figure 6
<p>Conditional probabilities <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mo>Δ</mo> <mo stretchy="false">^</mo> </mover> <mi>n</mi> </msub> <mrow> <mo stretchy="false">(</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics></math> for bounded discrete processing distribution, <math display="inline"><semantics> <mrow> <mi>ϱ</mi> <mo>=</mo> <mn>1.25</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>5</mn> </mrow> </semantics></math> and 10.</p>
Full article ">Figure 7
<p>Conditional probabilities <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mo>Δ</mo> <mo stretchy="false">^</mo> </mover> <mi>n</mi> </msub> <mrow> <mo stretchy="false">(</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics></math> for geometric processing distribution, <math display="inline"><semantics> <mrow> <mi>ϱ</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>, 5 and 10.</p>
Full article ">Figure 8
<p>Conditional probabilities <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mo>Δ</mo> <mo stretchy="false">^</mo> </mover> <mi>n</mi> </msub> <mrow> <mo stretchy="false">(</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics></math> for deterministic processing distribution, <math display="inline"><semantics> <mrow> <mi>ϱ</mi> <mo>=</mo> <mn>1.00</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>5</mn> </mrow> </semantics></math> and 10.</p>
Full article ">Figure 9
<p>Conditional probabilities <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mo>Δ</mo> <mo stretchy="false">^</mo> </mover> <mi>n</mi> </msub> <mrow> <mo stretchy="false">(</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics></math> for bounded discrete processing distribution, <math display="inline"><semantics> <mrow> <mi>ϱ</mi> <mo>=</mo> <mn>1.25</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>5</mn> </mrow> </semantics></math> and 10.</p>
Full article ">Figure 10
<p>Impact of skewness type on conditional probabilities <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mo>Δ</mo> <mo stretchy="false">^</mo> </mover> <mn>3</mn> </msub> <mrow> <mo stretchy="false">(</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics></math> for bounded discrete processing distribution and <math display="inline"><semantics> <mrow> <mi>ϱ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 11
<p>Mean first buffer overflow duration in dependence on offered load and initial buffer state.</p>
Full article ">Figure 12
<p>Impact of of system size on the mean first buffer overflow duration for different values of offered load.</p>
Full article ">
25 pages, 1526 KiB  
Article
Queuing System with Two Types of Customers and Dynamic Change of a Priority
by Valentina Klimenok, Alexander Dudin, Olga Dudina and Irina Kochetkova
Mathematics 2020, 8(5), 824; https://doi.org/10.3390/math8050824 - 19 May 2020
Cited by 20 | Viewed by 4473
Abstract
The use of priorities allows us to improve the quality of service of inhomogeneous customers in telecommunication networks, inventory and health-care systems. An important modern direction of research is to analyze systems in which priority of a customer can be changed during his/her [...] Read more.
The use of priorities allows us to improve the quality of service of inhomogeneous customers in telecommunication networks, inventory and health-care systems. An important modern direction of research is to analyze systems in which priority of a customer can be changed during his/her stay in the system. We considered a single-server queuing system with a finite buffer, where two types of customers arrive according to a batch marked Markov arrival process. Type 1 customers have non-preemptive priority over type 2 customers. Low priority customers are able to receive high priority after the random amount of time. For each non-priority customer accepted into the buffer, a timer, which counts a random time having a phase type distribution, is switched-on. When the timer expires, the customer with some probability leaves the system unserved and with the complimentary probability gains the high priority. Such a type of queues is typical in many health-care systems, contact centers, perishable inventory, etc. We describe the behavior of the system by a multi-dimensional continuous-time Markov chain and calculate a number of the stationary performance measures of the system including the various loss probabilities as well as the distribution function of the waiting time of priority customers. The illustrative numerical examples giving insights into the system behavior are presented. Full article
(This article belongs to the Section Network Science)
Show Figures

Figure 1

Figure 1
<p>Structure of the system.</p>
Full article ">Figure 2
<p>The distribution function <math display="inline"><semantics> <mrow> <msub> <mi>W</mi> <mn>1</mn> </msub> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </mrow> </semantics></math> under different service rate <math display="inline"><semantics> <mi>μ</mi> </semantics></math>.</p>
Full article ">Figure 3
<p>The loss probability <math display="inline"><semantics> <msubsup> <mi>P</mi> <mrow> <mi>l</mi> <mi>o</mi> <mi>s</mi> <mi>s</mi> </mrow> <mrow> <mo>(</mo> <mn>1</mn> <mo>)</mo> </mrow> </msubsup> </semantics></math> as a function of the buffer capacity <span class="html-italic">N</span> for <math display="inline"><semantics> <mrow> <mi>B</mi> <mi>M</mi> <mi>M</mi> <mi>A</mi> <mi>P</mi> </mrow> </semantics></math>s with different coefficients of correlation.</p>
Full article ">Figure 4
<p>The loss probability <math display="inline"><semantics> <msubsup> <mi>P</mi> <mrow> <mi>l</mi> <mi>o</mi> <mi>s</mi> <mi>s</mi> </mrow> <mrow> <mo>(</mo> <mn>2</mn> <mo>)</mo> </mrow> </msubsup> </semantics></math> as a function of the buffer capacity <span class="html-italic">N</span> for <math display="inline"><semantics> <mrow> <mi>B</mi> <mi>M</mi> <mi>M</mi> <mi>A</mi> <mi>P</mi> </mrow> </semantics></math>s with different coefficients of correlation.</p>
Full article ">Figure 5
<p>The loss probability <math display="inline"><semantics> <msub> <mi>P</mi> <mrow> <mi>l</mi> <mi>o</mi> <mi>s</mi> <mi>s</mi> </mrow> </msub> </semantics></math> as a function of the buffer capacity <span class="html-italic">N</span> for <math display="inline"><semantics> <mrow> <mi>B</mi> <mi>M</mi> <mi>M</mi> <mi>A</mi> <mi>P</mi> </mrow> </semantics></math>s with different coefficients of correlation.</p>
Full article ">Figure 6
<p>The loss probability <math display="inline"><semantics> <msubsup> <mi>P</mi> <mrow> <mi>l</mi> <mi>o</mi> <mi>s</mi> <mi>s</mi> </mrow> <mrow> <mo>(</mo> <mi>i</mi> <mi>m</mi> <mi>p</mi> <mo>)</mo> </mrow> </msubsup> </semantics></math> as a function of the buffer capacity <span class="html-italic">N</span> for <math display="inline"><semantics> <mrow> <mi>B</mi> <mi>M</mi> <mi>M</mi> <mi>A</mi> <mi>P</mi> </mrow> </semantics></math>s with different coefficients of correlation.</p>
Full article ">Figure 7
<p>The mean number of customers in the buffer, <math display="inline"><semantics> <mrow> <mi>L</mi> <mo>,</mo> </mrow> </semantics></math> as a function of the input rate <math display="inline"><semantics> <mi>λ</mi> </semantics></math> for the <math display="inline"><semantics> <mrow> <mi>B</mi> <mi>M</mi> <mi>M</mi> <mi>A</mi> <mi>P</mi> </mrow> </semantics></math>s with different coefficients of correlation.</p>
Full article ">Figure 8
<p>The mean number of priority customers in the buffer, <math display="inline"><semantics> <mrow> <msup> <mi>L</mi> <mrow> <mo>(</mo> <mi>p</mi> <mi>r</mi> <mi>i</mi> <mi>o</mi> <mi>r</mi> <mo>)</mo> </mrow> </msup> <mo>,</mo> </mrow> </semantics></math> as a function of the input rate <math display="inline"><semantics> <mi>λ</mi> </semantics></math> for the <math display="inline"><semantics> <mrow> <mi>B</mi> <mi>M</mi> <mi>M</mi> <mi>A</mi> <mi>P</mi> </mrow> </semantics></math>s with different coefficients of correlation.</p>
Full article ">Figure 9
<p>The standard deviations <math display="inline"><semantics> <mi>σ</mi> </semantics></math> of the number of customers in the buffer for the <math display="inline"><semantics> <mrow> <mi>B</mi> <mi>M</mi> <mi>M</mi> <mi>A</mi> <mi>P</mi> </mrow> </semantics></math>s with different coefficients of correlation.</p>
Full article ">Figure 10
<p>The standard deviations <math display="inline"><semantics> <msup> <mi>σ</mi> <mrow> <mo>(</mo> <mi>p</mi> <mi>r</mi> <mi>i</mi> <mi>o</mi> <mi>r</mi> <mo>)</mo> </mrow> </msup> </semantics></math> of the number of priority customers in the buffer for the <math display="inline"><semantics> <mrow> <mi>B</mi> <mi>M</mi> <mi>M</mi> <mi>A</mi> <mi>P</mi> </mrow> </semantics></math>s with different coefficients of correlation.</p>
Full article ">
13 pages, 1199 KiB  
Article
Queuing System with Unreliable Servers and Inhomogeneous Intensities for Analyzing the Impact of Non-Stationarity to Performance Measures of Wireless Network under Licensed Shared Access
by Ekaterina Markova, Yacov Satin, Irina Kochetkova, Alexander Zeifman and Anna Sinitcina
Mathematics 2020, 8(5), 800; https://doi.org/10.3390/math8050800 - 14 May 2020
Cited by 9 | Viewed by 1925
Abstract
Given the limited frequency band resources and increasing volume of data traffic in modern multiservice networks, finding new and more efficient radio resource management (RRM) mechanisms is becoming indispensable. One of the implemented technologies to solve this problem is the licensed shared access [...] Read more.
Given the limited frequency band resources and increasing volume of data traffic in modern multiservice networks, finding new and more efficient radio resource management (RRM) mechanisms is becoming indispensable. One of the implemented technologies to solve this problem is the licensed shared access (LSA) technology. LSA allows the spectrum that has been licensed to an owner, who has absolute priority on its utilization, to be used by other participants (i.e., tenants). Owner priority impacts negatively on the quality of service (QoS) by reducing the data bit rate and interrupting user services. In this paper, we propose a wireless multiservice network scheme model described as a queuing system with unreliable servers and a finite buffer within the LSA framework. The aim of this work is to analyze main system performance measures: blocking probability, average number of requests in queue, and average queue length depending on LSA frequencies’ availability. Full article
(This article belongs to the Section Network Science)
Show Figures

Figure 1

Figure 1
<p>State transition diagram of the queuing model with catastrophes and repairs (red—devices are OFF, green—devices are ON).</p>
Full article ">Figure 2
<p>Application traffic daily profile in Central and Eastern Europe (TB) [<a href="#B42-mathematics-08-00800" class="html-bibr">42</a>].</p>
Full article ">Figure 3
<p>Estimating the time interval for blocking probability <math display="inline"><semantics> <mrow> <mi>B</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math> analysis.</p>
Full article ">Figure 4
<p>Estimating of limiting values for blocking probability (<b>a</b>) and average queue length (<b>b</b>).</p>
Full article ">Figure 5
<p>Blocking probability (<b>a</b>) and average queue length (<b>b</b>) depending on traffic type.</p>
Full article ">
34 pages, 897 KiB  
Article
On NACK-Based rDWS Algorithm for Network Coded Broadcast
by Sovanjyoti Giri and Rajarshi Roy
Entropy 2019, 21(9), 905; https://doi.org/10.3390/e21090905 - 17 Sep 2019
Cited by 3 | Viewed by 3142
Abstract
The Drop when seen (DWS) technique, an online network coding strategy is capable of making a broadcast transmission over erasure channels more robust. This throughput optimal strategy reduces the expected sender queue length. One major issue with the DWS technique is the high [...] Read more.
The Drop when seen (DWS) technique, an online network coding strategy is capable of making a broadcast transmission over erasure channels more robust. This throughput optimal strategy reduces the expected sender queue length. One major issue with the DWS technique is the high computational complexity. In this paper, we present a randomized version of the DWS technique (rDWS), where the unique strength of the DWS, which is the sender’s ability to drop a packet even before its decoding at receivers, is not compromised. Computational complexity of the algorithms is reduced with rDWS, but the encoding is not throughput optimal here. So, we perform a throughput efficiency analysis of it. Exact probabilistic analysis of innovativeness of a coefficient is found to be difficult. Hence, we carry out two individual analyses, maximum entropy analysis, average understanding analysis, and obtain a lower bound on the innovativeness probability of a coefficient. Based on these findings, innovativeness probability of a coded combination is analyzed. We evaluate the performance of our proposed scheme in terms of dropping and decoding statistics through simulation. Our analysis, supported by plots, reveals some interesting facts about innovativeness and shows that rDWS technique achieves near-optimal performance for a finite field of sufficient size. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

Figure 1
<p>Block diagram of the components of the broadcasting transmission scenario.</p>
Full article ">Figure 2
<p>Relative timing of encoding, transmission, feedback reception, and sender queue updation points within a time slot.</p>
Full article ">Figure 3
<p>Probability of <span class="html-italic">innovativeness</span> of a picked-up coefficient, <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="script">P</mi> <mi>C</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>, versus field size where <math display="inline"><semantics> <mrow> <mo>|</mo> <mi>S</mi> <mo>(</mo> <mi>i</mi> <mo>)</mo> <mo>|</mo> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math> (left subfigure), <math display="inline"><semantics> <mrow> <mo>|</mo> <mi>S</mi> <mo>(</mo> <mi>i</mi> <mo>)</mo> <mo>|</mo> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> (middle subfigure) and <math display="inline"><semantics> <mrow> <mo>|</mo> <mi>S</mi> <mo>(</mo> <mi>i</mi> <mo>)</mo> <mo>|</mo> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math> (right subfigure).</p>
Full article ">Figure 4
<p>Probability of <span class="html-italic">innovativeness</span> of a picked-up coefficient <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi mathvariant="script">P</mi> <mrow> <mi>C</mi> <mi>M</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>,</mo> <mspace width="0.166667em"/> <msub> <mi mathvariant="script">P</mi> <mrow> <mi>C</mi> <mi>U</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mspace width="4.pt"/> <mi>and</mi> <mspace width="0.166667em"/> <msub> <mi mathvariant="script">P</mi> <mrow> <mi>C</mi> <mi>L</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>)</mo> </mrow> </semantics></math> versus field size where <math display="inline"><semantics> <mrow> <mo>|</mo> <mi>S</mi> <mo>(</mo> <mi>i</mi> <mo>)</mo> <mo>|</mo> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math> (left subfigure), <math display="inline"><semantics> <mrow> <mo>|</mo> <mi>S</mi> <mo>(</mo> <mi>i</mi> <mo>)</mo> <mo>|</mo> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> (middle subfigure) and <math display="inline"><semantics> <mrow> <mo>|</mo> <mi>S</mi> <mo>(</mo> <mi>i</mi> <mo>)</mo> <mo>|</mo> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math> (right subfigure).</p>
Full article ">Figure 5
<p>Tree corresponding to <a href="#sec4dot2dot1-entropy-21-00905" class="html-sec">Section 4.2.1</a> where <span class="html-italic">representative</span> vectors represent nodes. The constraint corresponding to each level of the tree is written at the right.</p>
Full article ">Figure 6
<p>Minimum value of the lower bound of the probability of <span class="html-italic">innovativeness</span> (<math display="inline"><semantics> <msub> <mfenced separators="" open="" close="|"> <msub> <mi mathvariant="script">P</mi> <mrow> <mi>L</mi> <mi>L</mi> </mrow> </msub> </mfenced> <mo movablelimits="true" form="prefix">min</mo> </msub> </semantics></math>) of a picked-up linear combination versus field size. For the left subfigure plots, we have considered <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>9</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>, and for the right subfigure plots, we have considered <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>9</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Minimum value of the lower bound of the probability of <span class="html-italic">innovativeness</span> (<math display="inline"><semantics> <msub> <mfenced separators="" open="" close="|"> <msubsup> <mi mathvariant="script">P</mi> <mrow> <mi>L</mi> <mi>L</mi> </mrow> <mo>′</mo> </msubsup> </mfenced> <mo movablelimits="true" form="prefix">min</mo> </msub> </semantics></math>) of a picked-up linear combination versus field size. For the left subfigure plots, we have considered <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>9</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>, and for the right subfigure plots, we have considered <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>9</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>Cumulative probability of packet dropping for the first packet (left subfigure), the second packet (middle subfigure), and the third packet (right subfigure) versus time slots with <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>p</mi> <mi>e</mi> </msub> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p>Average time to drop the last packet of a generation versus channel erasure probability with <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 10
<p>Cumulative probability of decoding a generation for an arbitrarily chosen receiver (left subfigure), and for the whole receiver system (right subfigure) with <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>p</mi> <mi>e</mi> </msub> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>.</p>
Full article ">
Back to TopTop