SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
Journal of Information Processing Systems, Vol.7, No.4, December 2011 http://dx.doi.org/10.3745/JIPS.2011.7.4.679 
Performance Evaluation of Finite Queue Switching 
Under Two-Dimensional M/G/1(m) Traffic 
Md. Syeful Islam*, Md. Rezaur Rahman*, Anupam Roy*, Md. Imdadul Islam* 
and M. R. Amin** 
Abstract—In this paper we consider a local area network (LAN) of dual mode service 
where one is a token bus and the other is a carrier sense multiple access with a collision 
detection (CSMA/CD) bus. The objective of the paper is to find the overall cell/packet 
dropping probability of a dual mode LAN for finite length queue M/G/1(m) traffic. Here, the 
offered traffic of the LAN is taken to be the equivalent carried traffic of a one-millisecond 
delay. The concept of a tabular solution for two-dimensional Poisson’s traffic of circuit 
switching is adapted here to find the cell dropping probability of the dual mode packet 
service. Although the work is done for the traffic of similar bandwidth, it can be extended 
for the case of a dissimilar bandwidth of a circuit switched network. 
Keywords—Carried Traffic, LST, Two-Dimensional Traffic, Cell Dropping Probability, 
M/G/1 Model 
1. INTRODUCTION 
In many communication systems, two or more traffic links are usually merged together to 
form a common trunk line or different types of traffic may share the bus or ring of a local area 
network (LAN). If a communication network is in statistical equilibrium and serving two or 
more different types of traffic, it can be modeled by the help of a multi-dimensional state transi-tion 
diagram. The transmission of real time data, like audio or video, which needs a constant 
arrival rate in sequential order to play the signal instantly at the receiving end requires circuit 
switching. On the other hand, packet switching is more efficient for data, which can withstand 
delays (such as e-mails, word files, etc.). For example, if any link experiences two types of Pois-son’s 
offered traffic A1 and A2 , then a two-dimensional Markov chain is considered as the sim-plest 
solution. The solution of the two-dimensional Markov chain (both similar and dissimilar 
bandwidth traffic) can be obtained in tabular form [1-3] for a limited trunk case. A good exam-ple 
of multidimensional traffic is the mobile cellular network, where two different arrivals, (i.e., 
new originating and handoff arrival traffic) are prevalent, as summarized in [4-6], where the 
bandwidth of both the traffic is the same since both are voice signals. If there is a provision of 
another offered traffic of a different bandwidth, say, if video/text/image data is added with the 
Manuscript received May 26, 2011; first revision October 5, 2011; accepted October 27, 2011. 
Corresponding Author: M. R. Amin 
* Department of Computer Science and Engineering, Jahangirnagar University, Savar, Dhaka 1342, Bangladesh 
679 
(imdad@juniv.edu) 
** Department of Electronics and Communications Engineering, East West University, 43 Mohakhali, Dhaka 1212, 
Bangladesh (ramin@ewubd.edu) 
Copyright ⓒ 2011 KIPS (ISSN 1976-913X)
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic 
conventional mobile cellular system, then the system is known as a voice-data integrated net-work 
680 
[7-8]. 
For non-Markovian traffic, the situation is different. For example, in packet switching, the 
information/message, regardless of content, type, or structure is converted into suitably-sized 
blocks, called packets. The sequences of packets from different information sources can share 
the common trunk and arrival of these packets (variable-bit-rate data streams) upon which a 
switch /router is routed to the appropriate outgoing link. In case of an appropriate router 
(because of huge traffic) being available, the packets are buffered or queued. After some instant 
of time (variable amount of delay), the outgoing link becomes free and the packets are routed to 
appropriate directions. 
In this paper, we consider dual mode terminals of a LAN of BUS topology, where each ter-minal 
can send packets using either a token bus or a carrier sense multiple access with collision 
detection (CSMA/CD) protocol. We consider the packet traffic of a LAN that follows the M/G/1 
model, where a packet may experience infinite delay since the size of the buffer is infinite. If a 
similarly offered traffic is applied to a limited buffer system, for example the M/G/1(m) model, 
some packets will be lost. 
According to teletraffic theory, the probability of occupancy by a full buffer is the probability 
of loss of packets. The probability of delay and cell/packet loss is prevalent but it is a cumber-some 
task to determine the traffic parameters of a combined packet traffic stream [9, 10]. In this 
paper, the probability states of M/G/1(m) before normalization are evaluated and the corres-ponding 
analysis is presented in the next section. The triangular matrix of a two-dimensional 
Markov chain is built for token bus and CSMA/CD traffic. Finally, the triangular matrix is nor-malized 
and complete occupied states are selected. The sum of the complete occupied states 
gives the packet loss probability. Sometimes it is necessary to determine the cell loss probability 
of a finite buffer network, which is equivalent to a finite amount of delay of an infinite buffer 
network. The model used here can solve the condition of the determination of the length of the 
queue to keep the quality of service (QoS) equivalent to the delay of an infinite buffer case. 
The paper is organized as follows: Section II deals with the theoretical analysis of determina-tion 
of the mean delay of the Token BUS and the CSMA/CD traffic of the M/G/1 model. Sec-tion 
III provides the theoretical analysis of determination for the probability states and for the 
probability of cell loss rate of a finite buffer network. Section IV gives the results corresponding 
to a combined traffic model along with an example, and finally, Section V concludes the entire 
analysis. 
2. THE PACKET TRAFFIC OF AN INFINITE BUFFER 
2.1 Token Ring 
In a token ring LAN, a special packet called a token (permission to access the ring) circulates 
among a number of terminals in a ring configuration as shown in Fig. 1. Terminals get the op-portunity 
to seize the token sequentially. Once the terminal gets the token, the terminal converts 
it to a busy packet with a destination address. After receiving the packet, the destination node 
sends the acknowledgment to the source node. Receiving the acknowledgment, the sending node 
generates a new token to be used by another station. 
Under the independent Poisson’s process, the mean message arrival rate at queue is assumed
Md. Syeful Islam, Md. Rezaur Rahman, Anupam Roy, Md. Imdadul Islam and M. R. Amin 
Fig. 1. Token Ring LAN 
to be:     ... ... ... 3 2 1    N /  , where i  
(1 / ) 
  
 
  , (1) 
681 
is the arrival rate of station i, and N is the 
number of users. The switchover time is r1  r2  r3  ... ... ...  R / N  r , where ri is the 
switchover time from queue i to i+1 and    N 
R i ri 1 . The mean waiting time (queuing delay) at 
the sending station is: 
[ ] 
2(1 ) [ ] 
2(1 ) 
2 
[ ] 
2 2 
E S 
Nr N E S 
r 
E W 
 
 
 
 
 
 
N 
i i  
where  2 is the variance of the switchover time, 1 1     
 is the traffic intensity 
under normalized condition,  i  iE[Si ] , E[Si ] is the mean service time of station i that 
follows the general distribution, and E[S] is the mean service time (packet length in time unit) 
expressed as E[S]  E[Lp ]  Lh / R   / , where Lp and Lh are the mean packet length 
and header length respectively. 
For constant service time, we use E[S 2 ]  E2[S] and for exponential service time, 
E[S 2 ]  2E2[S] is used. The average propagation delay is E[Tp ]  / 2 ; where  is the 
round trip propagation delay. The propagation time Tp is the time elapsed from the beginning 
of the transmission of the message until the arrival of the first bit of the message at the destina-tion. 
The mean transfer delay is: E[D]  E[W]  E[S]  E[Tp ] . In Eq. (1), the negative (-) sign 
in the numerator of the second term of the right-hand side is for the exhaustive service (the serv-er 
serves a queue of work station transmitting all of the data, including the date received during 
the transmission, until there is no message left in that queue) and the positive (+) sign for the 
gated service. (The server does a similar job only for the data that was waiting before the trans-mission 
began. In this type of service a gate is closed behind the waiting customer at the instant 
the server in that queue. The customers in front of the gate are served.) The transmission/service 
time S is the time elapsed between the arrival of the first bit of the message at the destination 
and the arrival of the last bit.
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic 
2.2 Token Bus 
The operation for token bus protocol is similar to that of the token ring. Here, instead of a ring, 
bus topology is used and the stations are ordered in such a way that they form a logical ring. The 
typical ordering of stations on a bus (token bus) is shown in Fig. 2. Let the length of the bus be l 
and corresponding end-to-end propagation delay be . Furthermore, let us consider that the 
mean message arrival rate at the queue according to the independent Poisson’s process is:  / N , 
as mentioned in the previous subsection. Similarly, the switchover time is: r  R / N . For a to-ken 
passing bus, we have r  / 3  c ,  2  2 /18 , the mean propagation delay 
is E[Tp ]  / 3 , where c  (Lt  Lb ) / R , Lt is the length of the token in bits and Lb is the 
bit delay by each station. 
If the mean transfer delay is D, including waiting time W (queuing delay) at the sending sta-tion, 
if the service time of the message is S and if the propagation delay isTp , then the average 
( / 3 ) 1 / 
E D  E S 
(2) 
2 2 2 
E D E S e E S e e 
[ ] [ ] (4 2) [ ] 5 4 (2 1) 
    
     
E S e 
2(1 [ [ ] 2 ]) 
2 
   
e e e 
1    
3 
(1 ) 2 
682 
of D can be written as: 
  
    . 
3 
[ ] 
[ ] 
2 1 [ ] 
 
2 1 
 
36( / 3 ) 
[ ] 
2 2  
 
 
 
 
 
  
 
 
 
 
  
 
E S 
N c N E S 
c 
In Eq. (2), the minus (-) sign is for exhaustive service and the plus (+) sign is for the gated 
service. 
2.3 CSMA/CD Bus 
In CSMA/CD, a node starts its transmission after sensing that there is no carrier in the bus, 
therefore, the collision of packets from simultaneous users are reduced. If the node finds the bus 
busy then it waits for a random amount of time and re-sensed the channel. If a node experiences 
collision during transmission it stops the transmission and waits for a random amount of time for 
retransmission. 
Considering the M/G/1 queuing source, the mean delay will be: 
  
   
  2 [ ] 
, 
( ) 1 
3 
 
 
  
  
  
 
   
  
 
   
 
   
 
e E S 
e F e e 
(3) 
Fig. 2. A Token Bus LAN
Md. Syeful Islam, Md. Rezaur Rahman, Anupam Roy, Md. Imdadul Islam and M. R. Amin 
where F( ) is the Laplace transform of the message transmission time distribution f (t) 
and can be expressed as: 
dt e t f F t   
  
0 
( ) ( )  . (4) 
For constant message lengths, it can be shown that F( )  e and E[S 2 ]  E2[S] , where 
 E[S] and 1/e=0.368. For exponentially distributed message lengths, F( ) 1/(1   ) 
and E[S 2 ]  2E2[S] . 
Entire analysis of the above network is done for the case of an infinite queue so the pack-et/ 
cell will experience only a delay but no cells will be lost. We will check the cell loss rate of 
the above network for a finite queuing model. 
3. CONNECTION ORIENTED PACKET SWITCHING OF M/G/1(M) TRAFFIC 
Let  j , h j ,Vj ,and y j be the call arrival rate, the mean call holding (connection) time, data 
speed, and the data activity rate for class jJ respectively. The input traffic load a and the utili-zation 
, 
c 
L 
s i 
a 
k j j j p p        
683 
ρco of the transmission line are given by 
a  
h 
(1 ) 1 , 
 
 
 
 
 
  
j J 
j j j j 
p 
co 
j J 
j j 
h V y 
L c 
B 
  
(5) 
where B is the call blocking probability, Lc is the cell length (53 bytes for ATM), Lp is the 
payload length (48 bytes for an asynchronous transfer mode (ATM)), and c is the transmission 
speed. From Erlang’s loss formula, the cell loss rate is given with the following expression: 
 
B  
a 
s 
i 
i 
s 
0 ! 
/ 
! 
, (6) 
where s is the number of virtual channels (VCs) assigned to the transmission line. According 
to [11] for M/G/1 system, we have the steady probability state: 
* 
1 
1 
1 
* 
0 
* 
k 
j 
k 
 
  ; j = 0, 1, 2, … (7) 
where pj is the probability that j calls arrive during the service time. 
The mean cell delay of M/G/1 traffic is:
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic 
W a  
h C 
a 
 , (8) 
 
 
    p  p k p 
     
j j j j k ; j = 0, 1, 2, …, m-1. (9) 
 
 
C  C  p p C p 
     
j j j j k k ; j = 0, 1, 2, …, m-1. (10) 
1 1 
* . (11) 
     
C 
m j 
j 
 (12) 
m j   
1 C 
c 
1 ( 1) 
  
co mC m k C 
co k 
B B mB 
 
 
(1  )   
2 
W   
684 
1 2  
(1  
) 2 
where a = λh, λ is the packet arrival rate, h is the service time, and the parameter C is defined 
after Eq. ((10). 
For the M/G/1(m) system, *j  0 for j ≥ m+1 and Eq. (7) takes the following recurrence 
form: 
1 
0 
* 
1 
1 
* 
0 
* * 
1 
 
 
 
  
 
j 
k 
Taking * 
C j  * j / 0 
, we get: 
1 
0 
1 
 
 
 
  
 
j 
k 
Let    mj 
C 0C j with C0 = 1 and by combining the above equations, we obtain: 
aC 
C 
P j 
j j j  
1 
The cell loss rate is: 
. 
1 
1 
1 
1 1 
0 0 
C 
aC 
B P P 
co 
m 
j 
  
 
       
  
Form the Little formula, the mean cell delay Wco can be written as: 
 
  
 
     
 
 
m 
k 
co 
C 
h 
W 
1 
1 
 
 
, (13) 
   . For a very small value of 
where hc=Lc/c is the cell transmission time and p k e co / k ! 
k co 
B or large value of m, the approximate formula ofWco can be derived to be: 
c 
co 
co 
  
co h 
 
 
2(1  
) 
 
. (14) 
Equation (14) gives the approximate expression for the mean cell delay and can be derived 
using Little’s formula and taking the mean residual service time hc / 2 and the waiting probabil-
Md. Syeful Islam, Md. Rezaur Rahman, Anupam Roy, Md. Imdadul Islam and M. R. Amin 
Traffic intensity (rho) 
685 
* B B B co 
ity 1 * (1 ) . 
1 0 
mj 
   j         To reduce the computational complexity, the 
above approximate equation, Eq. (14), for the mean cell delay, can be used instead of using Eq. 
(13) for a network of large buffer. 
4. RESULTS 
Fig. 3 shows the profile for carried traffic intensity (Erls/trunk) against the mean delay in 
mille-second (ms) for both CSMA/CD BUS and Token BUS by taking the length of the payload 
part of the packet as a parameter. For the length of the payload of a packet of 500 bits and a de-lay 
of 1 ms, the carried traffic intensity of CSMA/CD BUS is 0.53 Erls/trunk and that of the 
Token BUS is 0.66 Erls/trunk. The carried traffic for the two cases are decreased to 0.3 and 0.33 
respectively when the length of the payload is increased to 800 bits. 
Now our aim is to determine the cell loss rate of the finite queuing system for the offered traf-fic 
intensity of 0.53 Erls/trunk of the CSMA/CD BUS and 0.66Erls/trunk for that of the Token 
BUS. This cell loss rate will be equivalent to the delay of 1ms for an infinite queuing system. 
Let us now consider the length of the queue of a router to be 7 and considering the arrival of two 
types of M/G/1(7) traffic. Let the vector of probability states of CSMA/CD BUS be Q (for 0.53 
Erls/trunk) and that of Token BUS be P (for 0.66 Erls/trunk). Applying the traffic model of 
M/G/1(m) of Sec. III, we determine the probability states for Cj (before normalization) and put 
them in the following vectors: 
0.1 0.2 0.3 0.4 0.5 0.6 
2.5 
2 
1.5 
1 
E[D] CSMA/CD BUS for Lp=800 bits 
E[D] CSMA/CD BUS for Lp=500 bits 
E[D] Token BUS for Lp=800 bits 
E[D] Token BUS for Lp=500 bits 
Mean Delay E[D] in ms 
Fig. 3. Variation of mean delay against carried traffic
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic 
P = [1.00000000 0.93400000 0.53100000 
0.25500000 0.11700000 0.05300000 
0.02300000 9.5600E-03] 
and 
Q= [1.00000000 0.69900000 0.28600000 
0.09600000 0.03000000 8.8900E-03 
2.2500E-03 1.6800E-04]. 
The above vectors, after normalization, become: 
Pnorm  [0.34216601 0.31958310 0.18169000 
0.08725200 0.04003300 0.01813500 
0.00787000 0.00327000] 
and 
Qnorm  [0.47118500 0.32935900 0.13475900 
0.04523400 0.01413600 0.00418800 
0.00106000 7.9100E-05]. 
Now the vectors P and Q can be applied to a two-dimensional traffic model of the tabular 
form of [12] as shown in Table 1(a) and (b) respectively. 
From the above vectors and tables, we can easily determine the individual and combined sys-tem 
blocking probability. For only CSMA/CD BUS traffic, the blocking probability (from nor-malization 
vector P) is found to be B1 = 0.00327. Similarly, only for Token BUS traffic, the 
blocking probability (from normalization vector Q) is found to be B2 = 7.906E-05. 
Let us now determine the overall/combined cell blocking probability when both types of traf-fic 
exist simultaneously on a BUS. The work can be done in the tabular form of a two-dimensional 
traffic model of [13] as shown in Table 1. In Table 1(a) and Table 1(b), the proba-bility 
states are determined before and after normalization. The sum of the complete occupied 
states provides the overall cell blocking probability. Thus, the overall blocking probability is 
found to be: 
B0 =2.72E-05+ 3.41E-04+7.66E-04+1.24E-03+1.82E-03+2.46E-03+2.61E-03+1.55E-03 
=1.08E-03, 
which is seen to be greater than the sum of the individual blocking probabilities. This happens 
because of the statistical distribution of the offered traffic. 
686
Md. Syeful Islam, Md. Rezaur Rahman, Anupam Roy, Md. Imdadul Islam and M. R. Amin 
Table 1. (a) Before Normalization, (b) After Normalization 
(a) 
5. CONCLUSION 
The paper deals with the two-dimensional packet traffic of a M/G/1(m) case. Usually, the per-formance 
of two-dimensional packet traffic for a general service-time distribution case is ana-lyzed 
by incorporating the Markov modulated Poisson’s process (MMPP) model with M/G/1(m) 
traffic. Our present analysis has the flexibility of enhancement for a multi-dimensional dissimi-lar 
bandwidth case of packet traffic even for complete sharing or partitioning a call admission 
scheme. It has been demonstrated that the packet dropping probability of the combined traffic is 
687 
Q7 
1.68 
E-04 
1.68 
E-04 
Q6 2.25 
E-03 
2.25 
E-03 
2.10 
E-03 
Q5 8.89 
E-03 
8.89 
E-03 
8.30 
E-03 
4.72 
E-03 
Q4 0.03 3.00 
E-02 
2.80 
E-02 
1.59 
E-02 
7.65 
E-03 
Q3 0.096 9.60 
E-02 
8.97 
E-02 
5.10 
E-02 
2.45 
E-02 
1.12 
E-02 
Q2 0.286 2.86 
E-01 
2.67 
E-01 
1.52 
E-01 
7.293 
E-02 
3.35 
E-02 
1.52 
E-02 
Q1 0.699 6.99 
E-01 
6.53 
E-01 
3.71 
E-01 
1.78 
E-01 
8.18 
E-02 
3.71 
E-02 
1.61 
E-02 
Q0 1 1.00 
E+00 
9.34 
E-01 
5.31 
E-01 0.255 0.117 0.053 0.023 9.56 
E-03 
1 0.934 0.531 0.255 0.117 0.053 0.023 9.56 
E-03 
P0 P1 P2 P3 P4 P5 P6 P7 
(b) 
Q7 1.68 
E-04 
2.72 
E-05 
Q6 2.25 
E-03 
3.65 
E-04 
3.41 
E-04 
Q5 8.89 
E-03 
1.44 
E-03 
1.35 
E-03 
7.66 
E-04 
Q4 0.03 4.87 
E-03 
4.54 
E-03 
2.58 
E-03 
1.24 
E-03 
Q3 0.096 1.56 
E-02 
1.45 
E-02 
8.27 
E-03 
3.97 
E-03 
1.82 
E-03 
Q2 0.286 4.64 
E-02 
4.33 
E-02 
2.46 
E-02 
1.18 
E-02 
5.43 
E-03 
2.46 
E-03 
Q1 0.699 1.13 
E-01 
1.06 
E-01 
6.02 
E-02 
2.89 
E-02 
1.33 
E-02 
6.01 
E-03 
2.61 
E-03 
Q0 1 1.62 
E-01 
1.51 
E-01 
8.61 
E-02 
4.14 
E-02 
1.90 
E-02 
8.60 
E-03 
3.73 
E-03 
1.55 
E-03 
1 0.934 0.531 0.255 0.117 0.053 0.023 9.56 
E-03 
P0 P1 P2 P3 P4 P5 P6 P7
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic 
much larger than the individual service case and is even larger than the sum of the individual 
service cases. This happens because of the statistical distribution of the occupancy of the states. 
This work can be extended for the case of a dissimilar bandwidth or three-dimensional traffic or 
even for star LAN. The work will be helpful for a network planar to select the capacity of the 
link for a LAN to maintain the desired QoS in multi-dimensional traffic services. 
REFERENCES 
[1] D. Bear, Principle of Telecommunication Traffic Engineering, Second Edition, Peter 
Peregrinus Ltd., Hertfordshire, U.K., 1988. 
[2] Md. I. Islam, M. Q. Maula and L. J. Rozario, “Analysis of two dimensional limited source 
and mixed traffic model for a BTS of a small mobile cellular network,” Proceedings of the 
4th International Conference on Computers and Information Technology (ICCIT), Dhaka, 
December 2001. 
[3] P. Srisukpibul, “Traffic Measurement on a Cellular Mobile Network,” Masters Thesis, 
Division of Telecommunications, AIT, Bangkok, Thailand, 1997. 
[4] Paul Fitzpatrick, Cheng Siong Lee and Bob Warfiled, “Teletraffic Performance of Mobile 
Radio Networks with Hierarchical Cells and Overflow,” IEEE J. Select. Areas Commun., 
Vol.15, No.8, 1997, pp.1549-57. 
[5] Kwan L. Yeung and Sanjib Nanda, “Channel Management in Micro/Macro Cellular Radio 
Systems,” IEEE Trans. Veh. Technol., Vol.45, No.4, 1996, pp.14-23. 
[6] M. I. Islam and S. Hossain, “An analytical model of traffic performance of mobile cellular 
network in underlay overlay cell system,” Proceedings of the 6th International Conference 
on Computers and Information Technology (ICCIT), Dhaka, Bangladesh, Dec. 2003. 
[7] M. Mahdavi, R.M. Edwards and S.R. Cvetkovic, “Polycy Enhancement of Traffic in 
TDMA Hybrid Switched Integrated Integrated Voice/Data Cellular Mobile Communica-tions 
Systems,” IEEE Commun. Lett., Vol.5, No.6, 2004, pp.242-244. 
[8] Bin Li, Lizhong, Bo Li and Xi-Ren Cao, “Call admission control for voice/data integrated 
cellular networks: performance analysis and comparative study,” IEEE J. Select. Areas 
Commun., Vol.22, No.4, 2004, pp.706-718. 
[9] W. Bux, “Performance issues in local area networks,” IBM Syst. Journal, Vol.23, No.4, 
688 
1984, pp.351-374. 
[10] T. Supot and H. Akimaru, “A performance evaluation for heterogeneous bus CSMA/CD 
LANs,” IEICE Trans. Commun., Vol.E74-B, No.9, 991, pp.2721-2727. 
[11] Md. Imdadul Islam, Md. Shahriar Karim, J. K. Das and M. R. Amin, “Evaluation of Traf-fic 
Parameters of Multidimensional Traffic of a Combined Link Using a Tabular 
Method,” Proceedings of the 11th International Conference on Computers and Informa-tion 
Technology (ICCIT), KUET, Bangladesh, December 2008. 
[12] Haruo Akimaru, Marion R. Finley and Kyoko Yamori “A Practical Dimensioning Method 
for ATM System,” IEEE Trans. Commun., Vol.47, No.2, 1999, pp.311-315. 
[13] S. Hossain and Imdadul Islam, “Analysis of SDMA PCT-II Traffic for Duplicated First 
Case: A Theoretical Study,” International Conference on Wireless Communications, Net-working 
and Mobile Computing, Wuhan, China, September 2005.
Md. Syeful Islam, Md. Rezaur Rahman, Anupam Roy, Md. Imdadul Islam and M. R. Amin 
Md. Syeful Islam recieved his B.Sc. degree in Computer Science and Engi-neering 
from Jahangirnagar University in Dhaka, Bangladesh in 2011. Currently, 
he is working as a software consultant in the Micro-Finance Solutions Depart-ment 
of Southtech Limited in Uttara, Dhaka, Bangladesh. 
Md. Rezaur Rahman received his B.Sc. degree in Computer Science and 
Engineering from Jahangirnagar University in Dhaka, Bangladesh in 2011. He is 
currently working as a Lecturer in the Department of Computer Science and 
Engineering at the Daffodil Institute of Information Technology in Dhaka, Bangla-desh. 
Anupam Roy received his B.Sc. in Computer Science and Engineering from 
Jahangirnagar University in Savar, Dhaka, Bangladesh in 2007. He is now pur-suing 
his M.Sc. in Engineering at the same department. He worked for a few 
months as a General Software Developer at MFASIA LTD (A joint venture com-pany 
between Bangladesh and England) and as a Java Programmer at ATI LTD 
in Dhaka, Bangladesh. He is now working as a Programmer at BJIT LTD (A joint 
venture company between Bangladesh and Japan) in Dhaka, Bangladesh. 
Md. Imdadul Islam has received his B.Sc. and M.Sc. in Electrical and Elec-tronic 
Engineering from the Bangladesh University of Engineering and Technolo-gy 
in Dhaka, Bangladesh in 1993 and 1998 respectively and completed his Ph.D. 
degree in 2010 at the Department of Computer Science and Engineering at Ja-hangirnagar 
University in Dhaka, Bangladesh in the field of network traffic engi-neering. 
He is now working as a Professor in the Department of Computer 
Science and Engineering at Jahangirnagar University in Savar, Dhaka, Bangla-desh. 
Previously, he worked as an Assistant Engineer at Sheba Telecom (Pvt.) 
LTD (A joint venture company between Bangladesh and Malaysia, for mobile cellular and WLL) from 
Sept. '94 to July '96. He has very good field experience in the installation of Radio Base Stations and 
Switching Centers for WLL. His research fields are network traffic, wireless communications, wavelet 
transform, OFDMA, WCDMA, adaptive filter theory, ANFIS, and array antenna systems. He has more 
than a hundred research papers in national and international journals and conference proceedings. 
689
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic 
M. R. Amin received his B.Sc. and M.Sc. degrees in Physics from Jahangirna-gar 
University in Dhaka, Bangladesh in 1984 and 1986 respectively and his Ph.D. 
degree in Plasma Physics from the University of St. Andrews in the U. K. in 1990. 
He is a Professor of Electronics and Communications Engineering at East West 
University in Dhaka, Bangladesh. He served as a Post-Doctoral Research Asso-ciate 
in Electrical Engineering at the University of Alberta, Canada, during 1991- 
1993. He was an Alexander von Humboldt Research Fellow at the Max-Planck 
Institute for Extraterrestrial Physics in Garching/Munich, Germany during 1997- 
1999. Dr. Amin was awarded the Commonwealth Postdoctoral Fellowship in 1997. Besides these, he 
has also received several awards for his research, including the Bangladesh Academy of Science 
Young Scientist Award for the year 1996 and the University Grants Commission Young Scientist Award 
for 1996. He is a member of the IEEE. His current field of research is wireless communications and 
networks. 
690

Más contenido relacionado

La actualidad más candente

Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...IJCNCJournal
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sgDang Hop
 
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross LayerDelay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross LayerAM Publications
 
Bandwidth aware on demand multipath routing in manets
Bandwidth aware on demand multipath routing in manetsBandwidth aware on demand multipath routing in manets
Bandwidth aware on demand multipath routing in manetsijwmn
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkAcel-Omeran
 
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...ijwmn
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Sushant Kushwaha
 
Routing in telephone networks
Routing in telephone networksRouting in telephone networks
Routing in telephone networksRenjith Ravi
 
Performance Evaluation of Routing Protocols
Performance Evaluation of Routing Protocols Performance Evaluation of Routing Protocols
Performance Evaluation of Routing Protocols Ankush Mehta
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceIJSRD
 
Dynamic source routing in ad hoc wireless networks
Dynamic source routing  in ad hoc wireless networksDynamic source routing  in ad hoc wireless networks
Dynamic source routing in ad hoc wireless networkshuda2018
 
Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingKeyur Vadodariya
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
 

La actualidad más candente (20)

Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sg
 
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross LayerDelay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
 
Bandwidth aware on demand multipath routing in manets
Bandwidth aware on demand multipath routing in manetsBandwidth aware on demand multipath routing in manets
Bandwidth aware on demand multipath routing in manets
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
In3514801485
In3514801485In3514801485
In3514801485
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc network
 
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
 
J010525864
J010525864J010525864
J010525864
 
Routing in telephone networks
Routing in telephone networksRouting in telephone networks
Routing in telephone networks
 
Performance Evaluation of Routing Protocols
Performance Evaluation of Routing Protocols Performance Evaluation of Routing Protocols
Performance Evaluation of Routing Protocols
 
Transport layer
Transport layerTransport layer
Transport layer
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of Service
 
Dynamic source routing in ad hoc wireless networks
Dynamic source routing  in ad hoc wireless networksDynamic source routing  in ad hoc wireless networks
Dynamic source routing in ad hoc wireless networks
 
12 routing
12 routing12 routing
12 routing
 
D0441722
D0441722D0441722
D0441722
 
Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And Demultiplexing
 
C0431320
C0431320C0431320
C0431320
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 

Destacado

GRID Signage: Future of Digital Signage
GRID Signage: Future of Digital SignageGRID Signage: Future of Digital Signage
GRID Signage: Future of Digital Signageapptividia
 
Challenges and Advances in Large-scale DFT Calculations on GPUs using TeraChem
Challenges and Advances in Large-scale DFT Calculations on GPUs using TeraChemChallenges and Advances in Large-scale DFT Calculations on GPUs using TeraChem
Challenges and Advances in Large-scale DFT Calculations on GPUs using TeraChemCan Ozdoruk
 
Travel page of valdepeñas
Travel page of valdepeñasTravel page of valdepeñas
Travel page of valdepeñasInma Cuellar
 
6 Key Steps to a Successful Wellness Program
6 Key Steps to a Successful Wellness Program6 Key Steps to a Successful Wellness Program
6 Key Steps to a Successful Wellness Programwellsource10789
 
HCPSS's Responsible Use Slideshow
HCPSS's Responsible Use SlideshowHCPSS's Responsible Use Slideshow
HCPSS's Responsible Use Slideshowjennifer_wong
 
CKT08_INA_spread online
CKT08_INA_spread onlineCKT08_INA_spread online
CKT08_INA_spread onlineIgor Rangga
 
Valentine's Day The Biggest Consumer Holiday In America
Valentine's Day The Biggest Consumer Holiday In AmericaValentine's Day The Biggest Consumer Holiday In America
Valentine's Day The Biggest Consumer Holiday In AmericaBollyArts
 
Pengembangan pengelolahan hasil laut di indonesia copy
Pengembangan pengelolahan hasil laut di indonesia   copyPengembangan pengelolahan hasil laut di indonesia   copy
Pengembangan pengelolahan hasil laut di indonesia copyalfin thariq
 
Regional Geography - Earthquake Feature
Regional Geography - Earthquake FeatureRegional Geography - Earthquake Feature
Regional Geography - Earthquake Featureschofieldteacher
 
Beume março16 pdf
Beume março16 pdfBeume março16 pdf
Beume março16 pdfUme Maria
 
Govt Banned Rs. 500 and Rs 1000 Notes from November 2016
Govt Banned Rs. 500 and Rs 1000 Notes from November 2016Govt Banned Rs. 500 and Rs 1000 Notes from November 2016
Govt Banned Rs. 500 and Rs 1000 Notes from November 2016Naveen Kumar.V
 

Destacado (16)

GRID Signage: Future of Digital Signage
GRID Signage: Future of Digital SignageGRID Signage: Future of Digital Signage
GRID Signage: Future of Digital Signage
 
Challenges and Advances in Large-scale DFT Calculations on GPUs using TeraChem
Challenges and Advances in Large-scale DFT Calculations on GPUs using TeraChemChallenges and Advances in Large-scale DFT Calculations on GPUs using TeraChem
Challenges and Advances in Large-scale DFT Calculations on GPUs using TeraChem
 
Travel page of valdepeñas
Travel page of valdepeñasTravel page of valdepeñas
Travel page of valdepeñas
 
6 Key Steps to a Successful Wellness Program
6 Key Steps to a Successful Wellness Program6 Key Steps to a Successful Wellness Program
6 Key Steps to a Successful Wellness Program
 
Творчий калейдоскоп
Творчий  калейдоскопТворчий  калейдоскоп
Творчий калейдоскоп
 
HCPSS's Responsible Use Slideshow
HCPSS's Responsible Use SlideshowHCPSS's Responsible Use Slideshow
HCPSS's Responsible Use Slideshow
 
Heterogeneity in adhd
Heterogeneity in adhdHeterogeneity in adhd
Heterogeneity in adhd
 
CKT08_INA_spread online
CKT08_INA_spread onlineCKT08_INA_spread online
CKT08_INA_spread online
 
COLLEZIONE YUME 2016
COLLEZIONE YUME 2016COLLEZIONE YUME 2016
COLLEZIONE YUME 2016
 
Island of Icarus
Island of IcarusIsland of Icarus
Island of Icarus
 
Valentine's Day The Biggest Consumer Holiday In America
Valentine's Day The Biggest Consumer Holiday In AmericaValentine's Day The Biggest Consumer Holiday In America
Valentine's Day The Biggest Consumer Holiday In America
 
Pengembangan pengelolahan hasil laut di indonesia copy
Pengembangan pengelolahan hasil laut di indonesia   copyPengembangan pengelolahan hasil laut di indonesia   copy
Pengembangan pengelolahan hasil laut di indonesia copy
 
Regional Geography - Earthquake Feature
Regional Geography - Earthquake FeatureRegional Geography - Earthquake Feature
Regional Geography - Earthquake Feature
 
Beume março16 pdf
Beume março16 pdfBeume março16 pdf
Beume março16 pdf
 
Laptop tune up
Laptop tune upLaptop tune up
Laptop tune up
 
Govt Banned Rs. 500 and Rs 1000 Notes from November 2016
Govt Banned Rs. 500 and Rs 1000 Notes from November 2016Govt Banned Rs. 500 and Rs 1000 Notes from November 2016
Govt Banned Rs. 500 and Rs 1000 Notes from November 2016
 

Similar a Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic

Distributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity SchemeDistributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
 
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...ijceronline
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...TELKOMNIKA JOURNAL
 
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...IOSR Journals
 
PRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNEL
PRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNELPRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNEL
PRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNELijwmn
 
PRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNEL
PRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNELPRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNEL
PRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNELijwmn
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidancegraphhoc
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...IJRTEMJOURNAL
 
DISTIBUTED OPERATING SYSTEM
DISTIBUTED  OPERATING SYSTEM DISTIBUTED  OPERATING SYSTEM
DISTIBUTED OPERATING SYSTEM AjithaG9
 
Optical networks
Optical networks Optical networks
Optical networks ashok mane
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsSpiros Louvros
 
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay SelectionAn Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selectioninventy
 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...ijwmn
 

Similar a Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic (20)

Ijcnc050204
Ijcnc050204Ijcnc050204
Ijcnc050204
 
Distributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity SchemeDistributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity Scheme
 
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
 
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
 
2G3GISHO
2G3GISHO2G3GISHO
2G3GISHO
 
PRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNEL
PRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNELPRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNEL
PRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNEL
 
PRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNEL
PRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNELPRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNEL
PRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNEL
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
D0431013019
D0431013019D0431013019
D0431013019
 
SONET/SDH in CCN
SONET/SDH in CCNSONET/SDH in CCN
SONET/SDH in CCN
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
DISTIBUTED OPERATING SYSTEM
DISTIBUTED  OPERATING SYSTEM DISTIBUTED  OPERATING SYSTEM
DISTIBUTED OPERATING SYSTEM
 
Optical networks
Optical networks Optical networks
Optical networks
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
 
IEEE CAMAD 2014
IEEE CAMAD 2014IEEE CAMAD 2014
IEEE CAMAD 2014
 
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay SelectionAn Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
 

Más de Syeful Islam

[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_softwareSyeful Islam
 
Business benefit of Mobile device management
Business benefit of Mobile device managementBusiness benefit of Mobile device management
Business benefit of Mobile device managementSyeful Islam
 
A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...
A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...
A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...Syeful Islam
 
Hidden Object Detection for Computer Vision Based Test Automation System
Hidden Object Detection for Computer Vision Based Test Automation SystemHidden Object Detection for Computer Vision Based Test Automation System
Hidden Object Detection for Computer Vision Based Test Automation SystemSyeful Islam
 
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...Syeful Islam
 
Disordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFMDisordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFMSyeful Islam
 
Disordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFMDisordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFMSyeful Islam
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
 
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...Syeful Islam
 
Design Analysis Rules to Identify Proper Noun from Bengali Sentence for Univ...
Design Analysis Rules to Identify Proper Noun  from Bengali Sentence for Univ...Design Analysis Rules to Identify Proper Noun  from Bengali Sentence for Univ...
Design Analysis Rules to Identify Proper Noun from Bengali Sentence for Univ...Syeful Islam
 
Emergency notification at your phone
Emergency notification at your phoneEmergency notification at your phone
Emergency notification at your phoneSyeful Islam
 
Development of analysis rules to identify proper noun from bengali sentence f...
Development of analysis rules to identify proper noun from bengali sentence f...Development of analysis rules to identify proper noun from bengali sentence f...
Development of analysis rules to identify proper noun from bengali sentence f...Syeful Islam
 

Más de Syeful Islam (15)

[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software
 
Business benefit of Mobile device management
Business benefit of Mobile device managementBusiness benefit of Mobile device management
Business benefit of Mobile device management
 
Mobi manager mdm
Mobi manager mdmMobi manager mdm
Mobi manager mdm
 
A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...
A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...
A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...
 
Hidden Object Detection for Computer Vision Based Test Automation System
Hidden Object Detection for Computer Vision Based Test Automation SystemHidden Object Detection for Computer Vision Based Test Automation System
Hidden Object Detection for Computer Vision Based Test Automation System
 
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
 
Disordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFMDisordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFM
 
Disordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFMDisordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFM
 
jQuery besic
jQuery besicjQuery besic
jQuery besic
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
 
Design Analysis Rules to Identify Proper Noun from Bengali Sentence for Univ...
Design Analysis Rules to Identify Proper Noun  from Bengali Sentence for Univ...Design Analysis Rules to Identify Proper Noun  from Bengali Sentence for Univ...
Design Analysis Rules to Identify Proper Noun from Bengali Sentence for Univ...
 
Java oop concepts
Java oop conceptsJava oop concepts
Java oop concepts
 
Emergency notification at your phone
Emergency notification at your phoneEmergency notification at your phone
Emergency notification at your phone
 
Development of analysis rules to identify proper noun from bengali sentence f...
Development of analysis rules to identify proper noun from bengali sentence f...Development of analysis rules to identify proper noun from bengali sentence f...
Development of analysis rules to identify proper noun from bengali sentence f...
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic

  • 1. Journal of Information Processing Systems, Vol.7, No.4, December 2011 http://dx.doi.org/10.3745/JIPS.2011.7.4.679 Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic Md. Syeful Islam*, Md. Rezaur Rahman*, Anupam Roy*, Md. Imdadul Islam* and M. R. Amin** Abstract—In this paper we consider a local area network (LAN) of dual mode service where one is a token bus and the other is a carrier sense multiple access with a collision detection (CSMA/CD) bus. The objective of the paper is to find the overall cell/packet dropping probability of a dual mode LAN for finite length queue M/G/1(m) traffic. Here, the offered traffic of the LAN is taken to be the equivalent carried traffic of a one-millisecond delay. The concept of a tabular solution for two-dimensional Poisson’s traffic of circuit switching is adapted here to find the cell dropping probability of the dual mode packet service. Although the work is done for the traffic of similar bandwidth, it can be extended for the case of a dissimilar bandwidth of a circuit switched network. Keywords—Carried Traffic, LST, Two-Dimensional Traffic, Cell Dropping Probability, M/G/1 Model 1. INTRODUCTION In many communication systems, two or more traffic links are usually merged together to form a common trunk line or different types of traffic may share the bus or ring of a local area network (LAN). If a communication network is in statistical equilibrium and serving two or more different types of traffic, it can be modeled by the help of a multi-dimensional state transi-tion diagram. The transmission of real time data, like audio or video, which needs a constant arrival rate in sequential order to play the signal instantly at the receiving end requires circuit switching. On the other hand, packet switching is more efficient for data, which can withstand delays (such as e-mails, word files, etc.). For example, if any link experiences two types of Pois-son’s offered traffic A1 and A2 , then a two-dimensional Markov chain is considered as the sim-plest solution. The solution of the two-dimensional Markov chain (both similar and dissimilar bandwidth traffic) can be obtained in tabular form [1-3] for a limited trunk case. A good exam-ple of multidimensional traffic is the mobile cellular network, where two different arrivals, (i.e., new originating and handoff arrival traffic) are prevalent, as summarized in [4-6], where the bandwidth of both the traffic is the same since both are voice signals. If there is a provision of another offered traffic of a different bandwidth, say, if video/text/image data is added with the Manuscript received May 26, 2011; first revision October 5, 2011; accepted October 27, 2011. Corresponding Author: M. R. Amin * Department of Computer Science and Engineering, Jahangirnagar University, Savar, Dhaka 1342, Bangladesh 679 (imdad@juniv.edu) ** Department of Electronics and Communications Engineering, East West University, 43 Mohakhali, Dhaka 1212, Bangladesh (ramin@ewubd.edu) Copyright ⓒ 2011 KIPS (ISSN 1976-913X)
  • 2. Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic conventional mobile cellular system, then the system is known as a voice-data integrated net-work 680 [7-8]. For non-Markovian traffic, the situation is different. For example, in packet switching, the information/message, regardless of content, type, or structure is converted into suitably-sized blocks, called packets. The sequences of packets from different information sources can share the common trunk and arrival of these packets (variable-bit-rate data streams) upon which a switch /router is routed to the appropriate outgoing link. In case of an appropriate router (because of huge traffic) being available, the packets are buffered or queued. After some instant of time (variable amount of delay), the outgoing link becomes free and the packets are routed to appropriate directions. In this paper, we consider dual mode terminals of a LAN of BUS topology, where each ter-minal can send packets using either a token bus or a carrier sense multiple access with collision detection (CSMA/CD) protocol. We consider the packet traffic of a LAN that follows the M/G/1 model, where a packet may experience infinite delay since the size of the buffer is infinite. If a similarly offered traffic is applied to a limited buffer system, for example the M/G/1(m) model, some packets will be lost. According to teletraffic theory, the probability of occupancy by a full buffer is the probability of loss of packets. The probability of delay and cell/packet loss is prevalent but it is a cumber-some task to determine the traffic parameters of a combined packet traffic stream [9, 10]. In this paper, the probability states of M/G/1(m) before normalization are evaluated and the corres-ponding analysis is presented in the next section. The triangular matrix of a two-dimensional Markov chain is built for token bus and CSMA/CD traffic. Finally, the triangular matrix is nor-malized and complete occupied states are selected. The sum of the complete occupied states gives the packet loss probability. Sometimes it is necessary to determine the cell loss probability of a finite buffer network, which is equivalent to a finite amount of delay of an infinite buffer network. The model used here can solve the condition of the determination of the length of the queue to keep the quality of service (QoS) equivalent to the delay of an infinite buffer case. The paper is organized as follows: Section II deals with the theoretical analysis of determina-tion of the mean delay of the Token BUS and the CSMA/CD traffic of the M/G/1 model. Sec-tion III provides the theoretical analysis of determination for the probability states and for the probability of cell loss rate of a finite buffer network. Section IV gives the results corresponding to a combined traffic model along with an example, and finally, Section V concludes the entire analysis. 2. THE PACKET TRAFFIC OF AN INFINITE BUFFER 2.1 Token Ring In a token ring LAN, a special packet called a token (permission to access the ring) circulates among a number of terminals in a ring configuration as shown in Fig. 1. Terminals get the op-portunity to seize the token sequentially. Once the terminal gets the token, the terminal converts it to a busy packet with a destination address. After receiving the packet, the destination node sends the acknowledgment to the source node. Receiving the acknowledgment, the sending node generates a new token to be used by another station. Under the independent Poisson’s process, the mean message arrival rate at queue is assumed
  • 3. Md. Syeful Islam, Md. Rezaur Rahman, Anupam Roy, Md. Imdadul Islam and M. R. Amin Fig. 1. Token Ring LAN to be:     ... ... ... 3 2 1    N /  , where i  (1 / )      , (1) 681 is the arrival rate of station i, and N is the number of users. The switchover time is r1  r2  r3  ... ... ...  R / N  r , where ri is the switchover time from queue i to i+1 and    N R i ri 1 . The mean waiting time (queuing delay) at the sending station is: [ ] 2(1 ) [ ] 2(1 ) 2 [ ] 2 2 E S Nr N E S r E W       N i i  where  2 is the variance of the switchover time, 1 1      is the traffic intensity under normalized condition,  i  iE[Si ] , E[Si ] is the mean service time of station i that follows the general distribution, and E[S] is the mean service time (packet length in time unit) expressed as E[S]  E[Lp ]  Lh / R   / , where Lp and Lh are the mean packet length and header length respectively. For constant service time, we use E[S 2 ]  E2[S] and for exponential service time, E[S 2 ]  2E2[S] is used. The average propagation delay is E[Tp ]  / 2 ; where  is the round trip propagation delay. The propagation time Tp is the time elapsed from the beginning of the transmission of the message until the arrival of the first bit of the message at the destina-tion. The mean transfer delay is: E[D]  E[W]  E[S]  E[Tp ] . In Eq. (1), the negative (-) sign in the numerator of the second term of the right-hand side is for the exhaustive service (the serv-er serves a queue of work station transmitting all of the data, including the date received during the transmission, until there is no message left in that queue) and the positive (+) sign for the gated service. (The server does a similar job only for the data that was waiting before the trans-mission began. In this type of service a gate is closed behind the waiting customer at the instant the server in that queue. The customers in front of the gate are served.) The transmission/service time S is the time elapsed between the arrival of the first bit of the message at the destination and the arrival of the last bit.
  • 4. Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic 2.2 Token Bus The operation for token bus protocol is similar to that of the token ring. Here, instead of a ring, bus topology is used and the stations are ordered in such a way that they form a logical ring. The typical ordering of stations on a bus (token bus) is shown in Fig. 2. Let the length of the bus be l and corresponding end-to-end propagation delay be . Furthermore, let us consider that the mean message arrival rate at the queue according to the independent Poisson’s process is:  / N , as mentioned in the previous subsection. Similarly, the switchover time is: r  R / N . For a to-ken passing bus, we have r  / 3  c ,  2  2 /18 , the mean propagation delay is E[Tp ]  / 3 , where c  (Lt  Lb ) / R , Lt is the length of the token in bits and Lb is the bit delay by each station. If the mean transfer delay is D, including waiting time W (queuing delay) at the sending sta-tion, if the service time of the message is S and if the propagation delay isTp , then the average ( / 3 ) 1 / E D  E S (2) 2 2 2 E D E S e E S e e [ ] [ ] (4 2) [ ] 5 4 (2 1)          E S e 2(1 [ [ ] 2 ]) 2    e e e 1    3 (1 ) 2 682 of D can be written as:       . 3 [ ] [ ] 2 1 [ ]  2 1  36( / 3 ) [ ] 2 2                E S N c N E S c In Eq. (2), the minus (-) sign is for exhaustive service and the plus (+) sign is for the gated service. 2.3 CSMA/CD Bus In CSMA/CD, a node starts its transmission after sensing that there is no carrier in the bus, therefore, the collision of packets from simultaneous users are reduced. If the node finds the bus busy then it waits for a random amount of time and re-sensed the channel. If a node experiences collision during transmission it stops the transmission and waits for a random amount of time for retransmission. Considering the M/G/1 queuing source, the mean delay will be:        2 [ ] , ( ) 1 3                        e E S e F e e (3) Fig. 2. A Token Bus LAN
  • 5. Md. Syeful Islam, Md. Rezaur Rahman, Anupam Roy, Md. Imdadul Islam and M. R. Amin where F( ) is the Laplace transform of the message transmission time distribution f (t) and can be expressed as: dt e t f F t     0 ( ) ( )  . (4) For constant message lengths, it can be shown that F( )  e and E[S 2 ]  E2[S] , where  E[S] and 1/e=0.368. For exponentially distributed message lengths, F( ) 1/(1   ) and E[S 2 ]  2E2[S] . Entire analysis of the above network is done for the case of an infinite queue so the pack-et/ cell will experience only a delay but no cells will be lost. We will check the cell loss rate of the above network for a finite queuing model. 3. CONNECTION ORIENTED PACKET SWITCHING OF M/G/1(M) TRAFFIC Let  j , h j ,Vj ,and y j be the call arrival rate, the mean call holding (connection) time, data speed, and the data activity rate for class jJ respectively. The input traffic load a and the utili-zation , c L s i a k j j j p p        683 ρco of the transmission line are given by a  h (1 ) 1 ,        j J j j j j p co j J j j h V y L c B   (5) where B is the call blocking probability, Lc is the cell length (53 bytes for ATM), Lp is the payload length (48 bytes for an asynchronous transfer mode (ATM)), and c is the transmission speed. From Erlang’s loss formula, the cell loss rate is given with the following expression:  B  a s i i s 0 ! / ! , (6) where s is the number of virtual channels (VCs) assigned to the transmission line. According to [11] for M/G/1 system, we have the steady probability state: * 1 1 1 * 0 * k j k    ; j = 0, 1, 2, … (7) where pj is the probability that j calls arrive during the service time. The mean cell delay of M/G/1 traffic is:
  • 6. Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic W a  h C a  , (8)       p  p k p      j j j j k ; j = 0, 1, 2, …, m-1. (9)   C  C  p p C p      j j j j k k ; j = 0, 1, 2, …, m-1. (10) 1 1 * . (11)      C m j j  (12) m j   1 C c 1 ( 1)   co mC m k C co k B B mB   (1  )   2 W   684 1 2  (1  ) 2 where a = λh, λ is the packet arrival rate, h is the service time, and the parameter C is defined after Eq. ((10). For the M/G/1(m) system, *j  0 for j ≥ m+1 and Eq. (7) takes the following recurrence form: 1 0 * 1 1 * 0 * * 1       j k Taking * C j  * j / 0 , we get: 1 0 1       j k Let    mj C 0C j with C0 = 1 and by combining the above equations, we obtain: aC C P j j j j  1 The cell loss rate is: . 1 1 1 1 1 0 0 C aC B P P co m j             Form the Little formula, the mean cell delay Wco can be written as:            m k co C h W 1 1   , (13)    . For a very small value of where hc=Lc/c is the cell transmission time and p k e co / k ! k co B or large value of m, the approximate formula ofWco can be derived to be: c co co   co h   2(1  )  . (14) Equation (14) gives the approximate expression for the mean cell delay and can be derived using Little’s formula and taking the mean residual service time hc / 2 and the waiting probabil-
  • 7. Md. Syeful Islam, Md. Rezaur Rahman, Anupam Roy, Md. Imdadul Islam and M. R. Amin Traffic intensity (rho) 685 * B B B co ity 1 * (1 ) . 1 0 mj    j         To reduce the computational complexity, the above approximate equation, Eq. (14), for the mean cell delay, can be used instead of using Eq. (13) for a network of large buffer. 4. RESULTS Fig. 3 shows the profile for carried traffic intensity (Erls/trunk) against the mean delay in mille-second (ms) for both CSMA/CD BUS and Token BUS by taking the length of the payload part of the packet as a parameter. For the length of the payload of a packet of 500 bits and a de-lay of 1 ms, the carried traffic intensity of CSMA/CD BUS is 0.53 Erls/trunk and that of the Token BUS is 0.66 Erls/trunk. The carried traffic for the two cases are decreased to 0.3 and 0.33 respectively when the length of the payload is increased to 800 bits. Now our aim is to determine the cell loss rate of the finite queuing system for the offered traf-fic intensity of 0.53 Erls/trunk of the CSMA/CD BUS and 0.66Erls/trunk for that of the Token BUS. This cell loss rate will be equivalent to the delay of 1ms for an infinite queuing system. Let us now consider the length of the queue of a router to be 7 and considering the arrival of two types of M/G/1(7) traffic. Let the vector of probability states of CSMA/CD BUS be Q (for 0.53 Erls/trunk) and that of Token BUS be P (for 0.66 Erls/trunk). Applying the traffic model of M/G/1(m) of Sec. III, we determine the probability states for Cj (before normalization) and put them in the following vectors: 0.1 0.2 0.3 0.4 0.5 0.6 2.5 2 1.5 1 E[D] CSMA/CD BUS for Lp=800 bits E[D] CSMA/CD BUS for Lp=500 bits E[D] Token BUS for Lp=800 bits E[D] Token BUS for Lp=500 bits Mean Delay E[D] in ms Fig. 3. Variation of mean delay against carried traffic
  • 8. Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic P = [1.00000000 0.93400000 0.53100000 0.25500000 0.11700000 0.05300000 0.02300000 9.5600E-03] and Q= [1.00000000 0.69900000 0.28600000 0.09600000 0.03000000 8.8900E-03 2.2500E-03 1.6800E-04]. The above vectors, after normalization, become: Pnorm  [0.34216601 0.31958310 0.18169000 0.08725200 0.04003300 0.01813500 0.00787000 0.00327000] and Qnorm  [0.47118500 0.32935900 0.13475900 0.04523400 0.01413600 0.00418800 0.00106000 7.9100E-05]. Now the vectors P and Q can be applied to a two-dimensional traffic model of the tabular form of [12] as shown in Table 1(a) and (b) respectively. From the above vectors and tables, we can easily determine the individual and combined sys-tem blocking probability. For only CSMA/CD BUS traffic, the blocking probability (from nor-malization vector P) is found to be B1 = 0.00327. Similarly, only for Token BUS traffic, the blocking probability (from normalization vector Q) is found to be B2 = 7.906E-05. Let us now determine the overall/combined cell blocking probability when both types of traf-fic exist simultaneously on a BUS. The work can be done in the tabular form of a two-dimensional traffic model of [13] as shown in Table 1. In Table 1(a) and Table 1(b), the proba-bility states are determined before and after normalization. The sum of the complete occupied states provides the overall cell blocking probability. Thus, the overall blocking probability is found to be: B0 =2.72E-05+ 3.41E-04+7.66E-04+1.24E-03+1.82E-03+2.46E-03+2.61E-03+1.55E-03 =1.08E-03, which is seen to be greater than the sum of the individual blocking probabilities. This happens because of the statistical distribution of the offered traffic. 686
  • 9. Md. Syeful Islam, Md. Rezaur Rahman, Anupam Roy, Md. Imdadul Islam and M. R. Amin Table 1. (a) Before Normalization, (b) After Normalization (a) 5. CONCLUSION The paper deals with the two-dimensional packet traffic of a M/G/1(m) case. Usually, the per-formance of two-dimensional packet traffic for a general service-time distribution case is ana-lyzed by incorporating the Markov modulated Poisson’s process (MMPP) model with M/G/1(m) traffic. Our present analysis has the flexibility of enhancement for a multi-dimensional dissimi-lar bandwidth case of packet traffic even for complete sharing or partitioning a call admission scheme. It has been demonstrated that the packet dropping probability of the combined traffic is 687 Q7 1.68 E-04 1.68 E-04 Q6 2.25 E-03 2.25 E-03 2.10 E-03 Q5 8.89 E-03 8.89 E-03 8.30 E-03 4.72 E-03 Q4 0.03 3.00 E-02 2.80 E-02 1.59 E-02 7.65 E-03 Q3 0.096 9.60 E-02 8.97 E-02 5.10 E-02 2.45 E-02 1.12 E-02 Q2 0.286 2.86 E-01 2.67 E-01 1.52 E-01 7.293 E-02 3.35 E-02 1.52 E-02 Q1 0.699 6.99 E-01 6.53 E-01 3.71 E-01 1.78 E-01 8.18 E-02 3.71 E-02 1.61 E-02 Q0 1 1.00 E+00 9.34 E-01 5.31 E-01 0.255 0.117 0.053 0.023 9.56 E-03 1 0.934 0.531 0.255 0.117 0.053 0.023 9.56 E-03 P0 P1 P2 P3 P4 P5 P6 P7 (b) Q7 1.68 E-04 2.72 E-05 Q6 2.25 E-03 3.65 E-04 3.41 E-04 Q5 8.89 E-03 1.44 E-03 1.35 E-03 7.66 E-04 Q4 0.03 4.87 E-03 4.54 E-03 2.58 E-03 1.24 E-03 Q3 0.096 1.56 E-02 1.45 E-02 8.27 E-03 3.97 E-03 1.82 E-03 Q2 0.286 4.64 E-02 4.33 E-02 2.46 E-02 1.18 E-02 5.43 E-03 2.46 E-03 Q1 0.699 1.13 E-01 1.06 E-01 6.02 E-02 2.89 E-02 1.33 E-02 6.01 E-03 2.61 E-03 Q0 1 1.62 E-01 1.51 E-01 8.61 E-02 4.14 E-02 1.90 E-02 8.60 E-03 3.73 E-03 1.55 E-03 1 0.934 0.531 0.255 0.117 0.053 0.023 9.56 E-03 P0 P1 P2 P3 P4 P5 P6 P7
  • 10. Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic much larger than the individual service case and is even larger than the sum of the individual service cases. This happens because of the statistical distribution of the occupancy of the states. This work can be extended for the case of a dissimilar bandwidth or three-dimensional traffic or even for star LAN. The work will be helpful for a network planar to select the capacity of the link for a LAN to maintain the desired QoS in multi-dimensional traffic services. REFERENCES [1] D. Bear, Principle of Telecommunication Traffic Engineering, Second Edition, Peter Peregrinus Ltd., Hertfordshire, U.K., 1988. [2] Md. I. Islam, M. Q. Maula and L. J. Rozario, “Analysis of two dimensional limited source and mixed traffic model for a BTS of a small mobile cellular network,” Proceedings of the 4th International Conference on Computers and Information Technology (ICCIT), Dhaka, December 2001. [3] P. Srisukpibul, “Traffic Measurement on a Cellular Mobile Network,” Masters Thesis, Division of Telecommunications, AIT, Bangkok, Thailand, 1997. [4] Paul Fitzpatrick, Cheng Siong Lee and Bob Warfiled, “Teletraffic Performance of Mobile Radio Networks with Hierarchical Cells and Overflow,” IEEE J. Select. Areas Commun., Vol.15, No.8, 1997, pp.1549-57. [5] Kwan L. Yeung and Sanjib Nanda, “Channel Management in Micro/Macro Cellular Radio Systems,” IEEE Trans. Veh. Technol., Vol.45, No.4, 1996, pp.14-23. [6] M. I. Islam and S. Hossain, “An analytical model of traffic performance of mobile cellular network in underlay overlay cell system,” Proceedings of the 6th International Conference on Computers and Information Technology (ICCIT), Dhaka, Bangladesh, Dec. 2003. [7] M. Mahdavi, R.M. Edwards and S.R. Cvetkovic, “Polycy Enhancement of Traffic in TDMA Hybrid Switched Integrated Integrated Voice/Data Cellular Mobile Communica-tions Systems,” IEEE Commun. Lett., Vol.5, No.6, 2004, pp.242-244. [8] Bin Li, Lizhong, Bo Li and Xi-Ren Cao, “Call admission control for voice/data integrated cellular networks: performance analysis and comparative study,” IEEE J. Select. Areas Commun., Vol.22, No.4, 2004, pp.706-718. [9] W. Bux, “Performance issues in local area networks,” IBM Syst. Journal, Vol.23, No.4, 688 1984, pp.351-374. [10] T. Supot and H. Akimaru, “A performance evaluation for heterogeneous bus CSMA/CD LANs,” IEICE Trans. Commun., Vol.E74-B, No.9, 991, pp.2721-2727. [11] Md. Imdadul Islam, Md. Shahriar Karim, J. K. Das and M. R. Amin, “Evaluation of Traf-fic Parameters of Multidimensional Traffic of a Combined Link Using a Tabular Method,” Proceedings of the 11th International Conference on Computers and Informa-tion Technology (ICCIT), KUET, Bangladesh, December 2008. [12] Haruo Akimaru, Marion R. Finley and Kyoko Yamori “A Practical Dimensioning Method for ATM System,” IEEE Trans. Commun., Vol.47, No.2, 1999, pp.311-315. [13] S. Hossain and Imdadul Islam, “Analysis of SDMA PCT-II Traffic for Duplicated First Case: A Theoretical Study,” International Conference on Wireless Communications, Net-working and Mobile Computing, Wuhan, China, September 2005.
  • 11. Md. Syeful Islam, Md. Rezaur Rahman, Anupam Roy, Md. Imdadul Islam and M. R. Amin Md. Syeful Islam recieved his B.Sc. degree in Computer Science and Engi-neering from Jahangirnagar University in Dhaka, Bangladesh in 2011. Currently, he is working as a software consultant in the Micro-Finance Solutions Depart-ment of Southtech Limited in Uttara, Dhaka, Bangladesh. Md. Rezaur Rahman received his B.Sc. degree in Computer Science and Engineering from Jahangirnagar University in Dhaka, Bangladesh in 2011. He is currently working as a Lecturer in the Department of Computer Science and Engineering at the Daffodil Institute of Information Technology in Dhaka, Bangla-desh. Anupam Roy received his B.Sc. in Computer Science and Engineering from Jahangirnagar University in Savar, Dhaka, Bangladesh in 2007. He is now pur-suing his M.Sc. in Engineering at the same department. He worked for a few months as a General Software Developer at MFASIA LTD (A joint venture com-pany between Bangladesh and England) and as a Java Programmer at ATI LTD in Dhaka, Bangladesh. He is now working as a Programmer at BJIT LTD (A joint venture company between Bangladesh and Japan) in Dhaka, Bangladesh. Md. Imdadul Islam has received his B.Sc. and M.Sc. in Electrical and Elec-tronic Engineering from the Bangladesh University of Engineering and Technolo-gy in Dhaka, Bangladesh in 1993 and 1998 respectively and completed his Ph.D. degree in 2010 at the Department of Computer Science and Engineering at Ja-hangirnagar University in Dhaka, Bangladesh in the field of network traffic engi-neering. He is now working as a Professor in the Department of Computer Science and Engineering at Jahangirnagar University in Savar, Dhaka, Bangla-desh. Previously, he worked as an Assistant Engineer at Sheba Telecom (Pvt.) LTD (A joint venture company between Bangladesh and Malaysia, for mobile cellular and WLL) from Sept. '94 to July '96. He has very good field experience in the installation of Radio Base Stations and Switching Centers for WLL. His research fields are network traffic, wireless communications, wavelet transform, OFDMA, WCDMA, adaptive filter theory, ANFIS, and array antenna systems. He has more than a hundred research papers in national and international journals and conference proceedings. 689
  • 12. Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic M. R. Amin received his B.Sc. and M.Sc. degrees in Physics from Jahangirna-gar University in Dhaka, Bangladesh in 1984 and 1986 respectively and his Ph.D. degree in Plasma Physics from the University of St. Andrews in the U. K. in 1990. He is a Professor of Electronics and Communications Engineering at East West University in Dhaka, Bangladesh. He served as a Post-Doctoral Research Asso-ciate in Electrical Engineering at the University of Alberta, Canada, during 1991- 1993. He was an Alexander von Humboldt Research Fellow at the Max-Planck Institute for Extraterrestrial Physics in Garching/Munich, Germany during 1997- 1999. Dr. Amin was awarded the Commonwealth Postdoctoral Fellowship in 1997. Besides these, he has also received several awards for his research, including the Bangladesh Academy of Science Young Scientist Award for the year 1996 and the University Grants Commission Young Scientist Award for 1996. He is a member of the IEEE. His current field of research is wireless communications and networks. 690