Next Article in Journal
Planar Interdigitated Aptasensor for Flow-Through Detection of Listeria spp. in Hydroponic Lettuce Growth Media
Next Article in Special Issue
Variational Channel Estimation with Tempering: An Artificial Intelligence Algorithm for Wireless Intelligent Networks
Previous Article in Journal
A Deep Machine Learning Method for Concurrent and Interleaved Human Activity Recognition
Previous Article in Special Issue
Hierarchical Agglomerative Clustering of Bicycle Sharing Stations Based on Ultra-Light Edge Computing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Probabilistic Analysis of a Buffer Overflow Duration in Data Transmission in Wireless Sensor Networks

by
Wojciech M. Kempa
Department of Mathematics Applications and Methods for Artificial Intelligence, Faculty of Applied Mathematics, Silesian University of Technology, 44-100 Gliwice, Poland
Sensors 2020, 20(20), 5772; https://doi.org/10.3390/s20205772
Submission received: 11 September 2020 / Revised: 3 October 2020 / Accepted: 9 October 2020 / Published: 12 October 2020

Abstract

:
One of the most important problems of data transmission in packet networks, in particular in wireless sensor networks, are periodic overflows of buffers accumulating packets directed to a given node. In the case of a buffer overflow, all new incoming packets are lost until the overflow condition terminates. From the point of view of network optimization, it is very important to know the probabilistic nature of this phenomenon, including the probability distribution of the duration of the buffer overflow period. In this article, a mathematical model of the node of a wireless sensor network with discrete time parameter is proposed. The model is governed by a finite-buffer discrete-time queueing system with geometrically distributed interarrival times and general distribution of processing times. A system of equations for the tail cumulative distribution function of the first buffer overflow period duration conditioned by the initial state of the accumulating buffer is derived. The solution of the corresponding system written for probability generating functions is found using the analytical approach based on the idea of embedded Markov chain and linear algebra. Corresponding result for next buffer overflow periods is obtained as well. Numerical study illustrating theoretical results is attached.

1. Introduction

Capacities of buffers accumulating incoming packets in computer and telecommunication network nodes, e.g., wireless sensor network (WSN) nodes or LAN routers, are limited. As a consequence, one of typical phenomena of packet processing by a network node, especially when the traffic is heavy, is buffer overflows resulting in packet losses. As long as the accumulating buffer is overflowing, all incoming packets are lost. This causes deterioration of key service parameters, like packet loss ratio, end-to-end delay and mean energy consumption [1,2]. Obviously, as one can say, when a network sensor is turned on and the traffic is small, the problem of energy saving appears since we have long idle times. From the other side, sensor nodes are equipped typically with very small buffers, so during a “catastrophic” period, when large data amount arrives at the sensor node, buffer overflows and packet losses occur. Hence [3], reducing the power consumption during the “normal” period and reducing buffer overflow durations during the “catastrophic” period are equally important. In single-hop wireless sensor networks the sensor measurement is sent directly to the base station (sink node). However, in multi-hop topology the information is transferred from sensor to sensor to the sink node collecting the traffic, using a multi-hop protocol [2]. Unexpected buffer overflows occurring on the route (at intermediate nodes) generate packet losses and significantly reduce the Quality of Service (QoS). In fact, in the literature, one can find many available schemes of the buffer management dedicated to traditional wireless networks. However [4], they cannot be directly used in wireless sensor networks due to strong limitations in power supply and the memory.
The problems and challenges described above are the motivation for the in-depth analytical study of the buffer overflow phenomenon and its probabilistic nature. In particular, the analysis of the probability distribution of a single buffer overflow duration as a function of the buffer capacity, the intensity of packet arrivals and the processing speed is desirable.
In this paper, we consider a mathematical model of the node of a wireless sensor network with discrete time parameter. The model is based on a finite-buffer discrete-time queueing system with one processing station. As it seems, queueing systems with finite capacities of waiting rooms accumulating the incoming packets (customers, cells, jobs, etc.) have far greater potential practical applications compared to systems with infinite ones. Indeed, the enqueueing process of data packets arriving at nodes of computer or telecommunication networks (like IP routers or nodes of WSNs) or jobs occurring in the production process assumes a finite buffer (magazine) capacities. In consequence, a natural phenomena of a buffer overflow may appear, during which the “qualification” of new customers for the processing is timely suspended due to no place for waiting. Since during the buffer overflow all the entering customers are usually rejected without service, the knowledge of the probabilistic distribution of the duration of successive buffer overflow periods is essential from the point of view of the system control and optimization in order to ensure a proper level of the Quality of Service.
One can find analytical results for probability distributions of buffer overflow durations for the finite- and infinite-buffer M / G / 1 -type queueing models in [5,6,7,8]. In [9], an M / G / 1 / N -type system with a single vacation mechanism is analyzed. A compact-form representation for the Laplace transform (LT for short) of the first buffer overflow duration cumulative distribution function (CDF) is found there. Hence, the formula for the LT of next such periods is derived. The generalization of these results for the case of a multiple vacation policy and for the compound Poisson arrival stream can be found in [10,11], respectively [12,13]. Analytical results for the CDF of the time to the first buffer overflow are obtained, e.g., in [14,15], where the multiple vacation policy and an unreliable server subject to breakdowns are assumed, respectively, in the finite-buffer model with Poisson arrivals. As a tool for avoiding the risk of a buffer overflow, active queue management (AQM) is often applied. The representation for the queue-size distribution in a model with Poisson arrivals, AQM-type dropping function and finite buffer capacity is obtained, e.g., in [16].
In [17,18,19,20,21,22,23], wireless sensor networks are modeled applying queueing theory. In [24], the problem of congestion control and processing management is investigated using Markov chains. One can find a novel approach based on matrix-analytic method in studying discrete-time queues in [25]. In [26], the representation for the line-length distribution in the general-type discrete queue is obtained. Corresponding result for the case of a Batch Markovian Arrival Process (BMAP) in the discrete case can be found in [27]. Cost analysis for sensor network nodes accepting two different classes of packets is done in [28] basing on the finite-buffer G e o / G / 1 / K -type model with vacations. Distribution of queueing delay in discrete-time model is studied in [29].
As one can observe, most of analytical results relate mainly to performance measures of the stationary state of the system. However, transient (time-dependent) analysis is sometimes desired or even necessary, e.g., in the case of the observation of the system just after its restarting after a breakdown, or simultaneously with the implementation of a new control mechanism. In addition, in some practical situations, the queue-length behavior may be destabilized by different “outside” phenomena (like e.g., fade-out or interference occurring in wireless telecommunication).
In this paper, we study the model of a WSN node based on a finite-buffer discrete-time queueing system in transient state. The time axis is divided into fixed-length periods (called slots) and numbered by 1, 2, etc. Such an approach is usually used in modeling different real-life systems, for example in the analysis of telecommunication traffic. The in-depth analysis of various discrete-time queueing models can be found, e.g., in books [30,31,32]. Discrete-time queueing model with correlated arrivals and constant service times is analyzed in [33]. The case of generally distributed service times is investigated in [34]. In [35], discrete time queueing models and their networks are studied.
In this paper, a system of equations for the tail CDF of the first buffer overflow period duration conditioned by the initial state of the accumulating buffer is derived. The solution of the corresponding system written for probability generating functions (PGFs for short) is found using the analytical approach based on the idea of embedded Markov chain and linear algebra. Corresponding results for next buffer overflow periods are obtained as well. The numerical study illustrating theoretical results is attached. Therefore, the first main contribution of the paper is compact-form analytical results obtained for the transient state of the system, describing its evolution at arbitrary time (slot). Typically, in queueing modeling, the empty system is assumed initially. Thus, the next contribution of the paper is in showing an essential dependence (usually ignored) of the buffer overflow duration on the initial buffer state of the system. The dependence is visible in the formulae and it is illustrated via numerical results.
The remaining part of the article is organized as follows. In Section 2, we give a precise mathematical description of the considered queueing model and introduce some nomenclature. In Section 3, a transient system of equations for the tail CDF of the first buffer overflow period duration, conditioned by the number of packets accumulated in the buffer before the starting moment, is built. Moreover, a corresponding system written for PGFs is found there. Section 4 contains the main analytical result, namely a compact-form solution of the last system obtained in the previous section. The result for next buffer overflow periods is stated in Section 5. In Section 6, numerical analysis is provided. A brief summary and conclusion can be found in Section 7.

2. Model Description

In this paper, we consider a discrete-time queueing model in which the incoming packets arrive according to interarrival times being geometrically distributed with parameter 0 < a < 1 (a binomial arrival process), so the probability that an interarrival time equals k (time slots) is
a k = d e f a ( 1 a ) k 1 ,
where k { 1 , 2 , . . . } .
The probability that an interarrival time exceeds k we denote by a ¯ k . Obviously
a ¯ k = i = k + 1 a i = ( 1 a ) k , k 1 .
The j-fold convolution of the sequence ( a k ) with itself is defined as follows:
a k 1 = a k , k 1 ,
and
a k j = i = 1 k 1 a i ( j 1 ) a k i = i = 1 k 1 a i a k i ( j 1 ) ,
for 2 j k .
Processing times are assumed to be of general distribution, where b k stands for the probability that the service time lasts k time units, where k = 1 b k = 1 . The maximum system capacity is assumed to be N , so we have an accumulating buffer with N 1 places and one place in service station. A natural processing discipline FIFO (First In First Out) is assumed.
In a single time slot, at most one job can arrive and one service can be finished. We accept the so-called arrival-first (AF) regime, at which if the arrival and departure appear at the same time (slot) an arrival takes precedence over a departure.
In this paper, we use the notation I { A } for the indicator (characteristic function) of the random event A .

3. Basic Equations for First Buffer Overflow Duration

In this section, we deal with the first buffer overflow duration γ 1 . We introduce the following notation for the conditional tail CDF of γ 1 :
Δ n ( k ) = d e f P { γ 1 k | X 0 = n } ,
where k 1 , n { 0 , . . . , N 1 } and X 0 stands for the number of packets present in the buffer just before the starting epoch.
Let us start with the case of the buffer being empty before the opening of the system ( n = 0 ). Note that the corresponding CDFs for n = 0 and n = 1 are equal, i.e.,
P { γ 1 k | X 0 = 0 } = r = 1 a r P { γ 1 k | X 0 = 1 } = P { γ 1 k | X 0 = 1 } ,
so Δ 0 ( k ) = Δ 1 ( k ) .
Assume now that the system starts the operation with n { 1 , . . . , N 1 } packets accumulated in the buffer. Let us denote by i ( i 1 ) the first departure epoch after the opening of the system at time 0. In addition, if i 2 , let r be the last arrival moment before i . As a result that departure epochs are Markov moments in the evolution of the considered system (due to memoryless property of geometric distribution of interarrival times), for fixed n the following random events are mutually exclusive:
  • Λ 1 ( n ) : the moment r is the arrival time of, at most, the ( N n 1 ) th packet and the next packet enters the system after time i (the buffer does not become saturated before time i);
  • Λ 2 ( n ) : the moment r is the arrival time of, at most, the ( N n 1 ) th packet and the next packet enters the system exactly at time i;
  • Λ 3 ( n ) : at time r the ( N n ) th packet arrives, so the buffer overflow period begins at time r ;
  • Λ 4 ( n ) : the first packet (after the opening of the system) arrives exactly at time i;
  • Λ 5 ( n ) : the first packet (after the opening of the system) arrives after time i .
Obviously, from the total probability law we get
Δ n ( k ) = i = 1 5 P { ( γ 1 k ) Λ i | X 0 = n } .
Let us note that the following representations are true:
P { ( γ 1 k ) Λ 1 | X 0 = n } = i = 2 b i r = 1 i 1 j = 1 N n 1 a r j a ¯ i r Δ n + j 1 ( k ) ,
P { ( γ 1 k ) Λ 2 | X 0 = n } = i = 2 b i r = 1 i 1 j = 1 N n 1 a r j a i r Δ n + j ( k ) ,
P { ( γ 1 k ) Λ 3 | X 0 = n } = i = 2 b i r = 1 i 1 a r ( N n ) I { i r k } ,
P { ( γ 1 k ) Λ 4 | X 0 = n } = Δ n ( k ) i = 1 b i a i
and
P { ( γ 1 k ) Λ 5 | X 0 = n } = Δ n 1 ( k ) i = 1 b i a ¯ i .
Observe that in the case of (9) (if j = N n 1 ) and (11) (if n = N 1 ), according to AF regime, in fact, degenerated ”zero” buffer overflow periods occur at time i (the ( N n ) th packet arrives and the service completes at this time).
Collecting the right sides of (8)–(12) and referring to (7), we obtain
Δ n ( k ) = i = 2 b i r = 1 i 1 [ j = 1 N n 1 a r j a ¯ i r Δ n + j 1 ( k ) + a i r Δ n + j ( k ) + a r ( N n ) I { i r k } ] + i = 1 b i a i Δ n ( k ) + a ¯ i Δ n 1 ( k ) ,
where n { 1 , . . . , N 1 } .
Introduce now the following functionals:
b ^ j = d e f i = 2 b i r = 1 i 1 a r j a i r ,
b ˜ j = d e f i = 2 b i r = 1 i 1 a r j a ¯ i r ,
c ^ = d e f i = 1 b i a i ,
c ˜ = d e f i = 1 b i a ¯ i
and
θ n ( z ) = d e f k = 1 z k i = 2 b i r = 1 i 1 a r ( N n ) I { i r k } = i = 2 b i r = 1 i 1 a r ( N n ) k = 1 i r z k = z 1 z i = 2 b i r = 1 i 1 ( 1 z i r ) a r ( N n ) ,
where | z | < 1 .
If we define, moreover, the PGF of Δ n ( k ) as follows:
Δ ^ n ( z ) = d e f k = 1 z k Δ n ( k ) , | z | < 1 ,
then the system of Equation (13) can be rewritten in the following form:
Δ ^ n ( z ) = j = 1 N n 1 b ˜ j Δ ^ n + j 1 ( z ) + b ^ j Δ ^ n + j ( z ) + c ^ Δ ^ n ( z ) + c ˜ Δ ^ n 1 ( z ) + θ n ( z ) ,
where n { 1 , . . . , N 1 } . In addition (see (6)),
Δ ^ 0 ( z ) = Δ ^ 1 ( z ) .
Putting
τ j = d e f c ˜ , j = 0 , b ˜ 1 + c ^ , j = 1 , b ˜ j + b ^ j 1 , j 2 ,
the Equation (20) can be transformed as follows:
Δ ^ n ( z ) = j = 0 N n 1 τ j Δ ^ n + j 1 ( z ) + θ n ( z ) ,
where n { 1 , . . . , N 1 } .

4. Representation for Solution

In this section, we obtain an explicit solution of the system (21), (23) in a compact form. In [36], the idea of a potential of a random walk is considered. Namely, if the sequence ( Y n ) is defined as follows:
Y 0 = 0 , Y n = k = 1 n X k ,
where n 1 , and random variables X 1 , X 2 , . . . are independent and identically distributed with τ k = d e f P ( X n = k ) , k 0 , τ 0 > 0 , then a sequence ( R k ) defined in the following way:
k = 0 z k R k = 1 T ( z ) 1 ,
where
T ( z ) = d e f k = 1 z k τ k + 1 , | z | < 1 ,
is called the potential of the random walk ( Y n ) . The representation (25) can be used to find successive terms of the potential ( R k ) . Indeed, applying Maclaurin’s expansion, we can write
R k = 1 k ! z 1 T ( z ) 1 | z = 0 .
However, from the other side, successive terms of ( R k ) can be found recursively, namely [36]
R 0 = 0 , R 1 = 1 τ 0 , R k = R 1 R k 1 j = 0 k 1 τ j + 1 R k 1 i ,
where k 2 .
The potential has interesting algebraic applications. In [36], the following system of infinitely many linear equations is studied:
j = 1 n 1 τ j + 1 δ ^ n j δ ^ n = ϕ n , n 1 ,
where ( δ ^ n ) are unknowns and ( τ n ) and ( ϕ n ) are known sequences. It is proved that each solution of the system (29) can be represented in the following form:
δ ^ n = β R n + k = 1 n R n k ϕ k , n 1 ,
where β is a certain constant and ( R k ) is the potential corresponding to the sequence ( τ k ) .
As it turns out, the idea of the potential can be applied in solving the system (21), (23); however, firstly, it must be written in another, equivalent, form.
Introduce the following substitution:
δ ^ n ( z ) = d e f Δ ^ N n ( z ) , n { 1 , . . . , N } .
Observe that now the Equations (21), (23) can be rewritten as follows:
j = 1 n 1 τ j + 1 δ ^ n j ( z ) δ ^ n ( z ) = ϕ n ( z )
for n { 1 , . . . , N 1 } , and
δ ^ N ( z ) = δ ^ N 1 ( z ) ,
where
ϕ n ( z ) = d e f δ ^ 1 ( z ) τ n θ N n ( z ) .
Let us note that (32) has the form similar to (29); however, two essential differences can be observed. Firstly, the sequences of unknowns and free terms depend on the argument z . Secondly, the number of equations in the system (32) is finite in comparing to (29). In consequence, the representation (30) for the solution must be used in a slightly different form, namely
δ ^ n ( z ) = β ( z ) R n + k = 1 n R n k ϕ k ( z ) , n 1 ,
where β ( z ) is certain function of variable z and ( R k ) is the potential corresponding to the sequence ( τ k ) defined in (27) or (28). Next, the Equation (33) can be used for finding β ( z ) explicitly.
Let us start with substituting n = 1 into (35). We get
β ( z ) = δ ^ 1 ( z ) R 1 = δ ^ 1 ( z ) τ 0 .
Next, substituting n = N and n = N 1 into (35) and, moreover, applying (33), we can easily eliminate δ ^ 1 ( z ) as follows:
δ ^ 1 ( z ) = k = 1 N 1 ( R N k R N 1 k ) θ N k ( z ) k = 0 N 1 ( R N k R N 1 k ) τ k .
Returning to Δ ^ n ( z ) (by using the substitution (31)), we have
Δ ^ n ( z ) = δ ^ N n ( z ) = δ ^ 1 ( z ) τ 0 R N n + k = 1 N n R N n k ϕ k ( z ) = δ ^ 1 ( z ) τ 0 R N n + k = 1 N n δ ^ 1 ( z ) τ k θ N k ( z ) R N n k = δ ^ 1 ( z ) k = 0 N n τ k R N n k k = 1 N n θ N k ( z ) R N n k .
In consequence, referring to (33), (37) and (38), we can formulate the following main result:
Theorem 1.
The PGF of the tail CDF of the first buffer overflow duration γ 1 in the considered queueing system can be represented as follows:
Δ ^ n ( z ) = k = 1 N 1 ( R N k R N 1 k ) θ N k ( z ) k = 0 N 1 ( R N k R N 1 k ) τ k k = 0 N n τ k R N n k k = 1 N n θ N k ( z ) R N n k ,
where n { 0 , . . . , N 1 } , and the formulae for θ k ( z ) , τ k and R k are given in (18), (22) and (27) (or, equivalently, in (28)), respectively.

5. The Case of Next Buffer Overflows

Let us denote by γ r the rth buffer overflow period duration ( r 2 ). Observe that the following representation is true:
P { γ r > k } = P { γ 1 > k | X 0 = N 1 } ,
where k 1 .
Indeed, the completion epoch of each buffer overflow period is a Markov moment in the evolution of the system. Therefore, the process of reaching each next buffer overflow period (beginning with the second one) is probabilistically identical as the one for the first period but with “initial” number of jobs accumulated in the buffer equal to N 1 . In consequence, if we put
Δ ^ ( z ) = d e f k = 1 z k P { γ r k } ,
where r 2 and | z | < 1 , then we obtain the following:
Remark 1.
The PGF Δ ^ ( z ) of the tail CDF of the rth buffer overflow duration γ r ( r 2 ) in the considered queueing system can be expressed as
Δ ^ ( z ) = Δ ^ N 1 ( z ) ,
where | z | < 1 and the formula for Δ ^ N 1 ( z ) is given in (39).

6. Numerical Study

In this section, we present the numerical study illustrating theoretical results. In particular, we are interested in the visualization of the impact on the distribution of the first buffer overflow duration for the following “input” parameters of the system:
-
the offered traffic load ϱ defined as the quotient of the mean service time and the mean interarrival time;
-
the number of jobs n accumulated in the buffer before the starting moment;
-
the shape of the service (processing) time distribution;
-
the buffer size.
In computations, we consider three types of the processing time distribution:
  • geometric with fixed parameter b ;
  • deterministic (constant) of duration B = const ;
  • bounded discrete distribution, where the service time takes on finite number of possible values; dealing with the impact of the distribution skewness we analyze separately the following subcases of this type of distribution:
     
    symmetric;
     
    with positive skewness (positive asymmetry);
     
    with negative skewness (negative asymmetry).
In [37], an algorithm of numerical inversion of probability generating function is proposed. Namely, if F ( z ) = k = 0 f k z k , where | f k | 1 and z ia a complex number, then f k for k = 1 , 2 , . . . can be approximated by f ¯ k as follows:
f ¯ k = 1 2 k r k j = 1 2 k ( 1 ) j Re ( F ( r exp ( π i j / k ) ) ) ,
where r ( 0 , 1 ) . Moreover,
| f k f ¯ k | r 2 k 1 r 2 k .
We use the algorithm described above with r = 0.1 to invert the right side of the Formula (39) in Theorem 1.

6.1. Impact of the Type of Processing Distribution

We investigate the impact of the type of processing distribution on the distribution of the first buffer overflow duration. Assume that a = 0.25 so the mean interarrival time equals 4, and take N = 11 . Moreover, let us analyze three different processing time distributions with the same mean equal to 3 (so ϱ = 0.75 < 1 ), namely geometric with parameter b = 1 3 = 0.333 , deterministic with B = 3 and bounded discrete distribution defined as
b 1 = b 2 = b 4 = b 5 = 1 8 , b 3 = 1 2 , b k = 0 otherwise .
In Figure 1, Figure 2 and Figure 3, conditional probabilities Δ n ( k ) for k = 1 , 2 , . . . , 6 are presented for n = 0 , 5 and 10 , respectively.
In Figure 4, Figure 5 and Figure 6, the case of ϱ = 1.00 is visualized. Assuming the same values of a and N, we present results for three processing time distributions with the same mean equal to 4: geometric with parameter b = 1 4 = 0.250 , deterministic with B = 4 and bounded discrete distribution defined as follows:
b 2 = b 3 = b 5 = b 6 = 1 8 , b 4 = 1 2 , b k = 0 otherwise .
Finally, the case of ϱ = 1.25 and the mean service time equal to 5 are presented in Figure 7, Figure 8 and Figure 9. We take there geometric distribution with parameter b = 1 5 = 0.200 , deterministic with B = 5 and bounded discrete distribution given by
b 3 = b 4 = b 6 = b 7 = 1 8 , b 5 = 1 2 , b k = 0 otherwise .
Evidently, as k increases, then the probability values
Δ ^ n ( k ) = P { γ 1 k | X 0 = n }
for fixed n decrease; however, the shape of this relationship depends on the type of processing distribution. The relationship between the initial buffer state and the processing distribution type is interesting. Figure 1, Figure 4 and Figure 7 show that there is the biggest difference in the case of geometric distribution, where a huge disproportion between values obtained for n = 0 , 5 and n = 10 can be observed.

6.2. Impact of Skewness Type of the Processing Distribution

In this subsection, we investigate the effect of the statistical shape of the service type distribution on the tail of conditional distribution of the first buffer overflow duration in the considered model. Assume, as previously, that a = 0.25 , N = 11 , and accept a bounded discrete processing distribution. Consider three different types of this distribution in the case of ϱ = 1 (so with the same mean), namely
  • symmetric distribution of the form
    b 1 = b 2 = b 4 = b 5 = 1 8 , b 3 = 1 2
    and b k = 0 otherwise, for which the skewness equals 0;
  • distribution with positive skewness (positive asymmetry) of the form
    b 2 = 7 16 , b 3 = 4 16 , b 4 = 3 16 , b 5 = 2 16
    and b k = 0 otherwise, for which the skewness equals 0.629 > 0 ;
  • distribution with negative skewness (negative asymmetry) of the form
    b 1 = 2 16 , b 2 = 3 16 , b 3 = 4 16 , b 4 = 7 16
    and b k = 0 otherwise, for which the skewness equals 0.629 < 0 .
Let us note that means are the same and equal to 3.
The values of probabilities Δ ^ 3 ( k ) = P { γ 1 k | X 0 = 3 } for k = 1 , . . . , 6 are presented in Table 1 and in Figure 10. It is probably a bit surprising that these probabilities are the highest for a symmetric distribution. In the case of positive and negative skewness for ks greater than or equal to 3, the probabilities are very close to zero.

6.3. Mean Buffer Overflow Duration in Dependence on Offered Load and Initial Buffer State

Let us study now the impact of the offered load ϱ and the initial buffer state n on the mean first buffer overflow duration. Let us note that the mean conditional first buffer overflow duration E n ( γ 1 ) can be obtained just from the formula (39), namely
E n ( γ 1 ) = lim z 1 Δ ^ n ( z ) .
Assume that N = 11 and a = 0.25 , and analyze three different possibilities in the case of geometric-type processing distribution, namely b = 0.33 ( ϱ = 0.75 < 1 ), b = 0.25 ( ϱ = 1.00 ) and b = 0.20 ( ϱ = 1.25 > 1 ). The results are presented in Table 2 and visualized in Figure 11. Note that the values increase with increasing offered load. For a small and medium level of initial buffer state, the differences are small. For greater values of n compared to N, the differences are significant. For example, the average duration of the first buffer overflow period for the value of n = 10 increases almost twice as compared to the value obtained for n = 9 .

6.4. Impact of System Size

Finally, in Table 3 and in Figure 12, the impact of the system size N on the duration of the first buffer overflow is illustrated for geometric processing distribution and system parameters kept the same as in the previous subsection. Here, n = N 1 is assumed; therefore, we can illustrate in this case not only the first buffer overflow but also next ones. Indeed, due to the fact that after finishing each buffer overflow period the number of accumulated packets equals N 1 , this buffer state becomes an initial one for the second and next buffer overflow periods. The dependence on the offered load ϱ is similar to that analyzed in the previous case. The buffer overflow duration decreases with the increase of the declared buffer volume; however, the rate of this change is the most visible for small values of N . Generally, it shows that a large increase of the buffer capacity does not have an essential impact on the average number of lost packets, since mean buffer overflow durations do not differ significantly for large Ns.

7. Conclusions

The possibility of probabilistic evaluation of the duration of the buffer overflow period is crucial in the evaluation of transmission quality and the network optimization process. The article proposes a probabilistic model for the functioning of a wireless sensor network node based on a queueing system with discrete time and a limited capacity of the buffer accumulating incoming data packets. Using the analytical approach based on the concept of the embedded Markov chain, the total probability formula and linear algebra, a compact representation for the PGF of the tail of the CDF of the first buffer overflow period is obtained, depending on the initial state of this buffer. As a simple conclusion, the appropriate formula is also found for the subsequent periods of buffer overflow. The numerical study examines the sensitivity of the buffer overflow time distribution on the packet arrival intensity, the type of service time distribution and the buffer filling level at the time of system start.

Funding

This research was funded by Silesian University of Technology, Gliwice, Poland.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Sumathi, K.; Venkatesan, M. A survey on congestion control in wireless sensor networks. Int. J. Comput. Appl. 2016, 147, 6. [Google Scholar] [CrossRef]
  2. Syed, A.S.; Babar, N.; Imran, A.K. Congestion control algorithms in wireless sensor networks: Trends and opportunities. J. King Saud Univ. 2017, 29, 236–245. [Google Scholar]
  3. Joshi, G.; Dwivedi, S.; Goel, A.; Mulherkar, J.; Ranjan, P. Power and buffer overflow optimization in wireless sensor nodes. In Proceedings of the International Conference on Computer Science and Information Technology, Bangalore, India, 2–4 January 2011; pp. 450–458. [Google Scholar]
  4. Shwe, H.Y.; Gacanin, H.; Adachi, F. Multi-layer WSN with power efficient buffer management policy. In Proceedings of the 2010 IEEE International Conference on Communication Systems, Singapore, 17–19 November 2010. [Google Scholar]
  5. de Boer, P.T.; Nicola, V.F.; van Ommeren, J.C.W. The remaining service time upon reaching a high level in M/G/1 queues. Queueing Syst. 2001, 39, 55–78. [Google Scholar] [CrossRef]
  6. Chae, K.C.; Kim, K.; Kim, N.K. Remarks on the remaining service time upon reaching a target level in the M/G/1 queue. Oper. Res. Lett. 2007, 35, 308–310. [Google Scholar] [CrossRef]
  7. Chydziński, A. On the remaining service time upon reaching a target level in M/G/1 queues. Queueing Syst. 2004, 47, 71–80. [Google Scholar] [CrossRef]
  8. Fakinos, D. The expected remaining service time in a single server queue. Oper. Res. 1982, 30, 1014–1018. [Google Scholar] [CrossRef] [Green Version]
  9. Kempa, W.M. On buffer overflow duration in WSN with a vacation-type power saving mechanism. In Proceedings of the 2017 International Conference on Systems, Signals and Image Processing (IWSSIP), Poznan, Poland, 22–24 May 2017; pp. 87–90. [Google Scholar]
  10. Kempa, W.M. On buffer overflow duration in a finite-capacity queueing system with multiple vacation policy. In Proceedings of the 43th International Conference Applications of Mathematics in Engineering and Economics (AMEE’17), Sozopol, Bulgaria, 8–13 June 2017; pp. 1–6. [Google Scholar]
  11. Kempa, W.M. Buffer overflow duration in a model of WSN node with power saving mechanism based on SV policy. In Proceedings of the International Conference on Information and Software Technologies, Druskininkai, Lithuania, 12–14 October 2017; pp. 385–394. [Google Scholar]
  12. Kempa, W.M. The virtual waiting time for the batch arrival queueing systems. Stoch. Anal. Appl. 2004, 22, 1235–1255. [Google Scholar] [CrossRef]
  13. Kempa, W.M. Analysis of departure process in batch arrival queue with multiple vacations and exhaustive service. Commun. Stat. Theory Methods 2011, 40, 2856–2865. [Google Scholar] [CrossRef]
  14. Kempa, W.M.; Marjasz, R. Distribution of the time to buffer overflow in the M/G/1/N-type queueing model with batch arrivals and multiple vacation policy. J. Oper. Res. Soc. 2019, 71, 447–455. [Google Scholar] [CrossRef]
  15. Kempa, W.M.; Paprocka, I.; Grabowik, C.; Kalinowski, K. Distribution of time to buffer overflow in a finite-buffer manufacturing model with unreliable machine. In Proceedings of the MATEC Web of Conferences, Iasi, Romania, 4 August 2017. [Google Scholar]
  16. Tikhonenko, O.; Kempa, W.M. The generalization of AQM algorithms for queueing systems with bounded capacity. In Proceedings of the Parallel Processing and Applied Mathematics, 9th International Conference (PPAM 2011), Torun, Poland, 11–14 September 2011; pp. 242–251. [Google Scholar]
  17. Cao, J.; Ma, Z.; Guo, S.; Yu, X. Performance analysis of non-exhaustive wireless sensor networks based on queueing theory. Int. J. Commun. Netw. Distrib. Sys. 2020, 24, 186–213. [Google Scholar] [CrossRef]
  18. Ghosh, S.; Unnikrishnan, S. Reduced power consumption in Wireless Sensor Networks using queue based approach. In Proceedings of the 5th IEEE International Conference on Advances in Computing, Communication and Control (ICAC3), Mumbai, India, 1–2 December 2017. [Google Scholar]
  19. Kempa, W.M. Analytical model of a Wireless Sensor Network (WSN) node operation with a modified threshold-type energy saving mechanism. Sensors 2019, 19, 3114. [Google Scholar] [CrossRef] [Green Version]
  20. Lee, J.-H.; Jung, I.-B. Adaptive-compression based congestion control technique for wireless sensor networks. Sensors 2010, 10, 2919–2945. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  21. Li, J.; Li, Q.; Qu, Y.; Zhao, B. An energy-efficient MAC protocol using dynamic queue management for delay-tolerant mobile sensor networks. Sensors 2011, 11, 1847–1864. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  22. Syafrudin, M.; Alfian, G.; Fitriyani, N.L.; Rhee, J. Performance analysis of IoT-based sensor, big data processing, and machine learning model for real-time monitoring system in automotive manufacturing. Sensors 2018, 18, 2946. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  23. Xu, Y.; Qi, H.; Xu, T.; Hua, Q.Q.; Yin, H.S.; Hua, G. Queue models for wireless sensor networks based on random early detection. Peer Peer Netw. Appl. 2019, 12, 1539–1549. [Google Scholar] [CrossRef]
  24. Hafidi, S.; Gharbi, N.; Mokdad, L. Queuing and service management for congestion control in Wireless Sensor Networks using Markov chains. In Proceedings of the IEEE Symposium on Computers and Communications ISCC, Murcia, Spain, 27–30 June 2005; pp. 176–181. [Google Scholar]
  25. Alfa, A.S. An alternative approach for analyzing finite buffer queues in discrete time. Perform. Eval. 2003, 53, 75–92. [Google Scholar] [CrossRef]
  26. Grassmann, W.; Tavakoli, J. The distribution of the line length in a discrete time GI/G/1 queue. Perform. Eval. 2019, 131, 43–53. [Google Scholar] [CrossRef]
  27. Kim, B.; Kim, J. Explicit solution for the stationary distribution of a discrete-time finite buffer queue. J. Ind. Manag. Optim. 2016, 12, 1121–1133. [Google Scholar] [CrossRef]
  28. Zhao, Z.; Elancheziyande, A.; De Oliveira, J.C. Sleeping policy cost analysis for sensor nodes collecting heterogeneous data. In Proceedings of the 43rd IEEE Annual Conference on Information Sciences and Systems, Baltimore, MD, USA, 18–20 March 2009; pp. 635–640. [Google Scholar]
  29. Hoflack, L.; De Vuyst, S.; Wittevrongel, S.; Bruneel, H. System content and packet delay in discrete-time queues with session-based arrivals. In Proceedings of the 5th IEEE International Conference on Information Technology, Las Vegas, NV, USA, 7–9 April 2008; pp. 1053–1058. [Google Scholar]
  30. Bruneel, H.; Kim, B.G. Discrete-Time Models for Communication Systems Including ATM; Kluwer Academic Publishers: Boston, MA, USA, 1993; pp. 1–48. [Google Scholar]
  31. Hunter, J.J. Mathematical techniques of applied probability, vol. II. In Discrete-Time Models: Techniques and Applications; Academic Press: New York, NY, USA, 1983; pp. 189–236. [Google Scholar]
  32. Takagi, H. Queueing analysis—A foundation of performance evaluation, Vol. 3. In Discrete-Time Systems; North-Holland: Amsterdam, The Netherlands, 1993. [Google Scholar]
  33. Wittevrongel, S.; Bruneel, H. Discrete-time queue with correlated arrivals and constant service times. Comput. Oper. Res. 1999, 20, 93–108. [Google Scholar] [CrossRef]
  34. Fiems, D.; Steyaert, B.; Bruneel, H. Discrete-time queues with generally distributed service times and renewal-type server interruptions. Perform. Eval. 2005, 35, 277–298. [Google Scholar] [CrossRef]
  35. Bharath-Kumar, K. Discrete time queueing systems and their networks. IEEE Trans. Commun. 1980, 28, 260–263. [Google Scholar] [CrossRef]
  36. Korolyuk, V.S. Boundary-value problems for compound Poisson processes. Theor. Probab. Appl. 1974, 19, 1–13. [Google Scholar] [CrossRef]
  37. Abate, J.; Whitt, W. Numerical inversion of probability generating functions. Oper. Res. Lett. 1992, 12, 245–251. [Google Scholar] [CrossRef]
Figure 1. Conditional probabilities Δ ^ n ( k ) for geometric processing distribution, ϱ = 0.75 and n = 0 , 5 and 10.
Figure 1. Conditional probabilities Δ ^ n ( k ) for geometric processing distribution, ϱ = 0.75 and n = 0 , 5 and 10.
Sensors 20 05772 g001
Figure 2. Conditional probabilities Δ ^ n ( k ) for deterministic processing distribution, ϱ = 1.00 and n = 0 , 5 and 10.
Figure 2. Conditional probabilities Δ ^ n ( k ) for deterministic processing distribution, ϱ = 1.00 and n = 0 , 5 and 10.
Sensors 20 05772 g002
Figure 3. Conditional probabilities Δ ^ n ( k ) for bounded discrete processing distribution, ϱ = 1.25 and n = 0 , 5 and 10.
Figure 3. Conditional probabilities Δ ^ n ( k ) for bounded discrete processing distribution, ϱ = 1.25 and n = 0 , 5 and 10.
Sensors 20 05772 g003
Figure 4. Conditional probabilities Δ ^ n ( k ) for geometric processing distribution, ϱ = 0.75 and n = 0 , 5 and 10.
Figure 4. Conditional probabilities Δ ^ n ( k ) for geometric processing distribution, ϱ = 0.75 and n = 0 , 5 and 10.
Sensors 20 05772 g004
Figure 5. Conditional probabilities Δ ^ n ( k ) for deterministic processing distribution, ϱ = 1.00 and n = 0 , 5 and 10.
Figure 5. Conditional probabilities Δ ^ n ( k ) for deterministic processing distribution, ϱ = 1.00 and n = 0 , 5 and 10.
Sensors 20 05772 g005
Figure 6. Conditional probabilities Δ ^ n ( k ) for bounded discrete processing distribution, ϱ = 1.25 and n = 0 , 5 and 10.
Figure 6. Conditional probabilities Δ ^ n ( k ) for bounded discrete processing distribution, ϱ = 1.25 and n = 0 , 5 and 10.
Sensors 20 05772 g006
Figure 7. Conditional probabilities Δ ^ n ( k ) for geometric processing distribution, ϱ = 0.75 and n = 0 , 5 and 10.
Figure 7. Conditional probabilities Δ ^ n ( k ) for geometric processing distribution, ϱ = 0.75 and n = 0 , 5 and 10.
Sensors 20 05772 g007
Figure 8. Conditional probabilities Δ ^ n ( k ) for deterministic processing distribution, ϱ = 1.00 and n = 0 , 5 and 10.
Figure 8. Conditional probabilities Δ ^ n ( k ) for deterministic processing distribution, ϱ = 1.00 and n = 0 , 5 and 10.
Sensors 20 05772 g008
Figure 9. Conditional probabilities Δ ^ n ( k ) for bounded discrete processing distribution, ϱ = 1.25 and n = 0 , 5 and 10.
Figure 9. Conditional probabilities Δ ^ n ( k ) for bounded discrete processing distribution, ϱ = 1.25 and n = 0 , 5 and 10.
Sensors 20 05772 g009
Figure 10. Impact of skewness type on conditional probabilities Δ ^ 3 ( k ) for bounded discrete processing distribution and ϱ = 1 .
Figure 10. Impact of skewness type on conditional probabilities Δ ^ 3 ( k ) for bounded discrete processing distribution and ϱ = 1 .
Sensors 20 05772 g010
Figure 11. Mean first buffer overflow duration in dependence on offered load and initial buffer state.
Figure 11. Mean first buffer overflow duration in dependence on offered load and initial buffer state.
Sensors 20 05772 g011
Figure 12. Impact of of system size on the mean first buffer overflow duration for different values of offered load.
Figure 12. Impact of of system size on the mean first buffer overflow duration for different values of offered load.
Sensors 20 05772 g012
Table 1. Impact of skewness type on conditional probabilities Δ ^ 3 ( k ) for bounded discrete processing distribution and ϱ = 1 .
Table 1. Impact of skewness type on conditional probabilities Δ ^ 3 ( k ) for bounded discrete processing distribution and ϱ = 1 .
kSymmetryNegative SkewnessPositive Skewness
10.6440890.4093440.418129
20.3614250.1072540.142688
30.1661214.163336  × 10 14 0.030098
40.0518316.938894  × 10 14 0
50.0133125.551115  × 10 13 1.110223  × 10 12
63.700743  × 10 11 9.251859  × 10 12 2.312965  × 10 12
Table 2. Mean first buffer overflow duration in dependence on offered load and initial buffer state.
Table 2. Mean first buffer overflow duration in dependence on offered load and initial buffer state.
Buffer State n ϱ = 0.75 ϱ = 1.00 ϱ = 1.25
00.0363210.0497550.038306
10.0363210.0497550.038306
20.0379540.0555770.045982
30.0424960.0693530.062898
40.0522820.0946590.092465
50.0715750.1372330.140520
60.1082690.2062580.216532
70.1778840.3181610.337882
80.3133640.5082490.544020
90.5854390.8553410.925785
101.1344071.5111271.654884
Table 3. Impact of system size on the mean first buffer overflow duration for different values of offered load.
Table 3. Impact of system size on the mean first buffer overflow duration for different values of offered load.
System Size N ϱ = 0.75 ϱ = 1.00 ϱ = 1.25
21.6823032.0002422.088127
31.5358421.7626851.818474
41.4187141.6391401.716005
51.3276111.5775481.678921
61.2570001.5457041.664732
71.2054921.5286321.658915
81.1717071.5195361.656483
91.1516131.5147961.655473
101.1404191.5123651.655056
111.1344071.5111271.654884

Share and Cite

MDPI and ACS Style

Kempa, W.M. Probabilistic Analysis of a Buffer Overflow Duration in Data Transmission in Wireless Sensor Networks. Sensors 2020, 20, 5772. https://doi.org/10.3390/s20205772

AMA Style

Kempa WM. Probabilistic Analysis of a Buffer Overflow Duration in Data Transmission in Wireless Sensor Networks. Sensors. 2020; 20(20):5772. https://doi.org/10.3390/s20205772

Chicago/Turabian Style

Kempa, Wojciech M. 2020. "Probabilistic Analysis of a Buffer Overflow Duration in Data Transmission in Wireless Sensor Networks" Sensors 20, no. 20: 5772. https://doi.org/10.3390/s20205772

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop