Next Article in Journal
Correction: Japertas et al. Experimental Study of Lidar System for a Static Object in Adverse Weather Conditions. J. Sens. Actuator Netw. 2025, 14, 56
Previous Article in Journal
Can Differential Privacy Hinder Poisoning Attack Detection in Federated Learning?
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Loss Clustering at MSP Buffer

by
Andrzej Chydzinski
* and
Blazej Adamczyk
Department of Computer Networks and Systems, Silesian University of Technology, Akademicka 16, 44-100 Gliwice, Poland
*
Author to whom correspondence should be addressed.
J. Sens. Actuator Netw. 2025, 14(4), 84; https://doi.org/10.3390/jsan14040084
Submission received: 25 June 2025 / Revised: 4 August 2025 / Accepted: 8 August 2025 / Published: 13 August 2025
(This article belongs to the Section Communications and Networking)

Abstract

Packet losses cause a decline in the performance of packet networks, and this decline is related not only to the percentage of losses but also to the clustering of them together in series. We study how the correlation of packet sizes influences this clustering when the losses are caused by buffer overflows. Specifically, for a model of a buffer with correlated packet sizes, we derive the burst ratio parameter, an intuitive metric for the inclination of losses to cluster. In addition to the burst ratio, we obtain the sequential losses distribution in the first, k-th, and stationary overflow periods. The Markovian Service Process (MSP) used by the model empowers it to mimic arbitrary packet size distributions and arbitrary correlation strengths. Using numeric examples, the impact of packet size correlation, buffer size, and traffic intensity on the burst ratio is showcased and discussed.

1. Introduction

Packet buffers are omnipresent in computer networking, in virtually all types of networks and networking devices, including sensor and actuator networks [1,2,3,4,5,6,7]. These buffers have several roles to play: they decrease packet loss by capturing traffic bursts, increase the throughput by preventing the output link from experiencing starvation, smooth the packet transmission process, and more. However, what makes the buffers less effective than wanted and expected is the autocorrelation of traffic. In particular, the consecutive packet sizes are often correlated, which arises out of the design of networking protocols.
Packets of correlated sizes, processed by a buffer, have several negative effects on queueing performance. Firstly, the packet transmission times are correlated in the same manner as the packet sizes (see the egress link in Figure 1), which causes a decline in the throughput of the link. Secondly, the mean buffer occupancy is higher, leading to longer queueing delays. Thirdly, the buffer overflows for more time on average, resulting in greater packet loss (again, see Figure 1).
All three of these negative effects are well understood and documented in the literature, which will be covered in the next section. There is, however, one more negative consequence of correlated packet sizes that will be studied herein: the aggregation of packet losses in groups, one after another.
Why is this important? When transmitting information of different types, it is often the case that short, isolated gaps are much less damaging than long, continuous gaps, even if the latter occur less frequently. This can be credited to the natural redundancy of information in the transmitted stream, the time-critical nature of the information, redundant coding built into the transmission, or a combination of these factors.
Consider, for illustration, a simple example of a text that is supposed to be transmitted:
SHE_HAS_BLUE_EYES
Then, consider two unsuccessful transmissions of this text, such that in each of them, four letters are lost (black squares):
SH◼_H◼S_◼LUE_EYE◼
SHE_HAS_BL◼◼◼◼YES
We can successfully guess the full message in the first transmission, while, in the second one, it is very difficult or impossible. In both cases, the loss probability is the same, 4/17, but, in the second case, the losses are grouped together. Obviously, the recovery of missing information in the first case occurs due to the natural redundancy of information in the English language. Unfortunately, this redundancy cannot help when the gap is too long.
In sensor and actuator networks, longer gaps can cause problems because of the nature of the transmitted information. For example, if a network is used to monitor temperature, pressure, or chemical solution content, it can be much more damaging when information is missing for a relatively long time–even if rarely—than when it is missing for only short moments—even if more frequently.
The International Telecommunication Union has studied in detail the decline in the quality of packetized voices due to the occurrence of packet losses in series (see the references in the next section). When a video stream is transmitted, it is perhaps less annoying for the viewer if one frame is lost after every nine frames, rather than losing ten frames in a row after ninety frames.
In general, there are many networking scenarios where a structure of losses like this:
is better than a structure of losses like this:
◻◻◻◻◻◻◻◻◻◻◼◼◼◼◻◻◻
while it is hard to think of an example where the reverse is true.
The best parameter to express the clustering of loss is the burst ratio, B. It is defined as the mean number of sequential losses, H ¯ , to the theoretical mean number of sequential losses, K ¯ , that occur in a Bernoulli process, i.e., when all losses happen independently of each other. By definition, we have
B = H ¯ K ¯ .
If the packet loss probability is L, then it is easy to establish that K ¯ = 1 / ( 1 L ) . Thus, we get
B = H ¯ ( 1 L ) .
Parameter B has a very nice, intuitive explanation. When B > 1 , the losses must have a statistical inclination to cluster together. The larger B, the more pronounced this inclination. Naturally, B > 1 may occur only when the losses are strongly dependent on each other and when the chance that a packet is lost given that the previous one was also lost is higher than L. When B < 1 , the losses must have a statistical inclination to be isolated. Again, the smaller B, the more pronounced this inclination. When B = 1 , the occurrence of losses is random and independent, with clustering characteristics typical of a Bernoulli process. It is simple to confirm that for the two examples above of 17 transmitted packets with four losses, the burst ratios are 0.76 and 3.06, respectively. The very high B = 3.06 in the latter case indicates a very strong clustering inclination.
In this study, we will calculate the burst ratio, assuming the model of a buffer with correlated packet sizes. To the best of the authors’ knowledge, such a formula has not been derived before. Then, we will examine the effect of packet size correlation, buffer size, and traffic intensity on the value of B. To derive B, we will also establish the sequential loss distribution in both transient and stationary cases. These not only constitute intermediate steps for computing the burst ratio but are also interesting as standalone characteristics.
In networking, correlated packet sizes are synonymous with correlated service (transmission) times. Therefore, in the rest of this paper, the term “correlated packet sizes” will be used interchangeably with the term “correlated service times.” To model this phenomenon, the Markovian Service Process (MSP) will be employed herein. MSP combines analytical tractability with great modeling flexibility. Specifically, it enables the modeling of arbitrary distributions of service times (packet sizes) as well as arbitrary correlations between service times.
In detail, the contributions made by this study are
  • a formula for the sequential loss distribution in the first and k-th buffer overflow periods (Theorems 1 and 2, respectively);
  • a formula for the sequential loss distribution in the stationary overflow period (Theorem 3);
  • a formula for the burst ratio (Theorem 4);
  • numerical results illustrating the impact of packet size correlation, buffer size, and traffic intensity on the burst ratio.
This study proceeds as follows. In Section 2, previous work related to the burst ratio and buffers with MSP service is reviewed. In the next section, the model of the buffer and the packet transmission process is presented in detail. Then, in Section 4 and Section 5, three intermediate formulas needed for the burst ratio are given. In particular, Section 4 presents a formula for the sequential loss distribution in the first overflow period. Section 5 provides formulas for the sequential loss distribution in the k-th overflow period and the stationary case.
The central result of this paper, the formula for B, is given in Section 6. Section 7 discusses computational aspects of all the previously derived formulas. Section 8 is devoted to numerical examples. First, the impact of buffer size and traffic intensity on B is demonstrated for both positive and negative correlations of service times. Second, the effect of correlation strength is examined for the two types of correlation and compared with the uncorrelated case. Third, two examples of concrete engineering problems related to loss clustering and the burst ratio are presented and solved. Fourth, theoretical results are compared with simulation results at the end of Section 8. Finally, Section 9 presents concluding remarks, discusses the limitations of this study, and proposes directions for future research.

2. Related Work

To the best of the authors’ knowledge, the results of this paper are new. No previously published study has addressed the burst ratio or loss clustering at a buffer with correlated packet sizes.
Early approaches to modeling packet loss were based on abstract stochastic processes, decoupled from the actual causes of loss. These included two-state Markov chains [8], k-state Markov chains [9], and the Gilbert–Elliott model [10]. Later, the loss process was modeled using the actual, common cause of packet loss, namely, buffer overflows [11].
The burst ratio was originally introduced in [12]. It was initially studied for a two-state Markov loss model in [12,13,14]. Specifically, the formula for B in one loss channel was derived in [12]. In [13,14], the burst ratio was established for multiple concatenated channels, where the model of each channel was founded upon a two-state Markov chain. The International Telecommunication Union studied the decline of packetized voice quality related to B in [15,16]. In [15], provisional planning values were provided for codec performance under extreme burst ratio values above 4 (see Tables I.4–5 of [15]). In [16], a formula expressing voice transmission impairment based on B was proposed (see Formulas (7–29) of [16]). More recently, the burst ratio was calculated using a buffer overflow model of losses [17]. The study demonstrated that the buffering mechanism itself can be a source of high burst ratio values. This is relatively easy to understand: when the buffer is overflowed, it may remain so for some period of time. During this overflow period, all arriving packets are dropped consecutively, thus increasing the burst ratio. The buffer overflow period itself has also been studied as a distinct characteristic, independent of the burst ratio (see, e.g., [18]).
It must be emphasized that up to now, studies related to the burst ratio have not incorporated correlations of packet sizes (service times). As we will see in Section 8, this correlation has a significant impact on B.
The correlation of service times, as incorporated in this work, is modeled using the Markovian Service Process (MSP) [19]. This stochastic process has been used to derive various performance characteristics of buffering mechanisms [20,21,22,23,24,25,26,27,28,29,30,31]. These studies differed in several respects: the assumed buffer size (finite in [20,21,22,28,29,31] versus infinite in [23,24,25,26,27,30]); the performance characteristics analyzed (e.g., buffer occupancy, waiting time, loss probability, sojourn time, busy period, idle period, buffer throughput); the analytical approach (e.g., the root method in [24]); and the treatment of batch arrivals or services.
However, none of these studies on buffers with MSP service addressed the burst ratio parameter.
Finally, note that this study deals with the FIFO policy with tail dropping, which is the simplest and most commonly used policy. Since the burst ratio strongly depends on the packet discarding policy, the results of this paper are not applicable to any of the active management policies, e.g., [32,33,34,35,36].

3. Buffer Model

We assume a FIFO buffer with a capacity of N packets, including the one currently being transmitted, if applicable. If, on a packet arrival, the buffer is full—i.e., it already stores N packets—the new packet is discarded. Packets are served (transmitted) from the buffer’s head. Since the packet sizes are correlated, the transmission times are correlated in the same manner, which is modeled by the Markovian Service Process (MSP).
An MSP is parameterized by two square M × M matrices, L 0 and L 1 , such that L 0 has negative elements only on the diagonal, while L 1 has all entries non-negative. Furthermore, L = L 0 + L 1 must have each row summing to zero so that it can serve as the infinitesimal generator of a Markov chain with service states set as 1 , , M .
Once an MSP is parameterized, its evolution can be described as follows. If, at time t, the buffer is non-empty, the service state S ( t ) evolves as a Markov chain with infinitesimal generator L. Moreover, if S ( t ) = j , then at t + d t , the service state may change to k with probability L 0 ( j , k ) d t + o ( d t ) , in which case, the ongoing packet service continues. Alternatively, it may change to k with probability L 1 ( j , k ) d t + o ( d t ) , in which case, the ongoing packet service is completed.
During any idle period, S ( t ) remains unchanged and equal to the last service state prior to the buffer becoming empty.
The mean packet service rate, μ , can be calculated by means of the relation
μ = π L 1 e ,
where π stands for the stationary vector for infinitesimal generator L and
e = [ 1 , , 1 ] T .
Packet arrivals follow the Poisson process of rate λ . The traffic intensity ρ is, therefore,
ρ = λ μ ,
where μ is given in (3).
We denote the buffer occupancy at time t by X ( t ) , including the packet being transmitted, if applicable.
Finally, the correlation coefficient of two consecutive service times, c o r r , is
c o r r = μ π ( L 0 ) 1 L 1 ( L 0 ) 1 e 1 2 μ π ( L 0 ) 1 e 1 ,
(see, e.g., [37]).

4. First Series of Losses

Naturally, a few packets are lost sequentially only within a single buffer overflow period. The overflow period ends when at least one free position becomes available in the buffer. Thus, the next arriving packet will be accepted, terminating the loss sequence.
In order to derive B using (2), we first need to compute H ¯ , which is the mean number of sequential losses in the stationary regime. Before this can be accomplished, however, we must establish the distribution of the count of losses in the first and, more generally, the k-th overflow period.
Therefore, the overall plan of the work requires the derivation of the following:
  • Sequential loss distribution in the first overflow period.
  • Sequential loss distribution in the k-th overflow period, k 2 .
  • Sequential loss distribution in the stationary overflow period.
  • Burst ratio, B.
Each of these tasks depends on the preceding one and must be carried out in the specified order. Task 1 is described in this section, Tasks 2 and 3 in Section 5, and the final task in Section 6. The characteristics obtained in Tasks 1–3 not only serve as intermediate steps toward Task 4 but are also valuable as standalone performance metrics.
Lastly, note that to compute B from (2), we need not only H ¯ but also the loss probability L. This has already been computed at this stage and will be recalled in Section 7.
We now begin with the first task. Naturally, the sequential loss distribution during the first overflow period depends on the initial conditions, specifically, the initial service state and buffer occupancy. Let a i ( n , l ) be the probability that there are l packet losses during the first overflow period, given that S ( 0 ) = i and X ( 0 ) = n .
Assume first that the buffer is initially almost full, with one free position, i.e., X ( 0 ) = N 1 . We can assemble the following equation expressing a i ( N 1 , l ) :
a i ( N 1 , l ) = j = 1 M 0 f i , j ( t , 0 ) λ e λ t d t k = 1 M 0 e λ y ( λ y ) l l ! h j , k ( y ) d y + m = 1 N 2 j = 1 M 0 f i , j ( t , m ) a j ( N m , l ) λ e λ t d t + j = 1 M 0 g i , j ( t , N 1 ) a j ( 1 , l ) λ e λ t d t .
Before we can explain (6), we need to present definitions of functions f i , j ( t , m ) , g i , j ( t , m ) , and h i , j ( t ) which are present there. First, f i , j ( t , m ) denotes the probability of m packet services finished in ( 0 , t ) and the service state being j at t, given that X ( 0 ) > m and S ( 0 ) = i . Second, g i , j ( t , m ) denotes the probability of m packet services finished in ( 0 , t ) and having the service state j at the end of the m-th service, given that X ( 0 ) > m and S ( 0 ) = i . Third, h i , j ( t ) d t stands for the probability of the first service ending at ( t , t + d t ) and the service state being j just after that, given that S ( 0 ) = i .
Equation (6) can be detailed as follows. We have conditions for the time of the first arrival, t, which yields an integral involving the exponential density λ e λ t . This integral is then split into three parts, corresponding to three distinct scenarios:
  • No service completions by time t, which occurs with probability f i , j ( t , 0 ) : In this case, the arrival at time t triggers the start of the first overflow period. The packets lost after time t form the first series of losses. Clearly, the probability that this series has length l is 0 e λ y ( λ y ) l l ! h j , k ( y ) d y .
  • m services completed by time t, where m = 1 , , N 2 : In this case, no overflow occurs by time t and, just after t, the buffer occupancy is N m . Thus, counting from t, the new probability that there will be l losses during the first overflow period is then a j ( N m , l ) .
  • N 1 services completed by time t: In this scenario, the service state stops at state j when the last service is completed. The buffer occupancy is zero just before t and becomes 1 at time t due to the arriving packet. Thus, counting from t, the new probability that there will be l losses during the first overflow period is a j ( 1 , l ) .
Assume now the initial buffer occupancy n of 1 , , N 2 . In this case, the equation for a i ( n , l ) is constructed as follows:
a i ( n , l ) = m = 0 n 1 j = 1 M 0 f i , j ( t , m ) a j ( n m + 1 , l ) λ e λ t d t + j = 1 M 0 g i , j ( t , n ) a j ( 1 , l ) λ e λ t d t .
Equation (7) can be justified just like Equation (6), except for the first term of (6), which is absent in (7). The first term of (6) accounts for an overflow event occurring at time t. However, when starting with the buffer occupancy of no more than N 2 packets, an overflow upon the first arrival is not possible. Therefore, no corresponding term appears in (7).
Finally, if the buffer is vacant at the beginning, it must first reach a state where it contains exactly one packet before any overflow can occur. Moreover, the service state remains unchanged until the first arrival takes place. These considerations yield
a i ( 0 , l ) = a i ( 1 , l ) .
Denoting
F i , j ( m ) = λ 0 e λ t f i , j ( t , m ) d t ,
G i , j ( m ) = λ 0 e λ t g i , j ( t , m ) d t ,
H i , j ( m ) = 1 m ! 0 e λ t ( λ t ) m h i , j ( t ) d t
we obtain the following from (6):
a i ( N 1 , l ) = j = 1 M k = 1 M F i , j ( t , 0 ) H j , k ( l ) + m = 1 N 2 j = 1 M F i , j ( t , m ) a j ( N m , l ) + j = 1 M G i , j ( t , N 1 ) a j ( 1 , l ) ,
while obtaining the following from (7):
a i ( n , l ) = m = 0 n 1 j = 1 M F i , j ( t , m ) a j ( n m + 1 , l ) + j = 1 M G i , j ( t , n ) a j ( 1 , l ) , 0 < n < N 1 .
Vectors and matrices are applied as follows:
a ( n , l ) = [ a 1 ( n , l ) , , a M ( n , l ) ] T ,
F ( m ) = [ F i , j ( m ) ] i , j = 1 , , M ,
G ( m ) = [ G i , j ( m ) ] i , j = 1 , , M ,
H ( m ) = [ H i , j ( m ) ] i , j = 1 , , M .
Equation (12) yields
a ( N 1 , l ) = F ( 0 ) H ( l ) e + m = 1 N 2 F ( m ) a ( N m , l ) + G ( N 1 ) a ( 1 , l ) ,
while (13) gives
a ( n , l ) = m = 0 n 1 F ( m ) a ( n m + 1 , l ) + G ( n ) a ( 1 , l ) , 0 < n < N 1 .
Similarly, (8) in this notation has the form
a ( 0 , l ) = a ( 1 , l ) .
Exploiting Formula (7) of [38], from (19), we have
a ( n , l ) = R ( n ) c ( l ) + m = 1 n R ( n m ) z ( m , l ) , n > 1 ,
where
R ( 0 ) = 0 , R ( 1 ) = F 1 ( 0 ) ,
R ( m ) = R ( 1 ) ( R ( m 1 ) k = 0 m 1 F ( k + 1 ) R ( m 1 k ) ) , m > 1 ,
z ( m , l ) = F ( m ) G ( m ) ) a ( 1 , l ) ,
0 stands for the M × M matrix of 0 s and c ( l ) is a vector of length M. The substitution n = 1 in (21) produces the following relation between c ( l ) and a ( 1 , l ) :
c ( l ) = F ( 0 ) a ( 1 , l ) .
Hence, (21) can be rewritten with the help of (24) and (25) as follows:
a ( n , l ) = X ( n ) a ( 1 , l ) , n > 1 ,
where
X ( n ) = R ( n ) F ( 0 ) + m = 1 n R ( n m ) F ( m ) m = 1 n R ( n m ) G ( m ) .
Then, combining (18) with (26), we get
X ( N 1 ) a ( 1 , l ) = F ( 0 ) H ( l ) e + m = 1 N 2 F ( m ) X ( N m ) a ( 1 , l ) + G ( N 1 ) a ( 1 , l ) ,
leading to
a ( 1 , l ) = X ( N 1 ) m = 1 N 2 F ( m ) X ( N m ) G ( N 1 ) 1 F ( 0 ) H ( l ) e ,
which we know to be also equal to a ( 0 , l ) , according to (20).
This completes the derivations of a ( n , l ) for every n, which can be compiled as follows.
Theorem 1.
Sequential loss distribution in the first overflow period is
a ( n , l ) = X ( n ) ( X ( N 1 ) m = 1 N 2 F ( m ) X ( N m ) G ( N 1 ) ) 1 F ( 0 ) H ( l ) e , 1 < n < N , l 0 ,
where n is the initial buffer occupancy, while X ( n ) , F ( n ) , G ( n ) , and H ( n ) are defined in (27), (9), (10), and (11), respectively. Moreover, a ( 0 , l ) = a ( 1 , l ) is given in (29).
In Section 8, it will be shown how numerical values of F ( n ) , G ( n ) , and H ( n ) can be obtained while X ( n ) is a function of these three. Hence, Theorem 1 allows the distribution to be obtained effectively.

5. Subsequent and Stationary Series of Losses

We now derive the sequential loss distribution in the k-th overflow period, where k 2 . To do this, we must first establish the distribution of the service state at the end of the first overflow period.
Let P i , j ( n ) denote the probability of the service state being j at the end of the first overflow period, given that S ( 0 ) = i and X ( 0 ) = n .
Assume first that the buffer initially contains N 1 packets. We can assemble the following equation for P i , k ( N 1 ) :
P i , k ( N 1 ) = j = 1 M 0 f i , j ( t , 0 ) λ e λ t d t 0 h j , k ( y ) d y + m = 1 N 2 j = 1 M 0 f i , j ( t , m ) P j , k ( N m ) λ e λ t d t + j = 1 M 0 g i , j ( t , N 1 ) P j , k ( 1 ) λ e λ t d t .
This equation is established in the same way as (6) (see the explanation below (6)). If the buffer initially has n = 1 , , N 2 packets, then we have
P i , k ( n ) = m = 0 n 1 j = 1 M 0 f i , j ( t , m ) P j , k ( n m + 1 ) λ e λ t d t + j = 1 M 0 g i , j ( t , n ) P j , k ( 1 ) λ e λ t d t ,
which is justified like (7). Then, we have
P i , k ( 0 ) = P i , k ( 1 ) ,
(see the explanation below (Section 8)). Denoting
P ( n ) = [ P i , j ( n ) ] i , j = 1 , , M ,
E i , j = 0 h i , j ( t ) d t ,
E = [ E i , j ] i , j = 1 , , M ,
System (31)–(33) is equivalent to
P ( N 1 ) = F ( 0 ) E + m = 1 N 2 F ( m ) P ( N m ) + G ( N 1 ) P ( 1 ) .
P ( n ) = m = 0 n 1 F ( m ) P ( n m + 1 ) + G ( n ) P ( 1 ) , 0 < n < N 1 ,
P ( 0 ) = P ( 1 ) .
It is noticeable that system (37)–(39) has exactly the same composition as system (18)–(20). Hence, it can be solved likewise. Consequently, we obtain
P ( n ) = X ( n ) X ( N 1 ) m = 1 N 2 F ( m ) X ( N m ) G ( N 1 ) 1 F ( 0 ) E , 1 < n < N ,
which is an analog of (30), and
P ( 0 ) = P ( 1 ) = X ( N 1 ) m = 1 N 2 F ( m ) X ( N m ) G ( N 1 ) 1 F ( 0 ) E ,
which is an analog of (29).
Now, consider a sequence α 0 , α 1 , …, where α 0 is the initial service state, i.e., α 0 = S ( 0 ) , and α k for k 1 is the service state just after the k-th overflow period. The sequence α k forms a Markov chain, since the distribution of α k depends only on α k 1 and not on α k 2 , α k 3 , etc.
Clearly, the transition α 0 α 1 is governed by the transition matrix P ( n ) , as given in either (40) or (41), depending on whether n = X ( 0 ) > 1 or n 1 , respectively. The transition α k 1 α k for k 2 is always governed by the transition matrix P ( N 1 ) given in (40) since, immediately after an overflow period, the buffer always contains N 1 packets.
Consequently, the transition of the service state from the time origin to the end of the k-th overflow period for k 1 is covered by the matrix
P ( n ) P k 1 ( N 1 ) .
Let a i k ( n , l ) be the probability that there are l packet losses during the k-th overflow period, given that S ( 0 ) = i , X ( 0 ) = n , and denote
a k ( n , l ) = [ a 1 k ( n , l ) , , a M k ( n , l ) ] T .
To obtain a i k ( n , l ) , k 2 , we consider the fact that at end of the ( k 1 ) th overflow period, the buffer occupancy is N 1 , while the service state can be obtained using transition matrix P ( n ) P k 2 ( N 1 ) .
These considerations can be recapped as follows.
Theorem 2.
Sequential loss distribution in the k-th overflow period, k 2 , is:
a k ( n , l ) = P ( n ) P k 2 ( N 1 ) a ( N 1 , l ) , 0 n < N , l 0 ,
where n is the initial buffer occupancy, P ( n ) is given in (40) and (41), while a ( N 1 , l ) in (30).
Denote now:
a ( l ) = lim k a k ( 0 , l ) .
Namely, a ( l ) denotes the stationary probability that there are l packet losses during an overflow period. Clearly, the initial buffer occupancy of 0 used in (45) is irrelevant—any value can be used without affecting a ( l ) .
As k , the Markov chain α k reaches its stationary distribution. In other words, the distribution of the service state at the end of an overflow period will be given by the vector p, which is a stationary distribution vector of the matrix P ( N 1 ) . It can be found by solving the well-known system
p P ( N 1 ) = p , p e = 1 .
From this, we get the final result of this section.
Theorem 3.
Sequential loss distribution in the stationary overflow period is
a ( l ) = p a ( N 1 , l ) , l 0 ,
where p stands for the stationary vector for matrix P ( N 1 ) , given in (40), while a ( N 1 , l ) is obtained in (30).

6. Burst Ratio

We are now prepared to obtain the burst ratio by means of Formula (2).
Note first that H ¯ , defined as the mean number of sequential losses, cannot be computed directly as the mean of the distribution a ( l ) given in Theorem 3. This is because in some overflow periods, no loss may happen at all. Certainly, every series of losses occurs within a particular overflow period, but not every overflow period results in a series of losses.
To account for this, we may calculate the probability of no packet losses in a stationary overflow period. According to Theorem 3, this probability is p a ( N 1 , 0 ) . Therefore, the probability of forming a proper sequence—i.e., with non-zero losses—within a stationary overflow period is 1 p a ( N 1 , 0 ) . Thus, we have
H ¯ = l = 1 l p a ( N 1 , l ) 1 p a ( N 1 , 0 ) .
By gathering the above formula together with all previous results, we obtain the final theorem.
Theorem 4.
The burst ratio of losses at a buffer with correlated MSP service is
B = l = 1 l p a ( N 1 , l ) 1 p a ( N 1 , 0 ) ( 1 L ) ,
where
a ( N 1 , l ) = X ( N 1 ) F ( 0 ) H ( l ) e X ( N 1 ) m = 1 N 2 F ( m ) X ( N m ) G ( N 1 ) 1 ,
L is the packet loss probability; p stands for the stationary vector for matrix P ( N 1 ) :
P ( N 1 ) = X ( N 1 ) F ( 0 ) E X ( N 1 ) m = 1 N 2 F ( m ) X ( N m ) G ( N 1 ) 1 ,
while X ( n ) , F ( n ) , G ( n ) , H ( n ) , and E are given in (27), (9), (10), (11), and (35), respectively.
Effective numerical calculation of B therefore requires computing F ( n ) , G ( n ) , H ( n ) , E, and L (note that X ( n ) is a function of F ( n ) and G ( n ) ). In the next section, we will show how all these characteristics can be computed efficiently.

7. Computational Aspects

A formula for the loss probability in the model of interest, needed in (48), is found in [31], page 11. Namely, it holds
L = lim s 0 + λ 1 s U ( s ) A ( 0 , s ) e ,
where
A ( m , s ) = λ 0 e ( s + λ ) t f i , j ( m , t ) d t i , j = 1 , , M ,
U ( s ) = W ( N , s ) D ( N , s ) A ( 0 , s ) W ( N , s ) m = 1 N 1 A ( m , s ) W ( N m + 1 , s ) 1 ,
W ( m , s ) = Q ( m , s ) A ( 0 , s ) + k = 1 m Q ( m k , s ) A ( k , s ) D ( k , s ) ,
D ( m , s ) = λ 0 e ( s + λ ) t g i , j ( m , t ) d u i , j = 1 , , M ,
Q ( 0 , s ) = 0 , Q ( 1 , s ) = A 1 ( 0 , s ) ,
Q ( m + 1 , s ) = Q ( 1 , s ) ( Q ( m , s ) i = 0 m A ( i + 1 , s ) Q ( m i , s ) ) , m > 0 .
Therefore, L can be calculated numerically using a very small s in (51), e.g., s = 10 8 , but calculations of A ( m , s ) and D ( m , s ) are required first.
A ( m , s ) can be determined using the uniformization technique (see, e.g., [37], p. 66, for details), while D ( m , s ) can be determined using Formulas (40)–(42) of [31]. Applying all of these, we obtain
A ( m , s ) = λ k = 0 θ k ( λ + s + θ ) k + 1 K ( m , k ) ,
where
θ = max i = 1 , , M { L 0 ( i , i ) } ,
K ( 0 , 0 ) = I , K ( m , 0 ) = 0 , m 1 ,
K ( 0 , k + 1 ) = K ( 0 , k ) ( I + L 0 / θ ) ,
K ( m , k + 1 ) = K ( m 1 , k ) L 1 / θ + K ( m , k ) ( I + L 0 / θ ) ,
I is the identity matrix, and
D ( m , s ) = 1 λ A ( m 1 , s ) L 1 s H ( m , s ) ,
H ( 1 , s ) = 1 λ A ( 0 , s ) L 0 1 L 1 1 λ + s L 0 1 L 1 ,
H ( m + 1 , s ) = 1 λ A ( m , s ) L 0 1 L 1 H ( m , s ) L 0 1 L 1 , m > 0 .
Having A ( m , s ) and D ( m , s ) , we can compute not only L, using (51), but also F ( m ) and G ( m ) , following the obvious relations:
F ( m ) = A ( m , 0 ) , G ( m ) = D ( m , 0 ) .
Therefore, what remains is to calculate H ( m ) and E. A formula for E is well known:
E = ( L 0 ) 1 L 1 ,
(see [37], p. 68), whereas H ( m ) can be determined using the uniformization technique once more. Specifically, we have
H ( m ) = λ m m ! k = 0 θ k ( k + m ) ! k ! ( λ + θ ) m + k + 1 K ( 0 , k ) L 1 .

8. Examples

8.1. Impact of Traffic Intensity and Buffer Size

We will first use a moderately strong positive correlation of packet sizes (service times), with a correlation coefficient of 0.4. The following MSP matrices produce such a correlation:
L 0 + = 0.964135 0.921707 0.007896 0.118844 0.635838 0.014067 0.004706 0.001578 1.961343 ,
L 1 + = 0.005524 0.017211 0.011797 0.492461 0.005493 0.004973 0.019695 0.000944 1.934420 .
The service rate for matrices (69) and (70) is normalized to 1 packet per time unit. The arrival rate is varied from λ = 0.5 to λ = 2 packets per time unit, representing a range from very light to very heavy traffic. A summary of all system settings described in this subsection is shown in Table 1.
In Figure 2, the effect of traffic intensity on the burst ratio is presented for six buffer sizes: N = 3 , 5, 10, 20, 50, and 100 packets.
We observe that all values of B are very high, ranging from about 1.8 up to 3.2. This indicates that the mean series of packet losses is 2–3 times longer than it would be in the case of independent losses. Such loss clustering may have a significant impact on many applications, as was explained in Section 1 and will be further illustrated in Section 8.4.
Intuitively, loss clustering can be explained as follows. The buffering mechanism causes loss clustering because losses can occur only in continuous time intervals, i.e., during buffer overflow periods. During an overflow period, all arriving packets are lost consecutively, forming a sequence of losses. In other words, when a particular packet is lost at time t l , this means that the buffer is full at t l and will remain full after t l for at least some time. Therefore, it is likely that the next packet arriving after t l will also be lost.
This effect is further strengthened by the correlation of packet sizes. Specifically, the correlation makes it more likely that a sequence of longer-than-average service times occurs. A sequence like this has two possible consequences. First, it quickly increases the buffer occupancy, raising the risk of buffer overflow. Second, if an overflow does occur, the overflow period is exceptionally long because its duration equals an exceptionally long service time.
In summary, the high burst ratio is due to two factors: the buffering mechanism itself (which would increase B even without correlation) and the correlation of packet sizes. The separate influence of these two factors will be demonstrated later.
In Figure 2, we see the burst ratio changing in a non-monotonic manner with traffic intensity. Specifically, it reaches a maximum at a certain intensity, and the position of this maximum is conditioned by the buffer size. For a very small buffer, the maximum occurs near an intensity of 1 (slightly more than 1). Then, as the buffer grows, it gets closer to 1.5. Then, when the buffer grows even more, the maximum returns to a position near 1 again.
The existence of such a maximum can be understood by considering two extreme cases: λ and λ 0 + . In the former case, both H ¯ and K ¯ are large, but similar, due to the fact that the loss probability is very high (most packets are lost). In the latter case, losses are extremely rare, and both H ¯ and K ¯ are small. Somewhere between these two extremes, a maximum can be expected. However, it is difficult to explain intuitively why this maximum occurs at a specific position, e.g., at λ = 1.3 , for a specific system parameterization. Such a specific position is a consequence of the interplay between various system parameters, each having possibly a different influence on B.
In Figure 3, the dependence of B on buffer size is depicted for five traffic intensities: 0.5, 0.75, 1, 1.5, and 2. We observe the burst ratio increasing with buffer size in every case. Furthermore, for both low and high traffic intensities, the burst ratio approaches its maximum relatively quickly. For example, when λ = 0.5 , it does not change significantly beyond a buffer size of 40 packets. Similarly, when λ = 2.0 , it stabilizes at a buffer size as small as 30 packets. However, when λ is close to 1, the burst ratio continues to grow even beyond N = 100 .
As is evident in Figure 2 and Figure 3, a very small buffer results in a low burst ratio. This can be explained as follows. The burst ratio, as defined in (1), accounts for the extra clustering tendency, additional to the pure random formation of loss sequences. For this reason, there is a denominator in (1). When the buffer is very small, the loss probability is high, and there are many losses. Apparently, in this case, the purely random formation of loss sequences prevails, i.e., the value of B is low because of the high denominator in (1).
The combined impact of buffer size and traffic intensity on B is shown in Figure 4 for N = 5 , , 100 and λ [ 0.5 , 2 ] . We can observe how the maximum shifts as the buffer size increases.

8.2. Impact of Negative Correlation

In the next batch of examples, we apply a correlation of the same magnitude but with the opposite sign. The following MSP matrices yield a negative correlation of −0.4, while preserving the service rate of 1:
L 0 = 1.468954 1.400560 0.013478 0.040341 0.858689 0.023735 0.638451 0.012277 22.86338 ,
L 1 = 0.010037 0.028383 0.016496 0.008620 0.009706 0.776287 21.97520 0.013028 0.224424 .
A summary of all system settings described in this subsection is shown in Table 2.
In Figure 5, the impact of traffic intensity on B is shown for six buffer sizes: N = 3 , 5, 10, 20, 50, and 100 packets.
We observe that in the case of a negative correlation, the burst ratio values remain high—ranging from 1.5 to 2.4—but are noticeably lower than those in Figure 2. Once again, the burst ratio is a non-monotonic function of traffic intensity; however, in this case, the maximum is consistently located near λ = 1 for all buffer sizes considered.
In Figure 6, the impact of buffer size on B is shown for five traffic intensities: 0.5, 0.75, 1, 1.5, and 2. In every setting, the burst ratio increases with buffer size, but it now stabilizes much more quickly than in the positive correlation setting. Specifically, for all the considered cases, except λ = 1 , a buffer size as small as 15 packets is sufficient for the burst ratio to reach full saturation. In the case of λ = 1 , convergence is slower, but still significantly faster than what is observed in Figure 3.
In Figure 7, the combined influence of buffer size and traffic intensity on the burst ratio is represented for N = 5 , , 100 and λ [ 0.5 , 2 ] . Figure 7 ought to be contrasted with Figure 4, obtained for a positive correlation of packet sizes.

8.3. Impact of Correlation Strength

So far, we have considered a fixed correlation of service times. In this subsection, we will examine how correlations of varying strength influence the burst ratio. To accomplish this, we will use nine parameterizations of service times, with correlations of −0.4, −0.3, −0.2, −0.1, 0, 0.1, 0.2, 0.3, and 0.4.
The correlation of −0.4 is obtained using matrices (71) and (72). The correlation of −0.3 is obtained using matrices
L 0 = 1.125 ( L 0 + L 1 ) L 1 , L 1 = L 1 ,
where L 0 and L 1 are given in (71) and (72), respectively. The correlation of −0.2 is procured using matrices
L 0 = 1.33 ( L 0 + L 1 ) L 1 , L 1 = L 1 .
The correlation of −0.1 is obtained using matrices
L 0 = 1.78 ( L 0 + L 1 ) L 1 , L 1 = L 1 ,
The correlation of 0 is achieved using i.i.d. service times, exponentially distributed with μ = 1 . The correlation of 0.1 is obtained using matrices
L 0 = 18.35 ( L 0 + + L 1 + ) L 1 + , L 1 = L 1 + ,
where L 0 + and L 1 + are given in (69) and (70), respectively. The correlation of 0.2 is accomplished using matrices
L 0 = 6.88 ( L 0 + + L 1 + ) L 1 + , L 1 = L 1 + .
The correlation of 0.3 is obtained using matrices
L 0 = 2.49 ( L 0 + + L 1 + ) L 1 + , L 1 = L 1 + .
Finally, the correlation of 0.4 is obtained using unaltered matrices (69) and (70).
A summary of all system settings described in this subsection is shown in Table 3.
In Figure 8, the dependence of B on traffic intensity is depicted for the nine considered correlations and a fixed buffer size of 100. Similarly, in Figure 9, the burst ratio versus buffer size is presented for the same nine correlation values, with a fixed traffic intensity of 1.
As we observe in Figure 8 and Figure 9, the dependence of B on the strength and sign of the correlation is complex. First of all, the smallest B is always achieved for zero correlation. A negative correlation induces a higher B than no correlation at all—compare the blue lines with the black line in Figure 8 and Figure 9. Second, positive correlations result in higher burst ratios than their negative counterparts—compare the red lines with the blue lines in Figure 8 and Figure 9. Third, the burst ratio generally increases with the strength of the correlation, whether positive or negative. Namely, B is higher for c o r r = 0.2 than for c o r r = 0.1 and, similarly, higher for c o r r = 0.2 than for c o r r = 0.1 . However, when the correlation is strong, the burst ratio also depends heavily on λ and N. Therefore, for low λ or low N, a correlation of 0.3 can produce a higher burst ratio than a correlation of 0.4.
Finally, by comparing the red and blue lines with the black one in Figure 8 and Figure 9, we can assess the impact of correlation on B, separated from the impact of the buffering mechanism itself. Specifically, the buffering mechanism alone can cause the burst ratio to rise up to 1.9, even in the absence of a correlation (see the black line in Figure 8). A negative correlation can increase it further, up to 2.3 (top blue line), while a positive correlation pushes it even higher, up to 3.3 (top red line).

8.4. Concrete Problem Solutions

Now, we can demonstrate how the obtained theoretical results can be used to solve concrete engineering problems.
Assume, for instance, that a sensor node is monitoring a system or device. The monitoring data is transmitted in packets. A critical system error occurs when 10 packets of monitoring data are missing in a row.
Problem 1. Compute the probability that a critical error occurs within a week of system operation. Assume buffer size N = 50 , λ = 0.5 , and the correlation structure as in (69), (70).
Problem 2. What buffer size is needed to make the probability of a critical error occurring less than 0.001?
Problem 1 solution. From (51), we can obtain the overall packet loss probability for N = 50 . We have
L = 0.003283 .
Given such a loss probability, one might naively deduce that it is very unlikely to lose 10 packets in a row because 0 . 003283 10 is an extremely small number (on the order of 10 25 ). As we will see, this conclusion is completely wrong. To find the correct solution, we first compute the burst ratio from Theorem 4. We have
B = 2.215300 .
Then, we obtain the average length of the series of losses:
H ¯ = B / ( 1 L ) = 2.222596 .
Using Theorem 3, we calculate the probability that an arbitrary series of losses has a length less than 10:
p ˜ 10 = l = 1 9 a ( l ) 1 a ( 0 ) = l = 1 9 p a ( 49 , l ) 1 p a ( 49 , l ) = 0.995948 .
Within a week, the node sends, on average, 302,400 packets with monitoring data, out of which 993 packets are lost. Therefore, we can expect the following number of separate series of losses within a week:
993 / H ¯ 447 .
The probability that at least one of these series of losses consists of 10 or more packets is then
P ( critical   error ) 1 p ˜ 10 447 = 0.837 .
As we can see, it is very likely to have a critical system error within a week, with a probability exceeding 0.8.
Problem 2 solution. To solve this problem, we can simply increase N and repeat all the calculations as long as is necessary, i.e., until the probability of the critical error occurring goes below 0.001. In Figure 10, we can see the full dependence of the critical error probability on the buffer size, up to N = 160 . Specifically, for N > 154 , we have P ( critical   error ) < 0.001 , which completes the solution of the second problem.
Naturally, the solutions to the problems presented above depend on matrices (69) and (70), which here constitute only one selected example. What is crucial is that there are well-known methods to fit these matrices precisely to any packet size correlation structure and packet size distribution. These methods are described in detail in Section 5 of the excellent monograph in [39]. In Section 7 of the same monograph, the reader can find recommended software tools to automate the fitting process. Therefore, the problems in this section can be solved for streams of packets with arbitrary size distributions and correlations.

8.5. Verification via Simulations

Theoretical results were also verified through simulations performed in the OMNeT++ network simulator [40], version 5.6. The simulation granularity was set to 10 9 , i.e., the setting simtime-scale = −9 was used in the OMNeT++ configuration file. The buffer model presented in Section 3 was implemented manually, without the use of any specialized libraries, except for the general OMNeT++ libraries.
Twelve simulation scenarios were conducted, featuring various combinations of traffic intensity, buffer size, and correlation type. In each scenario, 50 × 10 6 packets were processed by the buffer, and the resulting burst ratio was measured and compared with its theoretical counterpart.
The results are summarized in Table 4. As we see, there is excellent agreement between the simulated values and their theoretical counterparts in every scenario.

9. Conclusions

We studied the effect of the correlation of packet sizes (service times) on the packet loss clustering, when the losses are caused by overflows of a FIFO buffer. Specifically, we established formulae for the sequential losses distribution in the first, k-th, and stationary overflow periods, using a model that allows for arbitrarily strong correlation (MSP). Based on these results, we derived the final formula for the burst ratio. All computational aspects were addressed, making the formulae fully applicable.
The mathematical results were then exploited in numeric examples, showing the effects of packet size correlation, buffer size, and traffic intensity on the burst ratio. Several noteworthy observations were made. Most importantly, we found that a positive correlation of service times significantly increased the burst ratio compared to the uncorrelated case across all scenarios, regardless of buffer size or traffic intensity. A negative correlation also increased the burst ratio, but to a lesser extent than a positive correlation.
We also observed that the burst ratio varies non-monotonically with traffic intensity, exhibiting a clear maximum. In the case of a positive correlation, the location of this maximum depends on the buffer size. Specifically, for very small buffers, the maximum occurs near a traffic intensity of 1. As the buffer grows, it gets closer to 1.5. Then, when the buffer grows even more, the maximum returns to a position near 1. This effect does not appear in negative or uncorrelated cases, where the maximum consistently occurs near a traffic intensity of 1, regardless of buffer size.
The burst ratio increases monotonically with buffer size, regardless of traffic intensity and correlation type. In most scenarios, it saturates quickly, reaching a maximum value at relatively small buffer sizes, after which, further increases in buffer size have no effect. This convergence is significantly slower, however, in scenarios with a positive service time correlation and a traffic intensity of 1.
In addition to these numeric calculations, we presented two examples of concrete engineering problems related to loss clustering and the burst ratio. The problems were then solved using two main theoretical results of this paper, i.e., Theorems 3 and 4.
The limitations of this study are twofold. Firstly, we considered only one particular buffer policy, namely, the FIFO policy with tail dropping. This policy is commonly used in networking devices of all types, but it is not the only existing approach. For instance, many active buffer management policies have been proposed for various devices and networks. Since the burst ratio strongly depends on the packet discarding policy, the results of this paper are not applicable to any of the active management policies.
The second limitation of this study is related to the fact that, in addition to packet service times, packet interarrival times can also be correlated in real networks. This effect is not taken into account in the model considered here, although it can certainly affect the burst ratio. Therefore, the results of this paper are applicable to traffic with uncorrelated or only weakly correlated interarrival times. For moderate or strong correlations of interarrival times, the model would likely produce significant errors.
These limitations clearly suggest two directions for future research. First, the burst ratio under buffer policies other than FIFO with tail dropping can be investigated. A promising starting point could be a RED-type active buffer management policy. Second, the burst ratio could be studied in a model incorporating both interarrival time correlations and service time correlations. A natural candidate for modeling correlated interarrival times would be the Markovian Arrival Process (MAP), in the addition to the Markovian Service Process (MSP) used here.

Author Contributions

Conceptualization, A.C.; methodology, A.C.; software, A.C.; validation, A.C. and B.A.; formal analysis, A.C. and B.A.; investigation, A.C. and B.A.; writing—original draft preparation, A.C.; writing—review and editing, A.C. and B.A.; visualization, A.C.; supervision, A.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Majeed, U.; Malik, A.N.; Abbas, N.; Alfakeeh, A.S.; Javed, M.A.; Abbass, W. Buffer Occupancy-Based Congestion Control Protocol for Wireless Multimedia Sensor Networks. Electronics 2024, 13, 4454. [Google Scholar] [CrossRef]
  2. Söderman, P.; Grinnemo, K.J.; Hidell, M.; Sjödin, P. A comparative analysis of buffer management algorithms for delay tolerant wireless sensor networks. IEEE Sens. J. 2021, 21, 9612–9619. [Google Scholar] [CrossRef]
  3. Sumathi, K.; Pandiaraja, P. Dynamic alternate buffer switching and congestion control in wireless multimedia sensor networks. Peer-to-Peer Netw. Appl. 2020, 13, 2001–2010. [Google Scholar] [CrossRef]
  4. Jayarajan, P.; Kanagachidambaresan, G.R.; Sundararajan, T.V.P.; Sakthipandi, K.; Maheswar, R.; Karthikeyan, A. An energy-aware buffer management (EABM) routing protocol for WSN. J. Supercomput. 2020, 76, 4543–4555. [Google Scholar] [CrossRef]
  5. Aygör, D.; Rehman, S.U.; Celebi, F.V. Impact of buffer management solutions on MAC Layer Performance in Wireless Sensor Networks. IEICE Trans. Commun. 2018, 101, 2058–2068. [Google Scholar] [CrossRef]
  6. Rabileh, A.A.; Bakar, K.A.; Mohamed, R.R.; Mohamad, M.A. Enhanced buffer management policy and packet prioritization for wireless sensor network. Int. J. Adv. Sci. Eng. Inf. Technol. 2018, 8, 1770–1776. [Google Scholar] [CrossRef]
  7. Pathak, A.A.; Deshpande, V.S. Buffer management for improving QoS in WSN. In Proceedings of the International Conference on Pervasive Computing (ICPC), Pune, India, 8–10 January 2015; pp. 1–4. [Google Scholar]
  8. Yajnik, M.; Moon, S.; Kurose, J.; Towsley, D. Measurement and modelling of the temporal dependence in packet loss. In Proceedings of the IEEE INFOCOM, New York, NY, USA, 21–25 March 1999; Volume 1, pp. 345–352. [Google Scholar]
  9. Sanneck, H.A.; Carle, G. Framework model for packet loss metrics based on loss runlengths. In Proceedings of the SPIE 3969, Multimedia Computing and Networking, San Jose, CA, USA, 24–26 January 2000; pp. 1–11. [Google Scholar]
  10. Hasslinger, G.; Hohlfeld, O. The Gilbert-Elliott model for packet loss in real time services on the Internet. In Proceedings of the Measuring, Modelling and Evaluation of Computer and Communication Systems Conference, Dortmund, Germany, 31 March–2 April 2008; pp. 1–15. [Google Scholar]
  11. Chydzinski, A.; Adamczyk, B. Transient and stationary losses in a finite-buffer queue with batch arrivals. Math. Probl. Eng. 2012, 2012, 326830. [Google Scholar] [CrossRef]
  12. McGowan, J.W. Burst Ratio: A Measure of Bursty Loss on Packet-Based Networks. U.S. Patent 6,931,017, 16 August 2005. [Google Scholar]
  13. Rachwalski, J.; Papir, Z. Burst Ratio in Concatenated Markov-based Channels. J. Telecommun. Inf. Technol. 2014, 3–9. [Google Scholar] [CrossRef]
  14. Rachwalski, J.; Papir, Z. Analysis of Burst Ratio in Concatenated Channels. J. Telecommun. Inf. Technol. 2015, 62, 65–73. [Google Scholar] [CrossRef]
  15. ITU-T Recommendation G.113: Transmission Impairments Due to Speech Processing. Technical Report. 2007. Available online: https://www.itu.int/rec/t-rec-g.113 (accessed on 25 June 2025).
  16. ITU-T Recommendation G.107: The E-Model, a Computational Model for Use in Transmission Planning. Technical Report. 2014. Available online: https://www.itu.int/rec/T-REC-G.107 (accessed on 25 June 2025).
  17. Chydzinski, A.; Samociuk, D.; Adamczyk, B. Burst ratio in the finite-buffer queue with batch Poisson arrivals. Appl. Math. Comput. 2018, 330, 225–238. [Google Scholar] [CrossRef]
  18. Chydzinski, A. Duration of the buffer overflow period in a batch arrival queue. Perform. Eval. 2006, 63, 493–508. [Google Scholar] [CrossRef]
  19. Bocharov, P.P.; D’Apice, C.; Pechinkin, A.V.; Salerno, S. The stationary characteristics of the G/MSP/1/r queueing system. Autom. Remote Control 2003, 64, 288–301. [Google Scholar] [CrossRef]
  20. Gupta, U.C.; Banik, A.D. Complete analysis of finite and infinite buffer GI/MSP/1 queue—A computational approach. Oper. Res. Lett. 2007, 35, 273–280. [Google Scholar] [CrossRef]
  21. Kim, J.; Kim, B. Asymptotic analysis for loss probability of queues with finite GI/M/1 type structure. Queueing Syst. 2007, 57, 47–55. [Google Scholar] [CrossRef]
  22. Banik, A.D.; Gupta, U.C. Analyzing the finite buffer batch arrival queue under Markovian service process: GIX/MSP/1/N. Top 2007, 15, 146–160. [Google Scholar] [CrossRef]
  23. Banik, A.D. Analyzing state-dependent arrival in GI/BMSP/1/ queues. Math. Comput. Model. 2011, 53, 1229–1246. [Google Scholar] [CrossRef]
  24. Chaudhry, M.L.; Samanta, S.K.; Pacheco, A. Analytically explicit results for the GI/C-MSP/1/ queueing system using roots. Probab. Eng. Informational Sci. 2012, 26, 221–244. [Google Scholar] [CrossRef]
  25. Samanta, S.K. Sojourn-time distribution of the GI/MSP/1 queueing system. Opsearch 2015, 52, 756–770. [Google Scholar] [CrossRef]
  26. Chaudhry, M.L.; Banik, A.D.; Pacheco, A. A simple analysis of the batch arrival queue with infinite-buffer and Markovian service process using roots method: GIX/C-MSP/1/. Ann. Oper. Res. 2017, 252, 135–173. [Google Scholar] [CrossRef]
  27. Banik, A.D.; Chaudhry, M.L.; Kim, J.J. A Note on the Waiting-Time Distribution in an Infinite-Buffer GI[X]/C-MSP/1 Queueing System. J. Probab. Stat. 2018, 2018, 7462439. [Google Scholar] [CrossRef]
  28. Banik, A.D.; Ghosh, S.; Chaudhry, M.L. On the consecutive customer loss probabilities in a finite-buffer renewal batch input queue with different batch acceptance/rejection strategies under non-renewal service. In Soft Computing for Problem Solving: SocProS 2017; Springer: Singapore, 2019; Volume 1, pp. 45–62. [Google Scholar]
  29. Banik, A.D.; Ghosh, S.; Chaudhry, M.L. On the optimal control of loss probability and profit in a GI/C-BMSP/1/N queueing system. Opsearch 2020, 57, 144–162. [Google Scholar] [CrossRef]
  30. Samanta, S.K.; Bank, B. Modelling and Analysis of GI/BMSP/1 Queueing System. Bull. Malays. Math. Sci. Soc. 2021, 44, 3777–3807. [Google Scholar] [CrossRef]
  31. Chydzinski, A. Throughput of Buffer with Dependent Service Times. Appl. Syst. Innov. 2025, 8, 34. [Google Scholar] [CrossRef]
  32. de Morais, W.G.; Santos, C.E.M.; Pedroso, C.M. Application of active queue management for real-time adaptive video streaming. Telecommun. Syst. 2022, 79, 261–270. [Google Scholar] [CrossRef]
  33. Giménez, A.; Murcia, M.A.; Amigó, J.M.; Martínez-Bonastre, O.; Valero, J. New RED-Type TCP-AQM Algorithms Based on Beta Distribution Drop Functions. Appl. Sci. 2022, 12, 11176. [Google Scholar] [CrossRef]
  34. Li, Z.; Hu, Y.; Tian, L.; Lv, Z. Packet rank-aware active queue management for programmable flow scheduling. Comput. Netw. 2023, 225, 109632. [Google Scholar] [CrossRef]
  35. Lhamo, O.; Ma, M.; Doan, T.V.; Scheinert, T.; Nguyen, G.T.; Reisslein, M.; Fitzek, F.H.P. RED-SP-CoDel: Random early detection with static priority scheduling and controlled delay AQM in programmable data planes. Comput. Commun. 2024, 214, 149–166. [Google Scholar] [CrossRef]
  36. Song, T.; Kyung, Y. Deep-Reinforcement-Learning-Based Age-of-Information-Aware Low-Power Active Queue Management for IoT Sensor Networks. IEEE Internet Things J. 2024, 11, 16700–16709. [Google Scholar] [CrossRef]
  37. Dudin, A.N.; Klimenok, V.I.; Vishnevsky, V.M. The Theory of Queuing Systems with Correlated Flows; Springer: Cham, Switzerland, 2020. [Google Scholar]
  38. Chydzinski, A. Time to reach buffer capacity in a BMAP queue. Stoch. Model. 2007, 23, 195–209. [Google Scholar] [CrossRef]
  39. Buchholz, P.; Kriege, J.; Felko, I. Input Modeling with Phase-Type Distributions and Markov Models: Theory and Applications; Springer: Berlin/Heidelberg, Germany, 2014. [Google Scholar]
  40. Available online: https://omnetpp.org/ (accessed on 25 June 2025).
Figure 1. Packet buffer in an output interface of a networking device.
Figure 1. Packet buffer in an output interface of a networking device.
Jsan 14 00084 g001
Figure 2. Burst ratio parameter versus traffic intensity for a positive correlation of 0.4 and various buffer sizes, from 3 to 100.
Figure 2. Burst ratio parameter versus traffic intensity for a positive correlation of 0.4 and various buffer sizes, from 3 to 100.
Jsan 14 00084 g002
Figure 3. Burst ratio parameter versus buffer size for a positive correlation of 0.4 and various traffic intensities.
Figure 3. Burst ratio parameter versus buffer size for a positive correlation of 0.4 and various traffic intensities.
Jsan 14 00084 g003
Figure 4. Burst ratio parameter versus traffic intensity and buffer size for a positive correlation of 0.4.
Figure 4. Burst ratio parameter versus traffic intensity and buffer size for a positive correlation of 0.4.
Jsan 14 00084 g004
Figure 5. Burst ratio parameter versus traffic intensity for a negative correlation of −0.4 and various buffer sizes, from 3 to 100.
Figure 5. Burst ratio parameter versus traffic intensity for a negative correlation of −0.4 and various buffer sizes, from 3 to 100.
Jsan 14 00084 g005
Figure 6. Burst ratio parameter versus buffer size for a negative correlation of −0.4 and various traffic intensities.
Figure 6. Burst ratio parameter versus buffer size for a negative correlation of −0.4 and various traffic intensities.
Jsan 14 00084 g006
Figure 7. Burst ratio parameter versus traffic intensity and buffer size for a negative correlation of −0.4.
Figure 7. Burst ratio parameter versus traffic intensity and buffer size for a negative correlation of −0.4.
Jsan 14 00084 g007
Figure 8. Burst ratio parameter versus traffic intensity for 9 different correlations of service times. N = 100 in every case.
Figure 8. Burst ratio parameter versus traffic intensity for 9 different correlations of service times. N = 100 in every case.
Jsan 14 00084 g008
Figure 9. Burst ratio parameter versus buffer size for 9 different correlations of service times. λ = 1 in every setting.
Figure 9. Burst ratio parameter versus buffer size for 9 different correlations of service times. λ = 1 in every setting.
Jsan 14 00084 g009
Figure 10. Critical error probability versus buffer size.
Figure 10. Critical error probability versus buffer size.
Jsan 14 00084 g010
Table 1. System settings described in Section 8.1.
Table 1. System settings described in Section 8.1.
ParameterValue
service times matrices(69) and (70)
correlation of service times, c o r r 0.4
service rate, μ 1
buffer size, Nvariable, from 2 to 100
arrival rate, λ variable, from 0.5 to 2
Table 2. System settings described in Section 8.2.
Table 2. System settings described in Section 8.2.
ParameterValue
service times matrices(71) and (72)
correlation of service times, c o r r −0.4
service rate, μ 1
buffer size, Nvariable, from 2 to 100
arrival rate, λ variable, from 0.5 to 2
Table 3. System settings described in Section 8.3.
Table 3. System settings described in Section 8.3.
ParameterValue
service times matrices(71) and (72), (73), (74), (75), (76), (77), (78), (69) and (70)
correlation of service times, c o r r variable, from −0.4 to 0.4
service rate, μ 1
buffer size, Nvariable, from 2 to 100
arrival rate, λ variable, from 0.5 to 2
Table 4. Theoretical and simulated B for various combinations of λ , N, and service correlation.
Table 4. Theoretical and simulated B for various combinations of λ , N, and service correlation.
ScenarioTheoreticalSimulated
ParametersBurst RatioBurst Ratio
λ = 0.75 , N = 20 , positive correlation (69), (70)2.5142.514
λ = 1.0 , N = 20 , positive correlation (69), (70)2.7402.740
λ = 1.5 , N = 20 , positive correlation (69), (70)2.9142.912
λ = 0.75 , N = 100 , positive correlation (69), (70)2.8082.809
λ = 1.0 , N = 100 , positive correlation (69), (70)3.1453.140
λ = 1.5 , N = 100 , positive correlation (69), (70)3.1013.099
λ = 1.0 , N = 10 , negative correlation (71), (72)2.1502.149
λ = 1.5 , N = 10 , negative correlation (71), (72)2.0742.074
λ = 2.0 , N = 10 , negative correlation (71), (72)1.9551.956
λ = 1.0 , N = 50 , negative correlation (71), (72)2.3322.333
λ = 1.5 , N = 50 , negative correlation (71), (72)2.0902.089
λ = 2.0 , N = 50 , negative correlation (71), (72)1.9571.957
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chydzinski, A.; Adamczyk, B. Loss Clustering at MSP Buffer. J. Sens. Actuator Netw. 2025, 14, 84. https://doi.org/10.3390/jsan14040084

AMA Style

Chydzinski A, Adamczyk B. Loss Clustering at MSP Buffer. Journal of Sensor and Actuator Networks. 2025; 14(4):84. https://doi.org/10.3390/jsan14040084

Chicago/Turabian Style

Chydzinski, Andrzej, and Blazej Adamczyk. 2025. "Loss Clustering at MSP Buffer" Journal of Sensor and Actuator Networks 14, no. 4: 84. https://doi.org/10.3390/jsan14040084

APA Style

Chydzinski, A., & Adamczyk, B. (2025). Loss Clustering at MSP Buffer. Journal of Sensor and Actuator Networks, 14(4), 84. https://doi.org/10.3390/jsan14040084

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop