Next Article in Journal
Improving Recommender Systems for Fake News Detection in Social Networks with Knowledge Graphs and Graph Attention Networks
Next Article in Special Issue
Computing the Matrix G of Multi-Dimensional Markov Chains of M/G/1 Type
Previous Article in Journal
Construction of a Hybrid Class of Special Polynomials: Fubini–Bell-Based Appell Polynomials and Their Properties
Previous Article in Special Issue
Accurate Approximation for Resource Queuing Systems with Losses and Signals
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analysis of Dynamic Transaction Fee Blockchain Using Queueing Theory

1
Graduate School of Science and Technology, University of Tsukuba, Tsukuba 305-8573, Japan
2
Institute of Systems and Information Engineering, University of Tsukuba, Tsukuba 305-8573, Japan
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2025, 13(6), 1010; https://doi.org/10.3390/math13061010
Submission received: 19 February 2025 / Revised: 14 March 2025 / Accepted: 18 March 2025 / Published: 20 March 2025
(This article belongs to the Special Issue Queue and Stochastic Models for Operations Research, 3rd Edition)

Abstract

:
In recent years, blockchains have been attracting attention because they are decentralized networks with transparency and trustworthiness. Generally, transactions on blockchain networks with higher transaction fees are processed preferentially compared to others. The processing fee varies significantly depending on other transactions; it is difficult to predict the fee, and it may be significantly high. These are major barriers to blockchain utilization. Although several consensus algorithms have been proposed to solve these problems, their performance has not been fully evaluated. In this study, we model a blockchain system with a base fee, such as in Ethereum, via a priority queueing model. To assess the model’s performance, we derive the stability condition, stationary probability, average number of customers, and average waiting time for each type of customer. In deriving the stability conditions, we propose a method that uses the theoretical values of the partial models. These theoretical values match well with those obtained from Monte Carlo simulations, confirming the validity of the analysis.
MSC:
60K20; 90B22; 68M20

1. Introduction

The use of blockchains, decentralized systems with transparency and trustworthiness, has emerged as a promising avenue. Blockchain is attracting attention not only in finance but also in information securities, the Internet of Things, review systems, public services, etc. [1,2]. Recent studies have shown the wide range of its applicability [3,4]. However, despite unpredictable and high transaction fees [5] hindering the use of blockchain, there are not many studies on them. Therefore, it is necessary to analyze and evaluate performance, taking into account transaction fees.
The reason for unpredictable and high transaction fees is that blockchain networks often operate via first-price auctions. In the blockchain, transactions are approved by third parties called miners. Miners are allowed to receive fees for transactions they approve. Hence, they can maximize their profits by approving transactions that offer the highest fee. Therefore, transactions that offer the highest fee are approved first. In such a system, fees fluctuate significantly depending on the situation, making them difficult to predict.
Some algorithms have been proposed to address increasing transaction fees [6,7]. Ethereum [8], the second-largest blockchain network by market capitalization (as of 3 December 2024), adopted a new algorithm in EIP-1559 [9]. In the new algorithm, a fee is divided into base and priority fees. The base fee is determined by the previous transaction status, and the user can set the priority fee. We refer to this as the base fee algorithm.
To expand the utilization of blockchain, it is necessary to analyze the trend of transaction fees. Many studies have evaluated blockchains using queueing theory [10,11]. However, the base fee algorithm has not yet been analyzed sufficiently. In this paper, we model and analyze this algorithm. In modeling, we simplify the transaction fee, which is a continuous value in the original blockchain, into a binary value of high and low fees. Hence, our model has two types of customers: high-priority and low-priority. In addition, while many blockchains introduce batch services to improve efficiency, we assume single services.
We obtain the stability condition, stationary probability, average number of customers, and average waiting time for each type of customer. In addition, we derive the performance evaluation index for the entire model. We show that the high-priority queue is observed to behave similarly to the M/M/1 queue. We also show that the stationary probability, average number of customers, and average waiting time of the low-priority queue could be approximated using the quasi-birth-death (QBD) processes. Furthermore, we propose a method to derive the stability of a low-priority queue using the behavior of a high-priority queue. Our results are supported by Monte Carlo simulation results.
The rest of our paper is organized as follows. In Section 2, we briefly describe blockchain systems. In Section 3, we present the related works. Section 4 shows the mathematical model of the system. Section 5 and Section 6 present the analysis of the model and numerical results, respectively. Finally, Section 7 concludes our paper.

2. Blockchain

Blockchain is a type of cryptographic technology and has been proposed as a decentralized system [12,13,14]. The blockchain mechanism is shown in Figure 1. Here, we describe a Proof-of-Work algorithm. The blockchain works by incorporating the hash value of the past block. When adding the next block, the nonce value must be adjusted to ensure that the hash value of the entire block meets certain conditions.
Confirmations of transactions in blockchains are accomplished by connecting the block containing the new information to the previous blocks. However, the process of adjusting the nonce value and obtaining the desired hash value imposes a certain degree of difficulty and cost on miners. All miners participating in the blockchain network perform the search for the desired hash value. To tamper with a block at a given point in time, it is necessary to recalculate the hash values of all subsequent blocks, which implies paying the cost of a majority of miners participating in the blockchain network and is considered practically difficult [15].
In major blockchain networks such as Bitcoin [12], the confirmation process is conducted via a first-price auction. The decision of which transactions to include in a block is left to the miners, and it is the best choice for the miners to prioritize users who pay higher transaction fees [16]. Therefore, high-fee users are prioritized, and low-fee users are put on hold. However, first-price auctions include the risk of overpaying and the difficulty of estimating fees [17].
Ethereum adopted a new algorithm instead of first-price auctions to overcome this inefficiency. In the new algorithm, a transaction fee is comprised of base and priority fees.
The base fee is determined by the system, not the user. It is determined by how many transactions are included in the previous block. In other words, the base fee is controlled by the congestion level of the blockchain network. The formula for calculating the base fee is shown in (1). Let the base fee of the t-th block be b t , the maximum change rate per block be d, the batch size of the t-th block be G t , and the maximum batch size be T. Here, d is set to 0.125. The base fee increases by 12.5% over the previous base fee when the previous batch size is the maximum. It remains the same when it is half the maximum. It decreases by 12.5% when it is zero. Importantly, if the base fee is higher than the fee suggested by the user, the transaction will not be processed. Thus, users must suggest a higher fee or wait until the base fee decreases.
b t + 1 = b t ( 1 + d G t T / 2 T / 2 ) .
The priority fee is determined at the discretion of the user. Since the base fee is the same for all users, users are prioritized only based on the priority fee.

3. Related Work

Blockchain consensus algorithms have been evaluated and improved since blockchain was first proposed [18,19]. The consensus algorithm is still in need of improvement in terms of several evaluation metrics, such as processing speed, profitability, degree of decentralization, security, etc. [20].
Along with the improvement of consensus algorithms, several studies have been conducted on approval times, with the main focus on using machine learning models for prediction [21,22]. However, these methods are considered vulnerable to extrapolation because they learn trends from historical data [23]. They also require a large amount of data and high computational costs [24,25].
Several researchers have evaluated the performance of consensus algorithms using queueing theory [10,11]. Research has been conducted on models such as those that include the time taken to synchronize a blockchain network [26] and those in which arrivals follow a Markovian arrival process and services follow a phase-type distribution [27]. In addition, a model that takes into account the initial state of the queue has been proposed to improve the accuracy of the prediction of the length of stay [28]. These studies are based on and extend the priority M/ M B /1 queueing model.
These studies were performed on models of first-price auctions and were not tested on the base fee algorithm. It is important to analyze the base fee algorithm because the second-largest major blockchain networks use it. In this paper, we model and analyze this algorithm.

4. Model

In this study, we analyze the base fee algorithm using a priority queueing model. This section describes the analytical model.
In the Ethereum architecture, the base fee is a continuous value, and the amount paid by users is also continuous. However, to simplify the analysis, we assume two levels of the base fee and the amount paid by users: high and low. We refer to users who pay high fees as high-priority customers and users who pay low fees as low-priority customers. The arrivals of high-priority and low-priority users are assumed to follow Poisson processes, where the arrival rate of low-priority customers is λ L , and that of high-priority customers is λ H .
We do not take priority fees into account. We assume that users form two queues based on the price they pay, and queues with the same price are admitted on a first-in, first-out basis.
In a blockchain, the time to generate a block is often significantly shorter than the time to calculate a nonce value. Thus, the service itself, block generation, was assumed to occur instantaneously in this model, and the time to calculate a nonce value is assumed to be the service time interval. We assume that the service time interval follows an exponential distribution with the mean 1 / μ . In a blockchain system, a service is completed when a hash calculation is successful. The hash computations can be regarded as independent Bernoulli trials. Moreover, due to the high computational complexity of hashing, the time until the first successful computation in the entire system, i.e., the service time interval, follows an exponential distribution [29].
To replicate the base fee algorithm, we define two approval conditions: one in which all users can be approved and the other in which only users with high fees can be approved. The former corresponds to a case where the base fee is low, and the latter corresponds to a case where the base fee is high. We incorporate an algorithm changing the base fee depending on the conditions of the previous transaction into our model.
When there are available users, one user is admitted, and the next base price is higher. In contrast, when there is no available user, the system admits no user, and the next base price is lower. When both high- and low-priority users are waiting, the high-priority user is admitted. The decision as to who is served or not will be made at the end of the service interval. Four types of approval condition transitions are shown in Figure 2, Figure 3, Figure 4 and Figure 5.
In the following, the queue length at time t is denoted by S L ( t ) for the low-priority users and S H ( t ) for the high-priority users. These include the next users to be served. The approval condition at time t is denoted by C ( t ) , where C ( t ) = 0 is the state in which all users can be approved, and C ( t ) = 1 is the state in which only the high-priority users can be approved.
We model the algorithm adopted in the blockchain network by incorporating changes in approval conditions based on the previous approval status into the model. Figure 6 shows the state transition diagram of the model. The model differs from a typical priority queue with interruptions in that the service is provided immediately and must be provided multiple times to handle low-priority users. In addition, whereas other studies using queueing theory [26,27,28] are based on first-price auctions, we model a system based on the base fee algorithm. Therefore, we incorporate the approval status into our model.

5. Performance Analysis

In this section, we calculate the performance evaluation index for the model in the previous section.

5.1. Stability Condition of High-Priority Queue

First, we consider the stability conditions of the high-priority queue. The high-priority queue is independent of the state of the low-priority queue since the high-priority users are approved first. The high-priority queue is also independent of the approval condition since the high-priority user can be approved regardless of the approval condition. Therefore, the high-priority queue depends on only two factors: the arrival rate of the high-priority users, λ H , and the service rate, μ . Thus, the high-priority queue can be considered an M/M/1 queue. The stability condition for the high-priority queueing model is the same as that for the M/M/1 queueing model and is given by (2). Note that ρ H is the traffic density in the high-priority queue.
ρ H = λ H μ < 1 .

5.2. Stability Condition of Low-Priority Queue

Second, we consider the stability conditions for the low-priority queue. The low-priority users are approved only when the high-priority queue is zero and the server state is such that all users are served, as shown in Figure 7. Therefore, the effective service rate of the low-priority queue can be expressed as p μ , where p is the probability that the high-priority queue is zero and the server state is that all users are served.
We consider the behavior of the partial model under the condition that the low-priority queue length is one or more. This assumption is valid in a situation where the arrival rate of the low-priority queue is non-zero, and we are concerned with the stability of low-priority customers (also known as the saturated rule, i.e., we only need to consider the stability of the number of low-priority customers when this number is large enough (at least 1)). The state transition diagram of the high-priority queue length, S H ( t ) , and the approval condition, C ( t ) , is shown in Figure 8. Accordingly, the partial model is a Markov chain because the current state determines the transition probabilities.
From Figure 8, the transition rate matrix Q A of the high-priority queue length, S H ( t ) , and the approval condition, C ( t ) , is given by (3) at S L ( t ) 1 .
Q A = O 0 A 0 O O A 2 A 1 A 0 O O A 2 A 1 A 0 O O A 2 A 1 ,
where
B 0 = λ H μ μ μ λ H μ ,
A 0 = λ H 0 0 λ H ,
A 1 = λ H μ 0 0 λ H μ ,
A 2 = 0 μ 0 μ ,
O is a zero matrix of appropriate dimensions.
We define the stationary distribution for this Markov chain as follows: π A = ( π 0 A , π 1 A , . . . ) , where π y A = ( π y , 0 A , π y , 1 A ) , and where
π y , z A = lim t P r ( S H ( t ) = y , C ( t ) = z ) .
Since the transition matrix, Q A , is a block-tridiagonal matrix, the pair of the length of the high-priority queue, S H ( t ) , and the approval condition, C ( t ) , is a QBD process.
From the theory of QBD, there exists (generally) a rate matrix, R A , such that (5).
π y + 1 A = π y A R A , y = 1 , 2 , .
The global equilibrium equation is given by (6).
π A Q A = O .
Furthermore, we obtain (7) from the normalization condition of the probability distribution.
π A e = 1 ,
where e is a column vector of appropriate dimension in which all elements are 1.
In QBD, the rate matrix, R A , satisfies the minimal non-negative solution of (8).
A 0 + R A A 1 + ( R A ) 2 A 2 = O .
Here, the rate matrix, R A , is the 2-by-2 matrix given in (9).
R A = a b c d ,
where c = 0 because A 0 , A 1 , and A 2 are upper triangular matrices.
The component representation of (8) is (10). From this, the system of Equation (11) can be derived.
λ H 1 0 0 1 ( λ H + μ ) a b 0 d + μ a b 0 d 2 0 1 0 1 = O ,
( λ H + μ ) a λ H = 0 μ a 2 + μ a b ( λ H + μ ) b + μ b d = 0 μ d 2 ( λ H + μ ) d + λ H = 0 .
The rate matrix, R A , is the minimum non-negative solution of (11), which is (12).
R A = λ H λ H + μ λ H 2 μ ( λ H + μ ) 0 λ H μ .
From (6) and (7), we have (13) and (14).
( π 0 A , π 1 A ) O 0 A 0 A 2 A 1 + R A A 2 = O ,
π 0 A e + π 1 A ( I R A ) 1 e = 1 .
where I is an identity matrix of appropriate dimensions.
By solving (13) and (14), π 0 , 0 A is obtained as (15).
π 0 , 0 A = μ λ H 2 μ + λ H ,
Since the rate matrix R A is an upper triangular matrix, the eigenvalues are λ H λ H + μ and λ H μ . Since λ H > 0 and μ > 0 , the maximum eigenvalue is λ H μ . The stability condition for this model is λ H μ < 1 since the largest eigenvalue of R A must be less than 1. This exactly coincides with the stability condition for the high-priority queue.
It should be noted that π 0 , 0 A can be derived using the generating function approach. Indeed, we define generating functions as follows.
Π j ( z ) = i = 0 π i , j A z i , j = 0 , 1 , | z | 1 .
Balancing the equations of states ( i , 0 ) ( i 0 ) yields
Π 0 ( z ) = ( λ H + μ ) π 0 , 0 A λ H + μ λ H z .
Furtheremore, from the balanced equations for states ( i , 1 ) and some transformation, we obtain
Π 1 ( z ) = π 0 , 0 A [ ( λ H + μ ) 2 λ H μ z ] ( μ λ H z ) ( λ H + μ λ H z ) .
Because Π 0 ( 1 ) + Π 1 ( 1 ) = 1 , we also obtain (15).
The service follows an exponential distribution. Therefore, according to Poisson arrivals (see time averages [30]), the certain probability, p, where the high-priority queue is zero and the server state is that all users are served when the service is performed is equivalent to the steady state probability, π 0 , 0 A . The stability condition of the low-priority queue can be expressed as (16) using the effective service rate. Note that ρ L is the traffic density in the low-priority queue.
ρ L = λ L p μ = λ L π 0 , 0 A μ = λ L ( 2 μ + λ H ) μ ( μ λ H ) < 1 , where μ λ H > 0 .
The above analysis indicates that λ H significantly influences the stability condition of the low-priority queue.

5.3. Stability Condition of the Model

When both the high-priority and the low-priority queues are stable, the model is stable. Therefore, the stability condition for the entire model is given by (17).
λ H μ < 1 , λ L ( 2 μ + λ H ) μ ( μ λ H ) < 1 .

5.4. Stationary Probability

We derive the performance evaluation index of the model. Based on Figure 6, the transition rate matrix, Q , is (18) by approximating the upper limit of the size of the high-priority queue to be K. When the high-priority queue satisfies the stability condition, it is possible to obtain an approximate solution with arbitrary precision by setting a sufficiently large K.
Q = D 0 C 0 O O C 2 C 1 C 0 O O C 2 C 1 C 0 O O C 2 C 1 ,
where
D 0 = M 0 λ H 0 0 0 μ N 0 λ H 0 0 0 μ N 0 λ H 0 0 μ g N 0 λ H 0 0 0 μ N 0 0 0 0 μ 0 N ,
C 0 = λ L 0 0 0 0 0 0 λ L 0 0 0 0 0 0 λ L 0 0 0 0 0 0 λ L 0 0 0 0 0 0 λ L 0 0 0 0 0 0 λ L ,
C 1 = N 0 λ H 0 0 0 μ N 0 λ H 0 0 0 μ N 0 λ H 0 0 μ 0 N 0 λ H 0 0 0 μ N 0 0 0 0 μ 0 N ,
C 2 = 0 μ 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ,
M = λ L λ H , N = λ L λ H μ .
D 0 , C 0 , C 1 , and C 2 are [ 2 ( K + 1 ) ] × [ 2 ( K + 1 ) ] matrices. Therefore, the stationary probability can be analyzed using QBD. We define the stationary probability π x , y , z as (19). In addition, let π = ( π 0 , π 1 , ) , where π x = ( π x , 0 , π x , 1 , , π x , K ) , π x , y = ( π x , y , 0 , π x , y , 1 ) .
π x , y , z = lim t P r ( S L ( t ) = x , S H ( t ) = y , C ( t ) = z ) .
Similar to the model in Figure 8, there exists a rate matrix, R , that satisfies (20) when the low-priority queue length is greater than or equal to 1.
π x + 1 = π x R , x = 1 , 2 , .
The global equilibrium equation is given by (21).
π Q = O .
Furthermore, we obtain (22) from the normalization condition of the probability distribution.
π e = 1 .
In QBD, the rate matrix, R , satisfies (23) due to (20) and (21).
C 0 + R C 1 + R 2 C 2 = O .
Since λ L , λ H , and μ are non-negative, C 1 is a strictly diagonally dominant matrix. Therefore, C 1 is an invertible matrix. Consequently, (23) can be transformed into the form of (24).
R = C 0 ( C 1 ) 1 + R 2 C 2 ( C 1 ) 1 .
Based on (24), we set R ( 0 ) = O and repeat the calculations using (25) to find R ( n ) . At this time, it is known that the rate matrix, R , can be found by (26). In numerical calculations, the calculation is stopped at n, where R ( n ) R ( n 1 ) is sufficiently small.
R ( n ) = C 0 ( C 1 ) 1 + R ( n 1 ) 2 C 2 ( C 1 ) 1 ,
lim n R ( n ) = R .
Furthermore, (27) and (28) hold from (21) and (22). Therefore, the stationary probability can be found by numerical calculation.
( π 0 , π 1 ) D 0 C 0 C 2 C 1 + R C 2 = O .
π 0 e + π 1 ( I R ) 1 e = 1 .

5.5. Average Number of Customers

The average number of customers in the high-priority queue, E [ S H ] , is derived from the M/M/1 queue and is given by (29). The average number of customers in the low-priority queue E [ S L ] is derived from the QBD and is given by (30).
E [ S H ] = ρ H 1 ρ H ,
E [ S L ] = x = 0 x π x e = x = 0 x π 1 R x 1 e = π 1 ( I R ) 2 e .

5.6. Average Waiting Time

From Little’s law [31], the average waiting time in the high-priority queue, E [ W H ] , and in the low-priority queue, E [ W L ] , are given by (31) and (32), respectively.
E [ W H ] = E [ S H ] λ H = 1 μ ( 1 ρ H ) ,
E [ W L ] = E [ S L ] λ L = π 1 ( I R ) 2 e λ L .

6. Numerical Simulation

We perform Monte Carlo simulations of the queueing model using Python 3.9 and compare the results with the theoretical values described above. In the following, one event is defined as an arrival or a service. The simulation is performed for 1,000,000 events for each parameter set, and the first 100,000 events are deleted to eliminate dependence on the initial state, resulting in 900,000 events.

6.1. Stability Condition of the High-Priority Queue

The stability condition for the high-priority queue is given by (2). The service rate is fixed at μ = 1.00 , and the arrival rate of low-priority customers is set as λ L = 0.00 , 0.20 , 0.40 , 0.60 , 0.80 , 0.95 . We also derive the arrival rate of high-priority users, λ H , using (2) so that ρ H takes a value from 0.02 to 1.04 in steps of 0.02 . For each parameter set, we calculate the average number of customers of the high-priority queue, E [ S H ] , under the stability condition. The simulation results are shown in Figure 9. Note that an auxiliary line is drawn at ρ H = 1.00 , which is the boundary of the stability condition.
The figure shows that E [ S H ] increases exponentially as ρ H approaches 1, independently of λ L , and E [ S H ] diverges when ρ H is greater than or equal to 1. All the lines overlap because they vary independently of λ L .

6.2. Stability Condition of the Low-Priority Queue

First, we verify π 0 , 0 A to derive stability conditions for low-priority queues. The theoretical value of π 0 , 0 A is given by (15). In addition, simulations are performed under the same condition as in Figure 8. The service rate is fixed at μ = 1.00 . We derive the arrival rate of the high-priority users λ H based on (2) such that ρ H takes a value from 0.02 to 0.98 in steps of 0.02 . Theoretical and simulated values are shown in Figure 10. From the figure, it can be seen that the theoretical values and simulation values generally agree.
Second, we examine the stability conditions of the low-priority queue. The theoretical value is given by (16). In addition, a simulation is performed under the same condition as in Figure 6. The service rate is fixed at μ = 1.00 , and the arrival rate of high-priority users is set as λ H = 0.00 , 0.20 , 0.40 , 0.60 , 0.80 , 0.95 . We derive the arrival rate of the low-priority user λ L based on (16) such that ρ L takes a value from 0.02 to 1.04 in steps of 0.02 . For each parameter set, we derive the average number of customers of the low-priority customer, E [ S L ] . The simulation results are shown in Figure 11. Note that an auxiliary line is drawn at ρ L = 1.00 , which is the boundary of the stability condition. The figure shows that E [ S L ] increases exponentially as ρ L approaches 1, and E [ S L ] diverges when ρ L is greater than or equal to 1.

6.3. Stationary Probability

We conduct a numerical experiment to find the stationary probability of the server state. The probability that only high-priority users can be approved is p H , and its theoretical value is found by (33).
p H = x = 0 y = 0 K π x , y , 1 .
We compare the theoretical value obtained by QBD with the simulated value.
In deriving the theoretical solution, the upper limit of the size of the high-priority queue, K, is set at 200. The repeated calculations of R are stopped at n when the maximum value of the elements of R ( n ) R ( n 1 ) is less than 1.0 × 10 10 . The service rate is fixed at μ = 1.00 , and the arrival rate of high-priority users is set as λ H = 0.00 , 0.20 , 0.40 , 0.60 , 0.80 . In addition, the arrival rate of the low-priority users, λ L , is set from 0.02 to 0.98 in steps of 0.02 . For each parameter set, we calculate the probability that only high-priority users can be approved, p H . The theoretical and simulated results are shown in Figure 12. Note that locations where λ L does not satisfy the stability condition of the low-priority queue are not listed because there is no theoretical value.
From the figure, it seems that the theoretical and simulation values show similar trends in the region where the low-priority queue satisfies the stability.
When the low-priority queue satisfies the stability, p H changes linearly with λ L . When the low-priority queue does not satisfy the stability, p H is constant, independent of λ L . This is because when λ L does not satisfy the stability condition, S L ( t ) diverges, and there are always users waiting for the service.

6.4. Average Number of Customers and Average Waiting Time

In deriving the theoretical solution, the upper limit of the size of the high-fee queue, K, is set at 200. The repeated calculations of R are stopped at n when the maximum value of the elements of R ( n ) R ( n 1 ) is less than 1.0 × 10 10 .
In the simulation of the high-priority queue, the service rate is fixed at μ = 1.00 , and the arrival rate of the low-priority user is set as λ H = 0.00 , 0.20 , 0.40 , 0.60 , 0.80 . We also derive the arrival rate of high-priority users λ H (2) so that ρ H takes a value from 0.02 to 0.98 in steps of 0.02 . For each parameter set, we derive the average number of customers in the high-priority queue, E [ S H ] , and the average waiting time in the high-priority queue, E [ W H ] . The theoretical and simulated values of the average number of customers are shown in Figure 13, and the theoretical and simulated values of the average waiting time are shown in Figure 14. From Figure 13 and Figure 14, we observe that E [ S H ] and E [ W H ] do not depend on λ L . Moreover, we observe that the theoretical values and simulation values generally agree.
In the simulation of the low-priority queue, the service rate is fixed at μ = 1.00 , and the arrival rate of the high-priority user is set as λ H = 0.00 , 0.20 , 0.40 , 0.60 , 0.80 . We derived the arrival rate of the low-priority user, λ L , based on (16) such that ρ L takes a value from 0.02 to 0.98 in steps of 0.02 . For each parameter set, we derived the average number of customers in the low-priority queue, E [ S L ] , and the average waiting time in the low-priority queue, E [ W L ] . The theoretical and simulated values of the average number of customers are shown in Figure 15, and the theoretical and simulated values of the average waiting time are shown in Figure 16. From Figure 15 and Figure 16, it seems that the theoretical and simulation values generally agree.

7. Conclusions

We modeled dynamic transaction fees considering approval conditions and derived stability conditions, stationary probability, average number of customers, and waiting time. Simulations validated our theoretical results. We proposed analyzing the low-priority queue’s stability using the result of the high-priority queue and approximating the stationary probability via QBD by limiting the number of customers in the high-priority queue. We also showed that the high-priority queue follows an M/M/1 model. In particular, the analytical solution of the stability condition makes it possible to determine the required service rate for the arrival rate, which contributes to determining the difficulty in blockchain.
This research facilitates the evaluation of existing systems and the design of more efficient alternatives. Further advancements in this study are expected to contribute to developing a cost-effective and high-speed blockchain. Moreover, our model appears to be applicable to systems with price fluctuations. However, several challenges remain. First, our model assumes a single-service system, whereas typical blockchains adopt batch processing, necessitating an extension to batch services. Second, this theory does not consider potential attacks or temporary blockchain branching, which should be incorporated for a more realistic analysis, as in previous studies [32,33]. Third, our current model treats transaction fees as discrete values, while in practice, fees often vary continuously; thus, extending the model to incorporate continuous fee structures is an important future direction. Finally, after extending the model to more realistic blockchain systems, we will evaluate how well the analyzed model aligns with real-world scenarios.

Author Contributions

Conceptualization, K.I. and T.P.-D.; Methodology, K.I. and T.P.-D.; Software, K.I.; Validation, K.I. and T.P.-D.; Formal analysis, K.I. and T.P.-D.; Investigation, K.I. and T.P.-D.; Writing—original draft, K.I.; Writing—review & editing, T.P.-D.; Visualization, K.I.; Supervision, T.P.-D. All authors have read and agreed to the published version of the manuscript.

Funding

The research of Tuan Phung-Duc was supported in part by JSPS KAKENHI, Grant Number 21K11765 and by F-MIRAI: R & D Center for Frontiers of MIRAI in Policy and Technology, the University of Tsukuba and Toyota Motor Corporation collaborative R & D center, Japan.

Data Availability Statement

No new data were created or analyzed in this study.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–375. [Google Scholar]
  2. Zou, W.; Lo, D.; Kochhar, P.S.; Le, X.B.D.; Xia, X.; Feng, Y.; Chen, Z.; Xu, B. Smart contract development: Challenges and opportunities. IEEE Trans. Softw. Eng. 2019, 47, 2084–2106. [Google Scholar] [CrossRef]
  3. Kumar, S.; Dohare, U.; Kaiwartya, O. FLAME: Trusted Fire Brigade Service and Insurance Claim System Using Blockchain for Enterprises. IEEE Trans. Ind. Inform. 2023, 19, 7517–7527. [Google Scholar]
  4. Kumar, S.; Rathore, R.S.; Dohare, U.; Kaiwartya, O.; Lloret, J.; Kumar, N. BEET: Blockchain Enabled Energy Trading for E-Mobility Oriented Electric Vehicles. IEEE Trans. Mob. Comput. 2024, 23, 3018–3034. [Google Scholar]
  5. Easley, D.; O’Hara, M.; Basu, S. From mining to markets: The evolution of bitcoin transaction fees. J. Financ. Econ. 2019, 134, 91–109. [Google Scholar]
  6. Chaudhry, N.; Yousaf, M.M. Consensus Algorithms in Blockchain: Comparative Analysis, Challenges and Opportunities. In Proceedings of the 2018 12th International Conference on Open Source Systems and Technologies (ICOSST), Lahore, Pakistan, 19–21 December 2018; pp. 54–63. [Google Scholar]
  7. Nguyen, G.T.; Kim, K. A survey about consensus algorithms used in blockchain. J. Inf. Process. Syst. 2018, 14, 101–128. [Google Scholar]
  8. Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32. [Google Scholar]
  9. Reijsbergen, D.; Sridhar, S.; Monnot, B.; Leonardos, S.; Skoulakis, S.; Piliouras, G. Transaction Fees on a Honeymoon: Ethereum’s EIP-1559 One Month Later. In Proceedings of the 2021 IEEE International Conference on Blockchain (Blockchain), Melbourne, Australia, 6–8 December 2021; pp. 196–204. [Google Scholar]
  10. Kasahara, S.; Kawahara, J. Effect of Bitcoin fee on transaction-confirmation process. J. Ind. Manag. Optim. 2019, 15, 365–386. [Google Scholar]
  11. Kawase, Y.; Kasahara, S. Transaction-confirmation time for bitcoin: A queueing analytical approach to blockchain mechanism. In Proceedings of the Queueing Theory and Network Applications: 12th International Conference, QTNA 2017, Qinhuangdao, China, 21–23 August 2017; Springer: Berlin/Heidelberg, Germany, 2017. Proceedings 12. pp. 75–88. [Google Scholar]
  12. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://assets.pubpub.org/d8wct41f/31611263538139.pdf (accessed on 10 January 2024).
  13. Buterin, V. A next-generation smart contract and decentralized application platform. White Pap. 2014, 3, 1–36. [Google Scholar]
  14. Vujičić, D.; Jagodić, D.; Ranđić, S. Blockchain technology, bitcoin, and Ethereum: A brief overview. In Proceedings of the 2018 17th International Symposium INFOTEH-Jahorina (INFOTEH), East Sarajevo, Bosnia and Herzegovina, 21–23 March 2018; pp. 1–6. [Google Scholar]
  15. Malakhov, I.; Marin, A.; Rossi, S.; Smuseva, D. On the use of proof-of-work in permissioned blockchains: Security and fairness. IEEE Access 2021, 10, 1305–1316. [Google Scholar]
  16. Huberman, G.; Leshno, J.; Moallemi, C.C. An economic analysis of the bitcoin payment system. Columbia Bus. Sch. Res. Pap. 2019, 17, 92. [Google Scholar]
  17. Leonardos, S.; Monnot, B.; Reijsbergen, D.; Skoulakis, E.; Piliouras, G. Dynamical analysis of the eip-1559 ethereum fee market. In Proceedings of the 3rd ACM Conference on Advances in Financial Technologies, Arlington, VA, USA, 26–28 September 2021; pp. 114–126. [Google Scholar]
  18. Liu, Y.; Lu, Y.; Nayak, K.; Zhang, F.; Zhang, L.; Zhao, Y. Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, CCS ’22, Los Angeles, CA, USA, 7–11 November 2022; pp. 2099–2113. [Google Scholar]
  19. Mingxiao, D.; Xiaofeng, M.; Zhe, Z.; Xiangwei, W.; Qijun, C. A review on consensus algorithm of blockchain. In Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, AL, Canada, 5–8 October 2017; pp. 2567–2572. [Google Scholar]
  20. Bamakan, S.M.H.; Motavali, A.; Bondarti, A.B. A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst. Appl. 2020, 154, 113385. [Google Scholar]
  21. Butler, C.; Crane, M. Blockchain Transaction Fee Forecasting: A Comparison of Machine Learning Methods. Mathematics 2023, 11, 2212. [Google Scholar] [CrossRef]
  22. Kurri, V.; Raja, V.; Prakasam, P. Cellular traffic prediction on blockchain-based mobile networks using LSTM model in 4G LTE network. Peer-Peer Netw. Appl. 2021, 14, 1088–1105. [Google Scholar]
  23. Marcus, G. Deep learning: A critical appraisal. arXiv 2018, arXiv:1801.00631. [Google Scholar]
  24. Mahajan, D.; Girshick, R.; Ramanathan, V.; He, K.; Paluri, M.; Li, Y.; Bharambe, A.; Van Der Maaten, L. Exploring the limits of weakly supervised pretraining. In Proceedings of the European Conference on Computer Vision (ECCV), Munich, Germany, 8–14 September 2018; pp. 181–196. [Google Scholar]
  25. Thompson, N.C.; Greenewald, K.; Lee, K.; Manso, G.F. The computational limits of deep learning. arXiv 2020, arXiv:2007.05558. [Google Scholar]
  26. Li, Q.L.; Ma, J.Y.; Chang, Y.X. Blockchain queue theory. In Proceedings of the Computational Data and Social Networks: 7th International Conference, CSoNet 2018, Shanghai, China, 18–20 December 2018; Springer: Berlin/Heidelberg, Germany, 2018. Proceedings 7. pp. 25–40. [Google Scholar]
  27. Li, Q.L.; Ma, J.Y.; Chang, Y.X.; Ma, F.Q.; Yu, H.B. Markov processes in blockchain systems. Comput. Soc. Netw. 2019, 6, 1–28. [Google Scholar]
  28. Malakhov, I.; Marin, A.; Rossi, S. Analysis of the confirmation time in proof-of-work blockchains. Future Gener. Comput. Syst. 2023, 147, 275–291. [Google Scholar]
  29. Kasahara, S. Performance Modeling of Bitcoin Blockchain: Mining Mechanism and Transaction-Confirmation Process. IEICE Trans. Commun. 2021, E104.B, 1455–1464. [Google Scholar]
  30. Wolff, R.W. Poisson arrivals see time averages. Oper. Res. 1982, 30, 223–231. [Google Scholar] [CrossRef]
  31. Little, J.D. A proof for the queuing formula: L=λW. Oper. Res. 1961, 9, 383–387. [Google Scholar] [CrossRef]
  32. Kim, S.K. Blockchain Governance Game. Comput. Ind. Eng. 2019, 136, 373–380. [Google Scholar] [CrossRef]
  33. Kim, S.K. Strategic Alliance for Blockchain Governance Game. Probab. Eng. Informational Sci. 2020, 36, 1–17. [Google Scholar] [CrossRef]
Figure 1. Blockchain diagram. A block is composed of the previous hash value, information, and nonce. The information part can have any content. The nonce is a value adjusted so that the hash value of the entire block meets a certain condition.
Figure 1. Blockchain diagram. A block is composed of the previous hash value, information, and nonce. The information part can have any content. The nonce is a value adjusted so that the hash value of the entire block meets a certain condition.
Mathematics 13 01010 g001
Figure 2. When service occurs in a state where only high-priority users are served, one high-priority user is served, and the state where only high-priority users are served continues.
Figure 2. When service occurs in a state where only high-priority users are served, one high-priority user is served, and the state where only high-priority users are served continues.
Mathematics 13 01010 g002
Figure 3. When service occurs in a state where only high-priority users are served, no user can receive the service. Thus, the system transitions to a state where all users can receive service.
Figure 3. When service occurs in a state where only high-priority users are served, no user can receive the service. Thus, the system transitions to a state where all users can receive service.
Mathematics 13 01010 g003
Figure 4. When service occurs in the state where all users are served, a high-priority user is served preferentially. When there is no high-priority user, a low-priority user is served. Thus, the system transitions to a state where only high-priority users are served.
Figure 4. When service occurs in the state where all users are served, a high-priority user is served preferentially. When there is no high-priority user, a low-priority user is served. Thus, the system transitions to a state where only high-priority users are served.
Mathematics 13 01010 g004
Figure 5. When service occurs in a state where all users are served, and there is no user, then no user is served. Thus, the state where all users are served continues.
Figure 5. When service occurs in a state where all users are served, and there is no user, then no user is served. Thus, the state where all users are served continues.
Mathematics 13 01010 g005
Figure 6. Transition diagram of the entire model.
Figure 6. Transition diagram of the entire model.
Mathematics 13 01010 g006
Figure 7. When service occurs in a state where all users are served and there is no high-priority user, a low-priority user is served; thus, the system transitions to a state where only high-priority users are served.
Figure 7. When service occurs in a state where all users are served and there is no high-priority user, a low-priority user is served; thus, the system transitions to a state where only high-priority users are served.
Mathematics 13 01010 g007
Figure 8. Transition diagram of the high-priority queue length and the approval condition under the condition that the low-priority queue length is one or more.
Figure 8. Transition diagram of the high-priority queue length and the approval condition under the condition that the low-priority queue length is one or more.
Mathematics 13 01010 g008
Figure 9. Stability condition of high-priority queue. The vertical orange line is an auxiliary line indicating ρ H = 1.00 .
Figure 9. Stability condition of high-priority queue. The vertical orange line is an auxiliary line indicating ρ H = 1.00 .
Mathematics 13 01010 g009
Figure 10. π 0 , 0 A against ρ H .
Figure 10. π 0 , 0 A against ρ H .
Mathematics 13 01010 g010
Figure 11. Stability condition of low-priority queue. The vertical orange line is an auxiliary line indicating ρ L = 1.00 .
Figure 11. Stability condition of low-priority queue. The vertical orange line is an auxiliary line indicating ρ L = 1.00 .
Mathematics 13 01010 g011
Figure 12. Server status. The theoretical values are shown only under conditions that satisfy the stability conditions.
Figure 12. Server status. The theoretical values are shown only under conditions that satisfy the stability conditions.
Mathematics 13 01010 g012
Figure 13. Average number of high-priority users.
Figure 13. Average number of high-priority users.
Mathematics 13 01010 g013
Figure 14. Average waiting time of high-priority users.
Figure 14. Average waiting time of high-priority users.
Mathematics 13 01010 g014
Figure 15. Average number of low-priority users.
Figure 15. Average number of low-priority users.
Mathematics 13 01010 g015
Figure 16. Average waiting time of low-priority users.
Figure 16. Average waiting time of low-priority users.
Mathematics 13 01010 g016
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Inami, K.; Phung-Duc, T. Analysis of Dynamic Transaction Fee Blockchain Using Queueing Theory. Mathematics 2025, 13, 1010. https://doi.org/10.3390/math13061010

AMA Style

Inami K, Phung-Duc T. Analysis of Dynamic Transaction Fee Blockchain Using Queueing Theory. Mathematics. 2025; 13(6):1010. https://doi.org/10.3390/math13061010

Chicago/Turabian Style

Inami, Koki, and Tuan Phung-Duc. 2025. "Analysis of Dynamic Transaction Fee Blockchain Using Queueing Theory" Mathematics 13, no. 6: 1010. https://doi.org/10.3390/math13061010

APA Style

Inami, K., & Phung-Duc, T. (2025). Analysis of Dynamic Transaction Fee Blockchain Using Queueing Theory. Mathematics, 13(6), 1010. https://doi.org/10.3390/math13061010

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop