On the Effect of Finite Buffer Truncation in a Two-node Jackson Network
نویسندگان
چکیده
We consider a two-node Jackson network in which the buffer of node 1 is truncated. Our interest is in the limit of the tail decay rate of the queue-length distribution of node 2 when the buffer size of node 1 goes to infinity, provided that the stability condition of the unlimited network is satisfied. We show that there can be three different cases for the limit. This generalizes some recent results obtained for the tandem Jackson network. Special cases and some numerical examples are also presented.
منابع مشابه
Study of Stone-wales Defect on Elastic Properties of Single-layer Graphene Sheets by an Atomistic based Finite Element Model
In this paper, an atomistic based finite element model is developed to investigate the influence of topological defects on mechanical properties of graphene. The general in-plane stiffness matrix of the hexagonal network structure of graphene is found. Effective elastic modulus of a carbon ring is determined from the equivalence of molecular potential energy related to stretch and angular defor...
متن کاملOn the effect of low-quality node observation on learning over incremental adaptive networks
In this paper, we study the impact of low-quality node on the performance of incremental least mean square (ILMS) adaptive networks. Adaptive networks involve many nodes with adaptation and learning capabilities. Low-quality mode in the performance of a node in a practical sensor network is modeled by the observation of pure noise (its observation noise) that leads to an unreliable measurement....
متن کاملSemi-Markov-Based Approach for the Analysis of Open Tandem Networks with Blocking and Truncation
This paper describes an analytical study of open two-node (tandem) network models with blocking and truncation. The study is based on semi-Markov process theory, and network models assume that multiple servers serve each queue. Tasks arrive at the tandem in a Poisson fashion at the rate λ, and the service times at the first and the second node are nonexponentially distributed with means s and s...
متن کاملEfficient Analysis of Rare Events Associated with Individual Buffers in a Tandem Jackson Network
Over the last decade, importance sampling has been a popular technique for the efficient estimation of rare event probabilities. This paper presents an approach for applying balanced likelihood ratio importance sampling to the problem of quantifying the probability that the content of the second buffer in a two node tandem Jackson network reaches some high level before it becomes empty. Heurist...
متن کاملبهبود پروتکل AODV جهت مقابله با حملات کرمچاله در شبکههای اقتضایی
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the ...
متن کامل