Next Article in Journal
A Versatile and Efficient Novel Approach for Mendelian Randomization Analysis with Application to Assess the Causal Effect of Fetal Hemoglobin on Anemia in Sickle Cell Anemia
Previous Article in Journal
Exchangeably Weighted Bootstraps of General Markov U-Process
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analysis of Multi-Server Priority Queueing System with Hysteresis Strategy of Server Reservation and Retrials

1
Department of Applied Mathematics and Computer Science, Belarusian State University, 4, Nezavisimosti Ave., 220030 Minsk, Belarus
2
Department of Information and Electrical Engineering and Applied Mathematics, University of Salerno, Via Giovanni Paolo II, 132, Fisciano, 84084 Salerno, Italy
3
Dipartimento di Scienze Aziendali—Management and Innovation Systems, University of Salerno, Via Giovanni Paolo II, 132, Fisciano, 84084 Salerno, Italy
*
Author to whom correspondence should be addressed.
Mathematics 2022, 10(20), 3747; https://doi.org/10.3390/math10203747
Submission received: 24 September 2022 / Revised: 8 October 2022 / Accepted: 9 October 2022 / Published: 12 October 2022
(This article belongs to the Section Dynamical Systems)

Abstract

:
A multi-server queueing system with two types of requests and preemptive priority of one type is considered as a model of a cell of a cognitive radio system under practical suggestions about the arrival flows. A hysteresis type strategy for server reservation is suggested to mitigate the effect of interruption of service of low priority requests. Under the arbitrarily fixed values of the sets of the thresholds defining this strategy, the behavior of the system is described by a level-dependent multi-dimensional Markov chain. Formulas for computation of values of performance characteristics of the system are derived. Numerical examples illustrating the dependence of the main performance characteristics on the thresholds defining the strategy of control and the numerical solution of the problem of the optimal choice of the thresholds are reported.

1. Introduction

Multi-server queueing systems with heterogeneous requests can be successfully applied for modeling, planning, evaluating, and optimization of real-world systems and networks. For example, such systems have been applied for description and optimization of the operation of emergency departments in hospitals (see, e.g., [1,2,3]) and cells of cognitive radio systems (see [4,5,6,7,8,9,10,11,12]).
It is usually supposed in such systems that primary requests (i.e., patients having a severe injury or licensed users) have preemptive priority over secondary requests (i.e., other patients or cognitive users). They can be dropped only if during their arrival moment all servers are busy and provide service for the primary requests. If some of them provide service for the secondary requests, service of one of secondary requests is instantaneously interrupted and this server is occupied by the primary request. The termination of service ahead of the schedule implies negative effects such as the loss of throughput due to the waste of the work done on servicing interrupted requests as well as dissatisfaction of these requests. Therefore, to smooth these negative effects, it is necessary to properly manage an admission of the secondary requests, e.g., via the temporarily suspending of their admission when the forced termination of service is likely because the number of busy servers is greater than a certain threshold fixed in advance (see for example [13]). In that paper, it was shown that the proper choice of the reservation threshold may lead to better operation of the system. Let the number of servers be equal to N. The strategy analysed in [13] assumes that an arbitrary non-priority request is accepted to the system only when the number of occupied servers at the arrival epoch is less than a threshold M which admits values in the range 0 < M N . In [14], the model analysed in [13], as well as in the majority of other existing papers devoted to analysis of cognitive radio systems, has been significantly generalized into several directions: (i) instead of the mixture of two stationary Poisson processes as model of arrival flows of heterogeneous requests, the arrivals are defined by the Marked Markovian Arrival Process ( M M A P ); (ii) it is supposed that the non-priority requests, which are not immediately accepted to the system at an arrival epoch or interrupted during a service, have the options to abandon the system or to move to so called orbit and attempt to enter the service again after a random amount of time.
The stationary Poisson arrival flows considered in the majority of the existing relevant papers are the simplest case of M M A P . They do not reflect the correlation and variance of inter-arrival times in the arrival process flows which are inherent in modern telecommunication networks. This process is the extension of the well known Markovian Arrival Process ( M A P ) (see [15,16,17]) to cover the case of heterogeneous requests. The problem of description of real flows by the M A P s has been intensively discussed in the existing literature, see, e.g., [18,19,20].
The phenomenon of retrials (repeated attempts) is an inherent feature of many real world systems, including telecommunication networks and contact centers. Therefore, its accounting is very important for adequate modeling of these systems and networks. The classic surveys of research on retrial queues are [21,22].
The threshold (and multi-threshold) type strategies of control by service and admission rates or by the number of active servers in queueing systems are very popular because their use allows the economic effectiveness of the corresponding real queueing systems to be significantly improved. Information concerning the state of the art in analysis of such systems when the arrival flow is provided by the M A P or M M A P can be found, e.g., in [23].
The evident drawback of the threshold type strategies is the possibility of frequent change (oscillation) of the operation mode of the system when the number of requests in the system hesitates around the value of the thresholds. To avoid this negative effect, so-called hysteresis strategies are often applied. Such a strategy is the transparent extension of a threshold strategy. In the context of our paper, this extension consists of the following. Instead of fixing one threshold, say, M ˜ , to stop admission of non-priority requests when the number of requests in the system achieves the level M ˜ and resuming acceptance when this number becomes less than M ˜ , we fix two thresholds, say, M 1 and M , ( M 1 M ). One can think that M 1 M ˜ M . Admission of non-priority requests is stopped when the number of requests in the system exceeds the upper level M and is resumed when this number becomes less than the lower level M 1 . Information about the state of the art in analysis of systems with hysteresis control when the arrival flow is provided by the M A P or M M A P can be found, e.g., in paper [24]. Queues with hysteresis control are sometimes called oscillating; see, e.g., [25,26].
In this paper, we analyse a system with a hysteresis policy of admission control. To the best of our knowledge, such a type of control has not been earlier applied for servers reservation in priority queues. The difficulty of the consideration of a system with hysteresis control compared to analysis of analogous systems with threshold control consists of the following. When using threshold control, the decision to admit or to reject an incoming request is made solely based on the comparison of the observed number of requests in the system and the threshold. When using hysteresis control, the decision in the situation when the observed number of requests admits values in the interval ( M 1 , M ] , and additionally depends on prior decisions. Therefore, in order to construct the Markov process that describes the dynamics of the system, the use of an additional component is required.
The rest of the paper is organized in the following way. In Section 2, the analysed mathematical model is completely reported. In Section 3, the dynamics of the queueing system under study is described as a level-dependent multi-dimensional continuous-time Markov chain. Necessary denotations are introduced and the infinitesimal generator of this Markov chain is derived. In Section 4, the ergodicity (stability) condition of this Markov chain is provided. The invariant distribution of the system states is calculated and formulas for computation of the main performance characteristics of the system are presented in Section 5. Section 6 is devoted to numerical illustration of the feasibility of the presented algorithms and the possibility of solving optimization problems. Section 7 concludes the paper. The main results of the presented analysis are summarized, and directions for future research are highlighted.

2. Mathematical Model

We consider a queueing system consisting of N identical servers and having no buffer space. Two types of requests are processed in this system. The service times of a type-k requests are independent identically exponentially distributed random variables with the rate μ k , k = 1 , 2 . Type-1 requests have preemptive (absolute) priority over type-2 requests. Arrival of type- k , k = 1 , 2 , requests is described by the Markovian Arrival Process. This process is defined by an underlying process that is an irreducible continuous-time Markov chain ν t ( k ) , t 0 having W ¯ k = W k + 1 states { 0 , , W k } . The transition intensities of the process ν t ( k ) within this state space are provided by the elements of the matrices D 0 ( k ) and D 1 ( k ) of size W ¯ k . The non-diagonal entries of the matrix D 0 ( k ) define the rates of transitions that are not accompanied by arrival of type-k requests. The diagonal entries of the matrix D 0 ( k ) define the rates at which the process ν t ( k ) exits its states. The entries of the matrix D 1 ( k ) define the rates of transitions that are accompanied by the arrival of a type-k request.
The matrix D ( k ) ( 1 ) = D 0 ( k ) + D 1 ( k ) is the infinitesimal generator of the Markov chain ν t ( k ) . The row vector θ ( k ) defines the invariant distribution of this Markov chain. This vector is the only solution to the system of equations θ ( k ) D ( k ) ( 1 ) = 0 , θ ( k ) e = 1 . Here and throughout this paper, e means a column vector of appropriate size consisting of ones and 0 means a row vector of appropriate size consisting of zeros.
The fundamental (mean) arrival rate λ k of type-k requests is defined by λ k = θ ( k ) D 1 ( k ) e .
We suggest that type-1 requests have preemptive priority over type-2 requests. This means that an arriving type-1 request is always admitted to the system except in a case when all servers are busy by providing service to type-1 requests at the arrival moment. In such a case, the type-1 request immediately departs from the system without service (that is, it is lost). If all servers during a type-1 request arrival epoch are busy, but a certain number of them are providing service to type-2 requests, service of one of type-2 requests is interrupted and the type-1 request occupies the corresponding server.
We suppose that the admission of type-2 requests to the system is implemented according to the hysteresis strategy. This strategy is more general and flexible than the threshold reservation strategy known in the literature. It is described as follows. The decision to admit or to reject an arriving type-2 request depends on the current state of the managing process ξ t . This is a stochastic process having two possible values, 0 and 1. We say that the value 0 corresponds to an off-period during which arriving type-2 requests are not admitted into the service, while a value of 1 corresponds to an on-period, during which arriving type-2 requests may be admitted for service.
The mechanism for switching the states of the managing process is defined by the relation of the current number of busy servers and two integer thresholds, M 1 and M , 0 M 1 < M < N .
If the number of busy servers during the stay of process ξ t in state 1 is less than M , then any request trying to obtain access is admitted to the system and immediately starts service. If the number of busy servers during the stay of the process ξ t in state 1 is equal to M and a new request from outside arrives, then the process ξ t jumps to state 0. The arriving request is accepted if it is of type-1 and is rejected if it is of type-2. With probability 1 q , 0 q 1 , a rejected request leaves the system permanently (it is lost). With probability q, this request decides to attempt to obtain access later on. We say that this request moves to a virtual place called a orbit. A request staying in the orbit repeats its attempts to get access independently of the behavior of other requests residing in the orbit after a random time interval duration, which has an exponential distribution with the rate α , α > 0 . An attempt is successful if the managing process ξ t resides in state 1 and the number of busy servers is less than M . If the attempt is successful, the request immediately occupies an available server and starts service. If the attempt is not successful, the retrying request departs from the system with probability 1 q . With the complementary probability, the request returns back to the orbit.
If the number of busy servers during the stay of process ξ t in state 0 is equal to M 1 and the service of any request finishes, then the process ξ t transits to state 1 (the on-period begins). At all other moments (i.e., when no arrival occurs during the on-line period in the presence of M busy servers or no service completion occurs during the off-line period in the presence of M 1 busy servers) no switches of the states of the managing process ξ t can occur.
As is stated above, service of a type-2 request receiving service can be terminated by the arrival of a type-1 request. In this case, a type-2 request leaves the system permanently with probability 1 p , 0 p 1 or transits to the orbit. The requests residing in the orbit are impatient (intolerant) and depart from the system without receiving service after a random amount of time. This time has an exponential distribution with the rate γ , γ > 0 .
In the rest of this paper, we analyze the invariant distribution of the system states and discuss computation of various performance characteristics of the system under any fixed values of the thresholds M 1 and M .

3. Process of the System States

Let
  • i t , i t 0 , be the number of requests residing in the orbit
  • n t , n t = 0 , N ¯ , be the number of occupied servers
  • l t , l t = 0 , min { n t , M } ¯ , be the number of type-2 requests in service
  • ν t ( k ) , ν t ( k ) = 0 , W k ¯ , be the state of the underlying Markov chain of the M A P k , k = 1 , 2
  • ξ t be the state of the admission managing process: ξ t = 0 during off-period and ξ t = 1 during on-period
during moment t when t 0 .
Note that we assume that ξ t = 1 if n t < M 1 , ξ t = 0 if n t > M , and that ξ t can be either 0 or 1 when M 1 n t M .
It is easy to verify that the six-dimensional stochastic process
η t = { i t , n t , l t , ν t ( 1 ) , ξ t , ν t ( 2 ) } , t 0 ,
is an irreducible continuous-time Markov chain having one denumerable and five finite components.
Let us enumerate the states of the chain η t in the direct lexicographic order of the components ( i , n , l , ν ( 1 ) , ξ , ν ( 2 ) ) . The set of states having a value ( i , n ) of the first two components are called a macro-state ( i , n ) and the set of macro-states ( ( i , 0 ) , , ( i , N ) ) is called a level i , i 0 .
Let Q be the infinitesimal generator of the Markov chain η t , t 0 . It consists of the matrix blocks Q i , j , which in turn consist of the matrices ( Q i , j ) n , n containing the transition rates of the chain η t from the macro-state ( i , n ) to the macro-state ( j , n ) , n , n = 0 , N ¯ . The diagonal entries of matrix Q are negative. The modulus of each diagonal entry defines the departure rate of the Markov chain from the corresponding state.
To write the explicit expression for the blocks and subblocks of the generator Q, we use the following notation.
Let
  • I and O be the identity matrix and zero matrix, correspondingly. If the dimension of a matrix is not clear from the context, it is indicated by a suffix. Otherwise, it is omitted.
  • 0 T denote the column vector that is the transposition of the row vector 0 .
  • ⊗ and ⊕ be the symbols of the Kronecker product and sum of matrices, respectively; see [27,28,29]. These symbols are very useful for describing the rates and probabilities of simultaneous transitions of several independent Markov chains.
  • δ n , N be the Kronecker delta, which is equal to 1 if n = N and 0 otherwise.
  • W ^ = W ¯ 1 W ¯ 2 and W ¯ = 2 W ^ .
  • K 1 be the size of blocks Q i , j , defined as
    K 1 = ( M 1 + 1 ) M 1 2 W ^ + ( M + M 1 + 2 ) ( M M 1 + 1 ) 2 W ¯ + ( M + 1 ) ( N M ) W ^ ;
  • C l = diag { 0 , 1 , , l } , l = 0 , M ¯ , i.e., C l be a diagonal matrix with diagonal entries 0 , 1 , , l .
  • C ¯ l = diag { l , l 1 , , 0 } , l = 0 , M ¯ .
  • C ˜ l = diag { l , l 1 , , l M + 1 , l M } , l = M , N ¯ .
  • E l + , E ^ l + , l = 0 , M 1 ¯ , be matrices of size ( l + 1 ) × ( l + 2 ) , defined as
    E l + = 0 T | I l + 1 , E ^ l + = I l + 1 | 0 T .
  • E l , E ^ l , l = 1 , M ¯ be matrices of size ( l + 1 ) × l , defined as
    E l = I l 0 , E ^ l = 0 I l .
  • E , E ˜ , I ^ be square matrices of size ( M + 1 ) × ( M + l ) , defined by the formulas
    E = E ^ M | 0 T , E ˜ = E M E M 1 + = 0 T | E M , I ^ = diag { 1 , 0 , , 0 } .
  • M n be the auxiliary matrices of the corresponding size, defined as
    M n = μ 2 C n + μ 1 C ¯ n , n = 0 , M ¯ , μ 2 C M + μ 1 C ˜ n , n = M + 1 , N ¯ .
  • M n be the auxiliary matrices of the corresponding size, defined as
    M n = μ 2 C n E ^ n + μ 1 C ¯ n E n , n = 1 , M ¯ , μ 2 C M E + μ 1 C ˜ n , n = M + 1 , N ¯ .
Lemma 1.
The infinitesimal generator Q of the Markov chain η t has the following block-tridiagonal structure:
Q = Q 0 , 0 Q 0 , 1 O O Q 1 , 0 Q 1 , 1 Q 1 , 2 O O Q 2 , 1 Q 2 , 2 Q 2 , 3
where the non-zero blocks Q i , j , i , j 0 , of size K 1 are defined as follows:
Q i , i = A i ( 0 ) B ( 0 ) O O O F ( 1 ) A i ( 1 ) B ( 1 ) O O O O O A i ( N 1 ) B ( N 1 ) O O O F ( N ) A i ( N ) + Δ 0 , i 0 ,
Q i , i + 1 = Q + = diag { H ( 0 ) , , H ( N ) } , i 0 ,
Q i , i 1 = i L ( 0 ) U ( 0 ) O O O O L ( 1 ) U ( 1 ) O O O O L ( 2 ) O O O O O L ( N 1 ) U ( N 1 ) O O O O L ( N ) , i 1 ,
where
Δ 0 = diag { I ( M 1 + 1 ) M 1 2 ( D 0 ( 1 ) D 0 ( 2 ) ) , I ( M + M 1 + 2 ) ( M M 1 + 1 ) 2 ( D 0 ( 1 ) ( I 2 D 0 ( 2 ) ) ) ,
I ( M + 1 ) ( N M ) ( D 0 ( 1 ) D 0 ( 2 ) ) } ,
A i ( n ) = ( M n + i ( α + γ ) I n + 1 ) I W ^ , n < M 1 , ( M n + i ( α + γ ) I n + 1 ) I W ¯ + I n + 1 I W ¯ 1 1 q 0 0 0 D 1 ( 2 ) + i α I n + 1 I W ¯ 1 q 0 0 0 I W ¯ 2 , M 1 n < M , ( M n + i ( α ( 1 q ) + γ ) I M + 1 ) I W ¯ + ( 1 q ) I M + 1 I W ¯ 1 1 0 1 0 D 1 ( 2 ) , n = M , ( M n + i ( α ( 1 q ) + γ ) I M + 1 ) I W ^ + δ n , N [ ( 1 p ) E + I ^ ] ( D 1 ( 1 ) I W ¯ 2 ) + ( 1 q ) I M + 1 I W ¯ 1 D 1 ( 2 ) , M < n N ;
B ( n ) = E n + I W ¯ 1 D 1 ( 2 ) + E ^ n + D 1 ( 1 ) I W ¯ 2 , n < M 1 1 , E n + I W ¯ 1 ( 0 , 1 ) D 1 ( 2 ) + E ^ n + D 1 ( 1 ) ( 0 , 1 ) I W ¯ 2 , n = M 1 1 , E n + I W ¯ 1 d i a g { 0 , 1 } D 1 ( 2 ) + E ^ n + D 1 ( 1 ) I 2 W ¯ 2 , M 1 n < M , I M + 1 D 1 ( 1 ) 1 1 I W ¯ 2 , n = M ; I M + 1 D 1 ( 1 ) I W ¯ 2 , M < n < N ;
F ( n ) = M n I W ^ , 1 n M 1 1 , M n I W ¯ 1 ( 1 , 1 ) T I W ¯ 2 , n = M 1 , M n I W ¯ , M 1 < n M , M n I W ¯ 1 ( 1 , 0 ) I W ¯ 2 , n = M + 1 ; M n I W ^ , M + 1 < n N ;
H ( n ) = O , n < M 1 , q I n + 1 I W ¯ 1 1 0 0 0 D 1 ( 2 ) , M 1 n < M , q I M + 1 I W ¯ 1 1 0 1 0 D 1 ( 2 ) , M = n ; q I M + 1 I W ¯ 1 D 1 ( 2 ) + δ n , N p E ( D 1 ( 1 ) I W ¯ 2 ) , M < n N ;
U ( n ) = α E n + I W ^ , n < M 1 1 , α E n + I W ¯ 1 0 1 I W ¯ 2 , n = M 1 1 , α E n + I W ¯ 1 0 0 0 1 I W ¯ 2 , M 1 n < M , O , M n N 1 ;
L ( n ) = γ I n + 1 I W ^ , n < M 1 , γ I n + 1 I W ¯ + α I n + 1 I W ¯ 1 1 q 0 0 0 I W ¯ 2 , M 1 n < M , ( γ + ( 1 q ) α ) I M + 1 I W ¯ , n = M , ( γ + ( 1 q ) α ) I M + 1 I W ^ , M < n N .
Proof of the lemma can be implemented by means of an analysis of different scenarios involving the behavior of the Markov chain η t during an interval of a very small duration while accounting for the transparent probabilistic meaning of all involved matrices and the extensive use of the operator of the Kronecker product and sum of matrices, which is not presented here.
The block-tridiagonal form of the generator Q obviously follows from the fact that during a very short interval the number of requests in the orbit can only not change its value or decrease or increase by one. This follows from the properties of the M A P and the exponential distribution of service, retrial, and impatience rimes.
The block-tridiagonal form of the matrices Q i , i , block-twodiagonal form of the matrices Q i , i 1 , and block-diagonal form of the matrices Q i , i + 1 analogously follows from the same properties.

4. Ergodicity (Stability) of the Process of the System States

Theorem 1.
As it is assumed that the probability of refusal on joining a busy system upon arrival or retrial is positive (i.e., q < 1 ) and requests can depart from the orbit without receiving service (i.e., γ > 0 ), the Markov chain η t is ergodic for any set of the system parameters.
To prove this Theorem, we use the results for Asymptotically Quasi-Toeplitz Markov Chains ( A Q T M C ) presented in [30]. To prove that the Markov chain η t indeed belongs to the class of such chains, it is necessary to verify the existence of the limits
Y 0 = lim i R i 1 Q i , i 1 , Y 1 = lim i R i 1 Q i , i + I , Y 2 = lim i R i 1 Q i , i + 1
where R i is a diagonal matrix with the elements defined as the moduli of the corresponding diagonal entries of the matrix Q i , i , i 0 .
Then, it follows from [30] that the sufficient condition for ergodicity of the A Q T M C is that the inequality
y Y 0 e > y Y 2 e
is fulfilled, where the row vector y is the unique solution to the system of linear algebraic equations
y ( Y 0 + Y 1 + Y 2 ) = y , y e = 1 ,
while the sufficient condition for non-ergodicity of the A Q T M C is the fulfillment of the inequality
y Y 0 e < y Y 2 e .
It may be easily verified that the limits (2) for the Markov chain η t do exist and are provided by the formulas
Y 0 =
γ γ + α I W ^ α γ + α E 0 + I W ^ O O O O O O γ γ + α I M W ^ α γ + α E M 1 + I W ¯ 1 0 1 I W ¯ 2 O O O O O I ( M + 1 ) W ¯ O O O O O O O O O O O O O I ( M + 1 ) W ^ ,
Y 1 = O , Y 2 = O .
Then, it is evident when accounting for (4) and (5) that inequality (3) turns into the trivial form 1 > 0 , which implies that the Markov chain η t is ergodic for any values of the system parameters. Thus, the theorem is proven.
Remark 1.
The statement of the Theorem is intuitively transparent because if any request can abandon joining the orbit or depart from there without service, then the number of requests in the orbit cannot infinitely grow and the process η t is ergodic.

5. Computation of Invariant Distribution of the Markov Chain and Key Performance Characteristics of the System

Let us assume that the ergodicity condition is fulfilled. Then, the following invariant probabilities exist:
π ( i , n , l , ν ( 1 ) , ξ , ν ( 2 ) ) = lim t P { i t = i , n t = n , l t = l , ν t ( 1 ) = ν ( 1 ) , ξ t = ξ , ν t ( 2 ) = ν ( 2 ) } ,
i 0 , n = 0 , N ¯ , l = 0 , min { n , M } ¯ , ν ( 1 ) = 0 , W 1 ¯ , ξ = 0 , 1 , ν ( 2 ) = 0 , W 2 ¯ .
Let us construct the row vectors of the invariant probabilities π i of the levels as follows.
The row vector π ( i , n , l ) consists of invariant probabilities π ( i , n , l , ν ( 1 ) , ξ , ν ( 2 ) ) enumerated in the direct lexicographic order of the components ( ν ( 1 ) , ξ , ν ( 2 ) ) .
Then, the row vectors π ( i , n ) of the macro-states are defined by
π ( i , n ) = ( π ( i , n , 0 ) , π ( i , n , 1 ) , , π ( i , n , min { n , M } ) ) , n = 0 , N ¯ .
And finally,
π i = ( π ( i , 0 ) , π ( i , 1 ) , , π ( i , N ) ) , i 0 .
It is well known that the probability vectors π i , i 0 , satisfy the following system of linear algebraic equations (the Chapman–Kolmogorov equations):
( π 0 , π 1 , ) Q = 0 , ( π 0 , π 1 , ) e = 1
where Q is the infinitesimal generator of the Markov chain η t , t 0 .
Note that in the case where q = 0 and p = 0 we have a model with request loss (i.e., without retrials). In this case, the infinite size generator Q reduces to a single finite non-zero block Q 0 , 0 of the form provided above and the system of Equation (6) is finite. The invariant probability vectors of the system states in this case can be computed by the direct solution of system (6) by computation or by means of numerically stable algorithms; see, e.g., [31,32,33].
In the general case, system (6) has infinite size and cannot be directly solved by computation except by performing its truncation. Instead of such a rough method, the system can be solved by means of the numerically stable algorithms developed in [30,34] and based on replacement of this system by the infinite system derived using the notion of censored Markov chains; see, e.g., [35,36]. The new system has a better structure of the generator that allows for its solution via elaborate and effective numerical algorithms.
The algorithms presented in [30,34] are oriented to a more general form of the generator Q (i.e., blocks above the off-diagonal blocks are not mandatory equal to zero). The version of the algorithm exactly oriented to a block-tridiagonal form of the generator Q can be found, e.g., in [37].
For the reader’s convenience, here we present a very short outline of the algorithm for the computation of the vectors of the invariant probabilities π i , i 0 .
Step 1 Compute the sequence of the matrices G i from backward recursion:
G i = [ ( Q i + 1 , i + 1 + Q i + 1 , i + 2 G i + 1 ) ] 1 Q i + 1 , i , i 0 ,
with terminal condition G = Y 0 .
Step 2 Compute the non-negative matrices Φ i , i 0 from direct recursion
Φ 0 = I K W ¯ , Φ i = Φ i 1 Q i 1 , i [ ( Q i , i + Q i , i + 1 G i ) ] 1 , i 1 .
Step 3 Compute the probability vector π 0 as the unique solution to the system
π 0 ( Q 0 , 0 + Q 0 , 1 G 0 ) = 0 , π 0 l = 0 Φ l e = 1 .
Step 4 Compute the vectors of the invariant probabilities π i , i 1 by the formula
π i = π 0 Φ i , i 1 .
Details of computer implementation of this algorithm can be found in [30,34,37].
After the vectors of the invariant probabilities π i , i 0 have been found, it is possible to compute a variety of performance characteristics of the system.
The invariant distribution of the number of requests in the orbit is
lim t P { i t = i } = π i e , i 0 .
The mean number of requests in the orbit is
L o r b i t = i = 1 i π i e .
The mean number of requests in the system is
L = i = 0 n = 0 N ( i + n ) π ( i , n ) e .
The mean number of busy servers is
N s e r v e r = i = 0 n = 1 N n π ( i , n ) e .
The mean number of busy servers providing service to type-1 requests is
N s e r v e r ( 1 ) = i = 0 n = 1 N l = 0 min { n , M } ( n l ) π ( i , n , l ) e .
The mean number of busy servers providing service to type-2 requests is
N s e r v e r ( 2 ) = i = 0 n = 1 N l = 1 min { n , M } l π ( i , n , l ) e = N s e r v e r N s e r v e r ( 1 ) .
The intensity of output of type-1 requests is
λ o u t ( 1 ) = μ 1 N s e r v e r ( 1 ) .
The intensity of output of type-2 requests is
λ o u t ( 2 ) = μ 2 N s e r v e r ( 2 ) .
The intensity of output of requests from the system is
λ o u t = λ o u t ( 1 ) + λ o u t ( 2 ) .
The loss probability of type-1 requests is
P 1 ( l o s s ) = λ 1 1 i = 0 π ( i , N , 0 ) ( D 1 ( 1 ) I W ¯ 2 ) e = 1 λ o u t ( 1 ) λ 1 .
The loss probability of type-2 requests is
P 2 ( l o s s ) = 1 λ o u t ( 2 ) λ 2 .
The loss probability of an arbitrary request is
P ( l o s s ) = 1 λ o u t λ
where λ = λ 1 + λ 2 .
The probability of type-2 request loss upon arrival is computed by
P ( e n t l o s s ) = ( 1 q ) λ 2 1 i = 0 [ n = M 1 M 1 π ( i , n ) ( I ( n + 1 ) W ¯ 1 1 0 0 0 D 1 ( 2 ) ) e +
+ π ( i , n ) ( I 2 ( M + 1 ) W ¯ 1 D 1 ( 2 ) ) e + n = M + 1 N π ( i , n ) ( I ( M + 1 ) W ¯ 1 D 1 ( 2 ) ) e ] .
The probability that a type-2 request enters the orbit upon arrival is computed by
P ( e n t t o o r b i t ) = q λ 2 1 i = 0 [ n = M 1 M 1 π ( i , n ) ( I ( n + 1 ) W ¯ 1 1 0 0 0 D 1 ( 2 ) ) e +
+ π ( i , n ) ( I 2 ( M + 1 ) W ¯ 1 D 1 ( 2 ) ) e + n = M + 1 N π ( i , n ) ( I ( M + 1 ) W ¯ 1 D 1 ( 2 ) ) e ] .
The rate of type-2 requests lost upon arrival is λ ˜ 2 = P ( e n t l o s s ) λ 2 .
The probability that an arbitrary type-2 request will be forced to terminate service and go into the orbit is
P ( t e r m i n a t i o n t o o r b i t ) = p λ 2 1 i = 0 l = 1 M π ( i , N , l ) ( D 1 ( 1 ) I W ¯ 2 ) e .
The probability of an arbitrary type-2 request being forced to terminate service leading to loss is
P ( t e r m i n a t i o n l o s s ) = ( 1 p ) λ 2 1 i = 0 l = 1 M π ( i , N , l ) ( D 1 ( 1 ) I W ¯ 2 ) e .
The probability of a type-2 request being lost due to non-persistence is computed by
P ( n o n p e r s l o s s ) = ( 1 q ) λ 2 1 i = 0 i α [ n = M 1 M 1 π ( i , n ) ( I ( n + 1 ) W ¯ 1 1 0 0 0 I W ¯ 2 ) e +
n = M N π ( i , n ) e ] .
The probability of a type-2 request being lost due to impatience is computed by
P ( i m p l o s s ) = γ L o r b i t λ 2 .
The probability of an arbitrary type-2 request being lost from the orbit is
P ( l o s s f r o m o r b i t ) = P 2 ( l o s s ) P ( e n t l o s s ) P ( t e r m i n a t i o n l o s s ) = P ( n o n p e r s l o s s ) + P ( i m p l o s s ) .
The mean number of state changes in the management process of admission during a unit of time is
φ = 2 i = 0 π ( i , M 1 ) M M 1 I W ¯ 1 0 1 0 0 I W ¯ 2 e .

6. Optimization Problem and Numerical Examples

The goals of this section are to briefly show the feasibility of the proposed method of constructing the generator of the Markov chain, describe the behavior of the system and computation performance characteristics of the system, and to illustrate the dependence of key performance characteristics on the parameters of the hysteresis admission control strategy.
Let us consider a system consisting of N = 20 servers. The matrices defining the arrival process of type-1 requests are as follows:
D 0 ( 1 ) = 17.053268 0.105659 0.258864 1.9187615 , D 1 ( 1 ) = 16.3406 0.607009 0.0236675 1.63623 .
This arrival process has a mean arrival intensity λ 1 = 6 , a squared coefficient of variation of inter-arrival times c v a r = 3.76129 , and a coefficient of correlation of two neighbouring inter-arrival times c c o r = 0.3 .
The matrices defining the arrival process of type-2 requests are
D 0 ( 2 ) = 21.966 0.15318 0.375292 5.692174 , D 1 ( 2 ) = 20.9328 0.88002 0.034312 5.28257 .
This arrival process has a mean arrival intensity λ 2 = 10 , a squared coefficient of variation of inter-arrival times c v a r = 1.82583 , and a coefficient of correlation of two neighbouring c c o r = 0.2 .
The other system parameters are μ 1 = 2.5 , μ 2 = 1.5 ,   q = 0.8 , p = 0.2 , α = 1 , and γ = 0.1 .
Let us now vary the parameter M over the interval [ 1 , N 1 ] and the parameter M 1 over the interval [ 1 , M ] .
First, note that the performance characteristics of the system related to type-1 requests do not depend on the parameters M and M 1 . Thus, for the example under consideration, N s e r v e r ( 1 ) = 2.399989 , λ o u t ( 1 ) = 5.99997289 , and P 1 l o s s = 4.51777 × 10 6 for all values of M and M 1 .
The dependencies of the main performance characteristics of type-2 requests on the parameters M and M 1 are presented in Figure 1, Figure 2, Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10.
The mean number of type-2 requests in the orbit ( L o r b i t ) is very large for small values of M and M 1 . This admission policy is too strict, and type-2 requests are compelled to wait for service in the orbit. With the growth of the values of M and M 1 , access by type-2 requests becomes easier and the value of L o r b i t essentially decreases.
The mean number N s e r v e r ( 2 ) of busy servers providing service to type-2 requests is small for small values M and M 1 , which restricts the value of N s e r v e r ( 2 ) from above. With the growth of the values of M and M 1 , the value of N s e r v e r ( 2 ) quickly increases as more type-2 requests receive access to the service upon arrival.
The probability P ( e n t l o s s ) of type-2 request loss upon arrival is essential for small values of M and M 1 . With the growth of the values of M and M 1 , it quickly decreases. Similar observations relate to the probability P ( i m p l o s s ) of type-2 request loss due to impatience, the probability P ( n o n p e r s l o s s ) of type-2 request loss due to non-persistence, and the probability P ( l o s s f r o m o r b i t ) of arbitrary type-2 request loss from the orbit.
The probability P ( t e r m i n a t i o n l o s s ) of an arbitrary type-2 request being forced to terminate service and being lost is quite small for small values of M and M 1 . This is because small values of M and M 1 imply strict restriction of admission of type-2 requests. Correspondingly, servicing of these requests is rarely terminated. With the growth of the values of M and M 1 , more type-2 requests are accepted into the system despite many servers being busy. This evidently implies more frequent service interruptions and a sharp increase in the probability P ( t e r m i n a t i o n l o s s ) .
The shape of the surface showing the probability P 2 ( l o s s ) of type-2 requests matches the form of the corresponding surfaces presenting the values of probabilities P ( e n t l o s s ) ,   P ( i m p l o s s ) ,   P ( n o n p e r s l o s s ) ,   P ( l o s s f r o m o r b i t ) , and P ( t e r m i n a t i o n l o s s ) , as the probability P 2 ( l o s s ) is the sum of the listed probabilities.
The loss probability P ( l o s s ) of an arbitrary request as a function of M and M 1 is similar to the probability P 2 ( l o s s ) of type-2 request loss presented in Figure 8, and the probability P ( l o s s ) is essentially less than the probability P 2 ( l o s s ) . This is easily explained by the fact that the number N of servers in this example is chosen to be such that the probability P 1 l o s s of type-1 requests lost is very small (on the order of 10 6 ). Because 37.5 percent of arriving requests are type-1 requests, which are rarely lost, the value of P ( l o s s ) is essentially less than the value of P 2 ( l o s s ) .
As anticipated, the value of φ is essentially larger when the values of the thresholds M and M 1 are close to each other. This value quickly decreases when the difference between M M 1 increases.
It is worth noting that all dependencies demonstrated in Figure 1, Figure 2, Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10 are more or less intuitively clear. The actual value of the results of the presented analysis is that it allows for evaluation of the dependencies both qualitatively and quantitatively.
Having clarified the shapes of the dependencies of the main performance characteristic of the system on the thresholds, we now illustrate the possibility of using the results of the presented analysis to optimize admission control in the considered system via proper choice of the thresholds M and M 1 , thereby defining the strategy of control.
Let the quality of the control of system operation be evaluated via the following cost function:
E = E ( M , M 1 ) = λ 2 ( a P ( e n t l o s s ) + b 1 P ( t e r m i n a t i o n l o s s ) + b 2 P ( t e r m i n a t i o n t o o r b i t ) +
+ c P ( i m p l o s s ) + d P ( n o n p e r s l o s s ) ) + f φ .
Here, the cost coefficients a , b 1 , b 2 , c , d , and f define the charges of the system caused by the loss of one type-2 request upon arrival to the system, loss after service termination, moving to the orbit after service termination, loss due to impatience, loss due to non-persistence, and for each change of the state of admission managing process, respectively. In the example, we set the following values of the cost coefficients:
a = 0.2 , b 1 = 8 , b 2 = 5 , c = 0.3 , d = 0.4 , f = 0.02
The shape of the function E ( M 1 , M 2 ) is presented on Figure 11. The optimal value is E * = 0.230645 , which is reached for M = 16 and M 1 = 14 .
To determine the time spent for computation related to this example, we used the algorithm for computation of invariant distribution developed in [37] on a Lenovo Gaming 3 notebook with an Intel(R) Core(TM) i7-10750H CPU, 2.60 GHz, and 16 GB RAM in Wolfram Mathematica 12, with a result of is 10,351 s (172.51666 min). This relatively long computation time is explained by the fact that computations were implemented for all values M = 1 , N 1 ¯ and M 1 = 1 , M ¯ (190 pairs ( M 1 , M ) in total); in addition, the size K 1 of the finite blocks Q i , j of the infinite size generator Q can be quite large (e.g., for M 1 = 1 and M = 19 , this size is equal to 1756).

7. Conclusions

In this paper, we have analyzed a multi-server queueing system providing service for two types of requests. The system is suitable for modeling, in particular, of the operation of the cell of cognitive radio systems. Type-1 requests have preemptive priority over type-2 requests. Access to services by type-2 requests is restricted via a hysteresis mechanism defined by two thresholds. Their access is temporarily forbidden when the number of busy servers exceeds the higher threshold and is resumed again when this number drops below the lower threshold. Rejected type-2 requests have the options of abandoning the system or attempting to retry for service after random intervals of time. Under the fixed values of the thresholds, the dynamics of the system are described by the level-dependent six-dimensional Quasi-Birth-and-Death process. The generator of this process is written out. A sufficient condition for the ergodicity of this chain is presented and efficient algorithms for computation of its invariant distribution are recommended. The expressions for computing the main performance characteristics of the system via the vectors of the invariant probabilities of the Quasi-Birth-and-Death process are derived, and the feasibility of their use for solving optimization problems is numerically demonstrated.
Various extensions of the model can be considered based on the results presented in this paper, e.g., the randomized procedure of dropping type-2 requests and retrying requests in situations involving a lack of servers can be considered. Different thresholds defining acceptance/rejection of type-2 requests arriving from outside and from the orbit can be considered. The presence of small buffers for temporal maintenance of high priority requests and/or interrupted low priority requests can be assumed. The existence of several classes of low-priority requests with a preemptive or non-preemptive priority between the classes of low-priority requests (see, e.g., [38]) can be supposed as well. A scenario in which the processor shares discipline instead of using fixed servers can be analysed. A phase-type distribution (see, e.g., [39]) of service times instead of an exponential one can be considered, and non-reliability of servers can be allowed (see, e.g., [40]).

Author Contributions

Conceptualization A.D.; methodology, S.D. and R.M.; software, S.D., R.M. and L.R.; validation, S.D., R.M. and L.R.; formal analysis, S.D., A.D. and R.M.; investigation, A.D.; writing—original draft preparation, A.D.; writing—review and editing A.D., S.D., R.M.; supervision A.D. and S.D.; project administration A.D. and S.D. All authors read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. He, Q.M.; Xie, J.; Zhao, X. Priority queue with requestupgrades. Nav. Res. Logist. 2012, 59, 362–375. [Google Scholar] [CrossRef] [Green Version]
  2. Alipour-Vaezi, M.; Aghsami, A.; Jolai, F. Prioritizing and queueing the emergency departments patients using a novel data-driven decision-making methodology, a real case study. Expert Syst. Appl. 2022, 195, 116568. [Google Scholar] [CrossRef] [PubMed]
  3. Elalouf, A.; Wachtel, G. Queueing Problems in Emergency Departments: A Review of Practical Approaches and Research Methodologies. Oper. Res. Forum 2022, 3, 1–46. [Google Scholar] [CrossRef]
  4. Maharaj, B.T.J.; Awoyemi, B.S. Developments in Cognitive Radio Networks. In Future Directions for Beyond 5G; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
  5. Huang, S.; Yuan, D.; Ephremides, A. Bandwidth partition and allocation for efficient spectrum utilization in cognitive communications. J. Commun. Netw. 2019, 21, 353–364. [Google Scholar] [CrossRef]
  6. Zhao, Y.; Yue, W.; Saffer, Z. Spectrum allocation strategy with a probabilistic preemption scheme in cognitive radio networks: Analysis and optimization. Ann. Oper. Res. 2022, 310, 621–639. [Google Scholar] [CrossRef]
  7. Chen, S.; Wyglinski, A.; Vuyyuru, R.; Altinas, O. Feasibility analysis of vehicular dynamic spectrum access via queueing theory model. IEEE Commun. Mag. 2011, 49, 156–163. [Google Scholar] [CrossRef]
  8. Akyildiz, I.F.; Lee, W.Y.; Vuran, M.C.; Mohanty, S. Next generation dynamic spectrum access cognitive radio wireless networks: A survey. Comput. Netw. 2006, 50, 2127–2159. [Google Scholar] [CrossRef]
  9. Konishi, Y.; Masuyama, H.; Kasara, S.; Takahashi, Y. Performance analysis of dynamic spectrum handoff scheme with variable bandwidth demand on secondary users for cognitive radio networks. Wirel. Netw. 2013, 19, 607–617. [Google Scholar] [CrossRef]
  10. Zahed, S.; Awan, I.; Cullen, A. Analytical modeling for spectrum handoff decision in cognitive radio networks. Simul. Model. Pract. Theory 2013, 38, 98–114. [Google Scholar] [CrossRef]
  11. Goel, S.; Kulshrestha, R. Queueing based spectrum management in cognitive radio networks with retrial and heterogeneous service classes. J. Ambient. Intell. Humaniz. Comput. 2022, 13, 2429–2437. [Google Scholar] [CrossRef]
  12. Dudin, A.N.; Lee, M.H.; Dudina, O.; Lee, S.K. Analysis of priority retrial queue with many types of customers and servers reservation as a model of cognitive radio system. IEEE Trans. Commun. 2016, 65, 186–199. [Google Scholar] [CrossRef]
  13. Zhu, X.A.; Shen, L.A.; Yum, T.-S. Analysis of cognitive radio spectrum access with optimal channel reservation. IEEE Commun. Lett. 2007, 11, 304–306. [Google Scholar] [CrossRef] [Green Version]
  14. Sun, B.; Lee, M.H.; Dudin, S.A.; Dudin, A.N. Analysis of multiserver queueing system with opportunistic occupation and reservation of servers. Math. Probl. Eng. 2014, 2014, 178108. [Google Scholar] [CrossRef] [Green Version]
  15. Lucantoni, D. New results on the single server queue with a batch Markovian arrival process. Commun.-Stat.-Stoch. Model. 1991, 7, 1–46. [Google Scholar] [CrossRef]
  16. Chakravarthy, S.R. The batch Markovian arrival process: A review and future work. Adv. Probab. Theory Stoch. Process. 2001, 1, 21–49. [Google Scholar]
  17. Chakravarthy, S.R. Markovian arrival processes. In Wiley Encyclopedia of Operations Research and Management Science; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2010. [Google Scholar]
  18. Heyman, D.P.; Lucantoni, D. Modelling multiple IP traffic streams with rate limits. IEEE /ACM Trans. Netw. 2003, 11, 948–958. [Google Scholar] [CrossRef]
  19. Klemm, A.; Lindermann, C.; Lohmann, M. Modelling IP traffic using the batch Markovian arrival process. Perform. Eval. 2003, 54, 149–173. [Google Scholar] [CrossRef] [Green Version]
  20. Buchholz, P.; Kemper, P.; Kriege, J. Multi-class Markovian arrival processes and their parameter fitting. Perform. Eval. 2010, 67, 1092–1106. [Google Scholar] [CrossRef]
  21. Falin, G. A survey of retrial queues. Queueing Syst. 1990, 7, 127–167. [Google Scholar] [CrossRef]
  22. Falin, G.; Templeton, J.G. Retrial Queues; CRC Press: Boca Raton, FL, USA, 1997; Volume 75. [Google Scholar]
  23. Dudin, A. Optimal multithreshold control for a BMAP/G/1 queue with N service modes. Queueing Syst. 1998, 30, 273–287. [Google Scholar] [CrossRef]
  24. Kim, C.; Dudin, A.; Dudin, S.; Dudina, O. Hysteresis control by the number of active servers in queueing system MMAP/PH/N with priority service. Perform. Eval. 2016, 101, 20–33. [Google Scholar] [CrossRef]
  25. Ferreira, F.; Pacheco, A.; Ribeiro, H. Distribution of the number of losses in busy-periods of oscillating MX/G/1/(n,a,b) systems. Comput. Oper. Res. 2021, 129, 105180. [Google Scholar] [CrossRef]
  26. Banik, A.D. Some aspects of stationary characteristics and optimal control of the BMAP/G-G/1/N() oscillating queueing system. Appl. Stoch. Model. Bus. Ind. 2015, 31, 204–230. [Google Scholar] [CrossRef]
  27. Graham, A. Kronecker Products and Matrix Calculus with Applications; Ellis Horwood: Cichester, UK, 1981. [Google Scholar]
  28. Horn, R.A.; Johnson, C.R. Topics in Matrix Analysis; Cambridge University Press: Cambridge, UK, 1991. [Google Scholar]
  29. Zhang, H.; Ding, F. On the Kronecker products and their applications. J. Appl. Math. 2013, 2013, 296185. [Google Scholar] [CrossRef] [Green Version]
  30. Klimenok, V.I.; Dudin, A.N. Multi-dimensional asymptotically quasi-Toeplitz Markov chains and their application in queueing theory. Queueing Syst. 2006, 54, 245–259. [Google Scholar] [CrossRef]
  31. Baumann, H.; Sandmann, W. Numerical solution of level dependent quasi-birth-and-death processes. Procedia Comput. Sci. 2010, 1, 1561–1569. [Google Scholar] [CrossRef] [Green Version]
  32. Kim, C.S.; Dudin, S.; Taramin, O.; Baek, J. Queueing system MMAP/PH/N/N+R with impatient heterogeneous customers as a model of call center. Appl. Math. Model. 2013, 37, 958–976. [Google Scholar] [CrossRef]
  33. Dudin, S.; Kim, C.; Dudina, O. MMAP/M/N queueing system with impatient heterogeneous customers as a model of a contact center. Comput. Oper. Res. 2013, 40, 1790–1803. [Google Scholar] [CrossRef]
  34. Dudin, S.; Dudin, A.; Kostyukova, O.; Dudina, O. Effective algorithm for computation of the stationary distribution of multi-dimensional level-dependent Markov chains with upper block-Hessenberg structure of the generator. J. Comput. Appl. Math. 2020, 366, 112425. [Google Scholar] [CrossRef]
  35. Kemeny, J.G.; Snell, J.L.; Knapp, A.W. Denumerable Markov Chains: With a Chapter of Markov Random Fields; Springer Science and Business Media: Berlin/Heidelberg, Germany, 2012; Volume 40. [Google Scholar]
  36. Zhao, Y.Q.; Liu, D. The censored Markov chain and the best augmentation. J. Appl. Probab. 1996, 33, 623–629. [Google Scholar] [CrossRef] [Green Version]
  37. Dudin, S.; Dudina, O. Retrial multi-server queueing system with PHF service time distribution as a model of a channel with unreliable transmission of information. Appl. Math. Model. 2019, 65, 676–695. [Google Scholar] [CrossRef]
  38. Xiao, X.; Zeng, F.; Jiang, H.; Xiao, Z.; Zhu, P. A Novel Dynamic Channel Assembling Strategy in Cognitive Radio Networks with Fine-grained Flow Classification. IEEE Internet Things J. 2022, 9, 19599–19614. [Google Scholar] [CrossRef]
  39. Neuts, M.F. Matrix-Geometric Solutions in Stochastic Models: An Algorithmic Approach; Courier Corporation: Chelmsford, MA, USA, 1994. [Google Scholar]
  40. Goel, S.; Kulshrestha, R. Dependability-Based Analysis for Ultra-reliable Communication in Heterogeneous Traffic Cognitive Radio Networks with Spectrum Reservation. Wirel. Pers. Commun. 2022, 1–25. [Google Scholar] [CrossRef]
Figure 1. The mean number L o r b i t of requests in the orbit as a function of M and M 1 .
Figure 1. The mean number L o r b i t of requests in the orbit as a function of M and M 1 .
Mathematics 10 03747 g001
Figure 2. The mean number N s e r v e r ( 2 ) of busy servers providing service to type-2 requests as a function of M and M 1 .
Figure 2. The mean number N s e r v e r ( 2 ) of busy servers providing service to type-2 requests as a function of M and M 1 .
Mathematics 10 03747 g002
Figure 3. The probability P ( e n t l o s s ) of type-2 request loss upon arrival as a function of M and M 1 .
Figure 3. The probability P ( e n t l o s s ) of type-2 request loss upon arrival as a function of M and M 1 .
Mathematics 10 03747 g003
Figure 4. The probability P ( i m p l o s s ) of type-2 request loss due to impatience as a function of M and M 1 .
Figure 4. The probability P ( i m p l o s s ) of type-2 request loss due to impatience as a function of M and M 1 .
Mathematics 10 03747 g004
Figure 5. The probability P ( n o n p e r s l o s s ) of type-2 request loss due to non-persistence as a function of M and M 1 .
Figure 5. The probability P ( n o n p e r s l o s s ) of type-2 request loss due to non-persistence as a function of M and M 1 .
Mathematics 10 03747 g005
Figure 6. The probability P ( l o s s f r o m o r b i t ) of arbitrary type-2 request loss from the orbit as a function of M and M 1 .
Figure 6. The probability P ( l o s s f r o m o r b i t ) of arbitrary type-2 request loss from the orbit as a function of M and M 1 .
Mathematics 10 03747 g006
Figure 7. The probability P ( t e r m i n a t i o n l o s s ) of an arbitrary type-2 request being forced to terminate service resulting in loss as a function of M and M 1 .
Figure 7. The probability P ( t e r m i n a t i o n l o s s ) of an arbitrary type-2 request being forced to terminate service resulting in loss as a function of M and M 1 .
Mathematics 10 03747 g007
Figure 8. The probability P 2 ( l o s s ) of type-2 requests loss as a function of M and M 1 .
Figure 8. The probability P 2 ( l o s s ) of type-2 requests loss as a function of M and M 1 .
Mathematics 10 03747 g008
Figure 9. The loss probability P ( l o s s ) of an arbitrary request as a function of M and M 1 .
Figure 9. The loss probability P ( l o s s ) of an arbitrary request as a function of M and M 1 .
Mathematics 10 03747 g009
Figure 10. The mean number φ of state changes in the management process of admission during a unit of time as a function of M and M 1 .
Figure 10. The mean number φ of state changes in the management process of admission during a unit of time as a function of M and M 1 .
Mathematics 10 03747 g010
Figure 11. The cost criterion E as a function of M and M 1 .
Figure 11. The cost criterion E as a function of M and M 1 .
Mathematics 10 03747 g011
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Dudin, A.; Dudin, S.; Manzo, R.; Rarità, L. Analysis of Multi-Server Priority Queueing System with Hysteresis Strategy of Server Reservation and Retrials. Mathematics 2022, 10, 3747. https://doi.org/10.3390/math10203747

AMA Style

Dudin A, Dudin S, Manzo R, Rarità L. Analysis of Multi-Server Priority Queueing System with Hysteresis Strategy of Server Reservation and Retrials. Mathematics. 2022; 10(20):3747. https://doi.org/10.3390/math10203747

Chicago/Turabian Style

Dudin, Alexander, Sergey Dudin, Rosanna Manzo, and Luigi Rarità. 2022. "Analysis of Multi-Server Priority Queueing System with Hysteresis Strategy of Server Reservation and Retrials" Mathematics 10, no. 20: 3747. https://doi.org/10.3390/math10203747

APA Style

Dudin, A., Dudin, S., Manzo, R., & Rarità, L. (2022). Analysis of Multi-Server Priority Queueing System with Hysteresis Strategy of Server Reservation and Retrials. Mathematics, 10(20), 3747. https://doi.org/10.3390/math10203747

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop