Next Article in Journal
Improved Yield Prediction of Winter Wheat Using a Novel Two-Dimensional Deep Regression Neural Network Trained via Remote Sensing
Previous Article in Journal
Ratiometric Temperature Sensing Using Highly Coupled Seven-Core Fibers
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Non-Stationary Characteristics of AQM Based on the Queue Length

by
Andrzej Chydzinski
Department of Computer Networks and Systems, Silesian University of Technology, Akademicka 16, 44-100 Gliwice, Poland
Sensors 2023, 23(1), 485; https://doi.org/10.3390/s23010485
Submission received: 21 November 2022 / Revised: 21 December 2022 / Accepted: 22 December 2022 / Published: 2 January 2023
(This article belongs to the Section Communications)

Abstract

:
We performed a non-stationary analysis of a class of buffer management schemes for TCP/IP networks, in which the arriving packets were rejected randomly, with probability depending on the queue length. In particular, we derived formulas for the packet waiting time (queuing delay) and the intensity of packet losses as functions of time. These results allow us to observe how the evolution of the waiting time and losses depend on initial conditions (e.g., the full buffer) and system parameters (e.g., dropping probabilities, load, packet size distribution). As side results, the stationary waiting time and packet loss probability were obtained. Numerical examples demonstrate applicability of the theoretical results.

1. Introduction

Contemporary TCP/IP networks suffer from bufferbloat [1,2,3], i.e., frequent occurrences of long queues of packets in the output buffers of routers. Bufferbloat not only causes performance degradation of TCP/IP networks in terms of extending the mean packet delivery time and its variance, but has also unpleasant side effects. These include synchronization of high and low-intensity cycles among TCP connections and lockouts of TCP connections with long round-trip times [4].
To mitigate bufferbloat, various active queue management (AQM) algorithms for admission of packets arriving at the router’s buffer were proposed (see, e.g., [5,6,7,8,9] and the references therein). The central idea of these algorithms is that some arriving packets are rejected randomly, with a probability that evolves in time with evolving network conditions. This probability is, therefore, recomputed frequently, depending on the current or past buffer occupancies, packet rejection history, buffer overflow events, arrival rates, or other factors. Deleting some packets upon arrival not only prevents the growth of the queue length immediately, but also informs TCP sources about worsening network conditions and the need to reduce their sending rates. On the other hand, the random nature of the acceptance–rejection process reduces the synchronization of TCP connections.
AQM algorithms are also studied in the context of wireless sensor networks (WSNs) (see, e.g., [10,11,12,13,14] and the references therein). In WSNs, AQM is an effective means of congestion avoidance and mitigation of packet losses caused by buffer overflows. In fact, in some WSNs (e.g., in healthcare), buffer overflows and losses should be avoided even more than in wired TCP/IP networks (see the discussion in [11]).
An important group of AQM algorithms uses the current queue length to compute the rejection probability. Namely, the probability of rejecting a packet is a function of the length of the queue upon this packet’s arrival. For obvious reasons, this function should be non-decreasing. Several functions were proposed and tested in simulations so far, including a linear function, broken-linear, quadratic, a hybrid of cubic and linear, product of a linear and logarithmic one, and a beta function, see [15,16,17,18,19,20], respectively. Recently, such algorithms have been implemented in a prototype device and tested in a real network of a large university [21]. Besides wired TCP/IP networks, algorithms of this type are postulated for wireless sensor networks (see, e.g., [13,14], where a linear probability of dropping a packet is used).
In this paper, we studied the mathematical model of the AQM scheme with rejections based on the queue length. Such a model has already been studied in a few papers (the details will be given in the next section). The majority of these papers, however, are devoted to the stationary analysis of the queue length. Herein, we perform the non-stationary (transient) analysis of the model and study different, equally important characteristics, namely the waiting time and the number of losses. These characteristics are studied at the particular time t, which can be small or large. The main contributions of this paper are as follows:
  • A new formula on the average virtual waiting time (workload) at the time t (Theorem 3);
  • New formulas on the average number of packets lost in the interval ( 0 , t ) and the local intensity of losses at the time t (Theorems 5 and 6);
  • New formulas on the stationary workload and loss probability (Theorems 4 and 7);
  • New formulas on the joint distribution of the number of accepted packets and losses in a given interval (Theorems 1 and 2);
  • Numerical examples computed for different initial states of the system, dropping probabilities, loads, and service time distributions.
Non-stationary characteristics provide deeper insight into the operation of a system, than their stationary counterparts, for several reasons. First of all, they are more general. From a non-stationary characteristic, it is usually easy to obtain the stationary one by letting t , but not vice versa. Herein, we will obtain the stationary waiting time and loss probability as simple corollaries from general, non-stationary results. However, non-stationary results enable much more than that. For instance, they allow us to observe how long the system needs to converge to the steady state, how the convergence time depends on the system parameters, and the characteristics of interest depend on the initial conditions. All of these will be demonstrated herein in numerical examples. We will see how the system load, service time (packet size) distribution, and dropping probabilities influence the convergence time. Moreover, we will check the dependency of the state of the system shortly after the beginning of its operation, on the initial buffer occupancy.
It should be stressed that we are interested in the practical applicability of the theoretical results. Therefore, all the necessary auxiliary results are presented and discussed, making the theorems fully applicable in numerical calculations. In particular, we prove a theorem on the joint distribution of the number of accepted packets and losses in a given interval, when the service is suspended. This is not only needed in order to use the main theorems in practice, but is also an important characteristic on its own. We also recommend a method of inverting the Laplace transform. Finally, to make the results as widely applicable as possible, the service time distribution, which here is proportional to the packet size distribution, is general and may assume an arbitrary form. The function assigning dropping probabilities to queue lengths is also general. Therefore each of the aforementioned functions can be used, as well as any other.
The remainder of the article is structured in the following manner. In Section 2, we characterize previous work on queues with rejections based on the queue length. Then, the  model of interest is formally described in Section 3. In Section 4, the analytical framework used in the paper is sketched and an important auxiliary result is obtained, i.e., the joint distribution of the number of accepted and lost packets in a given interval, when the service is suspended. In Section 5, the transient analysis of the waiting time is carried out. The main result of this section is Theorem 3, on the Laplace transform of the transient virtual waiting time. As a side result, the stationary virtual waiting time is obtained in Theorem 4. In Section 6, the transient analysis of the number of lost packets is performed. The main results are Theorem 5, on the Laplace transform of the number of lost packets in the interval ( 0 , t ) , and Theorem 6, on the intensity of losses at the time t. As a side result, the stationary loss probability is obtained in Theorem 7. In Section 7, all the steps needed to calculate the transient and stationary characteristics are systemized in an algorithmic manner. Then, in Section 8, numerical examples are presented and discussed. They demonstrate the transient behavior of the waiting time and losses, depending on dropping probabilities, queue length, system load and service time distribution. Furthermore, the theoretical results are verified by means of a discrete-event simulator. In Section 9, final conclusions are presented.

2. Related Work

To the best of the author’s knowledge, the results presented herein are new.
So far, majority of papers on the model of interest have been devoted to the stationary analysis of the queue length, under different assumptions on the arrival and service times. The model with exponential inter-arrival times and exponential service times was studied in [22,23,24,25]. In particular, the case with linear dropping probabilities was studied in [22], while the case with arbitrary dropping probabilities in [23,24]. In [25], a generalization, such that an arriving packet is accepted with probability depending on the available capacity of a continuous buffer, was considered. The model with general inter-arrival times and exponential service was studied in [26,27]. Namely, an approximate solution was presented in [26], while the exact solution in [27]. In [28], the system with general service times and exponential arrivals was studied, while in [29,30], its generalization to the continuous buffer. The transient queue length was investigated in [31,32,33], for a few types of the arrival process. Namely, a Poisson process was assumed in [31], a modulated Poisson process in [32] and a general renewal process in [33]. Finally, probability that in a given time interval the queue length is maintained under some levels was derived in [34].
Herein, we study different, equally important characteristics, i.e., the transient waiting time and intensity of losses. Note that in the non-stationary case, there is no simple relation between the average queue length and the waiting time. Little’s law, which constitutes a relation between the two, is valid only in the stationary case. Therefore, in the transient case separate formulas are required for the average queue length, waiting time, and loss intensity.
In this paper, a simplified model of traffic is used, i.e., the Poisson process. The reason why this process is used is that it makes the exact, transient analysis of the whole AQM model possible. The AQM model analyzed herein has several aforementioned features, which are of practical importance and have never been taken into account simultaneously. This comes with the cost of increased analytical complexity. In the literature, we can find analytical AQM models with much more detailed TCP traffic than herein, e.g., [35,36,37,38]. However, these models do not take into account some other properties of the system, which are taken into account herein. Moreover, they are approximate in nature—they treat network traffic as a continuous, rather than discrete, flow. There are also many TCP/AQM studies with very precise, discrete traffic models, but conducted via simulations only (e.g., [15,16,17,18,19,20]). Herein, we perform an exact, mathematical analysis of the discrete model, using tools and methods of the queuing theory.

3. Queuing Model

We are interested in a queuing model with one server (here an output link). Packets arrive according to the Poisson process of rate λ and form a queue if the server is busy upon arrival. The service time has an arbitrary distribution and its distribution function is denoted by F ( t ) . The order of service of packets in the queue is not specified, it can be of any type.
Each arriving packet may not be permitted to enter the system. This happens randomly, with probability d ( k ) , where k is the queue length on the arrival time of this packet. A rejected packet is deleted, so it is called a loss. We assume the finite buffer capacity with K positions in total, taking into account the service position. Therefore, function d ( k ) must fulfill the following assumption: d ( k ) = 1 for k K . Besides the latter, function d ( k ) may have an arbitrary form.
The following notation will be of use. By  X ( t ) we will denote the queue length at the time t. We adopt the convention that the length of the queue includes the service position, when this position is occupied. By  F ¯ , we denote the mean service time:
F ¯ = 0 t d F ( t ) ,
and assume that F ¯ < . By  S, we denote the standard deviation of F. The load of the queue is defined as:
ρ = λ F ¯ .
Without loss of generality, we may assume that the time origin corresponds to the service completion epoch. Therefore, a new service is initiated at t = 0 , if only X ( 0 ) > 0 .

4. Analytical Framework and Auxiliary Results

The analytical framework used herein is based on tools and methods of the queuing theory and can be sketched as follows.
To find transient characteristics, we first build integral equations of the Volterra type. Then these equations are transformed into linear equations using the Laplace transform. The solutions of these linear equations are presented in a traditional way, using inverted square matrices. Finally, to move from the transform domain to the time domain, we use an inversion method for the Laplace transform.
To find stationary characteristics, we alter the last step, i.e., we do not invert the Laplace transform. Instead, we use the well-known property of the Laplace transform. Namely, if  g ( s ) is the Laplace transform of function G ( t ) , which has a limit as t , then it holds:
lim t G ( t ) = lim s 0 + s g ( s ) .
In practice, to obtain a stationary characteristic, we have to compute the value of s g ( s ) for a small, positive s.
Finally, when building integral equations, we need a special characteristic of the system, i.e., the joint distribution of the number of accepted packets and losses in a given interval, when the service is suspended. This characteristic will be found in this section.
Let R n , i , j ( t ) denote the probability that in the interval ( 0 , t ) the number of accepted packets is i and the number of lost packets is j, under the condition that no service is completed in ( 0 , t ) and X ( 0 ) = n . Let Q n , i ( t ) denote the probability that in the interval ( 0 , t ) the number of accepted packets is i, given that no service is completed in ( 0 , t ) and X ( 0 ) = n .
The problem of finding Q n , i ( t ) was already solved in article [28]. Namely, it was shown that:
q n , i ( s ) = j = 0 i 1 λ ( 1 d ( n + j ) ) j = 0 i s + λ ( 1 d ( n + j ) ) ,
where
q n , i ( s ) = 0 e s t Q n , i ( t ) d t .
Formula (3) allows us to find effectively Q n , i ( t ) using one of the methods of the Laplace transform inversion.
Characteristic R n , i , j ( t ) has not been derived so far. Therefore, we start with proving the following theorem.
Theorem 1. 
For every n 0 , it holds:
r n , 0 , 0 ( s ) = 1 s + λ ,
r n , i , 0 ( s ) = ( 1 d ( n ) ) r n + 1 , i 1 , 0 ( s ) λ s + λ , i 1 ,
r n , 0 , j ( s ) = d ( n ) r n , 0 , j 1 ( s ) λ s + λ , j 1 ,
r n , i , j ( s ) = ( 1 d ( n ) ) r n + 1 , i 1 , j ( s ) λ s + λ + d ( n ) r n , i , j 1 ( s ) λ s + λ , i 1 , j 1 ,
where
r n , i , j ( s ) = 0 e s t R n , i , j ( t ) d t .
Proof. 
Assume an arbitrary n 0 . First, note that in order to have no accepted packets and no losses by the time t, there must be no arrivals by the time t. Therefore, the first arrival must happen after t. Hence:
R n , 0 , 0 ( t ) = e λ t .
Second, to have at least one accepted packet and no losses by the time t, there must be a packet arrival by the time t and this packet must be accepted. Thus, conditioning on the first arrival time, u, we have:
R n , i , 0 ( t ) = ( 1 d ( n ) ) 0 t λ e λ u R n + 1 , i 1 , 0 ( u ) d u , i 1 .
Similarly, to have no accepted packets and at least one loss by the time t, there must be a packet arrival by the time t and this packet must be lost. Therefore, conditioning on the first arrival time, u, yields:
R n , 0 , j ( t ) = d ( n ) 0 t λ e λ u R n , 0 , j 1 ( u ) d u , j 1 .
Finally, to have at least one accepted packet or at least one loss by the time t, there must be a packet arrival by the time t, which can be accepted or lost. In this case we obtain:
R n , i , j ( t ) = ( 1 d ( n ) ) 0 t λ e λ u R n + 1 , i 1 , j ( u ) d u + d ( n ) 0 t λ e λ u R n , i , j 1 ( u ) d u , i 1 , j 1 .
Now the proof can be completed easily. Applying the Laplace transform to (10)–(13) yields (5)–(8), respectively.    □
Recursive formulas (5)–(8) can be also combined in an explicit formula for r n , i , j ( s ) in the following theorem.
Theorem 2. 
For every n 0 , i 0 , j 0 it holds:
r n , i , j ( s ) = λ i + j ( s + λ ) i + j + 1 k = 0 i 1 ( 1 d ( k + n ) ) m 0 , , m i 0 , m 0 + + m i = j l = 0 i d m l ( n + l ) .
The proof can be carried out using formulas (5)–(8) and mathematical induction.
Now, R n , i , j ( t ) can be found effectively using either the recursive formulas (5)–(8), or the explicit formula (14), combined with one of the methods of the Laplace transform inversion. In practice, (5)–(8) are more useful than (14). They enable fast calculation of r n , i , j ( s ) for arbitrary s and a quick inversion of the transform. Formula (14), although having a compact form, is computationally more demanding than (5)–(8), due to the need of finding all divisions m 0 , , m i 0 , such that m 0 + + m i = j .

5. Waiting Time

Let V n ( t ) denote the average virtual waiting time at the time t, assuming X ( 0 ) = n . This is the average time a hypothetical packet entered the system at the time t, was accepted, and would spend in the queue before the service. In other words, V n ( t ) is the average unfinished work (workload) at the time t. Naturally, V n ( t ) is a non-stationary characteristic, which depends on time and the initial buffer occupancy, X ( 0 ) .
The main purpose of this section is to derive the Laplace transform of V n ( t ) , i.e.,
v n ( s ) = 0 e s t V n ( t ) d t .
Assume first 1 n K . In such case, a new service is initiated at the time t = 0 . Using the formula of total probability with respect to the completion time of this service, u, we can build the following integral equation:
V n ( t ) = k = 0 K n 0 t Q n , k ( u ) V n + k 1 ( t u ) d F ( u ) + k = 0 K n Q n , k ( t ) t u t + ( n + k 1 ) F ¯ d F ( u ) .
In particular, the first part of (16) covers the case where the first service is completed by the time t. In this case, the new queue length at the time u is n + k 1 with probability Q n , k ( u ) , defined in the previous section. The second part covers the case where the first service is completed after t. In that case, there are n + k packets in the system at the time t, with probability Q n , k ( t ) . Moreover, one of these packets is already in service, and the remaining service time is u t . Therefore, to compute the average workload at t, we have to sum u t and n + k 1 full service times, each on average equal to F ¯ .
Assume now n = 0 . In such a case, the system waits for the first arrival to initiate the first service. Using the formula of total probability with respect to the first arrival time, v, we now have the following integral equation:
V 0 ( t ) = 1 d ( 0 ) 0 t λ e λ v V 1 ( t v ) d v + d ( 0 ) 0 t λ e λ v V 0 ( t v ) d v .
The first part of (17) covers the case where the first packet arrives by the time t and is permitted to enter. Therefore, the new queue length at the time v is 1. The second part covers the case where the first packet arrives by the time t and is rejected. Therefore, the queue length remains 0 at the time v. In the case, where the first packet arrives after t, the queue at the time t is empty. Hence, the workload is zero and such a case does not have to be included in (17).
Integrating by parts the second integral of (16), we have:
t u t + ( n + k 1 ) F ¯ d F ( u ) = ( n + k 1 ) F ¯ [ 1 F ( t ) ] + g ( t ) ,
with
g ( t ) = 0 ( 1 F ( v + t ) ) d v .
Thus, from (16) and (18), we have:
V n ( t ) = k = 0 K n 0 t Q n , k ( u ) V n + k 1 ( t u ) d F ( u ) + k = 0 K n ( n + k 1 ) F ¯ Q n , k ( t ) ( 1 F ( t ) ) + Q n , k ( t ) g ( t ) , 1 n K .
Applying the Laplace transform to (20), we obtain:
v n ( s ) = k = 0 K n b n , k ( s ) v n + k 1 ( s ) + h n ( s ) , 1 n K ,
where
b i , j ( s ) = 0 e s t Q i , j ( t ) d F ( t ) ,
c i , j ( s ) = 0 e s t Q i , j ( t ) ( 1 F ( t ) ) d t ,
y i , j ( s ) = 0 e s t Q i , j ( t ) g ( t ) d t ,
h n ( s ) = k = 0 K n ( n + k 1 ) F ¯ c n , k ( s ) + y n , k ( s ) .
We may also apply the Laplace transform to (17), which yields:
v 0 ( s ) = v 1 ( s ) ( 1 d ( 0 ) ) λ λ + s + v 0 ( s ) d ( 0 ) λ λ + s .
Now we can rewrite systems (21), and (26) in matrix forms. Namely, introducing column vectors v ( s ) and h ( s ) :
v ( s ) = v 0 ( s ) , , v K ( s ) T ,
h ( s ) = 0 , h 1 ( s ) , , h K ( s ) T ,
and matrix A ( s ) :
A ( s ) = [ a i j ( s ) ] i , j = 0 , , K , a i j ( s ) = d ( 0 ) λ / ( λ + s ) , if i = j = 0 , ( 1 d ( 0 ) ) λ / ( λ + s ) , if i = 0 , j = 1 , b i , j i + 1 ( s ) , if 1 i K , i 1 j K 1 , 0 , otherwise ,
from (21) and (26) we obtain:
( A ( s ) I ) v ( s ) = h ( s ) ,
where I is the identity matrix. Therefore, we have proven the following theorem.
Theorem 3. 
The Laplace transform of the average virtual waiting time (workload) at the time t equals:
v ( s ) = ( A ( s ) I ) 1 h ( s ) ,
where A ( s ) is given in (29), while h ( s ) in (28) and (25).
From Theorem 3 we can obtain easily the average workload in the stationary regime, V. Namely, using properties of the Laplace transform we have:
V = lim t V 0 ( t ) = lim s 0 + s [ v ( s ) ] 1 ,
where [ ] 1 denotes the first element of a vector. Obviously, any other element can be used, because the stationary workload is independent of the initial queue length, n. Combining (31) and (32) we obtain the following theorem.
Theorem 4. 
The stationary average virtual waiting time equals:
V = lim s 0 + s ( A ( s ) I ) 1 h ( s ) 1 .

6. Number of Losses

Let L n ( t ) denote the average number of packets lost by the time t, assuming X ( 0 ) = n . Let l n ( t ) be its Laplace transform, i.e.,:
l n ( s ) = 0 e s t L n ( t ) d t .
Firstly, let us assume 1 n K . Using the law of total probability with respect to the completion time of the first service, u, we have:
L n ( t ) = k = 0 K n j = 0 0 t R n , k , j ( u ) [ j + L n + k 1 ( t u ) ] d F ( u ) + k = 0 K n j = 0 j R n , k , j ( t ) [ 1 F ( t ) ] .
The first double sum in (35) covers the situation, where the first service is completed by the time t. In such a situation, there are k acceptances and j losses by the time u with probability R n , k , j ( u ) , defined and computed in Section 4. The new queue length at the time u is n + k 1 , thus the average number of losses at the time t must equal now to j (already lost packets) plus L n + k 1 ( t u ) . The second double sum in (35) covers the situation, where the first service is completed after t, which happens with probability 1 F ( t ) . In that situation, there are k acceptances and j losses with probability R n , k , j ( t ) by the time t.
Secondly, let us assume n = 0 . Using the law of total probability with respect to the first arrival time, v, w have:
L 0 ( t ) = ( 1 d ( 0 ) ) 0 t λ e λ v L 1 ( t v ) d v + d ( 0 ) 0 t λ e λ v [ 1 + L 0 ( t v ) ] d v .
The first integral in (36) covers the situation, where the first packet arrives by the time t and is accepted, while the second integral involves the situation where the first packet arrives by the time t and is rejected. If there are no arrivals by the time t, then the number of packets lost by the time t is zero, and this situation can be omitted in (36).
Application of the Laplace transform to (35) yields:
l n ( s ) = k = 0 K n j = 0 w n , k , j ( s ) j s + l n + k 1 ( s ) + k = 0 K n j = 0 j x n , k , j ( s ) , 1 n K ,
where
w n , i , j ( s ) = 0 e s t R n , i , j ( t ) d F ( t ) ,
x n , i , j ( s ) = 0 e s t R n , i , j ( t ) ( 1 F ( t ) ) d t .
From the definitions of R n , i , j ( t ) and Q n , i ( t ) given in Section 4, it follows:
j = 0 w n , k , j ( s ) = b n , k ( s ) ,
where b n , k ( s ) is defined in (22). Therefore, from (37) and (40), we obtain:
l n ( s ) = k = 0 K n b n , k , j ( s ) l n + k 1 ( s ) + z n ( s ) , 1 n K ,
with
z n ( s ) = k = 0 K n j = 0 j w n , k , j ( s ) s + x n , k , j ( s ) .
Application of the Laplace transform to (36) gives:
l 0 ( s ) = l 1 ( s ) ( 1 d ( 0 ) ) λ λ + s + l 0 ( s ) d ( 0 ) λ λ + s + d ( 0 ) λ λ s + s 2 .
The system of Equations (41) and (43) can be presented now in the matrix form. Namely, we have:
( A ( s ) I ) l ( s ) = z ( s ) ,
where
l ( s ) = l 0 ( s ) , , l K ( s ) T ,
z ( s ) = d ( 0 ) λ λ s + s 2 , z 1 ( s ) , , z K ( s ) T ,
and matrix A ( s ) is defined in (29).
Finally, from (44), we obtain the following theorem.
Theorem 5. 
The Laplace transform of the average number of packets lost by the time t equals:
l ( s ) = ( A ( s ) I ) 1 z ( s ) ,
where A ( s ) is given in (29), while z ( s ) in (46) and (42).
The average number of losses by the time t is, obviously, a non-decreasing function of time. For a more intuitive description of the transient loss process, it is perhaps better to use the intensity of losses, I n ( t ) , defined as:
I n ( t ) = d L n ( t ) d t .
Having Theorem 5, we can easily obtain the Laplace transform of the intensity of losses. Denote:
i n ( s ) = 0 e s t I n ( t ) d t , i ( s ) = i 0 ( s ) , , i K ( s ) T ,
Using (47) and the basic properties of the Laplace transform, we arrive at the following theorem.
Theorem 6. 
The Laplace transform of the intensity of losses at the time t equals:
i ( s ) = s ( A ( s ) I ) 1 z ( s ) .
We can also obtain the stationary loss probability, i.e.,
p L = lim t I 0 ( t ) λ .
Using again properties of the Laplace transform, we have:
lim t I 0 ( t ) = lim s 0 + s [ i ( s ) ] 1 .
Finally, from (50)–(52), we have the following theorem.
Theorem 7. 
The stationary loss probability equals:
p L = 1 λ lim s 0 + s 2 ( A ( s ) I ) 1 z ( s ) 1 .

7. Calculation Procedures

In this section, we will systemize all the steps needed to perform calculations based on the proven theorems.
Before that, note that in order to obtain transient results in the time domain, we have to apply a method of numerical inversion of the Laplace transform. A very efficient method, in terms of the computation time, yet accurate enough for most practical purposes, is the Zakian method [39]. Namely, assuming that g ( s ) is the Laplace transform of function G ( t ) , the Zakian formula states:
G t 2 t 1 j = 1 5 Re w j g ( u j / t ) ,
where coefficients w j and u j are given in Table 1.
Now we can present the final computational procedures. Firstly, assume that we want to obtain the average waiting time, the average number of losses, and the average intensity of losses, at some particular time t 0 , given that the initial queue length was n 0 . The procedure is sketched in Algorithm 1.
Finally, we should extract the entry number n 0 of each resulting vector, V , L , and  I , to obtain the average waiting time, the average number of losses, and the average intensity of losses at time t 0 , respectively, for the initial queue length n 0 .
Algorithm 1 Transient characteristics
1:
procedure
2:
     t : = t 0
3:
    for  j = 1 , , 5  do
4:
         s j : = u j / t , where u j is given in Table 1
5:
        compute matrix A j : = A ( s j ) using formula (29)
6:
        compute vector h j : = h ( s j ) using formulas (28) and (25)
7:
        compute vector z j : = z ( s j ) using formulas (46) and (42)
8:
        compute vector v j : = ( A j I ) 1 h j
9:
        compute vector l j : = ( A j I ) 1 z j
10:
       compute vector i j : = s j l j
11:
    compute vector V : = 2 t 1 j = 1 5 Re w j v j , where w j is given in Table 1
12:
    compute vector L : = 2 t 1 j = 1 5 Re w j l j
13:
    compute vector I : = 2 t 1 j = 1 5 Re w j i j
14:
    close;
Stationary characteristics are easier to obtain because the inversion of the Laplace transform is not required. Instead, we have to compute the limits in (33) and (53), by using a small value of s. In most practical applications, s = 10 8 provides sufficiently accurate results. The procedure for calculating the stationary average waiting time and stationary loss probability is sketched in the following Algorithm 2.
Algorithm 2 Stationary characteristics
1:
procedure
2:
     s : = 10 8
3:
    compute matrix A : = A ( s ) using formula (29)
4:
    compute vector h : = h ( s ) using formulas (28) and (25)
5:
    compute vector z : = z ( s ) using formulas (46) and (42)
6:
    compute vector V : = s ( A I ) 1 h
7:
    compute vector p : = s 2 λ ( A I ) 1 z
8:
    close;
From the resulting vector V , we should extract the first entry to obtain the stationary average waiting time. To obtain the stationary loss probability, we take the first entry of vector p .

8.  Examples

In this section, we will present a few numerical examples demonstrating the evolution in time of the virtual waiting time and intensity of losses, depending on the aggressiveness of function d ( k ) , the initial buffer occupancy, and queue load and service time distribution ( d 1 ( k ) is more aggressive than d 2 ( k ) if d 1 ( k ) d 2 ( k ) for every k).
The service time distribution is hyperexponential, with the following parameters: ( p 1 , p 2 ) = ( 4 5 , 1 5 ) , and ( μ 1 , μ 2 ) = ( 2 , 1 3 ) . It can be checked that the mean service time is 1, while the standard deviation is 1.73, which is a moderate value, but significantly higher than in the exponential distribution. This service time distribution is altered only in Section 8.4, where distributions with larger deviations are considered as well.
The arrival rate is 1.1 , resulting in a slightly overloaded queue, ρ = 1.1 . This is altered only in Section 8.3, where strongly overloaded and strongly underloaded queues are considered as well.

8.1. Function d ( k )

In this subsection, we study the effect of the following five functions d ( k ) on the evolution of the virtual waiting time and intensity of losses:
d 1 ( k ) = 0 , if k < 15 , ( k 15 ) / 15 , if 15 k < 30 , 1 , if k 30 ,
d 2 ( k ) = d 1 2 ( k ) ,
d 3 ( k ) = d 1 ( k ) ,
d 4 ( k ) = 1 2 d 1 ( k ) , if k < 30 , 1 , if k 30 ,
d 5 ( k ) = d 1 ( k + 5 ) .
These functions are depicted in Figure 1. The following idea is behind such a choice. The linear function d 1 is the starting point. Functions d 2 and d 3 operate on the same interval as d 1 , but d 2 is less aggressive than d 1 and convex, while d 3 is more aggressive than d 1 and concave. Therefore, comparing the results for d 1 d 3 , we can study the impact of the aggressiveness of function d in terms of its convexity. The next function, d 4 , operates on the same interval as d 1 , but has dropping probabilities scaled by the factor of 1 2 . Thus comparing the results for d 1 and d 4 , we can study the impact of aggressiveness of function d, understood as the scaling factor. Finally, d 5 has the same form as d 1 , but operates on a different interval, i.e., it begins to reject packets more quickly than d 1 . Therefore, comparing the results for d 1 and d 5 , we can observe the impact of aggressiveness of function d in terms of its attack point.
In Figure 2, the transient virtual waiting time and the intensity of losses are depicted for functions d 1 d 5 and an initially empty buffer, X ( 0 ) = 0 .
It is easy to observe that the waiting times and intensity losses converge to stationary values in every case. For a particular function d, the convergence times are roughly the same for the waiting time and intensity of losses. However, convergence times differ among them. Namely, the system stabilizes around t = 90 if d 5 is used, around t = 120 if d 3 is used, around t = 150 if d 1 is used, and around t = 200 if d 2 or d 4 is used.
It is clear that the more aggressive function d, the shorter the convergence time. It is not crucial whether “more aggressive” means “more concave” or a “smaller attack point”.
Especially interesting are functions d 2 and d 4 . The waiting times and loss intensities for d 2 and d 4 are practically identical, on the whole time axis. This effect is quite surprising, given that d 2 and d 4 differ significantly from each other (see Figure 1). It is already known that the same value of a characteristic can be obtained by applying substantially different functions d, but only in the stationary regime, for t = . It has not been demonstrated yet that this can be achieved also on the whole time axis, t ( 0 , ) .

8.2. Initial Buffer Occupancy

In this subsection, we study the effect of the initial buffer occupancy, X ( 0 ) = n , on the evolution of the virtual waiting time and intensity of losses.
The results for n = 0 , 10, 15, 20, and 30 are depicted in Figure 3 and Figure 4. In this comparison, function d 2 is used.
As we can see, all the curves in Figure 3 converge to the same, steady-state level, in a similar time. In the same way, all the curves in Figure 4 achieve the same gradient. For n = 30 , the initial intensity of losses equals the arrival rate, i.e., I 30 ( 0 + ) = λ = 1.1 . This is due to the fact that d 2 ( k ) = 1 for k = 30 , which means that just after the start of the system, every arriving packet is lost.
It is interesting that for n = 20 the intensity of losses has a non-monotonic form, with two extrema. This is shown in detail in Figure 5, in which the time interval ( 0 , 30 ) is enlarged.

8.3. Queue Load

In this subsection, we check the effect of the queue load, ρ , on the evolution of the virtual waiting time and intensity of losses. In particular, an underloaded queue with ρ = 0.5 , a critically loaded queue with ρ = 1 and an overloaded queue with ρ = 1.5 , are tested. Moreover, X ( 0 ) = 30 and function d 4 are assumed.
The results are shown in Figure 6 and Figure 7. The most interesting observation is that for ρ = 1 the convergence time is the longest among the three. Namely, when ρ = 0.5 or ρ = 1.5 , the system becomes stable at around t = 100 , while for ρ = 1 , it is not stable even at t = 150 . Therefore, the convergence time to the steady state is not a monotonic function of the load.

8.4. Service Time Distribution

In this final subsection, we test the effect of the service time distribution on the evolution of the virtual waiting time and intensity of losses. In particular, we use three hyperexponential service time distributions, with the following parameters:
  • F 1 : ( p 1 , p 2 ) = ( 4 5 , 1 5 ) and ( μ 1 , μ 2 ) = ( 2 , 1 3 ) ,
  • F 2 : ( p 1 , p 2 ) = ( 24 25 , 1 25 ) and ( μ 1 , μ 2 ) = ( 5 2 , 10 154 ) ,
  • F 3 : ( p 1 , p 2 ) = ( 99 100 , 1 100 ) and ( μ 1 , μ 2 ) = ( 5 2 , 10 604 ) .
Each of them has a mean of 1. Therefore, the load remains the same, no matter which of the three is used. (The influence of the load was studied in the previous subsection, so now we prefer to keep it constant). F 1 F 3 have significantly different standard deviations, which are S = 1.73 , 4.28, and 8.50, respectively. In every case, X ( 0 ) = 30 , λ = 1.1 and function d 4 are used.
The results for F 1 F 3 are depicted in Figure 8 and Figure 9. At least three observations can be made in these figures.
Firstly, the value of S has a profound impact on the transient characteristics of the system, especially the workload. Compare, for instance, black curves on the left-hand sides of Figure 6 and Figure 8. In Figure 8, the workload is greater in the whole interval t ( 0 , ) compared to Figure 6, even though the load is much higher in Figure 6 compared to Figure 8. Namely, we have ρ = 1.5 versus ρ = 1.1 , and F 1 versus F 3 for the black curves, respectively, while other parameters are the same. In other words, enlarging the standard deviation has in this case a deeper impact on the transient workload than enlarging the queue load.
Secondly, the value of S seems to have a minor impact on the convergence time of the steady state. For all three distributions, F 1 F 3 , this time seems to be similar.
Thirdly, both the workload and the intensity of losses may or may not be monotonic in time, depending on S. As we can observe in Figure 8, one curve for the workload, and two curves for the intensity of losses, are not monotonic. In one case, we have two extrema. The extrema are visible more clearly in Figure 10, in which the transient intensity of losses for the distribution F 2 in the interval t ( 0 , 40 ) is depicted.

8.5. Verification via Simulations

Theoretical results proven in Section 5 and Section 6 were also verified using computer simulations. For this purpose, OMNeT++ was used [40]. OMNeT++ is a modular simulation framework, based on C++ language, designed mainly with network simulations in mind. It is available under the Academic Public License.
For the purpose of this research, the queuing system of Section 3 was implemented in OMNeT++ ver. 5.6, allowing the arbitrary configuration of the function assigning dropping probabilities to queue lengths, inter-arrival time distributions, service time distribution, and the buffer sizes.
Some special features of OMNeT++ were used due to the fact that transient simulations differ significantly from the traditional, steady-state simulations. In the latter case, the simulator works constantly for some (not short) time, enabling thousands of measurements of the characteristic of interest within one simulation run. In the transient case, the simulator works for a short time only, until a predefined t is reached. In the end, only one measurement of the characteristic of interest is taken and the simulation must be restarted, with the restored initial state of the system. Fortunately, all of these can be automatized in OMNeT++ using the repeat command in the configuration file. Furthermore, a lightweight user interface, called cmdenv, can be used in repeated simulations. It reduces to the absolute minimum the overhead related to the need of restarting the simulator over and over again.
With the help of these functionalities, 10 5 simulation runs were performed to obtain every average waiting time and number of losses. The total execution time (all runs) depended on the assumed t, but was within the range of a few minutes on an average PC. All the simulations were performed using function d 1 for dropping packets, F 1 distribution of the service time, the system load of 1.1 and X ( 0 ) = 30 .
The results are presented in Table 2 and Table 3, for the transient waiting times and numbers of losses, respectively. As we can see, simulation results agree very well with their theoretical counterparts.

9. Conclusions

In this paper, the time-dependent analysis of the AQM scheme with rejections based on the queue length was carried out. A few important transient characteristics were derived—the average virtual waiting time, the average number of losses in a given interval and the intensity of losses. As side results, the stationary waiting time, the stationary loss probability, and the joint distribution of the number of accepted packets and losses in a given interval (assuming the service was suspended) were obtained.
Several numerical examples were presented, in which the evolution of the waiting times and losses were shown, depending on function d, initial buffer occupancy, queue load, and service time distribution. A few observations were made, some of them rather counterintuitive.
In particular, it was demonstrated that function d has a deep influence on the transient behavior of the waiting time and losses. Moreover, the more aggressive it is, the quicker is the convergence to the steady state. Both of these were to be expected. What was much more surprising was the fact that both the average waiting time and intensity of losses could be practically identical for two significantly different functions d, on the whole time axis t ( 0 , ) .
It was shown also that the evolution in time of the average waiting time and intensity of losses may have sometimes a non-monotonic form, with multiple extrema.
Finally, it was demonstrated that the convergence time to the steady state is not a monotonic function of the queue load. Namely, a slower convergence was observed for the critical load of 1, rather than for a high or a low load.

Funding

This research was funded by the National Science Centre, Poland, grant number 2020/39/B/ST6/00224.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Gettys, J.; Nichols, K. Bufferbloat: Dark buffers in the Internet. Queue 2011, 9, 1–15. [Google Scholar] [CrossRef] [Green Version]
  2. Cerf, V.G. Bufferbloat and other Internet challenges. IEEE Internet Comput. 2014, 18, 79–80. [Google Scholar] [CrossRef]
  3. Ye, J.; Leung, K.-C.; Low, S.H. Combating Bufferbloat in Multi-Bottleneck Networks: Theory and Algorithms. IEEE/ACM Trans. Netw. 2021, 29, 1477–1493. [Google Scholar] [CrossRef]
  4. Baker, F.; Fairhurst, G. (Eds.) Internet Engineering Task Force. Request for Comments 7567; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2015. [Google Scholar]
  5. Nichols, K.; Jacobson, V. Controlling Queue Delay. Queue 2012, 55, 42–50. [Google Scholar]
  6. Pan, R.; Natarajan, P.; Piglione, C.; Prabhu, M.S.; Subramanian, V.; Baker, F.; VerSteeg, B. PIE: A lightweight control scheme to address the bufferbloat problem. In Proceedings of the IEEE International Conference on High Performance Switching and Routing, Taipei, Taiwan, 8–11 July 2013; pp. 148–155. [Google Scholar]
  7. Belamfedel Alaoui, S.; Tissir, E.H.; Chaibi, N. Analysis and design of robust guaranteed cost Active Queue Management. Comput. Commun. 2020, 159, 124–1321. [Google Scholar] [CrossRef]
  8. Wang, H. Trade-off queuing delay and link utilization for solving bufferbloat. ICT Express 2020, 6, 269–272. [Google Scholar] [CrossRef]
  9. Amigo, J.M.; Duran, G.; Gimenez, A.; Valero, J.; Bonastre, O.M. Modeling a new AQM model for internet chaotic behavior using Petri nets. Appl. Sci. 2021, 11, 5877. [Google Scholar] [CrossRef]
  10. Zhao, S.; Wang, P.; He, J. Simulation analysis of congestion control in WSN based on AQM. In Proceedings of the International Conference on Mechatronic Science, Electric Engineering and Computer, Jilin, China, 19–22 August 2011; pp. 197–200. [Google Scholar]
  11. Rezaee, A.A.; Yaghmaee, M.H.; Rahmani, A.M.; Mohajerzadeh, A.H. HOCA: Healthcare Aware Optimized Congestion Avoidance and control protocol for wireless sensor networks. J. Netw. Comput. Appl. 2014, 37, 216–228. [Google Scholar] [CrossRef]
  12. Rezaee, A.A.; Yaghmaee, M.H.; Rahmani, A.M.; Mohajerzadeh, A.H. A Fuzzy Congestion Control Protocol Based on Active Queue Management in Wireless Sensor Networks with Medical Applications. Wirel. Pers. Commun. 2017, 98, 815–842. [Google Scholar] [CrossRef]
  13. Asonye, E.A.; Musa, S.M. Analysis of Personal Area Networks for ZigBee Environment Using Random Early Detection-Active Queue Management Model. In Proceedings of the International Conference on Industrial Engineering and Operations Management, Toronto, ON, Canada, 23–25 October 2019; pp. 1441–1455. [Google Scholar]
  14. Kumar, H.; Kumar, S.M.D.; Nagarjun, E. Congestion Estimation and Mitigation Using Fuzzy System in Wireless Sensor Network. Lect. Notes Netw. Syst. 2022, 329, 655–667. [Google Scholar]
  15. Floyd, S.; Jacobson, V. Random early detection gateways for congestion avoidance. IEEE/ACM Trans. Netw. 1993, 1, 397–413. [Google Scholar] [CrossRef]
  16. Rosolen, V.; Bonaventure, O.; Leduc, G. A RED discard strategy for ATM networks and its performance evaluation with TCP/IP traffic. ACM SIGCOMM Comput. Commun. Rev. 1999, 29, 23–43. [Google Scholar] [CrossRef]
  17. Zhou, K.; Yeung, K.L.; Li, V. Nonlinear RED: Asimple yet efficient active queue management scheme. Comput. Netw. 2006, 50, 3784–3794. [Google Scholar] [CrossRef]
  18. Feng, C.; Huang, L.; Xu, C.; Chang, Y. Congestion Control Scheme Performance Analysis Based on Nonlinear RED. IEEE Syst. J. 2017, 11, 2247–2254. [Google Scholar] [CrossRef]
  19. Patel, S.; Karmeshu. A New Modified Dropping Function for Congested AQM Networks. Wirel. Pers. Commun. 2019, 104, 37–55. [Google Scholar] [CrossRef]
  20. Giménez, A.; Murcia, M.A.; Amigó, J.M.; Martínez-Bonastre, O.; Valero, J. New RED-Type TCP-AQM Algorithms Based on Beta Distribution Drop Functions. Appl. Sci. 2022, 12, 11176. [Google Scholar] [CrossRef]
  21. Barczyk, M.; Chydzinski, A. AQM based on the queue length: A real-network study. PLoS ONE 2022, 17, E0263407. [Google Scholar] [CrossRef]
  22. Bonald, T.; May, M.; Bolot, J.-C. Analytic evaluation of RED performance. In Proceedings of the INFOCOM, Tel Aviv, Israel, 26–30 March 2000; pp. 1415–1424. [Google Scholar]
  23. Kempa, W.M. On main characteristics of the M/M/1/N queue with single and batch arrivals and the queue size controlled by AQM algorithms. Kybernetika 2011, 47, 930–943. [Google Scholar]
  24. Chydzinski, A.; Barczyk, M.; Samociuk, D. The Single-Server Queue with the Dropping Function and Infinite Buffer. Math. Probl. Eng. 2018, 2018, 3260428. [Google Scholar] [CrossRef]
  25. Tikhonenko, O.; Kempa, W.M. The generalization of AQM algorithms for queuing systems with bounded capacity. Lect. Notes Comput. Sci. 2012, 7204, 242–251. [Google Scholar]
  26. Hao, W.; Wei, Y. An Extended GIX/M/1/N queuing Model for Evaluating the Performance of AQM Algorithms with Aggregate Traffic. Lect. Notes Comput. Sci. 2005, 3619, 395–414. [Google Scholar]
  27. Chydzinski, A. Queues with the dropping function and non-Poisson arrivals. IEEE Access 2020, 8, 39819–39829. [Google Scholar] [CrossRef]
  28. Chydzinski, A.; Chrost, L. Analysis of AQM queues with queue-size based packet dropping. Appl. Math. Comput. Sci. 2011, 3, 567–577. [Google Scholar] [CrossRef] [Green Version]
  29. Tikhonenko, O.; Kempa, W.M. Performance evaluation of an M/G/N-type queue with bounded capacity and packet dropping. Appl. Math. Comput. Sci. 2016, 26, 841–854. [Google Scholar] [CrossRef] [Green Version]
  30. Tikhonenko, O.; Kempa, W.M. Erlang service system with limited memory space under control of AQM mechanizm. Commun. Comput. Inf. Sci. 2017, 718, 366–379. [Google Scholar]
  31. Kempa, W.M. A direct approach to transient queue-size distribution in a finite-buffer queue with AQM. Appl. Math. Inf. Sci. 2013, 7, 909–915. [Google Scholar] [CrossRef]
  32. Mrozowski, P.; Chydzinski, A. Queues with dropping functions and autocorrelated arrivals. Methodol. Comput. Appl. Probab. 2018, 20, 97–115. [Google Scholar] [CrossRef] [Green Version]
  33. Kempa, W.M. Time-dependent queue-size distribution in the finite GI/M/1 model with AQM-type dropping. Acta Electrot. Inform. 2013, 13, 85–90. [Google Scholar] [CrossRef]
  34. Chydzinski, A. On the Transient Queue with the Dropping Function. Entropy 2020, 22, 825. [Google Scholar] [CrossRef]
  35. Hollot, C.V.; Misra, V.; Towsley, D.; Gong, W. Analysis and design of controllers for AQM routers supporting TCP flows. IEEE Trans. Autom. Control 2002, 47, 945–959. [Google Scholar] [CrossRef] [Green Version]
  36. Baburaj, P.; Kamal, S.; Bandyopadhyay, B. Higher order sliding mode-based robust stabilisation of fluid-flow model of TCP/AQM scheme. Int. J. Autom. Control. 2014, 8, 17–31. [Google Scholar] [CrossRef]
  37. Kahe, G.; Jahangir, A.H. A self-tuning controller for queuing delay regulation in TCP/AQM networks. Telecommun. Syst. 2019, 71, 215–229. [Google Scholar] [CrossRef]
  38. Shen, J.; Jing, Y.; Ren, T. Adaptive finite time congestion tracking control for TCP/AQM system with input saturation. Int. J. Syst. Sci. 2022, 53, 253–264. [Google Scholar] [CrossRef]
  39. Zakian, V. Numerical inversion of Laplace transform. Electron. Lett. 1969, 5, 120–121. [Google Scholar] [CrossRef]
  40. Available online: http://www.omnetpp.org/ (accessed on 20 November 2022).
Figure 1. Functions d 1 d 5 .
Figure 1. Functions d 1 d 5 .
Sensors 23 00485 g001
Figure 2. Average waiting time (on the left) and intensity of losses (on the right) vs. time, for different functions d ( k ) .
Figure 2. Average waiting time (on the left) and intensity of losses (on the right) vs. time, for different functions d ( k ) .
Sensors 23 00485 g002
Figure 3. Average waiting time (on the left) and intensity of losses (on the right) vs. time, for different initial buffer occupancies.
Figure 3. Average waiting time (on the left) and intensity of losses (on the right) vs. time, for different initial buffer occupancies.
Sensors 23 00485 g003
Figure 4. Average number of losses in ( 0 , t ) for different initial buffer occupancies.
Figure 4. Average number of losses in ( 0 , t ) for different initial buffer occupancies.
Sensors 23 00485 g004
Figure 5. The intensity of losses vs. time for n = 20 .
Figure 5. The intensity of losses vs. time for n = 20 .
Sensors 23 00485 g005
Figure 6. Average waiting time (on the left) and intensity of losses (on the right) vs. time, for different loads of the queue.
Figure 6. Average waiting time (on the left) and intensity of losses (on the right) vs. time, for different loads of the queue.
Sensors 23 00485 g006
Figure 7. Average number of losses in ( 0 , t ) for different loads of the queue.
Figure 7. Average number of losses in ( 0 , t ) for different loads of the queue.
Sensors 23 00485 g007
Figure 8. Average waiting time (on the left) and intensity of losses (on the right) vs. time, for different distributions of the service time.
Figure 8. Average waiting time (on the left) and intensity of losses (on the right) vs. time, for different distributions of the service time.
Sensors 23 00485 g008
Figure 9. Average number of losses in ( 0 , t ) for different distributions of the service time.
Figure 9. Average number of losses in ( 0 , t ) for different distributions of the service time.
Sensors 23 00485 g009
Figure 10. The intensity of losses vs. the time for the service time distribution F 2 .
Figure 10. The intensity of losses vs. the time for the service time distribution F 2 .
Sensors 23 00485 g010
Table 1. Coefficients in the Zakian inversion method.
Table 1. Coefficients in the Zakian inversion method.
j w j u j
1−36902.08210 + i 196990.425712.83767675 + i 1.666063445
261277.02524 − i 95408.6255112.22613209 + i 5.012718792
3−28916.56288 + i 18169.1853110.93430308 + i 8.409673116
44655.361138 − i 1.9015286428.776434715 + i 11.92185389
5−118.7414011 − i 141.30369115.225453361 + i 15.72952905
Table 2. Theoretical vs. simulated average waiting times at t.
Table 2. Theoretical vs. simulated average waiting times at t.
t125102050100200500
theoretical V n ( t ) 29.0528.2026.0323.3620.0415.9114.1713.7913.75
simulated V n ( t ) 29.0228.1826.0123.3420.0415.9514.1213.8313.75
Table 3. Theoretical vs. simulated average number of losses in ( 0 , t ) .
Table 3. Theoretical vs. simulated average number of losses in ( 0 , t ) .
t125102050100200500
theoretical L n ( t ) 1.041.994.467.6311.9519.4127.7942.4485.64
simulated L n ( t ) 1.032.004.467.6211.9419.4027.8042.4485.59
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chydzinski, A. Non-Stationary Characteristics of AQM Based on the Queue Length. Sensors 2023, 23, 485. https://doi.org/10.3390/s23010485

AMA Style

Chydzinski A. Non-Stationary Characteristics of AQM Based on the Queue Length. Sensors. 2023; 23(1):485. https://doi.org/10.3390/s23010485

Chicago/Turabian Style

Chydzinski, Andrzej. 2023. "Non-Stationary Characteristics of AQM Based on the Queue Length" Sensors 23, no. 1: 485. https://doi.org/10.3390/s23010485

APA Style

Chydzinski, A. (2023). Non-Stationary Characteristics of AQM Based on the Queue Length. Sensors, 23(1), 485. https://doi.org/10.3390/s23010485

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop