Next Article in Journal
STARC: Decentralized Coordination Primitive on Low-Power IoT Devices for Autonomous Intersection Management
Previous Article in Journal
Low-Cost Real-Time Locating System Solution Development and Implementation in Manufacturing Industry
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Loss Process at an AQM Buffer

by
Andrzej Chydzinski
Department of Computer Networks and Systems, Silesian University of Technology, Akademicka 16, 44-100 Gliwice, Poland
J. Sens. Actuator Netw. 2023, 12(4), 55; https://doi.org/10.3390/jsan12040055
Submission received: 10 June 2023 / Revised: 2 July 2023 / Accepted: 7 July 2023 / Published: 10 July 2023
(This article belongs to the Section Communications and Networking)

Abstract

:
We perform a comprehensive analysis of packet losses occurring at an AQM buffer in which the packet deletion probability is relative to the size of the queue. Several characteristics of the loss process are derived: the number of deletions in an interval of length t, the temporary intensity of deletions at arbitrary time, the steady-state loss ratio, and the number of losses if there is no service. All of them are obtained for a general deletion probability function and an advanced model of the arrival process, which incorporates, among other things, the autocorrelation of traffic. Analytical results are accompanied by examples in which numerical values are obtained for several configurations of the system. Using these examples, the dependence of the loss process on the initial system state, deletion probability function, and traffic autocorrelation are discussed.

1. Introduction

Packet buffers play an important role in all types of packet networks, including wireless sensor networks (WSNs). The buffers in networking devices are meant to store temporary bursts of packets occurring due to random fluctuations in traffic. There is a long and far from being settled debate regarding what size the buffers should be (see, e.g., [1,2] for WSNs and [3,4] for classic IP networks).
Many researchers postulate that instead of searching for a proper buffer size, active queue management should be applied (see, e.g., Ref. [5] and the references given there). It means basically that packets should be deleted before the buffer becomes full. Moreover, these deletions should be more frequent the more probable an occurrence of congestion (and a buffer overflow) is in the near future.
The easiest way to detect congestion is to observe the size of the queue of packets in the buffer. The simplicity of this method plays an especially important role in WSNs, where computationally and energetically lightweight solutions are to be preferred. No wonder that among 35 congestion detection methods in WSNs protocols, listed in Table 6 of [2], 21 methods are based solely on the size of the queue/buffer occupancy. Therefore, many active queue management solutions are based on the size of the queue as well—see, e.g., Refs. [6,7,8,9,10] for general-purpose methods and [11,12,13] for their WSN-specialized versions. In these solutions, the probability of removing a packet, instead of placing it in the buffer, is a function of the buffer occupancy.
Therefore, we analyze herein a buffer with active queue management such that the probability of removing a packet upon its arrival is a function of the buffer occupancy. Naturally, packet losses arising from this mechanism have a deep impact on the performance of the network in which such a mechanism is used.
The goal of this paper is to present a comprehensive characterization of this packet loss process. To achieve that, the following characteristics are derived:
  • The mean number of packets deleted in an interval of length t;
  • The temporary intensity of deletions at arbitrary time;
  • The steady-state loss ratio;
  • The distribution of losses in interval of length t if there is no service.
The contributions of the paper are four new theorems for the four characteristics of the loss process listed above. In addition, several numerical examples are given to demonstrate the applicability of these theorems. In the examples, we can see the progression in time of the number of deleted packets and the temporary intensity of deletions for different initial conditions, deletion probabilities, and traffic autocorrelation.
An advanced model of arrival process is used, i.e., the Markov-modulated Poisson process [14]. First of all, MMPP enables mimicking not only the packet arrival rate and the interarrival time standard deviation but also the whole shape of the interarrival time distribution [15]. What is equally important, it allows for modeling the autocorrelation of packet interarrival times. As exposed in several well-known papers, e.g., [16], we can expect to have positively autocorrelated traffic in packet networks. Moreover, neglecting this autocorrelation in the model of the system may cause far too optimistic evaluation of its performance, sometimes wrong by several scales of magnitude.
To find the characteristics of the loss process, we use herein analytical tools of the queuing theory. First, the distribution of deletions in interval ( 0 , t ) if there is no service is found using the fact that it has a recurrent structure in two dimensions. Then, the regeneration property of the queue size process is exploited to build integral equations for the time-dependent mean number of deletions and their intensity. These equations are practically insolvable in the time domain due to their integral forms. For this reason, they are transferred to the Laplace transform domain, where the integrals are removed and the solutions are possible to obtain. Finally, in numerical calculations, the transforms are inverted to the time domain using the inversion formula. This, however, is necessary only when the full, time-dependent solution is needed. To obtain the steady-state solution only (e.g., the steady-state loss ratio), the terminal value theorem can be used to obtain the characteristic directly from the transform domain, without the inversion formula.
All loss characteristics are derived herein for a general buffer model in which the probability of removing a packet is an arbitrary function of the buffer occupancy. In every aforementioned work [6,7,8,9,10,11,12,13], a specific deletion function was used, e.g., linear, cubic, etc. Herein, this function has a general form. Moreover, the service time distribution, associated with the packet size distribution, has a general form as well.
In the rest of the paper, we first characterize the related work (Section 2). In Section 3, the models of the buffer and packet arrival process are presented. Section 4 contains the main contribution of the paper, i.e., four theorems on the loss process characteristics with proofs. Then, in Section 5, examples are given. In particular, the mean number of packet losses and the loss intensity are shown for different initial system states, different forms of deletion probabilities, as well as for correlated and uncorrelated traffic. In addition to theoretical numbers, simulation results are presented. In Section 6, the concluding remarks are gathered.

2. Related Work

As far as the author knows, the results of this article are new.
The loss process in packet networks has been investigated for a long time using an experimental approach (see [17,18,19,20,21,22]) and theoretical models (see [23,24,25,26,27,28,29]), but none of the works [17,18,19,20,21,22,23,24,25,26,27,28,29] incorporate active queue management at the packet buffer. Such a mechanism has, obviously, a deep impact on packet loss characteristics.
Some analytical papers, which deal with the number of deleted packets, do include active queue management based on the size of the queue (see [30,31,32,33,34,35,36]). Unfortunately, in all of them a rather simple model of traffic is assumed. In particular, in [30,31,32,33,34,35], a simple Poisson process is used. A slightly more advanced model is exploited in [36], with general interarrival time distribution. None of the works [30,31,32,33,34,35,36], however, take into account the autocorrelation between interarrival times, which may degrade drastically performance of the system. For instance, in Section 5 here we will encounter an example in which neglecting the autocorrelation, even a mild one, makes the loss ratio optimistically wrong by three orders of magnitude.
In addition to the main loss characteristics, which are studied here, the burst ratio of losses can be studied [37]. The burst ratio, rather than characterizing the number of losses or the intensity of losses, as here, describes the stationary tendency of losses to occur in series, one after the other.
It is worth mentioning that active queue management has also been developed using different approaches, e.g., based on neural networks (see [38,39,40] and the references there). The approach analyzed herein may not give such good results as those based on neural networks but has other important advantages—it is easy to implement and of low computational complexity. Yet, it still gives a substantial improvement when compared with no AQM at all. (For a deeper discussion of that see [41], where a real implementation of the AQM considered herein is presented and accompanied with results of extensive tests in a real network).
This paper presents a comprehensive analysis of the number of deleted packets, for the first time, both in the transient and steady-state case, taking into account an AQM mechanism with packet deletions based on the size of the queue and a complex traffic model with autocorrelation and other advanced modeling capabilities.

3. Buffer Model

We deal with a packet buffer of capacity K. The arriving packets are placed in this buffer in the arrival order, forming a queue. At the same time, the buffer is drained from the head by an egress link. The service (transmission) time of a packet is random and has distribution function F ( · ) . In the simplest case, when the output link has a constant bitrate, distribution F is proportional to the distribution of the packet size. However, F may also account for some other uncertainties of the transmission time, e.g., induced by a wireless link layer.
When the buffer is overflowed, an incoming packet is deleted due to the lack of space for storage. This, however, is not the only case when a packet is deleted. There is also an AQM mechanism operating at the buffer. Namely, every packet can be deleted upon arrival with probability d ( n ) , where n stands for the number of packets present in the buffer upon the new packet arrival. Function d ( n ) can have an arbitrary form as well as distribution F.
By X ( t ) , we denote the number of packets in the buffer at time t. We assume that both X ( t ) and K include the service position. Similarly, n in function d ( n ) incorporates the service position.
As usual, it is assumed that the service times are independent of each other, and independent of interarrival times.
Packet interarrival times are modeled by the MMPP process (Markov-modulated Poisson process) [14]. The construction of the MMPP is based on the underlying process, J ( t ) , which is of CTMC type. This CMTC has m states and intensity matrix Q. To define the MMPP process, we also need m arrival intensities, λ 1 , , λ m . The arrivals in the MMPP are of Poisson type but with variable intensity depending on the state of the underlying CMTC. In particular, the arrival intensity at arbitrary time t equals to λ J ( t ) . Intensities λ i are often used in the diagonal matrix:
Λ = λ 1 0 0 0 λ 2 0 0 0 λ m .
The formula for the autocorrelation, which is a very important aspect of MMPP, can be found in [14], p. 153.
Finally, there are several known methods for fitting MMPP parameters to observed traffic, including its autocorrelation. In addition to the already mentioned work [15], the methods of [42] or [43] can be used.

4. Results on the Loss Process

We start with derivation of the distribution of the number of deleted and accepted packets in an interval of length t if there is no service. This is a characteristic of the loss and acceptance processes induced by the deletion mechanism only, with excluded influence of the service process. This characteristic may be of interest on its own, but it is also needed in the derivation of other characteristics.
Let Y i j ( n , a , l , v ) be the probability that in interval ( 0 , v ) , the number of packets accepted to the buffer is a, and the number of deleted packets is l, assuming that no service is finished by the time t and J ( 0 ) = i , X ( 0 ) = n , J ( t ) = j . We will be using its Laplace transform:
y i j ( n , a , l , s ) = 0 e s v Y i , j ( n , a , l , v ) d v ,
also in the matrix notation:
y ( n , a , l , s ) = y i j ( n , a , l , t s i = 1 , , m ; j = 1 , , m .
To find Y i , j ( n , a , l , t ) , we start with the case where no packets are deleted or accepted by the time t. This can happen either if there are no events by the time t, which has the probability e ( Λ i i Q i i ) t , or if there is a change of the CMTC state from i to k only, which happens with intensity p i , k ( Λ i i Q i i ) e ( Λ i i Q i i ) v , where
p i j = Q i j / ( Λ i i Q i i ) , i f   i j , 0 , i f   i = j .
Therefore, we have
Y i j ( n , 0 , 0 , t ) = δ i j e ( Λ i i Q i i ) t + k = 1 m 0 t p i k ( Λ i i Q i i ) e ( Λ i i Q i i ) v Y k j ( n , 0 , 0 , t v ) d v , 0 i , j m ,
where δ i j is the Kronecker delta function, namely
δ i j = 0 ,   i f   i j , 1 ,   i f   i = j .
No deletions and one or more packet acceptances by the time t can happen if the first packet appears by t and it is accepted, which happens with intensity ( 1 d ( n ) ) Λ i k e ( Λ i i Q i i ) v . Alternatively, the CMTC can switch its state from i to k before that. In the former case, the size of the queue changes to n + 1 , while the required number of acceptances to a 1 . In the latter situation, the size of the queue and the required number of acceptances do not change. We have:
Y i j ( n , a , 0 , t ) = ( 1 d ( n ) ) k = 1 m 0 t Λ i k e ( Λ i i Q i i ) v Y k j ( n + 1 , a 1 , 0 , t v ) d v + k = 1 m 0 t p i k ( Λ i i Q i i ) e ( Λ i i Q i i ) v Y k j ( n , a , 0 , t v ) d v , a > 0 , 0 i , j m .
On the other hand, no packet acceptances and one or more deletions by the time t can happen if the first packet appears by t and it is deleted or if the CMTC switches its state from i to k before that. In the former case, the queue does not change, but the required number of deletions decreases by 1. In the latter situation, the queue and the required number of losses do not change. Therefore, we have:
Y i j ( n , 0 , l , t ) = d ( n ) k = 1 m 0 t Λ i k e ( Λ i i Q i i ) v Y k j ( n , 0 , l 1 , t v ) d v , + k = 1 m 0 t p i k ( Λ i i Q i i ) e ( Λ i i Q i i ) v Y k j ( n , 0 , l , t v ) d v , l > 0 , 0 i , j m .
Lastly, to have one or more acceptances and one or more deletions by the time t, there has to be an arrival by t, no matter whether accepted or deleted. There also could be a CMTC state change before that. We have
Y i j ( n , a , l , t ) = ( 1 d ( n ) ) k = 1 m 0 t Λ i k e ( Λ i i Q i i ) v Y k j ( n + 1 , a 1 , l , t v ) d v , + d ( n ) k = 1 m 0 t Λ i k e ( Λ i i Q i i ) v Y k j ( n , a , l 1 , t v ) d v , + k = 1 m 0 t p i k ( Λ i i Q i i ) e ( Λ i i Q i i ) v Y k j ( n , a , l , t v ) d v , a , l > 0 , 0 i , j m .
In the next step, we employ the Laplace transform to (4)–(7). Pay attention that all Equations (4)–(7) contain convolution integrals in which an exponential function is convoluted with function Y ( n , a , l , v ) with respect to its last variable. Therefore, using the convolution theorem (see, e.g., [44], p. 92) yields
y i j ( n , 0 , 0 , s ) = δ i j s + Λ i i Q i i + k = 1 m ( Λ i i Q i i ) p i k s + Λ i i Q i i y k j ( n , 0 , 0 , s ) , 0 i , j m ,
y i j ( n , a , 0 , s ) = ( 1 d ( n ) ) k = 1 m Λ i k s + Λ i i Q i i y k j ( n + 1 , a 1 , 0 , s ) + k = 1 m ( Λ i i Q i i ) p i k s + Λ i i Q i i y k j ( n , a , 0 , s ) , a > 0 , 0 i , j m ,
y i j ( n , 0 , l , s ) = d ( n ) k = 1 m Λ i k s + Λ i i Q i i y k j ( n , 0 , l 1 , s ) , + k = 1 m ( Λ i i Q i i ) p i k s + Λ i i Q i i y k j ( n , 0 , l , s ) , l > 0 , 0 i , j m ,
y i j ( n , a , l , s ) = ( 1 d ( n ) ) k = 1 m Λ i k s + Λ i i Q i i y k j ( n + 1 , a 1 , l , s ) + d ( n ) k = 1 m Λ i k s + Λ i i Q i i y k j ( n , a , l 1 , s ) + k = 1 m ( Λ i i Q i i ) p i k s + Λ i i Q i i y k j ( n , a , l , s ) , a , l > 0 , 0 i , j m ,
respectively. Then, (8)–(11) can be rewritten using matrices. For n 0 , we have
y ( n , 0 , 0 , s ) = M ( s ) + N ( s ) y ( n , 0 , 0 , s ) ,
y ( n , a , 0 , s ) = ( 1 d ( n ) ) Λ M ( s ) y ( n + 1 , a 1 , 0 , s ) + N ( s ) y ( n , a , 0 , s ) , a > 0 ,
y ( n , 0 , l , s ) = d ( n ) Λ M ( s ) y ( n , 0 , l 1 , s ) + N ( s ) y ( n , 0 , l , s ) , l > 0 ,
y ( n , a , l , s ) = ( 1 d ( n ) ) Λ M ( s ) y ( n + 1 , a 1 , l , s ) + d ( n ) Λ M ( s ) y ( n , a , l 1 , s ) + N ( s ) y ( n , a , l , s ) , a , l > 0 ,
where
M ( s ) = δ i k s + Λ i i Q i i i = 1 , , m ; k = 1 , , m ,
N ( s ) = ( Λ i i Q i i ) p i k s + Λ i i Q i i i = 1 , , m ; k = 1 , , m .
Finally, denoting the identity matrix by I, we can solve Equations (12)–(15) with respect to y ( ) . After that, we obtain the theorem as follows.
Theorem 1.
The transform of the joint distribution of lost and accepted packets in interval ( 0 , v ) if there is no service is given by the following recursion:
y ( n , 0 , 0 , s ) = ( I N ( s ) ) 1 M ( s ) ,
y ( n , a , 0 , s ) = ( 1 d ( n ) ) ( I N ( s ) ) 1 Λ M ( s ) y ( n + 1 , a 1 , 0 , s ) , a > 0 ,
y ( n , 0 , l , s ) = d ( n ) ( I N ( s ) ) 1 Λ M ( s ) y ( n , 0 , l 1 , s ) , l > 0 ,
y ( n , a , l , s ) = ( I N ( s ) ) 1 Λ M ( s ) [ ( 1 d ( n ) ) y ( n + 1 , a 1 , l , s ) + d ( n ) y ( n , a , l 1 , s ) ] , a , l > 0 .
It is easy to see that Theorem 1 can be used effectively to calculate y ( n , a , l , s ) for arbitrary n , a , l , s .
Note also that, using Theorem 1, we can calculate the sole distribution of the number of accepted packets or the sole distribution of the number of deleted packets if there is no service. The former is obtained by summing y ( n , a , l , s ) by all l s, the latter is obtained by summing y ( n , a , l , s ) by all a s.
Now, let L n i ( t ) be the mean number of packets deleted by the time t under conditions that at t = 0 the size of the queue is n and the CMTC state is i and let
l n i ( s ) = 0 e s t L n i ( t ) d t ,
l n ( s ) = [ l n 1 ( s ) , l n 2 ( s ) , , l n m ( s ) ] T .
Assume that one or more packets are present in the queue at t = 0 . In this case, the service begins at t = 0 as well. Conditioning on the departure time of the first served packet, v, yields
L n i ( t ) = j = 1 m a = 0 K n l = 0 0 t Y i j ( n , a , l , v ) [ l + L n + a 1 , j ( t v ) ] d F ( v ) + j = 1 m a = 0 K n l = 0 l Y i j ( n , a , l , t ) [ 1 F ( t ) ] , 1 n K , 1 i m .
The first summand of Formula (24) can be explained as follows. With probability Y i j ( n , a , l , v ) , by the end of the first service, there will be a newly accepted packets in the buffer, and thus the new size of the queue at time v will be n + a 1 and the new CMTC state will be j. During the same interval ( 0 , v ) , there will be l deletions, and thus the new mean number of packet losses, counting from time v, will be l + L n + a 1 , j ( t v ) . The second summand of Formula (24) can be explained by noticing that with probability 1 F ( t ) , the first service will end after t. In such cases, the mean number of packet losses by t is just a sum of l Y i j ( n , a , l , t ) with respect to every possible l, a, and j.
Pay attention that (24) does not have a nice, recursive form, which can often be met when analyzing the classic queuing model with MMPP traffic (see, e.g., recursion (36) in [14]). This follows from the fact that, in contrary to the classic model, the considered model is not spatially homogeneous. Namely, in the classic model, the probability that the queue decreases by 1 in a given interval is the same for every positive queue size. Herein, this probability varies depending on the queue size and associated deletion probabilities.
Employing the Laplace transform to (24) and using the convolution theorem, we have
l n i ( s ) = j = 1 m a = 0 K n l = 0 l g i j ( n , a , l , s ) s + j = 1 m a = 0 K n l = 0 g i j ( n , a , l , s ) l n + a 1 , j ( s ) + j = 1 m a = 0 K n l = 0 l h i j ( n , a , l , s ) , 1 n K , 1 i m ,
with
g i j ( n , a , l , s ) = 0 e s v Y i j ( n , a , l , v ) d F ( v ) ,
h i j ( n , a , l , s ) = 0 e s v Y i j ( n , a , l , v ) ( 1 F ( v ) ) d v .
Exploiting vector notation, we then have
l n ( s ) = a = 0 K n l = 0 l s G ( n , a , l , s ) 1 + a = 0 K n l = 0 G ( n , a , l , s ) l n + a 1 ( s ) + a = 0 K n l = 0 l H ( n , a , l , s ) 1 , 1 n K ,
with
1 = [ 1 , , 1 ] T ,
G ( n , a , l , s ) = g i j ( n , a , l , s ) i = 1 , , m ; j = 1 , , m ,
H ( n , a , l , s ) = h i j ( n , a , l , s ) i = 1 , , m ; j = 1 , , m .
Assume now the system is empty at t = 0 . If so, we have
L 0 i ( t ) = j = 1 m 0 t p i j ( Λ i i Q i i ) e ( ( Λ i i Q i i ) ) v L 0 j ( t v ) d v + 1 d ( 0 ) j = 1 m 0 t Λ i j e ( Λ i i Q i i ) v L 1 j ( t v ) d v + d ( 0 ) j = 1 m 0 t Λ i j e ( Λ i i Q i i ) v ( 1 + L 0 j ( t v ) ) d v , 1 i m .
Indeed, the first event by the time t can be either the change of the CMTC from i to j, which happens with intensity p i j ( Λ i i Q i i ) e ( ( Λ i i Q i i ) ) v , or an accepted arrival, which happens with intensity ( 1 d ( 0 ) ) Λ i j e ( Λ i i Q i i ) v , or a deleted arrival, which happens with intensity d ( 0 ) Λ i j e ( Λ i i Q i i ) v . In the first case, the size of the queue upon the first event remains 0, and thus the new number of losses is L 0 j ( t v ) . In the second case, the size of the queue upon the first event becomes 1, and thus the new number of losses is L 1 j ( t v ) . In the third case, the size of the queue upon the first event remains 0, but the first event increases the number of losses by 1, and thus the new number of losses is 1 + L 0 j ( t v ) .
From (32) we then obtain
l 0 i ( s ) = j = 1 m ( Λ i i Q i i ) p i j s + Λ i i Q i i l 0 j ( s ) + 1 d ( 0 ) j = 1 m Λ i j s + Λ i i Q i i l 1 j ( s ) + d ( 0 ) s j = 1 m Λ i j s + Λ i i Q i i + d ( 0 ) j = 1 m Λ i j s + Λ i i Q i i l 0 j ( s ) , 1 i m ,
and, finally,
l 0 ( s ) = N ( s ) l 0 ( s ) + 1 d ( 0 ) Λ M ( s ) l 1 ( s ) + d ( 0 ) s Λ M ( s ) 1 + d ( 0 ) Λ M ( s ) l 0 ( s ) .
As we can notice, (28) and (34) establish a system of linear equations. We can easily rearrange these equations to obtain the solution in an explicite form. It is summarized in the theorem as follows.
Theorem 2.
The transform of the mean number of packets lost in ( 0 , t ) is equal to:
l ( s ) = Z 1 ( s ) x ( s ) ,
where
l ( s ) = [ l 0 ( s ) T , , l K ( s ) T ] T ,
Z ( s ) = [ Z i , j ( s ) ] i , j = 0 , , K ,
Z i j ( s ) = N ( s ) + d ( 0 ) Λ M ( s ) I , i f i = j = 0 , 1 d ( 0 ) Λ M ( s ) , i f i = 0 , j = 1 , l = 0 G ( i , 1 , l , s ) I , i f i = j , i > 0 , l = 0 G ( i , j + 1 i , l , s ) , i f 1 i K , i 1 j K 1 , i j , 0 , o t h e r w i s e ,
x ( s ) = [ x 0 ( s ) T , , x K ( s ) T ] T ,
x 0 ( s ) = d ( 0 ) s Λ M ( s ) 1 ,
x n ( s ) = a = 0 K n l = 0 l s G ( n , a , l , s ) + l H ( n , a , l , s ) 1 , 1 n K ,
and 0 is a square matrix of 0s.
In practice, it is perhaps more intuitive to use the temporary intensity of deletions at time t, rather than the number of packets deleted in ( 0 , t ) . We define the temporary intensity of deletions at t as:
I n i ( t ) = d L n i ( t ) d t .
Denote
i n i ( s ) = 0 e s t I n i ( t ) d t ,
i n ( s ) = i n 1 ( s ) , , i n m ( s ) T ,
i ( s ) = [ i 0 ( s ) T , , i K ( s ) T ] T .
It is a simple matter to obtain i ( s ) from Theorem 2. Namely, using the formula for the transform of the derivative of the original function (see, e.g., [44], p. 54), we obtain the theorem as follows.
Theorem 3.
The transform of the intensity of deletions at t is equal to:
i ( s ) = s Z 1 ( s ) x ( s ) ,
where Z ( s ) and x ( s ) are given in (38) and (39)–(41), respectively.
Now we can derive the steady-state loss ratio, L, which is the global fraction of packets lost is a very long (infinite) interval. To achieve that, we can use the terminal value theorem (see, e.g., [44], p. 89), which bonds the behavior of the original function at t = with the behavior of its Laplace transform at s = 0 + . Namely, applying this theorem, we have
L = lim t I 0 , 1 ( t ) / λ = lim s 0 + s [ i ( s ) ] 1 / λ ,
where λ is the global arrival rate, while [ ] 1 stands for the first entry of a vector. Finally, (47) and Theorem 3 yield the theorem as follows.
Theorem 4.
L = lim s 0 + s 2 [ Z 1 ( s ) x ( s ) ] 1 / λ ,
where Z ( s ) and x ( s ) are given in (38) and (39)–(41), respectively.
Obviously, λ can be obtained by computing the steady-state distribution, π , of the CMTC, using equations
π Q = [ 0 , , 0 ] , π · 1 = 1 .
After that, we have
λ = π Λ 1 .
Finally, note that Theorems 1–3 are formulated in the transform domain. Therefore, the transform inversion formula is needed in numerical calculations (see, e.g., [44]). Theorem 4 can be used directly, without inversion.

5. Examples and Discussion

In the numerical examples of this section, the following parameterization of the arrival process to the packet buffer is used:
Q = 0.2772 0.1310 0.1462 0.0734 0.1458 0.0724 0.0664 0.0973 0.1637 ,
Λ = 4.17575 0 0 0 0.32020 0 0 0 0.05271 .
It has a normalized total rate of λ = 1 and mildly correlated interarrival times. The correlation coefficient of interarrival times for lags of 1–10 are shown in Table 1. As we can notice, the 1-lag correlation is 21%, but for lags over 10 it gets below 1%. As we will see, even such a mild correlation plays a crucial role in the loss process.
If not declared otherwise, the following deletion probabilities are used in the AQM mechanism, with K = 40 :
d ( n ) = 0 , i f n < 20 , 0.0025 n 2 0.1 n + 1 , i f 20 n < 40 , 1 , i f n 40 .
(Other forms of d ( n ) will be investigated at the end of the section.) Finally, the packet service time is hyperexponentially distributed, with parameters ( 0.2 , 0.8 ) and ( 0.6 , 3 ) . Using the hyperexponential distribution allows us to set an arbitrary mean service time and its standard deviation. Herein, the mean service time is T = 0.6 , so the system is underloaded: ρ = λ T = 60 % . The service time standard deviation is S = 0.963 , which gives a moderate coefficient of variation of the service time equal to 1.6.
For this parameterization of the system, the mean number of deletions in ( 0 , t ) and the temporary intensity of deletions at t are depicted in Figure 1 and Figure 2, respectively. These figures are meant to illustrate the progression of the loss process in time, depending on the initial size of the queue. Therefore, the same initial CMTC state is used in every case, but n varies from 0 to 40.
As we can notice in Figure 1 and Figure 2, the progression of the loss process depends greatly on n in the initial, transient phase. For some values of the initial queue size, the intensity of deletions is not monotone in time. For instance, for n = 20 , n = 30 , and n = 40 , the intensity of deletions grows at first, then reaches a maximum, then decreases to some stable level.
In general, the particular behavior of the loss process can be attributed to complex interactions between the traffic, the size of the queue, and the deletion probability. Roughly speaking, the autocorrelated traffic tends to build up the queue in the buffer. However, the longer the queue is, the higher the deletion probability becomes and the more arriving packets are not allowed into the system. This gives the time to the service process to drain the buffer and decrease the queue, which in consequence decreases the deletion probability.
If, for instance, the initial queue is long, then a high deletion probability is used instantly according to (53), and we can see a steep peak of losses (the red curve in Figure 2). Such intensive losses last only for a relatively short time, until the service process can drain a significant portion of packets present in the buffer initially. This decreases the deletion probability and the loss process slowly converges to the steady state. If, on the other hand, the initial queue is short or empty, then no packets are deleted at the beginning, according to (53). In such cases, positively correlated arrivals build up the queue gradually, increasing packet deletions gradually until the steady state is achieved (see the black curve in Figure 2).
As can be seen in Figure 1 and Figure 2, the transient phase ends at about t = 70 . After that, the mean number of packet losses grows linearly and the temporary intensity of deletions stabilizes.
What is remarkable, the steady-state loss intensity is very high given the low load of the system. We have L = I n , i ( ) = 0.0599 , which means that on average about 6% of packets are lost, even though the system load is only 60%. This effect originates from the complex, autocorrelated structure of the traffic. (This will be discussed further at the end of the section).
In Figure 3 and Figure 4, the mean number of deletions in ( 0 , t ) and the temporary intensity of deletions at t are depicted again. This time, the same n = 0 is used in every case, but i varies from 1 to 3. Therefore, we can observe the progression of the loss process depending on the initial state of the CMTC for an initially empty queue. As we can notice, the loss process evolves quite differently for i = 1 than for the two remaining states.
Notably, there is no significant difference between i = 2 and i = 3 cases, even though λ 2 is about six times greater than λ 3 .
A similar situation can be seen in Figure 5, where the temporary intensity of deletions at t is depicted but for a different initial size of the queue, n = 20 .
Now we will proceed to the examination of the influence of function d ( n ) on the progression of the loss process. To realize that, we will use a family of functions d ( n ) , dependent on two positive parameters, p and q, namely
d p , q ( n ) = d ( n + p ) q ,
where the original d ( n ) is given in (53). In Figure 6, the shapes of function d p , q ( n ) for selected combinations of parameters p and q are shown. As can be seen, parameter p determines the deletion threshold, while parameter q determines the convexity of the deletion function. Obviously, the two parameters have the opposite impact on the number of losses. When p is kept unaltered and q grows, the number of losses decreases. When q is kept unaltered and p grows, the number of losses increases. Therefore, it is interesting to observe their combined impact on the loss process.
In Figure 7 and Figure 8, the temporary intensity of deletions at t for selected functions d p , q ( n ) is depicted. Figure 7 was obtained for the initial size of the queue of 20, while Figure 8 was obtained for the initial size of the queue of 30. Clearly, the influence of p (deletion threshold) prevails—the loss intensity decreases with this parameter in both figures. The reverse effect of growing q (convexity) is not strong enough to decrease the loss intensity.
In the next example, we check the influence of the autocorrelated structure of traffic on the loss process. Namely, the temporary intensity of deletions is computed for the MMPP parameterized in (51) and (52), as well as for the simple Poisson process of the same rate, λ = 1 . The results for the MMPP are obtained using Theorem 3, while the results for the Poisson process are obtained using the results of [35].
In both cases, the same function d ( n ) from (53), the same service time distribution (defined at the beginning of this section), and the same initial size of the queue (zero) are used. In the case of MMPP, i = 1 is assumed.
The resulting deletion intensities are depicted in Figure 9. Note the great difference between the two curves—the figure is in the logarithmic scale. In particular, the steady-state loss ratio is 6% in the case of MMPP and only 0.0095% in the case of Poisson arrivals, which is a difference of almost three orders of magnitude. Clearly, the autocorrelated structure of traffic influences the loss process heavily.
Finally, the theoretical results on the loss process were verified using computer simulation. For this purpose, a public-source simulator OMNeT++ was used. Namely, the model defined in Section 2 was implemented scrupulously in OMNeT++ and parameterized using parameters given at the beginning of this Section, i.e., (51)–(53), and hyperexponential service with parameters ( 0.2 , 0.8 ) and ( 0.6 , 3 ) .
Three different initial sizes of the queue were used in simulations, n = 0 , n = 20 , and n = 40 . Each simulation run lasted until simulated stopping time t was reached. Four different values of this stopping time were used in different simulation runs: t = 5 , t = 50 , t = 500 , and t = 5000 . In every run, the number of deleted packets was noted. The simulation of every scenario, e.g., n = 20 and t = 500 , was repeated 100,000 times with new RNG seeds so that a reliable mean value could be extracted from all the runs. In every run, i = 1 was used.
The results of these simulations are presented in Table 2. They are compared with the theoretical results obtained via Theorem 2. As can be observed, there is a high compliance between the simulated and the theoretical numbers in all the scenarios.

6. Conclusions

In this paper, a comprehensive analysis of the packet loss process caused by an AQM buffer in which the loss probability is relative to the size of the queue was carried out. Several characteristics of the loss process were derived: the number of packets deleted in an interval of length t, the temporary intensity of deletions at arbitrary time, the steady-state loss rate, and the number of losses if there is no service. They were obtained for a general deletion probability function and an advanced model of the arrival process, which includes autocorrelation.
In numerical examples, the progression of the loss process in time, depending on the initial state of the system, was presented first. As we could see, both the the initial CMTC state and the initial size of the queue had a deep impact of the loss process, resulting in different, sometimes even non-monotone, behavior.
Then, the impact of the deletion probability function on the loss process was demonstrated using a family of deletion functions dependent on two parameters which determined the deletion threshold and the convexity of the deletion function, respectively. Apparently, the deletion threshold prevailed, i.e., for the loss intensity, it was more important in which size of the queue the deletions began than what convexity the deletion function had.
Finally, the impact of the autocorrelation of traffic was shown in an example comparing the loss process for correlated and uncorrelated traffic. Even for a mildly correlated traffic, a quite high steady-state loss ratio of 6% was obtained. It was in great contrast with the steady-state loss ratio obtained for traffic of the same rate but with zero correlation. In the latter case, only 0.0095% of the packets were lost—almost three orders of magnitude fewer.
There are a few possible directions of future work.
Firstly, for the same active queue management model defined in Section 3, other performance parameters may be investigated.
Secondly, performance parameters of other active queue management models in which the packet deletion probability is not directly relative to the size of the queue can be studied analytically. For instance, the CoDel algorithm [45], uses packet sojourn times through the buffer rather than sizes of the queue. Moreover, the deletion probability is related to sojourn times in a complicated way. Roughly speaking, when the observed sojourn times exceed some predefined threshold T for some predefined period of time P, a packet is deleted and the next deletion event is set in the future. It is not clear whether an analytical model of such an AQM can be solved using the currently available tools of the queueing theory. Nevertheless, such an analysis is worth giving a try due to the fact that the CoDel algorithm is becoming more and more popular.
Finally, an application of the model in vehicular networks (see e.g., Refs. [46,47]) can be investigated. As it is assumed that such networks operate often in a high-load regime (see [46]), active queue management may potentially constitute a useful tool for congestion reduction. This, however, requires some further studies.

Funding

This research was funded by National Science Centre, Poland, grant number 2020/39/B/ST6/00224.

Data Availability Statement

Not applicable.

Conflicts of Interest

The author declare no conflict of interest.

References

  1. Pathak, A.A.; Deshpande, V.S. Buffer management for improving QoS in WSN. In Proceedings of the 2015 International Conference on Pervasive Computing, Pune, India, 8–10 January 2015; pp. 1–4. [Google Scholar]
  2. Ghaffari, A. Congestion control mechanisms in Wireless Sensor Networks: A survey. J. Netw. Comput. Appl. 2015, 52, 101–115. [Google Scholar] [CrossRef]
  3. Appenzeller, G.; Keslassy, I.; McKeown, N. Sizing router buffers. Acm SIGCOMM Comput. Commun. Rev. 2004, 34, 281–292. [Google Scholar] [CrossRef]
  4. Spang, B.; Arslan, S.; McKeown, N. Updating the theory of buffer sizing. Perform. Eval. 2021, 151, 102232. [Google Scholar] [CrossRef]
  5. Baker, F.; Fairhurst, G. (Eds.) Internet Engineering Task Force. Request for Comments 7567; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2015. [Google Scholar]
  6. Floyd, S.; Jacobson, V. Random early detection gateways for congestion avoidance. IEEE/Acm Trans. Netw. 1993, 1, 397–413. [Google Scholar] [CrossRef]
  7. Athuraliya, S.; Li, V.H.; Low, S.H.; Yin, Q. REM: Active queue management. IEEE Netw. 2001, 15, 48–53. [Google Scholar] [CrossRef] [Green Version]
  8. Augustyn, D.R.; Domanski, A.; Domanska, J. A choice of optimal packet dropping function for active queue management. Commun. Comput. Inf. Sci. 2010, 79, 199–206. [Google Scholar]
  9. Feng, C.; Huang, L.; Xu, C.; Chang, Y. Congestion Control Scheme Performance Analysis Based on Nonlinear RED. IEEE Syst. J. 2017, 11, 2247–2254. [Google Scholar] [CrossRef]
  10. Patel, S.; Karmeshu. A New Modified Dropping Function for Congested AQM Networks. Wirel. Pers. Commun. 2019, 104, 37–55. [Google Scholar] [CrossRef]
  11. Kumar, H.; Kumar, S.M.D.; Nagarjun, E. Congestion Estimation and Mitigation Using Fuzzy System in Wireless Sensor Network. Lect. Notes Netw. Syst. 2022, 329, 655–667. [Google Scholar]
  12. Asonye, E.A.; Musa, S.M. Analysis of Personal Area Networks for ZigBee Environment Using Random Early Detection-Active Queue Management Model. In Proceedings of the International Conference on Industrial Engineering and Operations Management, Toronto, ON, Canada, 23–25 October 2019; pp. 1441–1455. [Google Scholar]
  13. Zhao, S.; Wang, P.; He, J. Simulation analysis of congestion control in WSN based on AQM. In Proceedings of the International Conference on Mechatronic Science, Electric Engineering and Computer, Jilin, China, 19–22 August 2011; pp. 197–200. [Google Scholar]
  14. Fischer, W.; Meier-Hellstern, K. The Markov-modulated Poisson process (MMPP) cookbook. Perform. Eval. 1992, 18, 149–171. [Google Scholar] [CrossRef]
  15. Salvador, P.; Valadas, R.; Pacheco, A. Multiscale Fitting Procedure Using Markov Modulated Poisson Processes. Telecommun. Syst. 2003, 23, 123–148. [Google Scholar] [CrossRef]
  16. Leland, W.; Taqqu, M.; Willinger, W.; Wilson, D. On the self-similar nature of ethernet traffic (extended version). IEEE/ACM Trans. Netw. 1994, 2, 1–15. [Google Scholar] [CrossRef] [Green Version]
  17. Coates, M.; Nowak, R. Network loss inference using unicast end-to-end measurement. In Proceedings of the ITC Conference on IP Traffic, Measurement and Modeling, Monterey, CA, USA, 18–20 September 2000. [Google Scholar]
  18. Duffield, N.G.; Presti, F.L.; Paxson, V.; Towsley, D. Inferring link loss using striped unicast probes. In Proceedings of the IEEE INFOCOM, Anchorage, AK, USA, 22–26 April 2001; pp. 915–923. [Google Scholar]
  19. Benko, P.; Veres, A. A passive method for estimating end-to-end TCP packet loss. In Proceedings of the IEEE GLOBECOM, Taipei, Taiwan, 17–21 November 2002; pp. 2609–2613. [Google Scholar]
  20. Sommers, J.; Barford, P.; Duffield, N.; Ron, A. Improving accuracy in end-to-end packet loss measurement. Comput. Commun. Rev. 2005, 35, 157–168. [Google Scholar] [CrossRef]
  21. Sommers, J.; Barford, P.; Duffield, N.; Ron, A. A geometric approach to improving active packet loss measurement. IEEE/ACM Trans. Netw. 2008, 16, 307–320. [Google Scholar] [CrossRef] [Green Version]
  22. Lan, H.; Ding, W.; Zhang, Y.W. Strengthening packet loss measurement from the network intermediate point. KSII Trans. Internet Inf. Syst. 2019, 13, 5948–5971. [Google Scholar]
  23. Sanneck, H.A.; Carle, G. Framework model for packet loss metrics based on loss runlengths. SPIE Proc. 2000, 3969, 1–11. [Google Scholar]
  24. Yu, X.; Modestino, J.W.; Tian, X. The accuracy of Gilbert models in predicting packet-loss statistics for a single-multiplexer network model. In Proceedings of the IEEE INFOCOM, Miami, FL, USA, 13–17 March 2005; pp. 2602–2612. [Google Scholar]
  25. Chydzinski, A.; Adamczyk, B. Transient and stationary losses in a finite-buffer queue with batch arrivals. Math. Probl. Eng. 2012, 2012, 326830. [Google Scholar] [CrossRef] [Green Version]
  26. Nguyen, H.X.; Roughan, M. Rigorous statistical analysis of internet loss measurements. IEEE/ACM Trans. Netw. 2013, 21, 734–745. [Google Scholar] [CrossRef]
  27. Ellis, M.; Pezaros, D.P.; Kypraios, T.; Perkins, C. A two-level Markov model for packet loss in UDP/IP-based real-time video applications targeting residential users. Comput. Netw. 2014, 70, 384–399. [Google Scholar] [CrossRef] [Green Version]
  28. Chydzinski, A.; Samociuk, D.; Adamczyk, B. Burst ratio in the finite-buffer queue with batch Poisson arrivals. Appl. Math. Comput. 2018, 330, 225–238. [Google Scholar] [CrossRef]
  29. Jelassi, S.; Rubino, G. A perception-oriented Markov model of loss incidents observed over VoIP networks. Comput. Commun. 2018, 128, 80–94. [Google Scholar] [CrossRef] [Green Version]
  30. Bonald, T.; May, M.; Bolot, J.-C. Analytic evaluation of RED performance. In Proceedings of the INFOCOM, Tel Aviv, Israel, 26–30 March 2000; pp. 1415–1424. [Google Scholar]
  31. Kempa, W.M. On main characteristics of the M/M/1/N queue with single and batch arrivals and the queue size controlled by AQM algorithms. Kybernetika 2011, 47, 930–943. [Google Scholar]
  32. Tikhonenko, O.; Kempa, W.M. Erlang service system with limited memory space under control of AQM mechanizm. Commun. Comput. Inf. Sci. 2017, 718, 366–379. [Google Scholar]
  33. Tikhonenko, O.; Kempa, W.M. Performance evaluation of an M/G/N-type queue with bounded capacity and packet dropping. Appl. Math. Comput. Sci. 2016, 26, 841–854. [Google Scholar] [CrossRef] [Green Version]
  34. Chydzinski, A.; Barczyk, M.; Samociuk, D. The Single-Server Queue with the Dropping Function and Infinite Buffer. Math. Probl. Eng. 2018, 2018, 3260428. [Google Scholar] [CrossRef]
  35. Chydzinski, A. Non-Stationary Characteristics of AQM Based on the Queue Length. Sensors 2023, 23, 485. [Google Scholar] [CrossRef] [PubMed]
  36. Hao, W.; Wei, Y. An Extended GIX/M/1/N Queueing Model for Evaluating the Performance of AQM Algorithms with Aggregate Traffic. Lect. Notes Comput. Sci. 2005, 3619, 395–414. [Google Scholar]
  37. Chydzinski, A.; Adamczyk, B. On the Influence of AQM on Serialization of Packet Losses. Sensors 2023, 23, 2197. [Google Scholar] [CrossRef]
  38. Hariri, B.; Sadati, N. NN-RED: An AQM mechanism based on neural networks. Electron. Lett. 2007, 43, 1053–1055. [Google Scholar] [CrossRef]
  39. Li, F.; Sun, J.; Zukerman, M.; Liu, Z.; Xu, Q.; Chan, S.; Chen, G.; Ko, K.-T. A comparative simulation study of TCP/AQM systems for evaluating the potential of neuron-based AQM schemes. J. Netw. Comput. Appl. 2014, 41, 274–299. [Google Scholar] [CrossRef]
  40. Wang, C.; Chen, X.; Cao, J.; Qiu, J.; Liu, Y.; Luo, Y. Neural Network-Based Distributed Adaptive Pre-Assigned Finite-Time Consensus of Multiple TCP/AQM Networks. IEEE Trans. Circuits Syst. 2021, 68, 387–395. [Google Scholar] [CrossRef]
  41. Barczyk, M.; Chydzinski, A. AQM based on the queue length: A real-network study. PLoS ONE 2022, 17, e0263407. [Google Scholar] [CrossRef] [PubMed]
  42. Yoshihara, T.; Kasahara, S.; Takahashi, Y. Practical time-scale fitting of self-similar traffic with Markov-modulated Poisson process. Telecommun. Syst. 2001, 17, 185–211. [Google Scholar] [CrossRef]
  43. Singh, L.N.; Dattatreya, G.R. A novel approach to parameter estimation in Markov-modulated Poisson processes. In Proceedings of the IEEE Emerging Technologies Conference (ETC), Richardson, TX, USA, 14–17 October 2004. [Google Scholar]
  44. Schiff, J.L. The Laplace Transform: Theory and Applications; Springer: New York, NY, USA, 1999. [Google Scholar]
  45. Nichols, K.; Jacobson, V. Controlling queue delay. Commun. ACM 2012, 55, 42–50. [Google Scholar] [CrossRef]
  46. Wu, Q.; Shi, S.; Wan, Z.; Fan, Q.; Fan, P.; Zhang, C. Towards V2I Age-aware Fairness Access: A DQN Based Intelligent Vehicular Node Training and Test Method. arXiv 2022, arXiv:2208.01283. [Google Scholar]
  47. Wu, Q.; Zhao, Y.; Fan, Q.; Fan, P.; Wang, J.; Zhang, C. Mobility-Aware Cooperative Caching in Vehicular Edge Computing Based on Asynchronous Federated and Deep Reinforcement Learning. IEEE J. Sel. Top. Signal Process. 2023, 17, 66–81. [Google Scholar] [CrossRef]
Figure 1. The mean number of packets deleted in ( 0 , t ) for selected initial sizes of the queue and i = 2 .
Figure 1. The mean number of packets deleted in ( 0 , t ) for selected initial sizes of the queue and i = 2 .
Jsan 12 00055 g001
Figure 2. The temporary intensity of deletions at t for selected initial sizes of the queue and i = 2 .
Figure 2. The temporary intensity of deletions at t for selected initial sizes of the queue and i = 2 .
Jsan 12 00055 g002
Figure 3. The mean number of packets deleted in ( 0 , t ) for selected initial states and n = 0 .
Figure 3. The mean number of packets deleted in ( 0 , t ) for selected initial states and n = 0 .
Jsan 12 00055 g003
Figure 4. The temporary intensity of deletions at t for selected initial states and n = 0 .
Figure 4. The temporary intensity of deletions at t for selected initial states and n = 0 .
Jsan 12 00055 g004
Figure 5. The temporary intensity of deletions at t for selected initial states and n = 20 .
Figure 5. The temporary intensity of deletions at t for selected initial states and n = 20 .
Jsan 12 00055 g005
Figure 6. Function d p , q ( n ) for selected values of p and q.
Figure 6. Function d p , q ( n ) for selected values of p and q.
Jsan 12 00055 g006
Figure 7. The temporary intensity of deletions at t for selected functions d p , q and n = 20 .
Figure 7. The temporary intensity of deletions at t for selected functions d p , q and n = 20 .
Jsan 12 00055 g007
Figure 8. The temporary intensity of deletions at t for selected functions d p , q and n = 30 .
Figure 8. The temporary intensity of deletions at t for selected functions d p , q and n = 30 .
Jsan 12 00055 g008
Figure 9. The temporary intensity of deletions at t for correlated (MMPP) and uncorrelated (Poisson) traffic.
Figure 9. The temporary intensity of deletions at t for correlated (MMPP) and uncorrelated (Poisson) traffic.
Jsan 12 00055 g009
Table 1. Correlation coefficient of interarrival times versus lag.
Table 1. Correlation coefficient of interarrival times versus lag.
lag, k12345678910
correlation, R ( k ) 0.21560.13600.09460.06820.04980.03650.02670.01960.01440.0106
Table 2. Theoretical and simulated mean number of deletions in interval ( 0 , t ) depending on t and the initial size of the queue, n.
Table 2. Theoretical and simulated mean number of deletions in interval ( 0 , t ) depending on t and the initial size of the queue, n.
Theoretical
L n , 1 ( t )
Simulated
L n , 1 ( t )
n = 0 , t = 5 2.37  × 10 3 2.33 × 10 3
n = 20 , t = 5 9.85 × 10 1 9.83 × 10 1
n = 40 , t = 5 9.68 × 10 0 9.67 × 10 0
n = 0 , t = 50 2.62 × 10 0 2.62 × 10 0
n = 20 , t = 50 7.13 × 10 0 7.11 × 10 0
n = 40 , t = 50 1.98 × 10 1 1.98 × 10 1
n = 0 , t = 500 3.03 × 10 1 3.03 × 10 1
n = 20 , t = 500 3.49 × 10 1 3.48 × 10 1
n = 40 , t = 500 4.78 × 10 1 4.78 × 10 1
n = 0 , t = 5000 3.07 × 10 2 3.07 × 10 2
n = 20 , t = 5000 3.11 × 10 2 3.11 × 10 2
n = 40 , t = 5000 3.24 × 10 2 3.24 × 10 2
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chydzinski, A. Loss Process at an AQM Buffer. J. Sens. Actuator Netw. 2023, 12, 55. https://doi.org/10.3390/jsan12040055

AMA Style

Chydzinski A. Loss Process at an AQM Buffer. Journal of Sensor and Actuator Networks. 2023; 12(4):55. https://doi.org/10.3390/jsan12040055

Chicago/Turabian Style

Chydzinski, Andrzej. 2023. "Loss Process at an AQM Buffer" Journal of Sensor and Actuator Networks 12, no. 4: 55. https://doi.org/10.3390/jsan12040055

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop