Next Article in Journal
Novel Vision Monitoring Method Based on Multi Light Points for Space-Time Analysis of Overhead Contact Line Displacements
Next Article in Special Issue
An Energy Efficient Load Balancing Tree-Based Data Aggregation Scheme for Grid-Based Wireless Sensor Networks
Previous Article in Journal
Analysis of a Capacitive Sensing Circuit and Sensitive Structure Based on a Low-Temperature-Drift Planar Transformer
Previous Article in Special Issue
Problem Characteristics and Dynamic Search Balance-Based Artificial Bee Colony for the Optimization of Two-Tiered WSN Lifetime with Relay Nodes Deployment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On Transient Queue-Size Distribution in a Model of WSN Node with Threshold-Type Power-Saving Algorithm

by
Wojciech M. Kempa
1,*,† and
Dariusz Kurzyk
2,†
1
Department of Mathematics Applications and Methods for Artificial Intelligence, Faculty of Applied Mathematics, Silesian University of Technology, 23 Kaszubska Str., 44-100 Gliwice, Poland
2
Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, 5 Bałtycka Str., 44-100 Gliwice, Poland
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2022, 22(23), 9285; https://doi.org/10.3390/s22239285
Submission received: 12 October 2022 / Revised: 18 November 2022 / Accepted: 23 November 2022 / Published: 29 November 2022
(This article belongs to the Special Issue Wireless Sensor Networks and Communications)

Abstract

:
This article proposes a queueing model of the operation of a wireless sensor network node, in which a threshold strategy for starting the node after a period of no transmission is used. In this model, transmission of packets is resumed when the number of packets in the accumulation buffer reaches a predefined level. In the literature, most of the results for models with limited access to the service station are obtained in equilibrium. In this paper, a formula for the Laplace transform of the transient queue-size distribution is obtained and written using the key input parameters of the system. The analytical apparatus uses the concept of the embedded Markov chain, the formula for total probability, renewal theory and some supporting algebraic results. Numerical examples are attached as well.

1. Introduction

As is commonly known, wireless sensor networks (WSNs) are widely used in monitoring of different real-life phenomena, e.g., air pollution, fire risk, road traffic, military operations and many others. Sensors (nodes), typically equipped with a non-rechargeable battery, are often located in inaccessible places in which their eventual can be difficult. Hence, the problem of power saving is one of the most important challenges in WSN development. Currently, many attempts at improving the energy efficiency and lifetime of WSNs are being undertaken (see, e.g., [1,2,3,4] for related problems). In [5], we can find the usage of game theory for maximizing WSN lifetime, while [6] presents a low-power cluster-based routing algorithm for WSN that is biologically inspired by bee colonies. An interesting adaptive parallel processing strategy for WSNs is proposed in [7]. In [8], we can find an example of a queue-based power optimization algorithm. Different aspects and models of congestion control in WSNs are proposed and discussed in [9,10].
In [11] (see also [12,13,14,15]), a threshold-type N-policy is proposed as a model of power-saving mechanisms. In this algorithm, after the busy period during which packets are being transmitted continuously, the transmission of data messages is resumed after the suspension period only after at least N packets have accumulated in the buffer, where N is predetermined. This type of energy-saving mechanism allows the threshold value N to be adjusted depending on the purpose of the network. For example, in the case of fire risk monitoring, the value of N should be low, while in the case when the network is used to inform about the number of free parking spaces in the vicinity of a large shopping center, the value of this parameter may be greater.
One of the key questions when any mechanism of limiting access to a service station is used in the queueing model is its impact on the state of the queue length.
We deal with a model of a single network node based on a finite-capacity queueing system with group Poisson arrivals and a threshold-type policy. In the literature, analytical results for operating characteristics of various types of queueing systems are devoted mainly to the steady state of the system. In practice, however, transient analysis of the system is often desired. Such a situation occur in the case of the investigation of the system just after its restart after repair or simultaneously with the application of a new control policy.
Moreover, statistical behavior of the system may be disturbed by phenomena such as interference or fade-out, which are common in wireless networks.
According to the above-mentioned observations, the main motivation of the paper is to find explicit formulae for queue-size distribution in the considered model in the transient (non-stationary) case. We are interested in representations written via key input system parameters, without defining any additional random walk. In consequence, it will be possible to use these formulae directly in numerical computations.
The main contribution of the paper is a compact-form representation for the LT (=Laplace transform) of the transient queue-size distribution. The theoretical apparatus combines the notion of the embedded Markov chain, some facts from renewal theory and linear algebra. Analytical formulae are illustrated in numerical examples.
The considered queueing model offers interesting application possibilities (especially in wireless computer and telecommunication networks, and in production systems). With knowledge about the probability distribution of the number of packets present in the system, one can try to select the threshold value N so that the probability of exceeding a certain predetermined value r of the number of packets is appropriately small, e.g., below 0.05 . With the value of N determined in this way, it is now possible to assess the cost of the system operation for the so-designed energy-saving mechanism. Assuming that the unit cost of functioning during the buffer accumulation period is c L , and the unit cost of functioning during the server busy period is equal to c B , the unit cost of system operation is a linear combination with the form
α c L + ( 1 α ) c B ,
where α stands for the fraction of time during which the system is in the buffer-loading period.
One can find a review of the newest results relating to queueing models with different restriction types in the access to the service station in [16], where in all models, the supplementary variable technique is used. For example, in [17], an M / G / 1 -type model with Poisson arrivals and generally distributed processing times of the fault-tolerant system with server vacation policy and threshold-type waking up is developed by using the supplementary variable technique. In particular, the representation for the remaining time to repair is obtained. Significant theoretical work devoted to models with various types of server vacations can be found in [18], which is an extensive monograph focused on this subject. Stationary analysis of queueing models with the mechanism of N-policy can be found in [19,20]. In particular, in [19], joining strategies for retrial queueing models with multiple vacation policy, N-policy and server failures are studied. In [20], the problem of optimal balking strategies is analyzed in a retrial queue with threshold-type policy with multiple vacations. A queueing model with batch Markovian arrival process and generally distributed service times operating under N-policy is investigated in [21], where the solution of the cost optimization problem is also found. An inventory model with auto-correlated arrival process and N-policy is studied in [22], where the arriving customers are impatient. The representation for the joint probability distribution of the level of inventory and the number of customers in the system is obtained. In [23], performance and cost analysis are presented of a queueing model with N-policy and a repairable service station. In [24], customer balking behavior in queues with N-policy mechanisms and geometric balking are compared.
Transient analysis of the queue-size distribution in infinite-buffer models with N-policy and some additional service restrictions can be found in [25] (see also [26,27,28]). New results for finite-buffer models with N-policy were obtained in [29], where the Poisson and general independent arrival streams are considered. In [30] (see also [31]), non-stationary results were obtained for systems with single vacation and working vacation policies, respectively. Time-dependent analysis of a multiple vacation queueing model with a threshold restarting policy is proposed in [32] for studying the power-saving mechanisms of a wireless sensor network using the dynamic power management technique. The considered model consists of a busy state, wake-up state, shutdown state and inactive state. In [33], an approach based on the supplementary variables technique is used to obtain the queue-size distribution in the equilibrium of the G I / M / 1 -type model (in which, referring to Kendall’s notation, packets arrive according to a general independent input stream and service times are independent exponential random variables) with finite waiting room. A multi-server version of this system with N-policy is analyzed in [34]. Another restarting algorithm is considered in [35] for the discrete-time M A P / G / 1 model (with Markov arrival process and generally distributed service times), where the idle server resumes its service only when the accumulated workload exceeds the predetermined level. In [36], an ( N , T ) -policy is considered in which the system restarts the operation as soon as N messages are present or the waiting time of the leading message reaches a fixed time T .
The remainder of this paper is organized according to the following scheme. In the next Section 2, the queueing model is described mathematically. In Section 3, we find the formulae for LTs of the queue-size distribution during the buffer loading period and state the representation for the period duration. In Section 4, we deal with the queue-size distribution in a single busy period. The key formulae, following from the results obtained in Section 2, Section 3 and Section 4, are presented in Section 5. Section 6 contains numerical examples and Section 6 briefly summarizes the paper.

2. Mathematical Description of the Model

In the paper, we deal with a queueing system with a single service station and a finite waiting room in which packets enter in batches (groups) according to a compound Poisson process with group rate λ (i.e., the mean number of groups of packets occurring per time unit equals λ ) and are served individually with a CDF (=cumulative distribution function) F ( · ) of the service time. Each entering group (batch) consists of a random number of packets. The size of an individual batch is generally distributed with a sequence ( p k ) ,   k = 1 p k = 1 , where p j denotes the probability that the arriving group consists of exactly j packets. The total number of packets simultaneously present in the system is bounded by a non-random value K 2 , i.e., the system contains a waiting room (buffer) with capacity K 1 packets that accumulates packets waiting for service start. One place is dedicated to a packet being processed. The service process is governed by FIFO (i.e., first in first out, in that packets are being served in the order of their appearance in the system), as well. It is assumed that the system starts with the functioning empty and processing is initialized simultaneous with the arrival of the group containing the Nth packet (the N-policy), where 1 N K . For example, if N = 6 and the first three arriving groups contain 1, 4 and 7 packets, respectively, the service process starts simultaneous with the arrival of the third group.
When the server becomes idle, it is turned off; it is restarted if N packets accumulate in the waiting room (therefore, just after the arrival of the group containing the Nth packet).
In the functioning of the system, we can identify buffer loading periods L 1 , L 2 , , followed by busy periods B 1 , B 2 , ⋯, during which the queue becomes empty. It follows from the memoryless property of exponentially distributed interarrival times that the initial and completion epochs of successive busy periods are renewal moments. Therefore, ( L k ) and ( B k ) , k = 0 , 1 , are sequences of independent random variables with the same CDFs in each sequence treated separately. Moreover, we identify L k or B k , k 1 , with their duration.
Let us denote by X ( t ) the number of packets present in the system at time t , including the packet being served at this moment (if any). In the next sections, we obtain the closed-form formulae for the LTs of the queue-size distribution during single buffer loading and busy periods. Next, utilizing the independence of buffer loading periods and busy periods, and the fact that they follow one by one cyclically, we obtain the general formulae for the LT of the queue-size distribution at any time, applying the renewal theory approach.

3. Queue-Size Distribution during Buffer Loading Period

Consider first the case of the queue-size distribution during the first buffer loading period L 1 beginning at time t = 0 . Due to the Poisson-type arrival process, we obtain for t 0
P { X ( t ) = m , t L 1 } = I { 0 m N 1 } i = 0 m p m i ( λ t ) i i ! e λ t ,
where I { A } stands for the indicator of the random event A and p i j denotes the ith term of the j-fold convolution of the sequence ( p k ) , itself defined as follows:
p 0 0 = 1 , p i j = r = 0 i p r ( j 1 ) p i r , j 1 .
Indeed, the sum on the right side of (1) expresses the probability that exactly m packets arrive up to the fixed time t.
Introducing the following notation:
q ˜ L ( s , m ) = d e f 0 e s t P { X ( t ) = m t L 1 } d t ,
where s > 0 , we obtain from (1)
q ˜ L ( s , m ) = I { 0 m N 1 } i = 0 m p m i 0 e ( s + λ ) t ( λ t ) i i ! d t = I { 0 m N 1 } i = 0 m p m i λ i ( λ + s ) i + 1 .
Moreover, since each buffer loading period duration has an Erlang-N distribution with parameter λ (i.e., the distribution of N independent identically exponentially distributed random variables, here, N successive interarrival times), we obtain
g ˜ L ( s ) = 0 e s t d G L ( t ) = d e f 0 e s t d P { L k < t } = i = 1 N j = i 1 N 1 p j ( i 1 ) r = N j p r 0 e ( s + λ ) t λ i ( i 1 ) ! t i 1 d t = i = 1 N λ λ + s i j = i 1 N 1 p j ( i 1 ) r = N j p r .

4. Queue-Size Distribution during Busy Period

Let us assume that the processing of packets can be initialized with any possible number n of packets accumulated in the buffer, where 1 n K . Let Q n B ( t , · ) be the time-dependent conditional queue-size distribution at time t during the first busy period B 1 of the system, namely,
Q n B ( t , m ) = d e f P { X ( t ) = m , t B 1 | X ( 0 ) = n } ,
where t > 0 and 1 m , n K . In (6), we assume, for simplicity, that B 1 begins at time t = 0 . Because the consecutive departure moments are renewal moments (see, e.g., [37]), by applying the formula of total probability with respect to the first service completion moment after t = 0 , we obtain the following system of equations:
Q 1 B ( t , m ) = i = 1 K 2 j = 0 i 0 t p i j ( λ x ) j j ! e λ x Q i B ( t x , m ) d F ( x ) + i = K 1 j = 0 i 0 t p i j ( λ x ) j j ! e λ x Q K 1 B ( t x , m ) d F ( x ) + F ¯ ( t ) e λ t [ I { 1 m K 1 } i = 0 m 1 p m 1 i ( λ t ) i i ! + I { m = K } i = K 1 j = 0 i p i j ( λ t ) j j ! ] ,
and, for 2 n K ,
Q n B ( t , m ) = i = 0 K n 1 j = 0 i 0 t p i j ( λ x ) j j ! e λ x Q n + i 1 B ( t x , m ) d F ( x ) + i = K n j = 0 i 0 t p i j ( λ x ) j j ! e λ x Q K 1 B ( t x , m ) d F ( x ) + F ¯ ( t ) e λ t [ I { n m K 1 } i = 0 m n p m n i ( λ t ) i i ! + I { m = K } i = K n j = 0 i p i j ( λ t ) j j ! ] ,
where F ¯ ( t ) = d e f 1 F ( t ) .
Let us explain (7) and (8). The first summands on the right side of (7) and (8) illustrates the situation in which the waiting room does not become saturated before the first service completion epoch at time x < t , while the second one relates to the case where all places in the waiting room are occupied before x . The last summands on the right side of (7) and (8) illustrate the situation in which the service of the first packet finishes after time t . Let us note that the only difference between (7) and (8) is in the sum taken in (8) from i = 0 . Indeed, if the initial state of the waiting room equals at least two, then—if no new packets occur before the first service completion epoch - the first departure moment does not finish the busy period.
After introducing the following notations:
q ˜ n B ( s , m ) = d e f 0 e s t Q n B ( t , m ) d t ,
a n ( s ) = d e f 0 e ( s + λ ) t j = 0 n p n j ( λ t ) j j ! d F ( t ) , θ n ( s , m ) = d e f 0 e ( λ + s ) t F ¯ ( t ) [ I { n m K 1 } i = 0 m n p m n i ( λ t ) i i !
+ I { m = K } i = K n j = 0 i p i j ( λ t ) j j ! ] d t ,
where Re ( s ) > 0 , we can transform Equations (7)–(8) to a more compact form as follows:
q ˜ 1 B ( s , m ) = i = 1 K 2 a i ( s ) q ˜ i B ( s , m ) + q ˜ K 1 B ( s , m ) i = K 1 a i ( s ) + θ 1 ( s , m ) ,
q ˜ n B ( s , m ) = i = 0 K n 1 a i ( s ) q ˜ n + i 1 B ( s , m ) + q ˜ K 1 B ( s , m ) i = K n a i ( s ) + θ n ( s , m ) ,
where 2 n K .
Next, we are interested in rewriting Equations (12) and (13) in a specific form allowing for the application of an auxiliary algebraic result. Note that if we substitute d ˜ n B ( s , m ) = d e f q ˜ K n B ( s , m ) , where 0 n K 1 , we obtain from (12) and (13)
d ˜ K 1 B ( s , m ) = i = 1 K 2 a i ( s ) d ˜ K i B ( s , m ) + d ˜ 1 B ( s , m ) i = K 1 a i ( s ) + θ 1 ( s , m ) ,
k = 1 n a k + 1 ( s ) d ˜ n k B ( s , m ) d ˜ n B ( s , m ) = ϕ n ( s , m ) ,
where 0 n K 2 and
ϕ n ( s , m ) = d e f a n + 1 ( s ) d ˜ 0 B ( s , m ) d ˜ 1 B ( s , m ) i = n + 1 a i ( s ) θ K n ( s , m ) .
In [38], a system of type (15) with an infinite number of equations ( n 0 ) was considered. It was proven there that each of its solution can be represented in the form
d ˜ n B ( s , m ) = M ( s , m ) R n + 1 ( s ) + i = 0 n R n i ( s ) ϕ i ( s , m ) ,
where the functional sequence R n ( s ) is defined in a recursive way by the sequence a n ( s ) as follows:
R 0 ( s ) = 0 , R 1 ( s ) = a 0 1 ( s ) , R n + 1 ( s ) = R 1 ( s ) R n ( s ) i = 0 n a i + 1 ( s ) R n i ( s ) ,
where n 1 .
Because the number of equations in (15) is finite, we can use (14) as a specific-type boundary condition to find M ( s , m ) and, in consequence, obtain a unique solution. Moreover, it is necessary to obtain the explicit formula for d ˜ 0 B ( s , m ) and d ˜ 1 B ( s , m ) , occurring in (16). Below, we write M ( s , m ) and d ˜ 1 B ( s , m ) as functions of d ˜ 0 B ( s , m ) ; then, we eliminate d ˜ 0 B ( s , m ) explicitly.
Substituting n = 0 into (17) leads to
M ( s , m ) = a 0 ( s ) d ˜ 0 B ( s , m ) .
Next, substituting n = 0 into (15), we obtain
d ˜ 1 B ( s , m ) = a 0 1 ( s ) ϕ 0 ( s , m ) + d ˜ 0 B ( s , m ) 1 a 1 ( s )
and hence
d ˜ 1 B ( s , m ) = d ˜ 0 B ( s , m ) θ K ( s , m ) f ( s ) ,
where f ( s ) = d e f 0 e s t d F ( t ) .
Introducing (19) and (20) in (17) and taking into consideration (16), we can express d ˜ n B ( s , m ) for n 1 as a function of d ˜ 0 B ( s , m ) . Indeed, we have
d ˜ n B ( s , m ) = γ n ( s ) d ˜ 0 B ( s , m ) + η n ( s , m ) , n 0 ,
where
γ n ( s ) = d e f a 0 ( s ) R n + 1 ( s ) + i = 0 n R n i ( s ) a i + 1 ( s ) 1 f ( s ) j = i + 1 a j ( s )
and
η n ( s , m ) = d e f i = 0 n R n i ( s ) θ K ( s , m ) f ( s ) j = i + 1 a j ( s ) θ K i ( s , m ) .
Substituting now (22) into (14) and referring to (21), we eliminate d ˜ 0 B ( s , m ) in the following way:
d ˜ 0 B ( s , m ) = Π 1 ( s , m ) Π 2 1 ( s ) ,
where
Π 1 ( s , m ) = d e f i = 1 K 2 a i ( s ) η K i ( s , m ) θ K ( s , m ) f ( s )
× i = K 1 a i ( s ) + θ 1 ( s , m ) η K 1 ( s , m ) ,
Π 2 ( s ) = d e f γ K 1 ( s ) i = 1 K 2 a i ( s ) γ K i ( s ) 1 f ( s ) i = K 1 a i ( s ) .
Let us denote by χ n B ( · ) the LST (Laplace–Stieltjes transform) of CDF of the busy period duration in the system that begins the operation with 1 n K packets present in the waiting room. It is easy to see that for χ 1 B ( s ) , , χ K B ( s ) , the following system of equations can be written (compare (12) and (13)):
χ ˜ 1 B ( s ) = i = 1 K 2 a i ( s ) χ ˜ i B ( s ) + χ ˜ K 1 B ( s ) i = K 1 a i ( s ) + f ( λ + s ) ,
χ ˜ n B ( s ) = i = 0 K n 1 a i ( s ) χ ˜ n + i 1 B ( s ) + χ ˜ K 1 B ( s ) i = K n a i ( s ) ,
where 2 n K and f ( s ) = d e f 0 e s t d F ( t ) . Note that if we put
ϰ ˜ n ( s ) = d e f f ( λ + s ) , n = 1 , 0 , n 2 ,
then we can obtain the solution of the systems (28) and (29) by using a step-by-step procedure explained in detail in (14)–(27), taking ϰ ˜ n ( s ) instead of ϰ n ( s , m ) . Because in the original model with N-policy each busy period begins with exactly N packets present, the only representation we need is the formula for χ ˜ N B ( s ) . Referring to (22), we have
χ ˜ B ( s ) = d e f χ ˜ N B ( s ) = γ K N ( s ) Π ˜ 1 ( s ) Π 2 1 ( s ) + η ˜ K N ( s ) , n 0 ,
where
η ˜ n ( s ) = d e f i = 0 n R n i ( s ) a 0 1 ( s ) 1 + a 0 1 ( s ) 1 ϰ ˜ K ( s ) ϰ ˜ K i ( s )
and
Π ˜ 1 ( s ) = d e f i = 1 K 2 a i ( s ) η ˜ K i ( s ) + η ˜ 1 ( s ) i = K 1 a i ( s ) + ϰ ˜ 1 ( s ) η ˜ K 1 ( s )
where γ n ( s ) and Π 2 ( s ) are defined in (23) and (27), respectively.

5. Main Result

In this section, the key result, namely, the explicit representation for the LT of the queue-size distribution in the considered queueing system with the N-policy, is given and proven.
Theorem 1.
The formula for the LT of the queue-size distribution of in the M / G / 1 / K -type system with threshold-type N-policy is as follows:
0 e s t P { X ( t ) = m } d t = q ˜ L ( s , m ) + g ˜ L ( s ) q ˜ N B ( s , m ) 1 g ˜ B ( s ) g ˜ L ( s ) ,
where the representations for q ˜ L ( s , m ) , g ˜ L ( s ) ,   q ˜ N B ( s , m ) = d ˜ K N B ( s , m ) and g ˜ B ( s ) are given in (4), (5), (22) and (31), respectively.
Proof. 
Applying the formula of total probability, we obtain
P { X ( t ) = m } = i = 1 P { X ( t ) = m , t L i } + P { X ( t ) = m , t B i } .
Because random variables L k and B k , k 1 , are independent and have identical distributions (in each sequence separately), we obtain
P { X ( t ) = m , t L i } = 0 t P { X ( t y ) = m , t y L 1 } d G L G B ( i 1 ) ( y ) ,
  P { X ( t ) = m , t B i } = 0 t P { X ( t y ) = m , t y B 1 } d G L i G B ( i 1 ) ( y ) .
Indeed, ( G L G B ) ( i 1 ) ( · ) is a CDF of ( i 1 ) complete cycles consisting of a buffer loading period followed by a busy period. Similarly, G L i G B ( i 1 ) ( · ) represents the duration of the time consisting of ( i 1 ) complete cycles and one additional buffer loading period.
In consequence, taking LTs of (36) and (37), referring to (35), we obtain the conclusion (34) of the theorem. □

6. Numerical Examples

In this section, we illustrate analytical results via numerical examples motivated by the operation of a hypothetical wireless packet network with an energy-saving threshold-type mechanism. Assume that data packets arrive at the node operating under the N-policy. Taking K = 8 and 250 B as a packet “size” unit, we consider the following two different probability distributions of batch sizes:
P 1 : p 1 = p 2 = 1 2 , p k = 0 , k > 2 ;
P 2 : p 1 = p 2 = p 3 = 1 3 , p k = 0 , k > 3 .
which gives the following arrival rate parameters: λ 1 = 200 (for P 1 ) and λ 2 = 150 (for P 2 ), respectively. Obviously, in practice, data packets have different sizes and do not occur in batches. Therefore, the distributions P 1 and P 2 allow for modeling different packets sizes in the arriving flow. According to P 1 , packets of sizes 250 and 500 B enter with the same frequency. Similarly, in the case of P 2 , data packets of sizes 250, 500 and 750 B arrive with the same frequency. Furthermore, let packets be transmitted with two different processing speeds 800 kb/s and 600 kb/s, according to exponential service time distribution; these correspond to the mean processing times 2.50 and 3.33 ms (parameters of exponentially distributed service times equal μ 1 = 400 and μ 2 = 300 , respectively).
Under the assumptions about arrival and serving rates, two different values of the utilization factor ρ of the considered system are possible, namely, 0.75 or 1. Transient probabilities P { X ( t ) = m } for ρ = 0.75 , ρ = 1 and probability distributions P 1 , P 2 are visualized in Figure 1, Figure 2 and Figure 3 for N = 2 , 4 and 6, respectively.
The obtained results show a significant dependence of the transient queue-size distribution not only on the utilization factor, but also on the shape of the batch size distribution (thus, in practice, on the variation of packet sizes). Of course, the essential dependence on the threshold value N is also visible. The stationary queue-size distributions (for m = 1 , , 8 ) are presented in Table 1 for two batch size distributions P 1 and P 2 , and for ρ = 0.75 and 1 . The values were obtained by applying the well-known Tauberian theorem to Formula (34).
The results presented in Table 1 show that the sensitivity of the stationary queue-size distribution on the type of the batch size distribution is essentially visible for the lower value of the traffic load and it “expires” in the case of ρ = 1 . Moreover, clearly, the higher the threshold value N, the less likely a shorter queue is to be obtained.
By analyzing probability distributions visualized in Figure 1, Figure 2, Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9, Figure 10, Figure 11 and Figure 12 we can draw the following conclusions:
  • The higher the threshold value N, the more volatile is the behavior of the appropriate transient probability;
  • The behavior of probability distributions close to t = 0 is characterized by greater variability with greater values of m (which is directly related to a buffer loading period starting at time t = 0 , during which it is possible to obtain higher values of the queue length);
  • As can be observed, the graphs “stabilize” faster for a lower traffic load value ρ = 0.75 .

7. Conclusions

In this article, the explicit formula for the LT of the conditional queue-size distribution in the M X / G / 1 / K -type finite-buffer queueing model with threshold-type control policy is derived. Analytical results are obtained by using an approach based on the construction of an embedded Markov chain, renewal theory and linear algebra.
In the literature, most of the results (particularly for the queue-size distribution) concerning models with limitations in access to the service station are obtained for the steady state of the system (in the case t ). In this paper, appropriate formulae are found in a compact form for the transient state of the system. The formulae are written directly, using the key parameters of the system and some recursively defined functional sequence, without defining any additional random walk.
Numerical examples are attached that illustrate theoretical results. In particular, the impact of the traffic load, batch size distribution and the threshold level N on the non-stationary behavior of the queue-size distribution are tested on examples and visualized in figures. The considered queueing model has potential applications as a mathematical model of energy-saving mechanisms in wireless computer and telecommunication networks, or in production systems.

Author Contributions

Conceptualization, W.M.K. and D.K.; Methodology, W.M.K. and D.K.; Software, W.M.K. and D.K.; Validation, W.M.K. and D.K.; Formal analysis, W.M.K. and D.K.; Investigation, W.M.K. and D.K.; Resources, W.M.K. and D.K.; Data curation, W.M.K. and D.K.; Writing—original draft, W.M.K. and D.K.; Writing—review & editing, W.M.K. and D.K.; Visualization, W.M.K. and D.K.; Supervision, W.M.K.; Project administration, W.M.K.; Funding acquisition, W.M.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kosar, R.; Bojaxhiu, I.; Onur, E.; Ersoy, C. Lifetime extension for surveillance wireless sensor networks with intelligent redeployment. J. Network And Comput. Appl. 2011, 34, 1784–1793. [Google Scholar] [CrossRef]
  2. Lee, J.H.; Moon, I. Modeling and optimization of energy efficient routing in wireless sensor networks. Appl. Math. Model. 2014, 38, 2280–2289. [Google Scholar] [CrossRef]
  3. Wang, J.; Liu, Y.; Song, H. Counter-unmanned aircraft system(s) (C-UAS): State of the art, challenges, and future trends. IEEE Aerosp. Electron. Syst. Mag. 2021, 36, 4–29. [Google Scholar] [CrossRef]
  4. Wang, Z.; Yue, L.; Chengguo, L.; Hong, G.-R.; Pen, S.R. Dynamic inversion of inland aquaculture water quality based on UAVs-WSN spectral analysis. Remote Sens. 2020, 12, 402. [Google Scholar] [CrossRef] [Green Version]
  5. Alskaif, T.; Guerrero-Zapata, M.; Bellalta, B. Game theory for energy efficiency in wireless sensor networks: Latest trends. J. Netw. Comput. 2015, 54, 33–61. [Google Scholar] [CrossRef]
  6. Ari, A.A.A.; Yenke, B.O.; Labraoui, N.; Damakoa, I.; Gueroui, A. A power efficient cluster-based routing algorithm for wireless sensor networks: Honeybees swarm intelligence based approach. J. Netw. Comput. 2016, 69, 77–97. [Google Scholar] [CrossRef]
  7. Xiao, F.; Aritsugi, M. An adaptive parallel processing strategy for complex event processing systems over data streams in wireless sensor networks. Sensors 2018, 18, 3732. [Google Scholar] [CrossRef] [Green Version]
  8. Jiang, F.C.; You, I.; Leu, F.Y. Approaching green sensor field using queue-based optimization technique. J. Netw. Comput. 2016, 66, 128–136. [Google Scholar] [CrossRef]
  9. Deng, X.; Ma, L.; Liu, X. CCAIB: Congestion control based on adaptive integral backstepping for wireless multi-router network. Sensors 2022, 22, 1818. [Google Scholar] [CrossRef]
  10. Lee, J.-H.; Jung, I.-B. Adaptive-compression based congestion control technique for wireless sensor networks. Sensors 2010, 10, 2919–2945. [Google Scholar] [CrossRef]
  11. Jiang, F.C.; Huang, D.C.; Yang, C.T.; Leu, F.Y. Lifetime elongation for wireless sensor network using queue-based approaches. J. Supercomput. 2012, 59, 1312–1335. [Google Scholar] [CrossRef] [Green Version]
  12. Jiang, F.C.; Huang, D.C.; Wang, K.H. Design approaches for optimizing power consumption of sensor node with N-policy M/G/1 queuing model. In Proceedings of the 4th International Conference on Queueing Theory and Network Applications, ACM, Fusionopolis, Singapore, 29–31 July 2009; p. 3. [Google Scholar]
  13. Jiang, F.C.; Huang, D.C.; Yang, C.T.; Wang, K.H. Mitigation techniques for the energy hole problem in sensor networks using N-policy M/G/1 queuing models. In Proceedings of the International Conference on Frontier Computing, Theory, Technologies and Applications, Bhubaneswar, India, 22–23 December 2012; pp. 281–286. [Google Scholar]
  14. Ma, Z.; Yu, X.; Guo, S.; Zhang, Y. Analysis of wireless sensor networks with sleep mode and threshold activation. Wirel. Netw. 2021, 27, 1431–1443. [Google Scholar] [CrossRef]
  15. Maheswar, R.; Jayaparvathy, R. Power control algorithm for wireless sensor networks using N-policy M/M/1 queueing model. Power 2010, 2, 2378–2382. [Google Scholar]
  16. Jain, M.; Kaur, S.; Singh, P. Supplementary variable technique (SVT) for non-Markovian single server queue with service interruption (QSI). Oper. Res. 2021, 21, 2203–2246. [Google Scholar] [CrossRef]
  17. Kumar, P.; Jain, M.; Meena, R.K. Optimal control of fault tolerant machining system with reboot and recovery in fuzzy environment using harmony search algorithm. ISA Trans. 2022, 119, 52–64. [Google Scholar] [CrossRef]
  18. Tian, N.; Zhang, Z.G. Vacation Queueing Models: Theory and Applications; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2006; Volume 93. [Google Scholar]
  19. Wang, Z.; Liu, L.; Shao, Y.; Zhao, Y.Q. Joining strategies under two kinds of games for a multiple vacations retrial queue with N-policy and breakdowns. AIMS Math. 2021, 6, 9075–9099. [Google Scholar] [CrossRef]
  20. Wang, Z.; Liu, L.; Zhao, Y.Q. Equilibrium customer and socially optimal balking strategies in a constant retrial queue with multiple vacations and N-policy. J. Comb. Optim. 2022, 43, 870–908. [Google Scholar] [CrossRef]
  21. Nandi, R.; Samanta, S.K.; Kim, C. Analysis of D-BMAP/G/1 queueing system under N-policy and its cost optimization. J. Ind. Manag. Optim. 2021, 17, 3603. [Google Scholar] [CrossRef]
  22. Suganya, R.; Nkenyereye, L.; Anbazhagan, N.; Amutha, S.; Kameswari, M.; Acharya, S.; Joshi, G.P. Perishable inventory system with N-policy, MAP arrivals, and impatient customers. Mathematics 2021, 9, 1514. [Google Scholar] [CrossRef]
  23. Meena, R.K.; Jain, M.; Assad, A.; Sethi, R.; Garg, D. Performance and cost comparative analysis for M/G/1 repairable machining system with N-policy vacation. Math. Comput. Simul. 2022, 200, 315–328. [Google Scholar] [CrossRef]
  24. Sun, W.; Zhang, Z.; Li, S. Comparisons of customer balking behavior in observable queues with N policies and geometric abandonments. Qual. Technol. Quant. Manag. 2022, 1–27. [Google Scholar] [CrossRef]
  25. Kempa, W.M. On transient queue-size distribution in the batch arrival system with the N-policy and setup times. Math. Commun. 2012, 17, 285–302. [Google Scholar]
  26. Kempa, W.M. The virtual waiting time for the batch arrival queueing systems. Stoch. Anal. Appl. 2004, 22, 1235–1255. [Google Scholar] [CrossRef]
  27. Kempa, W.M. GI/G/1/ batch arrival queueing system with a single exponential vacation Kempa. Math. Methods Oper. Res. 2009, 69, 81–97. [Google Scholar] [CrossRef]
  28. Kempa, W.M. On transient queue-size distribution in the batch-arrivals system with a single vacation policy. Kybernetika 2014, 50, 126–141. [Google Scholar] [CrossRef] [Green Version]
  29. Kempa, W.M.; Kurzyk, D. Transient departure process in M/G/1/K-type queue with threshold server’s waking up. In Proceedings of the 2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 16–18 September 2015; pp. 32–36. [Google Scholar]
  30. Kempa, W.M.; Kobielnik, M. Transient solution for the queue-size distribution in a finite-buffer model with general independent input stream and single working vacation policy. Appl. Math. Model. 2018, 59, 614–628. [Google Scholar] [CrossRef]
  31. Kempa, W.M. A comprehensive study on the queue-size distribution in a finite-buffer system with a general independent input flow. Perform. Eval. 2017, 108, 1–15. [Google Scholar] [CrossRef]
  32. Sudhesh, R.; Mohammed, S.A. Transient analysis of power management in wireless sensor network with start-up times and threshold policy. Telecommun. Syst. 2022, 80, 1–16. [Google Scholar] [CrossRef]
  33. Ke, J.-C.; Wang, K.-H. A recursive method for the N policy G/M/1 queueing system with finite capacity. Eur. J. Oper. 2002, 142, 577–594. [Google Scholar] [CrossRef]
  34. Barbhuiya, F.P.; Kumar, N.; Gupta, U.C. Analysis of the GI/M/c queue with N-threshold policy. Qual. Technol. Quant. Manag. 2022, 19, 490–510. [Google Scholar] [CrossRef]
  35. Lee, S.W.; Lee, H.W.; Baek, J.W. Analysis of discrete-time MAP/G/1 queue under workload control. Perform. Eval. 2012, 69, 71–85. [Google Scholar] [CrossRef]
  36. Alfa, A.; Li, W. Optimal (N,T)-policy for M/G/1 system with cost structures. Perform. Eval. 2000, 42, 265–277. [Google Scholar] [CrossRef]
  37. Cohen, J.W. The Single Server Queue; North-Holland: Amsterdam, The Netherlands, 1982. [Google Scholar]
  38. Korolyuk, V.S. Boundary-value problems for compound Poisson processes. Theory Probab. Appl. 1974, 19, 1–13. [Google Scholar] [CrossRef]
Figure 1. Transient distributions P { X ( t ) = m } for N = 2 , batch distribution P 1 and ρ = 0.75 .
Figure 1. Transient distributions P { X ( t ) = m } for N = 2 , batch distribution P 1 and ρ = 0.75 .
Sensors 22 09285 g001
Figure 2. Transient distributions P { X ( t ) = m } for N = 2 , batch distribution P 1 and ρ = 1 .
Figure 2. Transient distributions P { X ( t ) = m } for N = 2 , batch distribution P 1 and ρ = 1 .
Sensors 22 09285 g002
Figure 3. Transient distributions P { X ( t ) = m } for N = 2 , batch distribution P 2 and ρ = 0.75 .
Figure 3. Transient distributions P { X ( t ) = m } for N = 2 , batch distribution P 2 and ρ = 0.75 .
Sensors 22 09285 g003
Figure 4. Transient distributions P { X ( t ) = m } for N = 2 , batch distribution P 2 and ρ = 1 .
Figure 4. Transient distributions P { X ( t ) = m } for N = 2 , batch distribution P 2 and ρ = 1 .
Sensors 22 09285 g004
Figure 5. Transient distributions P { X ( t ) = m } for N = 4 , batch distribution P 1 and ρ = 0.75 .
Figure 5. Transient distributions P { X ( t ) = m } for N = 4 , batch distribution P 1 and ρ = 0.75 .
Sensors 22 09285 g005
Figure 6. Transient distributions P { X ( t ) = m } for N = 4 , batch distribution P 1 and ρ = 1 .
Figure 6. Transient distributions P { X ( t ) = m } for N = 4 , batch distribution P 1 and ρ = 1 .
Sensors 22 09285 g006
Figure 7. Transient distributions P { X ( t ) = m } for N = 4 , batch distribution P 2 and ρ = 0.75 .
Figure 7. Transient distributions P { X ( t ) = m } for N = 4 , batch distribution P 2 and ρ = 0.75 .
Sensors 22 09285 g007
Figure 8. Transient distributions P { X ( t ) = m } for N = 4 , batch distribution P 2 and ρ = 1 .
Figure 8. Transient distributions P { X ( t ) = m } for N = 4 , batch distribution P 2 and ρ = 1 .
Sensors 22 09285 g008
Figure 9. Transient distributions P { X ( t ) = m } for N = 6 , batch distribution P 1 and ρ = 0.75 .
Figure 9. Transient distributions P { X ( t ) = m } for N = 6 , batch distribution P 1 and ρ = 0.75 .
Sensors 22 09285 g009
Figure 10. Transient distributions P { X ( t ) = m } for N = 6 , batch distribution P 1 and ρ = 1 .
Figure 10. Transient distributions P { X ( t ) = m } for N = 6 , batch distribution P 1 and ρ = 1 .
Sensors 22 09285 g010
Figure 11. Transient distributions P { X ( t ) = m } for N = 6 , batch distribution P 2 and ρ = 0.75 .
Figure 11. Transient distributions P { X ( t ) = m } for N = 6 , batch distribution P 2 and ρ = 0.75 .
Sensors 22 09285 g011
Figure 12. Transient distributions P { X ( t ) = m } for N = 6 , batch distribution P 2 and ρ = 1 .
Figure 12. Transient distributions P { X ( t ) = m } for N = 6 , batch distribution P 2 and ρ = 1 .
Sensors 22 09285 g012
Table 1. Stationary probability distributions P { X ( ) = m } for N = 2 , 4 , 6 , utilization factors ρ = 0.75 , ρ = 1 and batch distributions P 1 , P 2 .
Table 1. Stationary probability distributions P { X ( ) = m } for N = 2 , 4 , 6 , utilization factors ρ = 0.75 , ρ = 1 and batch distributions P 1 , P 2 .
ρ = 0.75 ρ = 1
m P 1 P 2 P 1 P 2
N = 2
1 0.212075 0.199834 0.136161 0.137516
2 0.158953 0.145376 0.122422 0.123172
3 0.105852 0.080855 0.088267 0.0882393
4 0.092547 0.079795 0.098391 0.0981389
5 0.072634 0.068235 0.098877 0.0983271
6 0.059375 0.055587 0.096823 0.0960106
7 0.047794 0.047841 0.097677 0.0967295
8 0.038719 0.040349 0.097540 0.0965412
N = 4
1 0.112242 0.109196 0.077365 0.0774847
2 0.168366 0.148005 0.110890 0.111069
3 0.182401 0.193431 0.151724 0.151987
4 0.133278 0.123177 0.125696 0.125765
5 0.094683 0.081633 0.106656 0.106566
6 0.080649 0.074157 0.111316 0.111175
7 0.063987 0.063608 0.112137 0.111953
8 0.052152 0.052593 0.110932 0.110729
N = 6
1 0.080347 0.079517 0.058994 0.0590118
2 0.120510 0.107797 0.084558 0.0845924
3 0.130566 0.140905 0.115694 0.115754
4 0.150675 0.141098 0.128203 0.128264
5 0.160766 0.157617 0.152010 0.152073
6 0.118102 0.111993 0.138015 0.138019
7 0.086094 0.078620 0.123893 0.123844
8 0.072584 0.070182 0.127400 0.127354
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kempa, W.M.; Kurzyk, D. On Transient Queue-Size Distribution in a Model of WSN Node with Threshold-Type Power-Saving Algorithm. Sensors 2022, 22, 9285. https://doi.org/10.3390/s22239285

AMA Style

Kempa WM, Kurzyk D. On Transient Queue-Size Distribution in a Model of WSN Node with Threshold-Type Power-Saving Algorithm. Sensors. 2022; 22(23):9285. https://doi.org/10.3390/s22239285

Chicago/Turabian Style

Kempa, Wojciech M., and Dariusz Kurzyk. 2022. "On Transient Queue-Size Distribution in a Model of WSN Node with Threshold-Type Power-Saving Algorithm" Sensors 22, no. 23: 9285. https://doi.org/10.3390/s22239285

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop