SlideShare a Scribd company logo
1 of 20
Download to read offline
QUEUING
NETWORKS
PROBABILITY MODELS
INTRODUCTION
Queueing theory is the mathematical study of waiting lines, or queues.
A queueing model is constructed so that queue lengths and waiting time can be predicted.
In a model for computer system performance analysis, we may have a service center for the
CPU(s), a service center for each I/O channel, and possibly others.
QUEUING NETWORK
● Queuing network is the inter connections of several queues.
● For networks of m nodes, the state of the system can be described by an m–dimensional
vector (x1
, x2
, ..., xm
) where xi
= number of customers at each node.
QUEUING NETWORK
● An open queuing network is characterized by one or more sources of job arrivals
and correspondingly one or more sinks that absorb jobs departing from the network.
● In a closed queuing network, on the other hand, jobs neither enter nor depart from
the network.
● For real-time systems, the knowledge of response time distributions is required in
order to compute and/or minimize the probability of missing a deadline.
EXAMPLE
● Customers go from one queue to another in post office, bank, supermarket etc.
● Data packets traverse a network moving from a queue in a router to the queue in another router
CLASSIFICATION
► OPEN QUEUING NETWORK
► CLOSE QUEUING NETWORK
► MIXED QUEUING NETWORK
Open Queueing Networks
► A model in which jobs departing from one queue arrive at another queue (or possibly the
same queue)
► External arrivals and departures.
● Number of jobs in the system varies with time.
● Throughput = arrival rate.
● Goal: To characterize the distribution of number of jobs in the system.
EXAMPLE
➔ The yellow circle B, represents an external source of customers.
➔ Three inter-connected service centres and an external destination C.
➔ Attaching a weighting to each possible destination.
➔ For example customer leaving queue 2, there are 2 possible destinations.
➔ However, if queue1 had weight 1 and queue 0 had weight 2, then , on average, 1 in 3 customers
would go to queue 1 and 2 in 3 customers would go to queue 0.
Closed Queueing Network
Closed queueing network: No external arrivals or departures
► Total number of jobs = constant
► `OUT' is connected back to `IN.'
► Throughput = flow of jobs in the OUT-to-IN link
► Number of jobs is given, determine the throughput
EXAMPLE
➔ The service centres perform as in the open network case and routing probabilities are
defined in the same way.
➔ When one builds a closed network it is necessary to define the number of customers which
are initially in each of the service centres.
➔ These customers can then travel around the network but cannot leave it.
Mixed Queueing Network
► Open for some workloads and closed for others ⇒ Two classes of jobs.
► All jobs of a single class have the same service demands and transition probabilities.
Within each class, the jobs are indistinguishable.
EXAMPLE
► simple model of virtual circuit that is window flow controlled.
PROPERTIES
► Jockeying
► Blocking
► Routing
► Forking
► Joining
TRAFFIC EQUATIONS
► Used to determine the throughput/effective arrival rate of each of the queues in a
network
► The ideas are easily extended to more complex open networks and to closed networks.
TRAFFIC EQUATIONS
➔ We consider each queue in turn
➔ Queue 0 : Input to queue is 0
◆ The arrival rate from the source i.e 1/20.
◆ So the first traffic equation is: Xo = 1/20.
➔ Queue 1:
◆ X1=Xo+X2
➔ Queue 2: It only gets ⅔ of the customers that leave queue 1
◆ X2 = ⅔ X1
➔ For this example we get : Xo = 0.05 , X1= 0.15 , X2 = 0.1
MEAN VALUE ANALYSIS
❏ This allows solving closed queueing networks in a manner similar to that used for open
queueing networks.
❏ It gives the mean performance.
❏ Given a closed queueing network with N jobs: Ri(N) = Si (1+Qi(N-1))
❏ Here, Qi(N-1) is the mean queue length at ith device with N-1 jobs in the network
MEAN VALUE ANALYSIS
► Performance with no users ( N=0 ) can be easily computed
► Given the response times at individual devices, the system response time using the general response time
law is:
Jackson’s Theorem
► Jackson’s Theorem states that provided the arrival rate at each queue is such that equilibrium exists,
the probability of the overall system state (n1…….nK ) for K queues will be given by the product
form expression
Jackson’s Theorem Attributes
In Jackson”s network:
► Only one servers (M/M/1)
► queue disciplines “FCFS”
► Infinite waiting capacity
► Poisson input
► Open networks
THANK YOU

More Related Content

What's hot

Vc dimension in Machine Learning
Vc dimension in Machine LearningVc dimension in Machine Learning
Vc dimension in Machine LearningVARUN KUMAR
 
K mean-clustering algorithm
K mean-clustering algorithmK mean-clustering algorithm
K mean-clustering algorithmparry prabhu
 
K Means Clustering Algorithm | K Means Clustering Example | Machine Learning ...
K Means Clustering Algorithm | K Means Clustering Example | Machine Learning ...K Means Clustering Algorithm | K Means Clustering Example | Machine Learning ...
K Means Clustering Algorithm | K Means Clustering Example | Machine Learning ...Simplilearn
 
K MEANS CLUSTERING
K MEANS CLUSTERINGK MEANS CLUSTERING
K MEANS CLUSTERINGsingh7599
 
5.5 graph mining
5.5 graph mining5.5 graph mining
5.5 graph miningKrish_ver2
 
Clustering, k-means clustering
Clustering, k-means clusteringClustering, k-means clustering
Clustering, k-means clusteringMegha Sharma
 
Simulation & Modeling - Smilulation Queuing System
Simulation & Modeling - Smilulation Queuing SystemSimulation & Modeling - Smilulation Queuing System
Simulation & Modeling - Smilulation Queuing SystemMaruf Rion
 
Travelling Salesman Problem
Travelling Salesman ProblemTravelling Salesman Problem
Travelling Salesman ProblemDaniel Raditya
 
K-Means clustring @jax
K-Means clustring @jaxK-Means clustring @jax
K-Means clustring @jaxAjay Iet
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
K means clustering
K means clusteringK means clustering
K means clusteringkeshav goyal
 
Unsupervised learning
Unsupervised learningUnsupervised learning
Unsupervised learningamalalhait
 
Classification and Clustering
Classification and ClusteringClassification and Clustering
Classification and ClusteringEng Teong Cheah
 

What's hot (20)

Vc dimension in Machine Learning
Vc dimension in Machine LearningVc dimension in Machine Learning
Vc dimension in Machine Learning
 
K mean-clustering algorithm
K mean-clustering algorithmK mean-clustering algorithm
K mean-clustering algorithm
 
K Means Clustering Algorithm | K Means Clustering Example | Machine Learning ...
K Means Clustering Algorithm | K Means Clustering Example | Machine Learning ...K Means Clustering Algorithm | K Means Clustering Example | Machine Learning ...
K Means Clustering Algorithm | K Means Clustering Example | Machine Learning ...
 
K MEANS CLUSTERING
K MEANS CLUSTERINGK MEANS CLUSTERING
K MEANS CLUSTERING
 
5.5 graph mining
5.5 graph mining5.5 graph mining
5.5 graph mining
 
Clustering, k-means clustering
Clustering, k-means clusteringClustering, k-means clustering
Clustering, k-means clustering
 
K mean-clustering
K mean-clusteringK mean-clustering
K mean-clustering
 
3. mining frequent patterns
3. mining frequent patterns3. mining frequent patterns
3. mining frequent patterns
 
Simulation & Modeling - Smilulation Queuing System
Simulation & Modeling - Smilulation Queuing SystemSimulation & Modeling - Smilulation Queuing System
Simulation & Modeling - Smilulation Queuing System
 
Butterfly network
Butterfly networkButterfly network
Butterfly network
 
Travelling Salesman Problem
Travelling Salesman ProblemTravelling Salesman Problem
Travelling Salesman Problem
 
K-Means clustring @jax
K-Means clustring @jaxK-Means clustring @jax
K-Means clustring @jax
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Distributed Mutual exclusion algorithms
Distributed Mutual exclusion algorithmsDistributed Mutual exclusion algorithms
Distributed Mutual exclusion algorithms
 
Elgamal digital signature
Elgamal digital signatureElgamal digital signature
Elgamal digital signature
 
K means clustering
K means clusteringK means clustering
K means clustering
 
Unsupervised learning
Unsupervised learningUnsupervised learning
Unsupervised learning
 
ID3 ALGORITHM
ID3 ALGORITHMID3 ALGORITHM
ID3 ALGORITHM
 
Kerberos
KerberosKerberos
Kerberos
 
Classification and Clustering
Classification and ClusteringClassification and Clustering
Classification and Clustering
 

Similar to QUEUEING NETWORKS

MODELLING TRAFFIC IN IMS NETWORK NODES
MODELLING TRAFFIC IN IMS NETWORK NODESMODELLING TRAFFIC IN IMS NETWORK NODES
MODELLING TRAFFIC IN IMS NETWORK NODESijdpsjournal
 
Stochastic modelling and its applications
Stochastic modelling and its applicationsStochastic modelling and its applications
Stochastic modelling and its applicationsKartavya Jain
 
System modeling and simulations
System modeling and simulationsSystem modeling and simulations
System modeling and simulationsSeydi Alkan
 
Queuing theory and its applications
Queuing theory and its applicationsQueuing theory and its applications
Queuing theory and its applicationsDebasisMohanty37
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection NetworkAli A Jalil
 
Operations Research_18ME735_module 4 - queuing systems.pdf
Operations Research_18ME735_module 4 - queuing systems.pdfOperations Research_18ME735_module 4 - queuing systems.pdf
Operations Research_18ME735_module 4 - queuing systems.pdfRoopaDNDandally
 
Cost minimization model
Cost minimization modelCost minimization model
Cost minimization modelrowell balala
 
PR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
PR-108: MobileNetV2: Inverted Residuals and Linear BottlenecksPR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
PR-108: MobileNetV2: Inverted Residuals and Linear BottlenecksJinwon Lee
 
Lecture-2-01-02-2022.pdf
Lecture-2-01-02-2022.pdfLecture-2-01-02-2022.pdf
Lecture-2-01-02-2022.pdfZakria Bilal
 
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...IRJET Journal
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd Iaetsd
 
Simulation chapter 4
Simulation chapter 4Simulation chapter 4
Simulation chapter 4Hagos Guesh
 
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPMODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPVLSICS Design
 

Similar to QUEUEING NETWORKS (20)

Queue
QueueQueue
Queue
 
14 queuing
14 queuing14 queuing
14 queuing
 
MODELLING TRAFFIC IN IMS NETWORK NODES
MODELLING TRAFFIC IN IMS NETWORK NODESMODELLING TRAFFIC IN IMS NETWORK NODES
MODELLING TRAFFIC IN IMS NETWORK NODES
 
Stochastic modelling and its applications
Stochastic modelling and its applicationsStochastic modelling and its applications
Stochastic modelling and its applications
 
System modeling and simulations
System modeling and simulationsSystem modeling and simulations
System modeling and simulations
 
Queuing theory and its applications
Queuing theory and its applicationsQueuing theory and its applications
Queuing theory and its applications
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
Queuing theory
Queuing theoryQueuing theory
Queuing theory
 
Operations Research_18ME735_module 4 - queuing systems.pdf
Operations Research_18ME735_module 4 - queuing systems.pdfOperations Research_18ME735_module 4 - queuing systems.pdf
Operations Research_18ME735_module 4 - queuing systems.pdf
 
Queuing Theory
Queuing TheoryQueuing Theory
Queuing Theory
 
cscn1819.pdf
cscn1819.pdfcscn1819.pdf
cscn1819.pdf
 
Cost minimization model
Cost minimization modelCost minimization model
Cost minimization model
 
Queueing theory
Queueing theoryQueueing theory
Queueing theory
 
PR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
PR-108: MobileNetV2: Inverted Residuals and Linear BottlenecksPR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
PR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
 
Queueing theory
Queueing theoryQueueing theory
Queueing theory
 
Lecture-2-01-02-2022.pdf
Lecture-2-01-02-2022.pdfLecture-2-01-02-2022.pdf
Lecture-2-01-02-2022.pdf
 
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
 
Simulation chapter 4
Simulation chapter 4Simulation chapter 4
Simulation chapter 4
 
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPMODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
 

More from RohitK71

VIRTUALIZATION TECHNOLOGY
VIRTUALIZATION TECHNOLOGYVIRTUALIZATION TECHNOLOGY
VIRTUALIZATION TECHNOLOGYRohitK71
 
Gram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellationsGram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellationsRohitK71
 
Negotiation
Negotiation Negotiation
Negotiation RohitK71
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYRohitK71
 
INTEGRATION TESTING
INTEGRATION TESTINGINTEGRATION TESTING
INTEGRATION TESTINGRohitK71
 
INHERITANCE
INHERITANCEINHERITANCE
INHERITANCERohitK71
 
Dbms seminar
Dbms seminarDbms seminar
Dbms seminarRohitK71
 
Cn application layer_paradigms
Cn application layer_paradigmsCn application layer_paradigms
Cn application layer_paradigmsRohitK71
 
Compiler design error handling
Compiler design error handlingCompiler design error handling
Compiler design error handlingRohitK71
 
Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)RohitK71
 
Usp message queues
Usp message queuesUsp message queues
Usp message queuesRohitK71
 

More from RohitK71 (11)

VIRTUALIZATION TECHNOLOGY
VIRTUALIZATION TECHNOLOGYVIRTUALIZATION TECHNOLOGY
VIRTUALIZATION TECHNOLOGY
 
Gram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellationsGram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellations
 
Negotiation
Negotiation Negotiation
Negotiation
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
INTEGRATION TESTING
INTEGRATION TESTINGINTEGRATION TESTING
INTEGRATION TESTING
 
INHERITANCE
INHERITANCEINHERITANCE
INHERITANCE
 
Dbms seminar
Dbms seminarDbms seminar
Dbms seminar
 
Cn application layer_paradigms
Cn application layer_paradigmsCn application layer_paradigms
Cn application layer_paradigms
 
Compiler design error handling
Compiler design error handlingCompiler design error handling
Compiler design error handling
 
Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)
 
Usp message queues
Usp message queuesUsp message queues
Usp message queues
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 

QUEUEING NETWORKS

  • 2. INTRODUCTION Queueing theory is the mathematical study of waiting lines, or queues. A queueing model is constructed so that queue lengths and waiting time can be predicted. In a model for computer system performance analysis, we may have a service center for the CPU(s), a service center for each I/O channel, and possibly others.
  • 3. QUEUING NETWORK ● Queuing network is the inter connections of several queues. ● For networks of m nodes, the state of the system can be described by an m–dimensional vector (x1 , x2 , ..., xm ) where xi = number of customers at each node.
  • 4. QUEUING NETWORK ● An open queuing network is characterized by one or more sources of job arrivals and correspondingly one or more sinks that absorb jobs departing from the network. ● In a closed queuing network, on the other hand, jobs neither enter nor depart from the network. ● For real-time systems, the knowledge of response time distributions is required in order to compute and/or minimize the probability of missing a deadline.
  • 5. EXAMPLE ● Customers go from one queue to another in post office, bank, supermarket etc. ● Data packets traverse a network moving from a queue in a router to the queue in another router
  • 6. CLASSIFICATION ► OPEN QUEUING NETWORK ► CLOSE QUEUING NETWORK ► MIXED QUEUING NETWORK
  • 7. Open Queueing Networks ► A model in which jobs departing from one queue arrive at another queue (or possibly the same queue) ► External arrivals and departures. ● Number of jobs in the system varies with time. ● Throughput = arrival rate. ● Goal: To characterize the distribution of number of jobs in the system.
  • 8. EXAMPLE ➔ The yellow circle B, represents an external source of customers. ➔ Three inter-connected service centres and an external destination C. ➔ Attaching a weighting to each possible destination. ➔ For example customer leaving queue 2, there are 2 possible destinations. ➔ However, if queue1 had weight 1 and queue 0 had weight 2, then , on average, 1 in 3 customers would go to queue 1 and 2 in 3 customers would go to queue 0.
  • 9. Closed Queueing Network Closed queueing network: No external arrivals or departures ► Total number of jobs = constant ► `OUT' is connected back to `IN.' ► Throughput = flow of jobs in the OUT-to-IN link ► Number of jobs is given, determine the throughput
  • 10. EXAMPLE ➔ The service centres perform as in the open network case and routing probabilities are defined in the same way. ➔ When one builds a closed network it is necessary to define the number of customers which are initially in each of the service centres. ➔ These customers can then travel around the network but cannot leave it.
  • 11. Mixed Queueing Network ► Open for some workloads and closed for others ⇒ Two classes of jobs. ► All jobs of a single class have the same service demands and transition probabilities. Within each class, the jobs are indistinguishable.
  • 12. EXAMPLE ► simple model of virtual circuit that is window flow controlled.
  • 13. PROPERTIES ► Jockeying ► Blocking ► Routing ► Forking ► Joining
  • 14. TRAFFIC EQUATIONS ► Used to determine the throughput/effective arrival rate of each of the queues in a network ► The ideas are easily extended to more complex open networks and to closed networks.
  • 15. TRAFFIC EQUATIONS ➔ We consider each queue in turn ➔ Queue 0 : Input to queue is 0 ◆ The arrival rate from the source i.e 1/20. ◆ So the first traffic equation is: Xo = 1/20. ➔ Queue 1: ◆ X1=Xo+X2 ➔ Queue 2: It only gets ⅔ of the customers that leave queue 1 ◆ X2 = ⅔ X1 ➔ For this example we get : Xo = 0.05 , X1= 0.15 , X2 = 0.1
  • 16. MEAN VALUE ANALYSIS ❏ This allows solving closed queueing networks in a manner similar to that used for open queueing networks. ❏ It gives the mean performance. ❏ Given a closed queueing network with N jobs: Ri(N) = Si (1+Qi(N-1)) ❏ Here, Qi(N-1) is the mean queue length at ith device with N-1 jobs in the network
  • 17. MEAN VALUE ANALYSIS ► Performance with no users ( N=0 ) can be easily computed ► Given the response times at individual devices, the system response time using the general response time law is:
  • 18. Jackson’s Theorem ► Jackson’s Theorem states that provided the arrival rate at each queue is such that equilibrium exists, the probability of the overall system state (n1…….nK ) for K queues will be given by the product form expression
  • 19. Jackson’s Theorem Attributes In Jackson”s network: ► Only one servers (M/M/1) ► queue disciplines “FCFS” ► Infinite waiting capacity ► Poisson input ► Open networks