<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Estimation of Buffer Capacity for Weibull Traffic*</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Saint Petersburg Electrotechnical University "LETI"</institution>
          ,
          <addr-line>ul. Professora Popova 5, 197376 St. Petersburg</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The solution to the problem of estimating the probability of exceeding a given value by a random value is discussed, in particular, estimating the small and very small probabilities of packet loss due to buffer overflows. It is shown that statistics of extreme values is an effective means of solving the problems of this class. With the appropriate choice of the structure of the extrapolation formula, which underlies the extreme values, it is possible to significantly accelerate the computational experiment. The use of the Extreme Value Theory method in combination with the Monte Carlo method for estimating small and very small values of the probabilities of random variables allows us to reduce the simulation time by 4-5 tens compared to the classical Monte Carlo method. Demonstrated the solution to the problem of calculating the buffer capacity for Weibull traffic based on the admissible probability 10-6 of its overflow.</p>
      </abstract>
      <kwd-group>
        <kwd>Network Traffic</kwd>
        <kwd>Fractal Traffic</kwd>
        <kwd>Distribution with Heavy «Tails»</kwd>
        <kwd>Weibull</kwd>
        <kwd>Buffer Storage Volume</kwd>
        <kwd>Probability of Loss</kwd>
        <kwd>Extreme Value Theory</kwd>
        <kwd>Simulation</kwd>
        <kwd>Experiment Acceleration</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        A feature of the traffic of modern packet-switched info-communication networks is its
large-scale invariance (fractality). Fractal traffic is described by long-term
dependencies (LTD). The concept of a pulsating structure is often used in this context [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        An adequate description of fractal traffic is given by probability distributions with
heavy tails [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. One of these distributions used to describe the packet structure of
network traffic is the Weibull distribution [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]
      </p>
      <p>The Weibull distribution, hereinafter W(c, b), is widely used in the technique and it
is distributions with heavy tails with the distribution function of y values:
F ( y)  1  e( y)c , y  0.
(1)
*</p>
      <p>The distribution W(c, b) can be obtained as a function of the exponential distribution.
Let X be a random variable that has an exponential distribution Fx  X   1 ex. Then
the random variable Y has a Weibull distribution Y  X 1/с . Really</p>
      <p>Fy (Y )  P(Y  y)  P  X 1/с  y   P  X  yc   1 eyc  1 e y1/c c .
The resulting final expression is a function for the Weibull distribution.</p>
      <p>Let us compare the values of the tails W(c, b) and exponentially distributed random
variables with the same probability of their observation
(2)
(3)
e y1/c c  ex   y1/c c  x  yc  x  y  x1/c .</p>
      <p>From the relation, y  x1/c it follows that for values x&gt; 1 and c &lt;1 value y&gt; x, that
is, the “tail” of the W(c, b) distribution is heavier than the “tail” of the exponential
distribution.</p>
      <p>“Heavy tail” means that in distributions with heavy tails, significant (large) values
of a random variable are more likely (more often) than the same values, for example,
in an exponential distribution.</p>
      <p>
        The fractal properties of traffic have a significant effect on the characteristics of the
network [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5">1-5</xref>
        ]. The solution to many problems of the theory and technology of
information networks requires an assessment of such characteristics as the probability of a
random value exceeding a given value. These may be tasks related to the estimation of
small and very small probabilities of packet loss due to buffer overflow. For such
problems, a relatively small part of the random variable values given by the tail of the
distribution function becomes decisive [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        An effective means of solving problems of this class is the statistics of extreme
values [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. This is an extrapolation method based on knowledge of the asymptotic behavior
of the probability distribution. The "tail" of the probability distribution of values
random variable is approximated by a dependence, the parameters of which are estimated
from the results of direct modeling by the Monte Carlo method [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. With the proper
choice of the structure of the extrapolation formula, one can significantly accelerate the
computational experiment [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>The purpose of the paper is to present a solution to the problem of calculating the
buffer capacity for "heavy" traffic, based on the admissible probability Pover≤10-6 of its
overflow.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Node Model and Problem Statement</title>
      <p>
        We consider the network node as a queuing system (QS) of class G|G|1|m. To describe
the recurrent flow of applications and/or service time, we use the probability
distribution with a heavy tail - the Weibull distribution. With the ON-OFF model, the Pareto
distribution is more often considered. However, the Weibull distribution with the form
parameter c&lt;1 has all finite moments. This makes the distribution W(c, b) suitable for
modeling the convergence of tail parts in a heavy multiplexing environment [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>We set the task of calculating the required buffer capacity as the problem of finding
the dependence
the probability P of failure (loss of claim) on the size of the buffer m (m=0, 1, 2, ...).
This will allow for any predetermined admissible1 loss probability P* to determine the
corresponding smallest admissible buffer size m* by the formula following from (4):</p>
      <p>P  (m)
m*  –1 (P * ),
(4)
(5)
where -1 is the inverse of the function . Assuming that the function  is
monotonically decreasing2, we can state that the inverse function -1 exists3. Thus, having solved
the main problem, we can, for any given quality level (that is, for any maximum
admissible probability of losses P*), by the formula (5) determine the smallest buffer size m*
that provides it.</p>
      <p>
        In solving this problem, we will rely on the method of extreme values (Extreme
Value Theory, EVT) [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Extreme Value Method</title>
      <p>The theory of extreme values is based on the postulate that for a large number of initial
distributions F(x), the distribution of maxima Fn(x) taken from samples of size n tends
to an asymptote of the form
lim F n (bn  an )  exp(  exp(  x)),
(6)
where an and bn are parameters estimated from independent sample values of a
continuous random variable X.</p>
      <p>A class of distributions converging to the asymptote (6) is called exponential.
Weibull distribution belongs to this class.</p>
      <p>The EVT method was developed to analyze continuous random variables.</p>
      <p>
        The classical expression obtained using EVT for approximating the "tails" of
continuous distributions belonging to the exponential class has the form [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
1 In practice, it is required that the probability of loss of the application is very small (for
example, the admissible probability of losses can be 10–6–10–9).
2 We believe that the proportion of P requests lost due to lack of queue space cannot increase
with increasing buffer size m.
3 The function  is defined in formula (4) on the discrete set {m} = {0, 1, ...} of values of the
argument m. Therefore, the inverse function -1, strictly speaking, is defined on a discrete set
– the set {P} = { (0),  (1), ...}.
x
e(x/b)c
Simulation
x
e(x/m)
Simulation
exp  x  bn  ,
 an 
(7)
where Eτ is the average length of the sample sequences of values of the random variable
X, generated serially;
n is a fixed length of a series of sample sequences;
an and bn are parameters calculated from the results of the general sample.
      </p>
      <p>The accuracy of the approximation can be estimated by comparing the results
obtained by the EVT method with the results calculated from the corresponding
theoretical distributions</p>
      <p>To this end, a computer model was constructed to simulate Weibull and exponential
distributions. The following results were obtained from the experiment with the model
sampling.</p>
      <p>In the Table. 1 shows the results of modeling the “tail” of the Weibull distribution
e(x/b)c with parameters c=0,5; b=1.
The results of an experimental study of the use of the EVT method for estimating the
tail of known theoretical distributions show a rather high approximation accuracy – for
the same tail values the probabilities are of the same order of smallness.</p>
      <p>Therefore, it can be argued that the function constructed by the EVT method and
approximating the tail of the distribution is equivalent to the theoretical function.</p>
      <p>Also, a comparison of the values of the Weibull “tails” and the exponential
distribution for probabilities of the same order of smallness shows how much the Weibull “tail”
is heavier than the exponential one.</p>
    </sec>
    <sec id="sec-4">
      <title>The Model of the Process of Losses in the Buffer of the</title>
    </sec>
    <sec id="sec-5">
      <title>Limit Capacity</title>
      <p>
        The process of receipt and servicing of requirements in the QS with a limited queue
(hereinafter referred to as the limited buffer – LB ) can be considered as a regenerative
process [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] of occupation and discharge of the system.
      </p>
      <p>
        During the busy interval, requirements arrive and leave the system. The regeneration
point in the model coincides with the moment the request arrives, which catches the
service node unoccupied [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. A separate busy interval ends when the entire buffer is
freed. The number of escalation processes and queue reduction processes occurring in
the same occupation period is the same.
      </p>
      <p>
        From the analysis of the QS model with an unlimited queue (hereinafter referred to
as the unlimited buffer - UB) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], it follows that the number of requirements lost in the
LB due to the overflow of its capacity is equal to the difference between the maximum
value of the queue formed in the UB during the busy period and the value of the LB
capacity.
      </p>
      <p>Due to the stationary nature of the QS, the analysis of events in one employment
interval is equivalent for all intervals.</p>
      <p>The maximum value of the queue Li in the UB achieved during the escalation process
at the i-th employment interval does not depend on the number of escalation and
reduction processes, nor the number of requests served in this interval and does not depend
on the length of the employment gap.</p>
      <p>The value of Li depends only on the time intervals between arrivals and service
intervals. Since these times are random variables, the value Li for  i is also a random
variable. When observing an infinite number of employment intervals, it can be argued
that the maximum value of the queue L has a probability distribution function of its
values.</p>
      <p>This allows us to finally recognize that the probability of losing requests in an LB
with a capacity of N (probability of buffer overflow) is a function of the tail of the
distribution of the values of the maximum value L, starting with the value L=N+1.</p>
      <p>Therefore, if the distribution function for L=N is F(x), then the probability of losses is
Ploss(N)  f Q(N 1)  f 1 F(N).
(8)
that is, it is a distribution function of the tail of the probabilities of the values of the
maximum queue length in the UB.</p>
      <p>Experimental estimates of the required capacity of the limit buffer</p>
      <p>
        The queue in the buffer is a discrete random variable. To describe the probability
function of the values of the “tails” of discrete random values, for expression (4) is
obtained extension in the form [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]
      </p>
      <p>Q  x  R an exp( x  bn  1
nK an
),
(9)
were an and bn are the coefficients calculated from the sample data;
K – the average number of applications received at the entrance of the QS for the
regeneration period;
n is the number of values in the sequences into which the sampling sequence is
composed of the maximum values of the queue at the regeneration intervals;
R  exp xan  – the constant R depends on the value of the interval 2x=hi-hi-1 between
the values hi and hi-1 of the discrete values x.</p>
      <p>Let Ploss_ad be the admissible value of the probability of losses due to the excess of
the buffer capacity N.</p>
      <p>We set the value of Ploss_ad and solve (9) concerning the variable x=N. We obtain an
expression for estimating the value of the buffer capacity N, which provides the value
of the probability of losses Ploss (N) ≤ Ploss_ad (N), in the form
(10)
where x is the nearest integer not less than x.</p>
      <p>To use expression (10) to determine the required value of the capacitance of the LB, it
is necessary to calculate the coefficients, an and bn from the sample data K , ab, and bn.</p>
      <p>For this purpose, a simulation model of a single-phase QS with LB was realized. The
simulation model reproduced the periods of regeneration of receipt of applications in
the buffer and their servicing. The maximum values of the queues and their processing
were taken into account.</p>
      <p>The model corresponded to four types of QS: M|W|1, W|W|1, W|M|1, and M|M|1
with load factors = 0,5; 0,7; 0,9 for each type of QS. The simulation was carried out
for the given values of the probability of losses Ploss_ad: 10-4, 10-6, 10-8, 10-10.</p>
      <p>Tables 1-4 show the simulation results for this source data and PM is the value of the
probability of losses obtained from the Monte Carlo simulation with the found values
of the buffer capacity N.</p>
      <p>The corresponding values of Ploss_ad and PM presented in the tables are of the same
order of smallness, which confirms the sufficient accuracy of the calculated results by
expression (10).</p>
      <p>Also, a comparative analysis of the calculated data in Tables 1-3 with the data in
Table 4 confirms the fact that the packet traffic, in which receiving of requests are
described as distribution with heavy tails, requires significantly more significant
amounts of the buffer memory in network nodes.</p>
      <p>Ploss_ad</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>
        Fractal models are difficult to analytically interpret. The presented method for
calculating the buffer capacity under the conditions of “heavy” traffic described by the
Weibull distribution is relatively simple and efficient. The use of the EVT method in
combination with the Monte Carlo method for estimating small and very small values
of the probabilities of random variables allows us to reduce the simulation time by 4–5
tens in comparison with the classical Monte Carlo method [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        The EVT method was developed to approximate extreme statistics of distributions
of an exponential class [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        However, the case of small values of the shape parameter (c&lt;1) is of particular
interest since Weibull distributions with such parameters occupy an intermediate place
between distributions with an exponential decrease in tails (exponential distribution,
gamma distribution) and “heavy-tailed” distributions with power-law descending tails
of the Zipf-Pareto type [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        In the same work [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], the possibility of expanding the convergence of the
distributions of statistics of a fairly general form, based on samples of random volume, to the
Weibull distribution was shown.
      </p>
      <p>In our opinion, this is a significant point, since it expands the Weibull distribution
capabilities to describe real traffic.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Shelukhin</surname>
            <given-names>O. I. Multifractals.</given-names>
          </string-name>
          <article-title>Infocommunication applications</article-title>
          . Moscow: Hot line - Telecom, (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Stolings</surname>
            <given-names>W.</given-names>
          </string-name>
          <article-title>Modern computer networks</article-title>
          . 2nd ed. - St. Petersburg: Peter, (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Arfeen</surname>
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pawlikowski</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McNickle</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Willig</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>The role of the Weibull Distribution in Internet traffic modeling</article-title>
          .
          <source>In 25th International Teletraffic Congress (ITC)</source>
          . - Shanghai,
          <year>2013</year>
          . pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . DOI:
          <volume>10</volume>
          . 1109/ITC.
          <year>2013</year>
          .6662948
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Ramirez-Cobo</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lillo</surname>
            <given-names>R.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wiper</surname>
            <given-names>M. P.</given-names>
          </string-name>
          <article-title>Bayesian analysis of a gueeuing system with a long-tailed arrival process</article-title>
          . Communication in Statistics, vol.
          <volume>37</volume>
          ,
          <fpage>697</fpage>
          -
          <lpage>712</lpage>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Kutuzov</surname>
            <given-names>O. I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tatarnikova</surname>
            <given-names>T. M.</given-names>
          </string-name>
          <article-title>Model of a self-similar traffic generator and evaluation of buffer storage for classical and fractal queuing system</article-title>
          // Moscow Workshop on Electronic and Networking Technologies,
          <source>MWENT 2018 - Proceedings 1</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Galambos</given-names>
            <surname>Janos</surname>
          </string-name>
          .
          <article-title>Asymptotic theory of extreme order statistics</article-title>
          . Moscow: Nauka, (
          <year>1984</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Kutuzov</surname>
            <given-names>O. I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haddad</surname>
            <given-names>M. Analytical</given-names>
          </string-name>
          <article-title>and statistical method for calculating the capacity of the drive / Equipment in ecology and human activity</article-title>
          .
          <source>Materials of the International Conference "IENS - 2002". St. Petersburg</source>
          , 9 p. (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Francesco</given-names>
            <surname>Bernabei</surname>
          </string-name>
          , Roberto Ferretti, Marco Listanti,
          <string-name>
            <given-names>Giuseppe</given-names>
            <surname>Zingrillo</surname>
          </string-name>
          .
          <article-title>A methodology for buffer design in ATM switches // J.European transactions on telecommunications and related</article-title>
          technologia vol.
          <volume>2</volume>
          , no.
          <issue>4</issue>
          ,
          <fpage>367</fpage>
          -
          <lpage>379</lpage>
          (
          <year>1991</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Crane</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lemoine</surname>
            <given-names>O</given-names>
          </string-name>
          .
          <article-title>Introduction to the regenerative method of model analysis</article-title>
          . - M.:
          <string-name>
            <surname>Nauka</surname>
          </string-name>
          ,
          <year>1982</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>Haddat</given-names>
            <surname>Mufid</surname>
          </string-name>
          .
          <article-title>Development of a method for calculating the characteristics of the exchange of information in wide-band networks for integrated maintenance of automated control systems. The dissertation for the degree of candidate of technical sciences</article-title>
          .
          <source>St</source>
          .
          <article-title>Petersburg State Electrotechnical Institute (LETI)</article-title>
          .
          <source>St. Petersburg</source>
          ,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Korolev</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Yu</surname>
          </string-name>
          .,
          <string-name>
            <surname>Sokolov</surname>
            <given-names>I.A</given-names>
          </string-name>
          .
          <article-title>On the conditions for convergence of distributions of extreme order statistics to the Weibull distribution</article-title>
          .
          <source>Informatics and its application</source>
          ,
          <source>no3(8)</source>
          ,
          <fpage>3</fpage>
          -
          <lpage>11</lpage>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>