<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Features of Processing Various Self-Similar Traffic of Telecommunication Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Volodymyr Nakonechnyi</string-name>
          <email>volodym.nakonechnyi@knu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Valery Kozlovskyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Toroshanko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Shvets</string-name>
          <email>ivan.shvets@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Lubomyra Huzara Avenue, Kyiv, 03680</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska str., Kyiv, 01601</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <fpage>20</fpage>
      <lpage>21</lpage>
      <abstract>
        <p>Considered models of mass service systems of self-similar traffic of telecommunication networks. The differences of the main ratios of mass service theory for self-similar traffic in comparison with random processes with a classical Poisson distribution, as well as with distributions with so-called "heavy tails": Pareto, Weibull, log-normal distribution, gamma distribution, beta distribution, are analyzed. Analytical expressions for evaluating the key parameters of mass service systems of self-similar traffic under conditions of stationarity and ergodicity of the request arrival process are presented. Considered models of a single-channel and multi-channel service system with shared and shared buffer memory for the incoming request queue. For self-similar traffic, the analytical dependence of the average queue length on the average network utilization rate is determined. The Hurst parameter was used to estimate the correlation function of self-similar processes. The necessity of managing the packet arrival period and other parameters of the self-similar incoming flow is shown, reducing the risk of overloading individual routes and autonomous network segments. Graphs are shown that illustrate the dependence of the required buffer memory on the utilization ratio, as well as the growth of the queue for deterministic and quasi-deterministic traffic. Telecommunication network, self-similar traffic, mass service theory, multi-channel system, ORCID: 0000-0002-8301-5501 (V. Kozlovskyi); 0000-0002-0816-657X (A. Toroshanko); 0000-0001-7546-764X (I. Shvets); 0000-0002Proceedings ceur-ws.org</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Hurst parameter, network utilization factor</title>
      <sec id="sec-1-1">
        <title>1. Introduction</title>
        <p>
          The processes of the functioning of networks and communication systems can be represented as a
set of mass service systems (MSS), for which the characteristics of QoS service quality [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] and other
performance indicators are determined. The assessment of traffic service quality indicators requires
taking into account many factors in order to build adequate, scientifically based methods of calculation.
        </p>
        <p>For components used to build telecommunication networks (computers, operating systems, network
technologies, etc.), analytical models based on mass service theory (MST) provide an acceptable
convergence of theory and practice.</p>
        <p>
          The accuracy of simulation results is in all cases limited by the accuracy of the input data. In addition,
even in the presence of many assumptions introduced when using MST, the obtained results are close
to those that would be obtained with more detailed simulation modelling [
          <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5 ref6">2-6</xref>
          ]. In addition, analysis
based on MST can be performed in a shorter time than simulation.
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>2. Formulation of the research task</title>
        <p>discipline of service are taken into account 1, 2.</p>
        <p>In the mathematical models of MSS, the type of input flow, the scheme of the system and the
EMAIL:
atoroshanko@ukr.net
(A.</p>
        <p>
          2023 Copyright for this paper by its authors.
CEUR
time, there will be a certain number of requests (zero or more) in the queue; denote the average number
of requests in the queue by w , the average number of requests served – by ρ, and the average waiting
time is   . This time is averaged over all requests received at the entrance. Average service time of one
request   ̶ this is the time interval between sending the request to the server and leaving the serviced
request from the server. Service intensity  – this is the number of requests served per unit of time. The
total average number of requests in the system is defined as  . Average time of finding a request in the
system (waiting in the queue and service) –   . If the capacity of the queue is infinite, then requests in
the system are never lost; they are only delayed during waiting and service times. Under these
circumstances, the average number of sent requests is equal to the average number of incoming requests
per unit of time. When the intensity of the arrival of requests at the entrance of the system increases, the
time of finding requests in the system also increases, which leads to traffic jams (overload). The queue
is getting longer, the waiting time is increasing. When  = 1 , i.e  =  , the server is saturated, working
100% of the time [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. Therefore, the theoretical maximum intensity of the incoming flow is related to
the average service time   as  max = 1
⁄ .
        </p>
        <p />
        <p>In the first approximation, the length of the request stream is taken as an infinite stream. This means
that the average frequency of applications does not change when they are lost. If the length of the stream
is limited, then the amount of requests that can be expected at the system entrance is reduced by the
number of requests currently in the system; this usually results in a proportional decrease in the average
frequency of applications.</p>
        <p>
          If an infinite queue size is assumed, the waiting time can grow to infinity. Under the conditions of a
limited queue, some applications in the system may be lost. In practice, of course, any queue is limited.
In many cases, this does not lead to a significant difference in the analysis [
          <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
          ].
        </p>
      </sec>
      <sec id="sec-1-3">
        <title>3. Models of mass service systems</title>
        <p>
          The simplest and most frequently used in MSS are service disciplines FIFO (First came In – First
came Out) and LIFO (Last In – First Out) 3, 6, 8]. In computer and telecommunication networks, other
service disciplines can also be chosen [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], for example:
        </p>
        <p>̶ FIRO (First came In ̶ in Random order came Out. Another name ̶ SIRO (Service In Random</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Order);</title>
      <p>requirements.</p>
      <p>– SPT (Shortest requests are Processing First);
– PRS (Priority Requests Service), service according to priority.</p>
      <p>In practice, the service discipline is chosen for reasons of acceptable service time. For example, in
a node with packet switching, it is possible to provide for the sending of the shortest packets first or,
conversely, the longest packets. This choice is determined by the nature of traffic and quality of service
3.1.</p>
      <sec id="sec-2-1">
        <title>Single-channel MSS model</title>
        <p>
          This is the simplest model of SMO [
          <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
          ] (Figure 1). The central element of the system is a server
that serves the incoming flow of applications. These applications enter the service system. If the server
is free, the request is served immediately. Otherwise, the application becomes a queue for service.
        </p>
        <p>When the server has finished servicing the current request, it is removed from the queue. If there are
requests in the queue, one of them immediately enters the server according to the service discipline
used. The server in this model can perform some auxiliary services in processing requests. Examples:
a processor provides a service to processes; the data transmission line provides the service of
transmission of packets or frames; an I/O device provides read or write requests. When the system is
saturated, when</p>
        <p>→ 1, the queue grows to infinity. In practice, in a single-channel system, the intensity
of the input flow is limited to 70% to 90% relative to the theoretical maximum.
3.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>A model of a multi-channel system with a common queue</title>
        <p>In figure 2 shows a model of a multi-channel service system with a shared buffer memory of the
input queue of requests. A common queue with a given service discipline is used for all requests.</p>
        <p>If a request arrives at a time when at least one server is free, it is immediately sent to that server.
All servers are assumed to be identical; therefore, if more than one server is available, it does not matter
which server is selected for service. If all servers are busy, a queue begins to form. As soon as one
server becomes free, the request is dequeued according to the current service discipline.
equal to the intensity of the incoming flow of requests  . The theoretical maximum of the relative
service intensity is equal to  × 100%, and the theoretical maximum intensity of the incoming flow is
 max =  ⁄ .</p>
        <p>3.3</p>
      </sec>
      <sec id="sec-2-3">
        <title>A model of a multichannel system with a split queue</title>
        <p>In figure 3 shows a multi-channel system with a separate buffer memory. Such a system can be
interpreted as a parallel structure of single-channel service systems. Although the structural changes are
not fundamental, the operating characteristics of the depicted system may differ from those previously
discussed. The key characteristics of a queue with multiple serving devices are similar to those of a
single-channel system. An infinite volume of buffer memory and an infinite size of the queue are
assumed, with the distribution of the queue among all serving devices (servers). It is commonly believed
that the discipline of service in the order of arrival (FIFO) is implemented. In the case of a multi-channel
service system, if all servers are assumed to be identical, the choice of a specific server for the next
request does not affect the service time.</p>
      </sec>
      <sec id="sec-2-4">
        <title>4. Determination of key parameters of self-similar traffic</title>
        <p>To estimate the average queue size r under conditions of stationarity and ergodicity of the</p>
        <p>Accordingly, Little's formulas can be used to connect the number ρ with the intensity of incoming
requests  and the time the request was in the system   :  =    .</p>
        <p>characteristics as the process</p>
        <p>itself:
mathematical expectation</p>
        <p>x t </p>
        <p>Real random processes, of course, preserve the property of self-similarity only up to a certain limit.
This measure of the statistical stability of the process under multiple scaling is defined by the so-called
Hurst parameter or related self-similarity parameter. A random process x(t) is statistically self-similar
with the Hurst parameter H (0,5  H  1), if for any a &gt; 0 process
 (
)
⁄  has the same statistical
dispersion
correlation function
 [ ( )] =
 [ ( )] =
 ( ,  ) =
 [ ( )]
 [ ( )]
 ( , 
⁄ 
⁄ 2
)
⁄ 2
application arrival process, Little's formula is used 1, 9, 11:
for a single-channel service system:
 =  ,  =</p>
        <p>+  ;
for  -channel service system:
 =
   ⁄ ,  =    = 
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)</p>
        <p>Thus, the following a priori information is necessary for the analysis of MSS: the intensity of the
incoming flow of requests, the average service time, and the number of service channels. Based on this
information, you can get asymptotic estimates of the average number of requests in the queue, the
average waiting time, and the total time the requests are in the system.</p>
        <p>
          It should be taken into account that request flows may not be distributed according to Poisson's law,
but according to other probabilistic laws with so-called "heavy tails" [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. These are the Pareto, Weibull,
log-normal distribution, gamma distribution, beta distribution, and some other less popular ones.
        </p>
        <p>For example, for the Pareto distribution, the main relations have the following form:
probability density
probability function:
average value
 ( ) =  ⁄ (</p>
        <p>⁄ )

 +1
, ( і</p>
        <p>&lt; 0) ̶ distribution parameters;</p>
        <p>( ) = 1 −  ⁄
, ( &gt;  ,</p>
        <p>&gt; 0);
 [ ] =  ⁄
− 1
 , (
&gt; 1).</p>
        <p>The more  , the longer the property of self-similarity is preserved under multiple scaling. At 
=
0,5 this property is practically absent.</p>
        <p>Correlation functions of self-similar processes with a large Hurst parameter decay more slowly than
those of ordinary random processes, and the decay has, as a rule, an oscillatory character. It was
established that the constant component of the correlation function decreases according to the law
 1 − 2 , where  1,  2 ̶ constants,  ̶ scale parameter.</p>
        <p>Accordingly, the spectral density of the process theoretically tends to infinity at a frequency
approaching zero. Ratios (1-7) can be useful as asymptotic approximations of real processes.</p>
        <p>
          Such specific characteristics are inherent not only to data traffic (TCP, FTP protocols), but also to
signal traffic (SS7 protocol), VBR-video, Ethernet/ISDN and some others. Physically, they are caused
by a high degree of grouping of packets at client sites, in routers and switching nodes of information
communication networks. Even if the source generates a regular stream of packets, the data is delivered
to the consumer in bursts interspersed with idle intervals. The reasons for this are the limited speed of
network devices, insufficient volume of buffers, etc. In addition, self-similar traffic has a special
structure that is preserved during multiple scaling. In real processes, there is some outliers with a
relatively small average traffic level. Due to such bursts of load, network characteristics also deteriorate:
losses, delays, jitter of packets when passing through network nodes increase [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>
          Methods for calculating the requirements for networks of new generations (channel bandwidth,
buffer capacity, etc.) based on Markov models and Erlang or Little formulas, which were successfully
used in the design of telephone networks, can give unreasonably optimistic solutions and lead [
          <xref ref-type="bibr" rid="ref13 ref7">7, 13</xref>
          ].
With the self-similar nature of the traffic, the dependence of the average duration of the queue
(respectively, the required size of the buffer) q from the average utilization ratio has the following form:
At H=0,5 this formula is simplified:
 =
 1/2(1− )
⁄
        </p>
        <p>(1 −  ) /(1− )
 =</p>
        <p>⁄(1 −  )
which is a classical result of MSS with the simplest input flow and exponentially distributed service
time (М/М/1). For a system with deterministic maintenance time (М/D/1) a classic result looks like this:
 =

⁄
1 − 
−
 2
⁄
2(1 −  )
.</p>
        <p>In figure 4 shows the results of calculations of the dependence of the required buffer memory  
from the utilization factor  =  ⁄ for different inbound traffic patterns. Calculations are made as for
Poisson flows of requests M/M/1 і M/D/1, as well as for self-similar flows.</p>
        <p>(1 – H=0,6; 2 – H=0,8; 3 – H=0,7; 4 – H=0,4; 5 – M/M/1; 6 – M/D/1)</p>
        <p>D/D/1</p>
        <p>In practice, both the traffic at the output of the shaper and the packet processing time are
quasideterministic (we denote them by QD). In figure. 6 shows graphs for the relevant cases.</p>
        <p>The graphs clearly show that for self-similar traffic already at   0,4 a larger memory resource of
buffer devices is required than for the classic model M/M/1, which is considered the least favorable
compared to others (for example, with a constant or Gaussian service time distribution). The rate of
growth of the required amount of memory increases with the increase of the Hurst parameter, which is
mainly due to the degree of grouping of homogeneous packets and bursts of network load.</p>
        <p>It can also be concluded that simply increasing the buffer memory (hardware or software) is
ineffective. With the expected increase in the share of data traffic in the total volume, the degree of
selfsimilarity will increase, and the dependence  (  ) will grow more and more sharply. To eliminate
or at least reduce the harmful effect of traffic similarity, methods of regulation or shaping of the
incoming flow (policing - shaping) are usually used. Ideally, this results in a deterministic or close to
deterministic application order. With deterministic traffic (deterministic order of incoming applications
and deterministic processing time), the queue growth graph is a linear-broken line (Figure 5).
0</p>
      </sec>
      <sec id="sec-2-5">
        <title>5. Conclusions</title>
        <p>Models of heterogeneous computer network traffic, which has self-similar properties, are analyzed
in the work. The considered models of single-channel and multi-channel service system with shared
and separate buffer memory for the input queue of requests. Their advantages and disadvantages are
shown. Analytical expressions for evaluating the key parameters of mass service systems of self-similar
traffic under conditions of stationarity and ergodicity of the application arrival process are presented.
For self-similar traffic, the analytical dependence of the average queue duration on the average network
utilization rate is determined.</p>
        <p>To eliminate traffic bursting caused by the similarity of the incoming stream, it is necessary to
control its parameters, first of all, the period of arrival of packets. Thanks to this, the rate of growth of
queues in the buffer memory of switching nodes slows down. As a result, the risk of overloading
individual routes and autonomous network segments is reduced..
6. References</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Giambene</surname>
            <given-names>G.</given-names>
          </string-name>
          <article-title>Queuing Theory and Telecommunications: Networks and Applications; 2nd edition</article-title>
          . ‒ Springer NY,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Floudas</surname>
            <given-names>C.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pardalos P.M. Encyclopedia</surname>
          </string-name>
          of optimization: 2-d ed. - Springer science+buisiness media, LLC,
          <year>2009</year>
          . - 4646 p.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Bonaventure</surname>
            <given-names>O. Computer</given-names>
          </string-name>
          <string-name>
            <surname>Networking</surname>
          </string-name>
          : Principles, Protocols and Practices.
          <source>Release. - cnp3book</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Stallings</surname>
            <given-names>W.</given-names>
          </string-name>
          <article-title>Foundations of Modern Networking: SDN, NFV</article-title>
          , QoE, IoT, and
          <string-name>
            <surname>Cloud</surname>
          </string-name>
          . New Jersey; Pearson Education, Inc.,
          <string-name>
            <surname>Old</surname>
            <given-names>Tappan</given-names>
          </string-name>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Popovsʹkyy</surname>
            <given-names>V.V.</given-names>
          </string-name>
          <article-title>Telekomunikatsiyni systemy ta merezhi. Struktura ta osnovni funktsiyi</article-title>
          .
          <source>Kharkiv.: SMIT</source>
          ,
          <year>2018</year>
          . http://www.znanius.com/3534.html
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Speidel</surname>
            <given-names>J</given-names>
          </string-name>
          . Introduction to Digital Communications / Springer Nature Switzerland AG,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Kurose</surname>
            <given-names>J.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ross K.W. Computer Networking: A Top-Down Approach</surname>
          </string-name>
          . ‒ 7th ed. ‒ Pearson
          <string-name>
            <surname>Education</surname>
          </string-name>
          , Inc.,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Frenzel</surname>
            <given-names>L.E.</given-names>
          </string-name>
          <article-title>Principles of electronic communication systems</article-title>
          , 4th Ed.
          <source>McGraw Hill Education</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Lesnaya</surname>
            <given-names>N.N.</given-names>
          </string-name>
          <article-title>Development of control algorithm intelligent multiservice networks. Problems efficiency infrastructure</article-title>
          .
          <source>Collected Works</source>
          , issue
          <volume>11</volume>
          .
          <string-name>
            <surname>Kyiv</surname>
          </string-name>
          ,
          <year>2015</year>
          .
          <fpage>150</fpage>
          -
          <lpage>155</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Tanenbaum</surname>
            <given-names>Andrew S.</given-names>
          </string-name>
          , Maarten Van Steen.
          <article-title>Distributed systems: principles and paradigms</article-title>
          .
          <source>Pearson Education</source>
          . Inc. Pearson Prentice Hall, Upper Saddle River, NJ
          <volume>07458</volume>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Vinogradov</surname>
            <given-names>N.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savchenko</surname>
            <given-names>A.S.</given-names>
          </string-name>
          <article-title>Comparative analysis of the functionals of optimal control corporate computer network</article-title>
          .
          <source>Journal of Qafqaz University (Mathematics and Computer Science)</source>
          . Vol.
          <volume>1</volume>
          ,
          <issue>Nr</issue>
          .
          <volume>2</volume>
          .,
          <year>2013</year>
          .
          <fpage>156</fpage>
          -
          <lpage>167</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Di</surname>
            <given-names>Giorgio A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pietrabissa</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Priscoli F.D.</surname>
          </string-name>
          ,
          <string-name>
            <surname>Isidori</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Robust Output Regulation for a Class of Linear Differential-Algebraic Systems</article-title>
          .
          <source>‒ IEEE Control Systems Letters. ‒ 2018</source>
          . ‒ Vol.
          <volume>2</volume>
          , No. 3. ‒ P.
          <fpage>477</fpage>
          -
          <lpage>482</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Forbs</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Evans</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hastings</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peacock</surname>
            <given-names>B</given-names>
          </string-name>
          . Statistical Distributions:
          <fpage>4</fpage>
          -
          <string-name>
            <given-names>th</given-names>
            <surname>Edition</surname>
          </string-name>
          . ‒ John Wiley &amp; Sons, Inc.,
          <string-name>
            <surname>Hoboken</surname>
          </string-name>
          , New Jersey,
          <year>2011</year>
          . ‒ 212 pp.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>