Telecommunication Systems

, Volume 65, Issue 4, pp 717–728 | Cite as

Performance modeling and analysis of hypoexponential network servers

Article

Abstract

Hypoexponential servers are commonly seen in today’s computer and communication networks whereby incoming packets are processed by the network server in multiple stages with each stage having a different processing time. This paper presents an analytical model to capture the behavior and subsequently analyze the performance of these network servers or similarly behaving systems. From our model, we derive key performance measures and features which include CPU utilization, system idleness, mean throughput, packet loss, mean system and queuing packet delays, and mean system and queue sizes. In addition, we present two popular finite queueing models (namely, M / D / 1 / K and M / M / 1 / K) to approximate our hypoexponential model. Results show that the both of these approximate models give close results when the system queue size is large.

Keywords

Network servers Finite queueing systems Hypoexponential service Performance modeling and analysis 

Notes

Acknowledgements

The authors thank the anonymous reviewers for their valuable comments, which helped us to considerably improve the content, quality, and presentation of this paper.

References

  1. 1.
    The Snort Project, ‘Snort Users Manual 2.81’. http://www.snort.org/.
  2. 2.
    Carr, J. “Snort: Open Source Network Intrusion Prevention”, eSecurityPlanet. http://www.esecurityplanet.com/article.php/11162_3681296_1.
  3. 3.
    Melara, A. J. (2002).“Performance Analysis of the Linux Firewall in a Host,” Master Thesis, California Polytechnic State University.Google Scholar
  4. 4.
  5. 5.
    Network Function Virtualization, “NFV—Introductory White Paper”. http://portal.etsi.org/NFV/NFV_White_Paper.pdf.
  6. 6.
    Mantri, G. “Comparing Windows Azure Queue Service and Amazon Simple Queue Service”. http://gauravmantri.com/2012/03/27/comparing-windows-azure-queue-service-and-amazon-simple-queue-service/.
  7. 7.
    Amazon Inc., “Amazon Simple Queue Service”. http://aws.amazon.com/sqs/.
  8. 8.
    StormMQ Inc., “Enterprise Class Message Queueing”. http://stormmq.com/cloud-based-mq-services/.
  9. 9.
    Iron.io., “IronMQ: Elastic and Scalable Message and Event Handling”. http://www.iron.io/products/mq.
  10. 10.
  11. 11.
    Ranjan, R. (2014). Streaming big data processing in datacenter clouds. IEEE Cloud Computing, 1(1), 78–83.CrossRefGoogle Scholar
  12. 12.
  13. 13.
  14. 14.
  15. 15.
  16. 16.
    Gross, D., & Harris, C. (1998). Fundamentals of queueing theory. New York: John Wiley & Sons.Google Scholar
  17. 17.
    Takagi, H. (1993). Queueing analysis, Vol. 1 : Finite systems. Amsterdam: North-Holland.Google Scholar
  18. 18.
    Kleinrock, L. (1975). Queueing systems, Vol. 1: Theory. New York: Wiley-Interscience.Google Scholar
  19. 19.
    Neuts, M. F. (1981). Matrix-geometric solutions in stochastic models: An algorithmic approach. New York: Courier Corporation.Google Scholar
  20. 20.
    Dandoush, A., Alouf, S., & Nain, P. (2009). Simulation analysis of download and recovery processes in P2P storage systems. In Proceedings of international teletraffic congress, pp. 1–8.Google Scholar
  21. 21.
    Gao, W., Li, Q., Zhao, B., & Cao, G. (2009). Multicasting in delay tolerant networks: A social network perspective. In Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, pp. 299–308, New Orleans, LA.Google Scholar
  22. 22.
    Gao, W., Li, Q., Zhao, B., & Cao, G. (2012). Social-aware multicast in disruption-tolerant networks. IEEE/ACM Transactions on Networking (TON), 20(5), 1553–1566.CrossRefGoogle Scholar
  23. 23.
    Marin, A., & Bulo, S. R. (2015). Explicit solutions for queues with hypo-or hyper-exponential service time distribution and application to productform approximation. Performance Evaluation, 81, 1–19.CrossRefGoogle Scholar
  24. 24.
    Marin, A., & Bulo, S. R. (2011). Explict solutions for queues with hypo-exponential service time and applications to product form analysis. In Proceedings of the 5th international ICST conference on performance evaluation methodologies and tools, pp. 166–175, Paris, France.Google Scholar
  25. 25.
    Salah, K. (2011). Analysis of a two-stage network server. International Journal of Applied Mathematics and Computation, Elsevier Science, 217(23), 9635–9645.CrossRefGoogle Scholar
  26. 26.
    Salah, K. (2014). Analysis of Erlangian network services. International Journal of Electronics and Communications, Elsevier Science, 68(7), 623–630.CrossRefGoogle Scholar
  27. 27.
    Salah, K., Badawi, K., & Boutaba, R. (2012). Performance modeling and analysis of network firewalls. IEEE Transactions on Network and Service Management, 9(1), 12–21.CrossRefGoogle Scholar
  28. 28.
    Karam, M., & Tobagi, F. (2002). Analysis of delay and delay jitter of voice traffic in the internet. Computer Networks Magazine, 40(6), 711–726.CrossRefGoogle Scholar
  29. 29.
    Leland, W., Taqqu, M., Willinger, W., & Wilson, D. (1994). On the self-similar nature of Ethernet traffic. IEEE/ACM Transactions on Networking, 2(1), 1–15.CrossRefGoogle Scholar
  30. 30.
    Paxson, V., & Floyd, S. (1995). Wide-area traffic: The failure of Poisson modeling. IEEE/ACM Transactions on Networking, 3(3), 226–244.CrossRefGoogle Scholar
  31. 31.
    Willinger, W., Taqqu, M., Sherman, R., & Wilson, D. (1995). Self-Similarity through high-variability: Statistical analysis of Ethernet LAN traffic at the source level. In Proceedings of ACM SIGCOMM, August, pp. 100–113, Cambridge, Massachusetts.Google Scholar
  32. 32.
    Jain, R. (1991). The art of computer systems performance analysis: Techniques for experimental design, measurement, simulation, and modeling. New York: Wiley.Google Scholar
  33. 33.
    Salah, K., Elbadawi, K., & Boutaba, R. (2015). An analytical model for estimating cloud resources of elastic services. Journal of Network and Systems Management, 24(2), 285–308.CrossRefGoogle Scholar
  34. 34.
    Law, A., & Kelton, W. (1991). Simulation modeling and analysis (2nd ed.). New York: McGraw-Hill.Google Scholar
  35. 35.
    White, J. (1997). An effective truncation heuristic for bias reduction in simulation output. Simulation Journal, 69(6), 323–334.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.Electrical and Computer Engineering DepartmentKhalifa University of Science, Technology and Research (KUSTAR)Abu DhabiUAE
  2. 2.Computer, Networks, Mobility and Modeling Laboratory, National School of Applied SciencesHassan 1st UniversitySettatMorocco

Personalised recommendations