Background

Server vacation models are useful for queueing systems in which the server wants to utilize his idle time for different purposes. The vacation mechanism considered in this paper is termed as ‘multiple vacation policy’. That is, the server upon returning from a vacation leaves immediately for another one if the system is empty at that moment. Applications of the server with multiple vacation models can be found in manufacturing systems, designing of computer and communication systems, etc. Queueing systems with multiple server vacations have attracted the attention of numerous researchers. Baba (1986) studied batch-arrival MX/G/1 queueing systems with multiple vacations. A discrete-time Geo/G/1 queue with multiple vacations was studied by Tian and Zhang (2002). An MX/G(a,b)/1 queue with multiple vacations including closedown time has been studied by Arumuganathan and Jeykumar (2004). Kumar and Madheswari (2005) analyzed a Markovian queue with two heterogeneous servers and multiple vacations. By using the matrix geometric method, they derived the stationary queue length distribution and mean system size. Wu and Takagi (2006) investigated an M/G/1 queue with multiple vacations and exhaustive service discipline such that the server works with different rates rather than completely stopping the service during vacation. Ke (2007) studied an MX/G/1 queueing system under a variant vacation policy where the server takes at most j vacations. He derived the system size distribution as well as waiting time distribution in the queue. Ke and Chang (2009) considered an MX/(G1,G2)/1 retrial queue with general retrial times, where the server provides two phases of heterogeneous service to all customers under Bernoulli vacation schedules. They constructed the mathematical model and derived the steady-state distribution of the server state and the number of customers in the system/orbit. Ke et al. (2009) studied the vacation policy for a finite buffer M/M/c queueing system with an un-reliable server. Threshold N-policy for an MX/H2/1 queueing system with an un-reliable server and vacations was studied by Sharma (2010). Moreover, Singh et al. (2012) investigated an M/G/1 queueing model with vacation and used the generating function method for obtaining various performance measures. Very recently, an un-reliable bulk queue with state-dependent arrival rates was examined by Singh et al. (2013).

Queueing models with an un-reliable server under multiple vacation policy are more realistic representation of the systems. The service of the components may be interrupted when the operator encounters unpredicted breakdowns, and it is to be immediately recovered with a random time. When the repair is completed, the server immediately returns for service. Wang et al. (1999) extended Wang's model to the N-policy for an M/H2/1 queueing system and focused on single-arrival Erlangian service time queueing model with an un-reliable server. Wang et al. (2004) considered an M/Hk/1 queueing system with a removable and un-reliable server under N-policy and presented the optimal operating policy. Wang (2004) considered an M/G/1 queue with an un-reliable server and second optional service. Using the supplementary variable method, he obtained transient and steady-state solutions for both queueing and reliability measures of interest. Ke (2005) studied a modified T vacation policy for an M/G/1 queueing system where an un-reliable server may take at most J vacations repeatedly until at least one customer appears in the queue upon returning from vacation, and the server needs a startup time before starting each of his service periods. Li et al. (2007) proposed a single-server vacation queue with two policies, working vacation and service interruption. Choudhury and Deka (2008) studied an M/G/1 retrial queue with an additional second phase of optional service subject to breakdowns occurring randomly at any instant while serving the customers. Further, Wang and Xu (2009) obtained the solution of an M/G/1 queue with second optional service and server breakdown using the method of functional analysis. The work on an M/G/1 queue with second optional service and server breakdown has been done by Choudhury and Tadj (2009). They derived the Laplace-Stieltjes transform of busy period distribution and waiting time distribution. Further, an un-reliable server queue with multi-optional services and multi-optional vacations was analyzed by Jain et al. (2013).

Approximate results of many complex queueing models have been developed by several authors by applying the technique of maximum entropy principle. Jain and Singh (2000) used the principle of maximum entropy to analyze the optimal flow control of a G/G/c finite capacity queue. Jain and Dhakad (2003) provided the steady-state queue size distribution of an MX/G/1 queue using the maximum entropy approach in which the constraints are expressed in terms of mean arrival rates, mean service rates, and mean number of customers in the system. Further, Ke and Lin (2006) employed the principle of maximum entropy to derive the approximate formulas for the steady-state probability distributions of the queue length. Ke and Lin (2008) suggested the maximum entropy principle to examine the MX/G/1 queueing system in different frameworks. Omey and Gulck (2008) did maximum entropy analysis of an MX/M/1 queueing model with multiple vacations and server breakdowns. Wang and Huang (2009) analyzed a single removable and un-reliable server M/G/1 queue under the (p,N)-policy. They did the maximum entropy analysis to obtain the approximate formulas for the probability distributions of the number of customers and the expected waiting time in the system. Maximum entropy approach has been applied for an un-reliable server vacation queueing model by Jain et al. (2012).

The main objective of our study is to develop an MX/Hk/1 queueing model with an un-reliable server under multiple vacation policy. In this paper, an MX/Hk/1 queue has been analyzed including more features, namely (1) bulk arrival, (2) server breakdown, and (3) multiple vacation. The various approximate results for waiting time distribution have been analyzed using the maximum entropy principle which was not considered in the previous study. Now, we cite a real-life situation of a given model wherein all the features are encountered simultaneously. To highlight the application, we cite an example of production of heat transfer equipment. In the production of these equipment, the raw material of these equipment arrives in group (batch arrival). The production of these equipment has been done by the machine in phases (called k-type hyper-exponential distribution). During the production, the production of the equipment may be interrupted due to some machinery faults called server breakdown. After interruption in the service, the machine is immediately sent for repairing. After repairing, the machine renews and works as a new one. As the raw material of these equipment is finished, the operator may take multiple vacations till the raw material arrives again. More realistic assumptions incorporated in our model provide a new dimension in the area of queueing systems.

Our main objective of this paper is to develop an MX/Hk/1 queueing model with an un-reliable server under multiple vacation policy. Further, we intend to determine the approximate results for the steady-state probability distributions of the queue length using the maximum entropy approach. The rest of the paper is organized as follows. In the ‘Model description’ section, we describe the model and construct the steady-state equations governing the model. Afterwards, in the ‘Probability generating function’ section, we obtain the queue size distribution by using the probability generating function technique. In the ‘Performance measures’ section, we derive various performance indices. The principle of maximum entropy is described in the ‘Maximum entropy principle’ section to establish the approximate results for the expected system size and expected waiting time. In the ‘Numerical illustration and sensitivity analysis’ section, numerical illustrations and sensitivity analysis are presented to validate the analytical results. Finally, conclusion has been drawn in the ‘Conclusion’ section.

Model description

Consider a single un-reliable, removable server queue with state-dependent rates. We assume that the states of the system are described by the triplet (i,j,n), where i = 0, 1,…, k; j = V, B, D; and n = 0, 1, 2,…. Here i = 0 denotes that the customer is not in service, and i = 1, 2,…, k denotes that the customer is in the i th phase service; j = V, B, D represents that the server is on vacation, busy, and under repair after failure, respectively; and n denotes the number of customers present in the system. The service time is assumed to follow the k-type hyper-exponential distribution. It is assumed that μ i (i = 1, 2,…, k) is the service rate of i th phase service. Let the probability that the next customer to enter in the service is of type i be q i (i = 1, 2,…, k) and i = 1 k q i = 1 . Other assumptions made to construct the mathematical model are as follows:

  • The customers arrive in batches according to the Poisson process with state-dependent arrival rate λ j given by

    λ j = λ 0 , if the server is on vacation λ 1 , if the server is turned on and is in operation λ 2 , if the server is turned on and is under repair
  • Let A be the random variable denoting the batch size, and then the batch size distribution is given by

    c j = Pr A = j , j = 1 , 2 , , d
  • Furthermore, the generating function for the batch size distribution is A z = j = 1 c j z j . It follows that E(A) = A′(1) and E[A(A − 1)] = A″(1).

  • When the breakdown occurs, the server is unable to render service to the customers, but after completing repair provided by a repairman, it works as efficiently as before the failure. The life time and repair time of the server are negative exponentially distributed with mean 1/α and 1/β, respectively.

  • The customers are served according to the first come, first served (FCFS) discipline.

Let us denote the steady-state probabilities depicting the system status as follows:

  • P0,V(n): Probability that there are n (n = 0, 1,…) customers in the system and the server is on vacation.

  • Pi,B(n): Probability that there are n (n = 1, 2,…) customers in the system and the customer in service is in phase i (i = 1, 2,…, k), when the server is turned on and is in busy state.

  • Pi,D(n): Probability that there are n (n = 1, 2,…) customers in the system and the customer in service is in phase i (i = 1, 2,…, k), when the server is turned on and is in a breakdown state.

The steady-state equations governing the model are given as follows:

λ 0 + ν P 0 , V n = λ 0 k = 1 n P 0 , V n k c k ; n 1
(1)
λ 0 P 0 , V 0 = j = 1 k μ j P 0 , V 1
(2)
λ 1 + α + μ i P i , B 1 = q i j = 1 k μ j P j , B 2 + β P i , D 1 ; 1 i k
(3)
λ 1 + α + μ i P i , B n = q i j = 1 k μ j P j , B n + 1 + β P i , D n + λ 1 k = 1 n 1 P i , B n k c k ; n 2 , 1 i k
(4)
λ 2 + β P i , D 1 = α P i , B 1 ; 1 i k
(5)
λ 2 + β P i , D n = α P i , B n + λ 2 k = 1 n 1 P i , D n k c k ; n 2 , 1 i k
(6)

Probability generating function

In this section, we present the probability generating function (PGF) technique to obtain the analytical solution of Equations 1 to 6. Let us define the following partial generating functions:

G 0 , V z = n = 0 z n P 0 , V n , z 1
(7)
G i , B z = n = 1 z n P i , B n , 1 i k , z 1
(8)
G i , D z = n = 1 z n P i , D n , 1 i k , z 1
(9)

Lemma 1. The expressions for the partial generating functions are obtained as follows:

G 0 , V z = 1 1 ρ ν A z P 0 , V 0
(10)
G i , B z = N i z D z P 0 , V 0 , i = 1 , 2 , , k
(11)
G i , D z = α λ 2 + β λ 2 A z G i , B z , 1 i k
(12)

where

ρ ν = λ 0 λ 0 + ν ; D z = i = 1 k θ i z + i = 1 k q i μ i j i k θ j z
N i z = j i k θ j z q i λ 0 z ;
θ i z = λ 1 zA z λ 1 + α + μ i + αβ λ 2 C z λ 2 β z , i = 1 , 2 , , k

Proof. For proof, see ‘Proof of Lemma 1’ in the Appendix.

Lemma 2. The probability P 0,V (0) is

P 0 , V 0 = 1 1 ρ ν + i = 1 k ρ i q i 1 + α β λ 1 βE A + α λ 2 E A i = 1 k 1 1 μ i ] λ 1 βE A + α λ 2 E A i = 1 k q i μ i β 1
(13)

Also, the stability condition is given by

α β < 1 λ 1 E A i = 1 k q i μ i λ 2 E A i = 1 k q i μ i
(14)

Proof. For proof, see ‘Proof of Lemma 2’ in the Appendix.

Theorem 1. The probability generating function of the number of customers in the system is given by

G z = 1 1 ρ ν C z + i = 1 k 1 + α λ 2 + β λ 2 C z N i z D z P 0 , V z
(15)

Proof. For proof, see ‘Proof of Theorem 1’ in the Appendix.

Performance measures

In order to predict the system characteristics under variant circumstances, it is worthwhile to explore key aspects by establishing analytical formulae. In this section, some performance measures in terms of steady-state probabilities are obtained. The long-run probabilities of the server being on vacation, busy, and breakdown are denoted by P V , P B , and P D , respectively. Thus, we obtain

P V = n = 1 z n P 0 , V n = G 1 0 , V = 1 1 ρ ν P 0 , V 0
(16)
P B = n = 1 i = 1 k z n P i , B n = i = 1 k G i , B 1 = i = 1 k ρ i q i 1 + α β λ 1 βE A + α λ 2 E A i = 1 k 1 1 μ i λ 1 βE A + α λ 2 E A i = 1 k q i μ i β P 0 , V 0
(17)
P D = n = 1 i = 1 k z n P i , D n = i = 1 k G i , D 1 = i = 1 k α ρ i q i 1 + α β λ 1 βE A + α λ 2 E A i = 1 k 1 1 μ i β λ 1 βE A + α λ 2 E A i = 1 k q i μ i β P 0 , V 0
(18)

Theorem 2. The expected number of customers in the system (L N ) is given by

L N = G 1 = ρ ν E A 1 ρ ν 2 + i = 1 k α + β ( N i 1 D 1 N i 1 D 1 2 β D 1 2 + N i 1 λ 2 E A D 1 β 2 P 0 , V 0
(19)

where

N i 1 = j i k 1 i + 1 λ 0 μ j q i 1 i = 1 k a i , i = 1 , 2 , , k
N i 1 = 1 i q i λ 0 b i = 1 k 1 j = 1 j i k 1 μ j + 2 i = 1 k 1 μ i i = 1 k 1 a i i = 1 k 1 a i j = 1 j i k 1 a j , i = 1 , 2 , , k
D ' 1 = i = 1 k μ i i = 1 k a i q i , i = 1 , 2 , , k
D 1 = b i = 1 k q i j i k μ j 2 i = 1 k μ i a i i = 1 k 1 q i a i , i = 1 , 2 , , k
a i = λ 1 E A + δ μ i 1 , i = 1 , 2 , , k , δ = α λ 2 E A β
b = 2 λ 1 E A + 2 δ + E A A 1 λ 1 + α β λ 2 2 α δ 2

Proof. For proof, see ‘Proof of Theorem 2’ in the Appendix.

Maximum entropy principle

Exact probabilities of the system states of an MX/Hk/1 queueing system with multiple vacations and an un-reliable server have not been found earlier to the best information of the authors. In order to evaluate approximate results for the steady-state probabilities, we employ the maximum entropy approach. It is well established that the principle of maximum entropy can be used for estimating probabilistic information measures which is further used to obtain the queue size distribution of various complex queueing systems in different frameworks. In order to obtain the steady-state probabilities P 0,V (n), P i,B (n), and P i,D (n) by using the principle of maximum entropy, we formulate the maximum entropy model as follows.

The maximum entropy model

Following El-Affendi and Kouvatsos (1983), the entropy function y can be mathematically formulated as

y = n = 0 P 0 , V n log P 0 , V n n = 0 i = 1 k P i , B n log P i , B n n = 0 i = 1 k P i , D n log P i , D n
(20)

subject to the following constraints:

  1. 1.

    Normalizing condition

    n = 0 P 0 , V n + n = 1 i = 1 k P i , B n + n = 1 i = 1 k P i , D n = 1
    (21)
  2. 2.

    The probability that the server being busy

    n = 1 i = 1 k P i , B n = i = 1 k G i , B 1 = i = 1 k A i
    (22)
  3. 3.

    The probability that the server is in a breakdown state

    n = 1 i = 1 k P i , D n = i = 1 k G i , D 1 = i = 1 k E i
    (23)
  4. 4.

    The expected number of customers in the system

    n = 0 n P 0 , V n + n = 1 i = 1 k n P i , B n + n = 1 i = 1 k n P i , D n = L N
    (24)

where A i  = G i,B (1), E i  = G i,D (1), (1 ≤ i ≤ k), and L N are given by Equations 17, 18, and 19, respectively.

After introducing Lagrange's multipliers corresponding to constraints (21) to (24), we construct Lagrange's function as

y = n = 0 P 0 , V n log P 0 , V n n = 0 i = 1 k P i , B n log P i , B n n = 0 i = 1 k P i , D n log P i , D n θ 1 n = 0 P 0 , V n + n = 1 i = 1 k P i , B n + n = 1 i = 1 k P i , D n 1 i = 1 k η i n = 1 P i , B n A i i = 1 k ξ i n = 1 P i , D n E i ξ k + 1 n = 0 n P 0 , V n + n = 1 i = 1 k n P i , B n + n = 1 i = 1 k n P i , D n L N
(25)

where θ1, η i  (1 ≤ i ≤ kand ξ i  (1 ≤ i ≤ k + 1) are Lagrange's multipliers corresponding to constraints (21) to (24), respectively.

The maximum entropy analysis

The maximum entropy results are obtained by taking the partial derivatives of y w.r.t. P 0,V (n), P i,B (n), and P i,D (n) and equating to zero. Thus, we get

y P 0 , V n = log P 0 , V n 1 θ 1 ξ k + 1 n = 0
(26)
y P i , B n = log P i , B n 1 θ 1 η i ξ k + 1 n = 0 , 1 i k
(27)
y P i , D n = log P i , D n 1 θ 1 ξ i ξ k + 1 n = 0 , 1 i k
(28)

From Equations 26 to 28, we get

P 0 , V n = e 1 + θ 1 e ξ k + 1 n , n = 0 , 1 ,
(29)
P i , B n = e 1 + θ 1 + η i e ξ k + 1 n , n = 1 , 2 , , 1 i k
(30)
P i , D n = e 1 + θ 1 + ξ i e ξ k + 1 n , n = 1 , 2 , , 1 i k
(31)

Denote

φ 1 = e 1 + θ 1 , ψ i = e η i , 1 i k and δ i = e ξ i , 1 i k + 1 .

Then, Equations 29 to 31 can be written as

P 0 , V n = φ 1 δ k + 1 n , n = 0 , 1 ,
(32)
P i , B n = φ 1 ψ i δ k + 1 n , n = 1 , 2 , , 1 i k
(33)
P i , D n = φ 1 δ i δ k + 1 n , n = 1 , 2 , , 1 i k
(34)

On substituting the values of P 0,V (n), P i,B (n), and P i,D (n) from Equations 32 to 34 into Equations 21 to 23, we obtain

n = 0 φ 1 δ k + 1 n = φ 1 1 δ k + 1 = 1 i = 1 k A i + E i
(35)
n = 1 φ 1 ψ i δ k + 1 n = φ 1 ψ i δ k + 1 1 δ k + 1 = A i , 1 i k
(36)
n = 1 φ 1 δ i δ k + 1 n = φ 1 δ i δ k + 1 1 δ k + 1 = E i , 1 i k
(37)

It follows from Equations 35 to 37 that

φ 1 = 1 ρ 1 δ k + 1
(38)
ψ i = A i 1 ρ δ k + 1 , 1 i k
(39)
δ i = E i 1 ρ δ k + 1 , 1 i k
(40)

where

ρ = i = 1 k A i + E i .

On substituting the values of φ1,  ψ i  and δ i (1 ≤ i ≤ k) from Equations 38 to 40 into Equation 24 and after doing some algebraic manipulations, we obtain

δ k + 1 = L N ρ 1 + L N ρ
(41)

On substituting the values of φ1, ψ i , andδ i from Equations 38 to 40 into Equations 32 to 34 and using Equation 40, we finally get

P 0 , V n = 1 ρ 1 + L N 1 ρ L N ρ 1 + L N ρ n , n = 0 , 1 ,
(42)
P i , B n = A i 1 + L N 1 ρ L N ρ 1 + L N ρ n 1 , n = 1 , 2 , , 1 i k
(43)
P i , D n = E i 1 + L N 1 ρ L N ρ 1 + L N ρ n 1 , n = 1 , 2 , , 1 i k
(44)

The expected waiting time in the system

Let W S and W ^ S denote the exact and the expected waiting time in the system, respectively. Then,

W S = L N λ eff
(45)

where λ eff  = [λ0P V  + λ1P B  + λ2P D ]E[A].

Following the work of Wang et al. (2007), the approximate expected waiting time in the system is given by the approximate expected waiting time in

W ^ S = i = 1 k n = 1 n q i μ i + 1 ν + q i 2 μ i E A 2 E A 1 P 0 , V n + i = 1 k n = 0 n q i μ i + q i 2 μ i E A 2 E A 1 P i , B n + i = 1 k n = 0 n q i μ i + 1 β + q i 2 μ i E A 2 E A 1 P i , D n
(46)

Substituting the values of P0,V(n), Pi,B(nand Pi,D(n)  from Equations 42 to 44 into Equation 46, the approximate expected waiting time in the system is given by

W ^ S = 1 i = 1 k A i i = 1 k E i ν + i = 1 k q i μ i L N + 1 2 E A 2 E A 1 + i = 1 k E i β
(47)

Numerical illustration and sensitivity analysis

In this section, we present a numerical simulation by taking the illustration of production of heat transfer equipment (HTE) discussed in the ‘Background’ section. For developing the code of computational program, we have used the ‘MATLAB’ software. For computation purposes, we assume that the raw materials arrive in batches of fixed batch size k = 3. The arrival rates are chosen as λ1 = 0.5, λ2 = 0.9, and λ3 = 0.7. The service times of the machine when producing these equipment are μ1 = 1, μ2 = 2, and μ3 = 3. The processing of the equipment may be interrupted with rate α = 0.8 and again becomes available for processing with rate β = 2. Further, the server may go for multiple vacations with rate v = 0.09. The expected number of these equipment in the system is obtained by using Equations 1 to 19 as L N  = 36.

Now, we present the numerical results to demonstrate the effects of different parameters on various performance indices. The accuracy of numerical results is examined by comparing the exact waiting time (W S ) obtained in the ‘Maximum entropy principle’ section using the probability generating function approach with the approximate waiting time ( W ^ S ) obtained by the maximum entropy principle (MEP) of the MX/HK/1 queueing system under multiple vacation policy. Relative percentage error is tabulated for this purpose. The variations of different parameters on the average queue length are shown in Figures 1 and 2 graphically.

Figure 1
figure 1

Average queue length vs. (a) α , (b) β , and (c) v for homogeneous and heterogeneous arrival rates.

Figure 2
figure 2

Average queue length vs. (a) α , (b) β , and (c) v for different batch sizes.

Table 1 summarizes the numerical results for long-run fraction of time of the server being in different states by varying the parameters λ, μ, α, β, and v for two different cases of q i (case 1: (q1, q2, q3) = (0.6, 0.3, 0.1) and case 2: (q1, q2, q3) = (0.7, 0.2, 0.1)). For the sake of convenience, we choose the default parameters λ1 = 0.9, λ2 = 0.8, λ3 = 0.7, μ = 1, μ1 = 1 μ, μ2 = 2 μ, μ3 = 3 μ, α = 0.2, β = 1, and v = 0.9. It is noticed that P V shows a decreasing trend with respect to the increasing values of λ, α, and v, but an increasing trend has been found with other parameters for both cases. Similarly, P B and P D increase as we increase the values of λ, α, and v and decrease with increasing values of μ and β for both cases. Table 2 presents the comparison between W S and W ^ S for case 1: (q1, q2, q3) = (0.5, 0.1, 0.4) and case 2: (q1, q2, q3) = (0.4, 0.3, 0.3). We fix default parameters for numerical results summarized in Table 2 as λ1 = 0.8, λ2 = 0.7, λ3 = 0.6, μ = 1, μ1 = 1 μ, μ2 = 2 μ, μ3 = 3 μ, α = 0.2, β = 3, and v = 0.01. For both cases, W S increases as we increase the values of λ1 and α but decreases with increasing values of λ0, μ, β, and v. As we increase the values of λ1, μ, β, and v, it is seen that W ^ S decreases but increases with λ0 and α for both cases. It can be observed easily from Table 2 that the relative percentage error varies from 0 % to 3 % which is reasonably less.

Table 1 Effect of various parameters on long-run fraction of time of the server being in different states
Table 2 Comparison between the exact and the approximate results of waiting times

Figure 1a,b,c depicts the effect of different parameters on average queue length for various sets of heterogeneous arrival rate (λ0 = 1.8λ, λ1 = 0.5λ, λ2 = 0.6λ) shown by discrete lines and homogeneous arrival rate (λ0 = λ1 = λ2 = λ) shown by continuous lines. We observe that the average queue length is higher for the heterogeneous arrival rate in comparison to the homogeneous arrival rate on increasing the breakdown rate of the server. The queue length shows a gradual decreasing trend on increasing the repair rate and the vacation rate. Further, Figure 2a,b,c visualizes the effect of batch size on the average queue length. It is observed that the average queue length reveals an increasing trend with increasing values of α and β while shows a decreasing trend with increasing values of v. The tractability of numerical results shows that our model can be easily implemented for the quantitative assessment of the performance of many real-time congestion systems.

Methods

In this paper, an MX/Hk/1 queue under multiple vacations and an un-reliable server with varying arrival rates is studied. The probability generating function technique is used to determine various performance measures in explicit form. Then, MEP is further employed to compare the approximate results with exact results. For validating the analytical results, the sensitivity analysis is also carried out.

Results and discussion

The role of queueing analysis based on MEP lies in the fact that it helps basically system designers and managers to take decisions based on the performance indices determined using the probability distribution of the system size in terms of available information by MEP approach. The numerical illustration presented demonstrates that maximum entropy analysis is a simple approach to deal with complex scenarios for real-life congestion situations and can be easily applied to complex queueing scenarios for which performance measures are not easily obtained by using a classical approach. Based on the numerical experiment and sensitivity analysis carried out, we overall conclude that the comparative analysis of approximate results with exact results has demonstrated that the results obtained by MEP are reasonably good. The average queue length is higher for heterogeneous arrival rate in comparison to homogeneous arrival rate. The trends are more perceptible for larger batch size, which is quite obvious as the congestion increases significantly if the batch size of arriving customers is large.

Conclusion

In this paper, an MX/Hk/1 queue with multiple vacations and an un-reliable server has been studied in order to facilitate various performance indices in explicit form by using an analytical approach based on the generating function method and maximum entropy principle. The incorporation of some more realistic features such as multiple vacations, un-reliable server, and batch arrival makes our model closer to real-life congestion situations. This model depicts many real-time embedded systems, namely production system, computer system, data communication system, etc. The numerical results and sensitivity analysis obtained provide an insight into how the system can be made more efficient by controlling the sensitive parameters. The queueing model studied can be further extended by taking the concept of k-phase optional repair. The concept of working vacation, N-policy, and multi-repair can also be included which is the topic of our future research work.

Appendix

Proof of Lemma 1

Multiplying Equation 1 by appropriate powers of z and then summing over n, we get

λ 0 + ν λ 0 A z G 0 , V z = λ 0 + ν P 0 , V 0
(48)

Substituting ρ ν = λ 0 λ 0 + ν in Equation 48, we have

G 0 , V z = 1 1 ρ ν A z P 0 , V 0
(49)

Multiplying Equation 2 by q i z, Equation 3 by z2, and Equation 4 by zn+1 and then adding these equations term by term for all possible values of n, finally, we obtain

λ 1 z A z λ 1 + α + μ i z G i , B z + q i j = 1 k μ j G j , B z + βz G i , D z = q i z λ 0 P 0 0 , V , 1 i k
(50)

After multiplying Equation 5 by z and Equation 6 by zn and then adding these equations term by term for all possible values of n, thus, we obtain

λ 2 + β G i , D z = α G i , B z + λ 2 A z G i , D z , 1 i k
(51)

Using Equation 51, we have

G i , D z = α λ 2 + β λ 2 A z G i , B z , 1 i k
(52)

Now put i = 1 in Equation 50 and using Equation 52 into Equation 50, we have

λ 1 zA z λ 1 + α + μ 1 + αβ λ 2 A z λ 2 β z + q 1 μ 1 G 1 , B z + q 1 j = 2 k μ j G j , B ( z ) = q 1 z λ 0 P 0 0 , V
(53)

Again put i = 2 in Equation 50 and using Equation 52 into Equation 50, we obtain

q 2 μ 1 G 1 , B z + λ 1 zA z λ 1 + α + μ 2 + αβ λ 2 A z λ 2 β z + q 2 μ 2 G 2 , B z + q 2 j = 3 k μ j G j , B z = q 2 z λ 0 P 0 0 , V
(54)

Similarly, repeating this process for i = k, we get

q k j = 1 k 1 μ j G j , B z + λ 1 zA z λ 1 + α + μ k + αβ λ 2 A z λ 2 β z + q k μ k G k , B z = q k z λ 0 P 0 0 , V
(55)

We use Cramer's rule to solve Equations 53 to 55. Now we get

G i , B z = N i z D z P 0 , V 0 , i = 1 , 2 , , k
(56)

Proof of Lemma 2

Using Lemma 1, we obtain

G 0 , V 1 = lim z 1 G 0 , V z = 1 1 ρ ν P 0 , V 0
(57)
G i , B 1 = lim z 1 G i , B ( z ) = ρ i q i λ 1 βE A + α λ 2 E A i = 1 k 1 1 μ i λ 1 βE A + α λ 2 E A i = 1 k q i μ i β P 0 , V ( 0 ) , i = 1 , 2 , , k
(58)
G i , D 1 = lim z 1 G i , D z = α β G i , B 1 , i = 1 , 2 , , k
(59)

where

ρ i = λ 0 μ i .

The L-Hospital rule has been applied to compute the above results.

To determine P0,V(0), we use the normalizing condition given by

G 1 = G 0 , V 1 + i = 1 k G i , B 1 + G i , D 1
(60)

On substituting the values of G0,V(1), Gi,B(1), and Gi,D(1) from Equations 57 to 59 into Equation 60, we obtain the value of P0,V(0).

For finding the result of the stable condition, we use the condition

0 < P 0 , V 0 < 1 .
(61)

Using Equation 13 into Equation 61, we have

0 < λ 1 β + α λ 2 E A i = 1 k q i μ i β < 1 .
(62)

After some algebraic manipulations, Equation 62 provides the result given in Equation 14.

Proof of Theorem 1

In order to prove Equation 15, we have

G z = n = 0 z n P 0 , V n + n = 1 i = 1 k z n P i , B n + n = 1 i = 1 k z n P i , D n = G 0 , V z + i = 1 k G i , B z + G i , D z
(63)

On substituting the values of G0,V(z), Gi,B(z), and Gi,D(z) from Lemma 1 into Equation 63, we get Equation 15.

Proof of Theorem 2

The average system size is computed using

L N = lim z 1 G z .

The L-Hospital rule is applied twice to compute the results given in Equation 19.