scispace - formally typeset
Open AccessBook

Queueing Systems - Vol. 1: Theory

Reads0
Chats0
About
The article was published on 2013-01-01 and is currently open access. It has received 540 citations till now. The article focuses on the topics: Layered queueing network & Bulk queue.

read more

Citations
More filters

Queuing systems : modeling, analysis and simulation

TL;DR: This document gives an overview the standard methods used to model and analyze the performance of queuing systems, both analytical techniques and simulation methodology, and the need to perform statistical output analysis is also emphasized.
Proceedings ArticleDOI

A general mathematical model for run-time distributions in a passively replicated fault tolerant system

TL;DR: This paper presents a general mathematical model for the run-time distribution of a method in a fault tolerant system where a passive replication technique is used and shows how this can be used to compute the probability of a missed deadline in a simple fault-tolerant system.
Journal ArticleDOI

A performance analysis of discrete-time tandem queues with Markovian sources

TL;DR: An exact performance analysis of tandem networks with an arbitrary number of multiplexers in which each multiplexer is fed by multiple types of traffic and it has been shown that the multiplexing smooths the traffic.
Journal ArticleDOI

Characterization of the traffic on high-speed token-ring networks

TL;DR: It is found that the traffic characterization, when used to represent the output traffic from a token-ring network, provides significantly more accurate results for the mean packet waiting time at the bridge than when modeling theoutput traffic by a Poisson process.
Journal ArticleDOI

Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16j

TL;DR: A new hybrid authentication and key distribution algorithm for IEEE 802.16j MMR service that uses centralized authentication when a mobile station or a relay station initially joins the MMR network and uses distributed authentication for hop-by-hop authentication between mobile nodes.