Bounding blocking probabilities and throughput in queueing networks with buffer capacity constraints

Sunil Kumar, R. Srikant, P. R. Kumar

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

We propose a new technique for upper and lower bounding the throughput and blocking probabilities in queueing networks with buffer capacity constraints, i.e., where some buffers in the network have finite capacity. By studying the evolution of multinomials of the state of the system in its steady state, we obtain linear programs whose values upper and lower bound the performance measure of interest, namely throughput or blocking probabilities. The main advantages of this new technique are that the computational complexity does not increase with the size of the finite buffers and that the technique is applicable to systems in which some buffers have infinite capacity. The technique is demonstrated on examples taken from both manufacturing systems and communication networks. As a model for further analysis, for the M/M/s/s queue, we establish that the bounds on the blocking probability are asymptotically tight, i.e., they asymptotically approach the exact value as the degree of the multinomials considered is increased to infinity.

Original languageEnglish (US)
Title of host publicationProceedings of the IEEE Conference on Decision and Control
Editors Anon
StatePublished - 1996
Externally publishedYes
EventProceedings of the 1996 35th IEEE Conference on Decision and Control. Part 3 (of 4) - Kobe, Jpn
Duration: Dec 11 1996Dec 13 1996

Publication series

NameProceedings of the IEEE Conference on Decision and Control
Volume1
ISSN (Print)0191-2216

Other

OtherProceedings of the 1996 35th IEEE Conference on Decision and Control. Part 3 (of 4)
CityKobe, Jpn
Period12/11/9612/13/96

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Modeling and Simulation
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Bounding blocking probabilities and throughput in queueing networks with buffer capacity constraints'. Together they form a unique fingerprint.

Cite this