This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Modeling and Performance Analysis of Single-Server Database Over Quasi-static Rayleigh Fading Channel

Mengying Chen, Wannian An, Yang Liu, Chen Dong, Xiaodong Xu, Senior Member, IEEE, Boxiao Han, Ping Zhang, Fellow, IEEE This work was supported in part by State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, and in part by Beijing University of Posts and Telecommunications-China Mobile Research Institute Joint Innovation Center (Project Number: R207010101125D9) and Fundamental Research Funds for the Central Universities(Project Number: 2021RC01).(Corresponding author: Chen Dong.)Mengying Chen, Wannian An and Yang Liu are with the School of Information and Communication Engineering Beijing University of Posts and Telecommunications(e-mail: [email protected]; [email protected]; [email protected]).Chen Dong, Xiaodong Xu and Ping Zhang are with the State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China (e-mail:[email protected]; [email protected]; [email protected]).Boxiao Han is with the Future Mobile Technology Lab China Mobile Research (e-mail: [email protected]).
Abstract

Cloud database is the key technology in cloud computing. The effective and efficient service quality of the cloud database is inseparable from communication technology, just as improving communication quality will reduce the concurrency phenomenon in the ticketing system. In order to visually observe the impact of communication on the cloud database, we propose a Communication-Database (C-D) Model with a single-server database over the quasi-static Rayleigh fading channel, which consists of three parts: CLIENTS SOURCE, COMMUNICATION SYSTEM and DATABASE SYSTEM. This paper uses the queuing model, M/G/1//K, to model the whole system. The C-D Model is analyzed in two cases: nonlinearity and linearity, which correspond to some instances of SISO and MIMO. The program simulation results of average staying time, average number of transactions and other performance characteristics are basically consistent with theoretical results, which verify the validity of the C-D Model. The comparison of these experimental results also proves that poor communication quality does lead to the reduction in the quality of database service.

Index Terms:
single-server database, quasi-static Rayleigh fading channel, exclusive lock, retrial, queue system.

I Introduction

The database can store data efficiently and orderly, which makes it convenient for people to use data, such as checking the inventory of train tickets. In order to ensure the stability of online services in the face of a large number of demand, the improvement of the online service system is needed.

As we all know, the online services system mainly consists of communication systems and database systems. The delay of threads based on high concurrency database systems is less if it is in the high quality of communication environment. Therefore, the joint analysis of communication systems and database systems for enhancing the quality of online services is what we consider.

The study in [1] proposed a simulation model within a finite amount of time in a communication network that enables users to analyze distributed transaction scheduling algorithms in real-time database systems. For communication system, most studies assume that the communication network has a constant transmission capacity, such as [2, 3, 4]. In [5, 6, 7], the models are no longer limited to a constant transmission delay but still assume that the network capacity is infinite. The communication links may become the restriction in some wireless communication systems. With the continuous expansion of communication applications, there are more and more researches on mobile edge computing(MEC) stack services [8, 9]. Unfortunately, very few studies have been made to combine a database model with a communication environment.

On the other hand, the performance studies of database systems commonly use queuing systems as the analytical models. Some of the earliest queuing models of database systems can be found in [10] which models the databases through the M/M/m/FCFS queuing system. In [11], the model M/M/m is used to study the performance characteristics of a replicated database under synchronous and non-synchronous cases. The studies in [12] and [13] use M/M/1 queues with an exponential distribution of service times. More generally, [14] and [15] model the databases as M/G/1/FCFS and M/G/1/RR queues with generally distributed service times, respectively.

All of the preceding articles disregard or make constant communication time. In this paper, we offer a model that combines communication systems with database systems, named the C-D Model, in order to display the status of database service in response to fluctuating channel conditions and arrival rate of transactions.

As a result, a total time distribution for each customer, including communication time and service time, is introduced. Several stationary performance parameters, including queue length (LS, both waiting and serving), waiting queue length (L, only waiting), waiting time (W, only waiting), staying time (WS, both waiting and serving), and busy period of the database (BP), are considered. The main contributions of this paper are summarized as follows:

1) A model, named the C-D Model, is designed for describing the impact of communication quality on the services provided by a single-server database.

2) Two simulation outcomes are obtained: linearity and nonlinearity.

3) For nonlinear and linear cases, the impact of communication quality is analyzed on a single-server database system, where its program simulation and the theoretical results match each other.

This paper is arranged as follows: The second section describes the C-D Model in detail. In the third section, two cases of unclosed numerical solutions are derived from theoretical analysis. The fourth section explains the program simulation and theoretical results that verify the C-D Model, as well as the effect of communication quality on single-server database service.

Notation: The characters in TABLE I are representations of the queuing model. A complete queuing model is expressed as

X/Y/Z/A/B/C,X/Y/Z/A/B/C, (1)

where the meaning of each letter is as follows: XX is the distribution of customer arrival interval, YY is the distribution of service time. The distribution of XX and YY is as follows: MM represents the negative exponential distribution with a negative parameter; DD is deterministic distribution; EkE_{k} stands for the k-order Erlang distribution, HkH_{k} is k-phase hyper-exponential distribution, and GG represents the general distribution. ZZ says the number of services. AA indicates the system capacity limit, and its default is ++\infty. BB is the limit on the number of client sources, and its default value is ++\infty. CC indicates the service rule, and its default value is the first come, first serve rule.

TABLE I: Basic Choices of Modeling
Reference XX YY ZZ BB Communication Time
[12] MM MM 1 ++\infty the average number of I/O’s per transaction ×\times the average time per I/O
[15] MM GG 1 ++\infty no
[10] MM MM m ++\infty no
[16] MM DD ++\infty ++\infty constant
[17] MM H2H_{2} 1 ++\infty constant 10 ms
our work MM GG 1 k Rayleigh fading channel

II SYSTEM

Refer to caption
Figure 1: C-D Model. The CLIENTS SOURCE, COMMUNICATION SYSTEM and DATABASE SYSTEM make up this model. The CLIENTS SOURCE is finite with KK clients, and has a Waiting Area. Quasi-static Rayleigh fading channel is considered in COMMUNICATION SYSTEM. And there is a single-server in the DATABASE SYSTEM.

II-A CLIENTS SOURCE

This part assumes that there are K(2<K<+)K(2<K<+\infty) clients. The client is locked until the completion of its final transaction. When a client is free at time tt (i.e., is not being served and is not waiting for service), it may initiate a transaction during interval (t,t+dt)(t,t+\mathrm{d}t) with probability λ\lambda dt.

If the channel is occupied or the DATABASE SYSTEM is locked, the transaction waits in the Waiting Area and generates a Poisson flow of repeated calls at a rate of γ\gamma until it discovers that the channel is available. When the transaction waits in the Waiting Area, the client remains locked until terminated due to communication quality or successfully served.

II-B COMMUNICATION SYSTEM

The channel in C-D Model is a quasi-static Rayleigh fading channel, such as [18] and [19]. It is assumed that fading coefficients are constant during a packet transmission, but change independently from one packet to another. If the transaction is terminated by database because of poor communication quality(i.e., the communication time exceeds TT), it could be discarded. No data related to this discarded transaction is recorded.

We examine two cases in our work. In one case, C=Blog2(1+SN)C=B\log_{2}\left(1+\frac{S}{N}\right), there is a nonlinear relationship between capacity and signal power in some SISO, called the nonlinear case. In another case, CSNln2C\approx\frac{S}{N\ln{2}}(see [20]), there is a linear relationship between capacity and signal power in some MIMO, referred to as linear case.

II-C DATABASE SYSTEM

Assume in the C-D Model that every transaction has an exclusive lock on this single-server database. Once a transaction enters the COMMUNICATION SYSTEM, the DATABASE SYSTEM is locked until this transaction finishes.

Poor communication quality leads to long communication times for transactions. It is presumed that TT represents the maximum time the database can wait for this transaction to transmit before terminating it. After the transaction is terminated, the database is unlocked for the next transaction.

The service time in the DATABASE SYSTEM conforms to an exponential distribution with a negative parameter μ\mu.

II-D The process of a transaction

Refer to caption
Figure 2: The process of a transaction in CLIENTS SOURCE, COMMUNICATION SYSTEM and DATABASE SYSTEM.

A transaction is initiated by one idle client in the CLIENTS SOURCE, which marks the beginning of a process. If the communication quality is so poor that the communication time is longer than TT, the database system will terminate the transaction. This transaction is discarded and no data is recorded. On the contrary, if the DATABASE SYSTEM is unlocked in the case of good communication quality, transaction passes through the COMMUNICATION SYSTEM and is served by the DATABASE SYSTEM. Unfortunately, in the event that the channel is occupied or the DATABASE SYSTEM is locked, the transaction enters the Waiting Area and retries until the service successfully completes.

After the service is completed, the transaction passes through the COMMUNICATION SYSTEM again and returns to the CLIENTS SOURCE. In this case, the communication time longer than TT will also cause the transaction to be discarded. The client does not release the lock on the database until the returned transaction is received, which marks the end of the process.

The M/G/1//K queue is selected as the analytical model of our system based on the information presented above.

III ANALYSIS

In this section, the M/G/1//K model is explained first. Secondly, the nonlinear and linear cases of ·/G/· are theoretically analyzed. These two cases have distinct distribution functions of TallT_{all}, where Tall=Tcomup+Tserv+TcomdownT_{all}=T_{comup}+T_{serv}+T_{comdown}. TcomupT_{comup} is the uplink time in COMMUNICATION SYSTEM. TservT_{serv} is the service time in DATABASE SYSTEM. TcomdownT_{comdown} is the downlink time in COMMUNICATION SYSTEM.

III-A M/G/1//K Model

The following is an illustration of the model we used. The M/G/1//K queuing system was introduced by G. I. Falin and J. R. Artalejo in [21], and they improved the expressions of the main performance characteristics as proved in Appendix A111The full paper is recorded on http://arxiv.org/abs/2212.09219.. Their results can be summarized as follows:

q0m=Cmq0,K1,0mK2,q_{0m}=C_{m}\cdot q_{0,K-1},0\leq m\leq K-2, (2)
q0,K1=v((v+λ+(K1)γ)C0+(λγ)C1)1,q_{0,K-1}=v\left((v+\lambda+(K-1)\gamma)C_{0}+(\lambda-\gamma)C_{1}\right)^{-1}, (3)

where v=1/β1v=1/\beta_{1}, and

βn=0tndFTall(t).\beta_{\mathrm{n}}=\int_{0}^{\infty}t^{n}\mathrm{d}F_{T_{all}}(t). (4)

The coefficients CmC_{m} can be recursively computed by eq(5) with q0,K1=1,q0K=q0,1=0q_{0,K-1}=1,q_{0K}=q_{0,-1}=0.

(((Km1)γ+(m+1)λ)(1β(mλ))+mγ\displaystyle(((K-\mathrm{m}-1)\gamma+(\mathrm{m}+1)\lambda)(1-\beta(\mathrm{m}\lambda))+m\gamma (5)
β(mλ))q0m(Km)γβ(mλ)q0,m1+(m+1)\displaystyle\beta(\mathrm{m}\lambda))q_{0m}-(K-m)\gamma\beta(\mathrm{m}\lambda)q_{0,m-1}+(m+1)
(λγ)(1β(mλ))q0,m+1=0,1mK1,\displaystyle(\lambda-\gamma)(1-\beta(\mathrm{m}\lambda))q_{0,m+1}=0,1\leq m\leq K-1,

where β(s)\beta\left(s\right) is FTall(t)F_{T_{all}}\left(t\right)’s Laplace-Stieltjes transform

β(s)=0estdFTall(t).\beta(\mathrm{s})=\int_{0}^{\infty}e^{-st}\mathrm{d}F_{T_{all}}(t). (6)

By using eq(2), eq(5) could be reduced to a equation with CmC_{m}. C0C_{0} and C1C_{1} are obtained by iteration. With eq(3) and eq(2), q0,0q_{0,0} is obtained. When the system is in equilibrium,

  1. 1)

    The server utilization.

    p1=1q00.\mathrm{p}_{1}=1-q_{00}. (7)
  2. 2)

    The mean number of clients in waiting area.

    L=Kλ1(λ+v)p1.\mathrm{L}=K-\lambda^{-1}(\lambda+v)p_{1}. (8)
  3. 3)

    The mean waiting time.

    W=(vp1)1Kλ1v1.\mathrm{W}=\left(v\mathrm{p}_{1}\right)^{-1}K-\lambda^{-1}-v^{-1}. (9)
  4. 4)

    The mean busy period.

Busy periods are defined in this way, including alternating service periods and periods in which the DATABASE SYSTEM is unlocked and the Waiting Area has repeated transactions. The final results are given as eq(10), and they are described in detail in [14] part4.

𝐄[LBP]=\displaystyle\mathbf{E}\left[L_{BP}\right]= β1+(1+β1((K1)μ+α))\displaystyle\beta_{1}+\left(1+\beta_{1}\left(\left(K-1\right)\mu+\alpha\right)\right) (10)
(A0(0)+B0(0))\displaystyle\left(A_{0}\left(0\right)+B_{0}\left(0\right)\right)
+(αμ)β1(A1(0)+B1(0)).\displaystyle+\left(\alpha-\mu\right)\beta_{1}\left(A_{1}\left(0\right)+B_{1}\left(0\right)\right).

Am(0),Bm(0)A_{m}\left(0\right),B_{m}\left(0\right) are shown in eq(11) and eq(12).

AK1(0)=0,BK1(0)=0,AK2(0)=(μβ((K1)α))1,BK2(0)=μ1,um(0)Am(0)+vm(0)Am+1(0)+wm(0)Am1(0)=(K1m),m=K2,,1,um(0)Bm(0)+vm(0)Bm+1(0)+wm(0)Bm1(0)=(K1m)β(mα),m=K2,,1,\begin{split}&A_{K-1}\left(0\right)=0,B_{K-1}\left(0\right)=0,\\ &A_{K-2}\left(0\right)=\left(\mu\beta\left(\left(K-1\right)\alpha\right)\right)^{-1},B_{K-2}\left(0\right)=-\mu^{-1},\\ &u_{m}\left(0\right)A_{m}\left(0\right)+v_{m}\left(0\right)A_{m+1}\left(0\right)+w_{m}\left(0\right)A_{m-1}\left(0\right)=-\binom{K-1}{m},m=K-2,...,1,\\ &u_{m}\left(0\right)B_{m}\left(0\right)+v_{m}\left(0\right)B_{m+1}\left(0\right)+w_{m}\left(0\right)B_{m-1}\left(0\right)=\binom{K-1}{m}\beta\left(m\alpha\right),m=K-2,...,1,\end{split} (11)
um(s)=s+((Km1)μ+(m+1)α)(1β(s+mα))+mμβ(s+mα),m=K1,,1,vm(s)=(m+1)(αμ)(1β(s+mα)),m=K1,,1,wm(s)=(Km)μβ(s+mα),m=K1,,1.\begin{split}&u_{m}\left(s\right)=s+\left(\left(K-m-1\right)\mu+\left(m+1\right)\alpha\right)\left(1-\beta\left(s+m\alpha\right)\right)+m\mu\beta\left(s+m\alpha\right),m=K-1,...,1,\\ &v_{m}\left(s\right)=\left(m+1\right)\left(\alpha-\mu\right)\left(1-\beta\left(s+m\alpha\right)\right),m=K-1,...,1,\\ &w_{m}\left(s\right)=\left(K-m\right)\mu\beta\left(s+m\alpha\right),m=K-1,...,1.\end{split} (12)

III-B Distribution Functions of TallT_{all}

The Rayleigh fading model is suitable for describing the wireless channel and belongs to small-size fading. In this paper, the large-scale fading effect does not affect the theoretical derivation, so that it can be ignored. The probability density function of the Rayleigh distribution is shown in eq(13).

f(r)=2αreαr2,r(0,+),f\left(r\right)=2\alpha re^{-\alpha r^{2}},r\in(0,+\infty), (13)

where α=12σ2\alpha=\frac{1}{2\sigma^{2}}, σ\sigma is the parameter in Rayleigh fading channel .

According to eq(13), the distribution function of the signal power is deduced in eq(14).

FS(s)\displaystyle F_{S}\left(s\right) =P{Rs}\displaystyle=P\left\{R\leq\sqrt{s}\right\} (14)
=1eαs,s(0,+).\displaystyle=1-e^{-\alpha s},s\in(0,+\infty).

It is assumed that the amount of information that goes through the channel each time is a unit packet, which is 1KB[22].

III-B1 Linear Case

In the linear case, there is a linear relationship between capacity and signal power in some MIMO. Under the information parallel transmission technology in [20], the capacity meets CSNln2C\approx\frac{S}{N\ln{2}}. Therefore, TcomT_{com} is deduced as follows.

Tcom=1C=Nln2S.T_{com}=\frac{1}{C}=\frac{N\ln{2}}{S}. (15)

According to eq(14) and eq(15), the probability density function fTcom(t)f_{T_{com}}(t) of the communication time TcomupT_{comup} and TcomdownT_{comdown} is shown in eq(16).

fTcom(t)=Nln2αt2eNln2αt,t(0,T].\displaystyle f_{T_{com}}\left(t\right)=\frac{N\ln{2}\cdot\alpha}{t^{2}}e^{-\frac{N\ln{2}\cdot\alpha}{t}},t\in(0,T]. (16)

The service time follows exponential distribution with a negative parameter μ\mu. So the probability density function fTserv(t)f_{T_{serv}}(t) of the service times TservT_{serv} is

fTserv(t)=μeμt,t(0,+).f_{T_{serv}}(t)=\mu e^{-\mu t},t\in(0,+\infty). (17)

First, it is assumed that Y=Tcomup+TservY=T_{comup}+T_{serv}. As proved in Appendix B222The full paper is recorded on http://arxiv.org/abs/2212.09219., we arrive at

fY(y)={Nln2αμeμyg(y),y(0,T],Nln2αμeμyg(T),y(T,),0,else,f_{Y}(y)=\left\{\begin{array}[]{l}N\ln{2}\alpha\mu e^{-\mu y}g\left(y\right),y\in(0,T],\\ N\ln{2}\alpha\mu e^{-\mu y}g\left(T\right),y\in(T,\infty),\\ 0,else,\end{array}\right. (18)

where

g(y)=1yeNln2αr+μrdr=\displaystyle g\left(y\right)=\int_{\frac{1}{y}}^{\infty}e^{-N\ln{2}\cdot\alpha r+\frac{\mu}{r}}\mathrm{d}r= (19)
S[1Nln2αμ,yNln2α|[1,00,0]1|(0,11,0)1|(0,11,1)10]Nln2α.\displaystyle\frac{S\left[\frac{-1}{N\ln{2}\cdot\alpha\mu},\frac{y}{N\ln{2}\cdot\alpha}\bigg{|}\begin{bmatrix}1,0\\ 0,0\end{bmatrix}_{-}^{1}\bigg{|}\begin{pmatrix}0,1\\ 1,0\end{pmatrix}\begin{matrix}1\\ -\end{matrix}\bigg{|}\begin{pmatrix}0,1\\ 1,1\end{pmatrix}\begin{matrix}1\\ 0\end{matrix}\right]}{N\ln{2}\cdot\alpha}.
FTall(t)={e2Nln2αtH0,22,0[t2(Nln2α)2|(1,1),(0,1)]Nln2αeμt0+eNln2αxS[xμ,tx|[0,00,0](0,11,0)1(0,11,1)10]S[1Nln2αμ,1Nln2α(tx)|[1,00,0]1|(0,11,0)1|(0,11,1)10]dx,t(0,T],e2Nln2αt{S[t2(Nln2α)2,tTNln2α(tT)|[1,00,0]1|(0,11,0)1|(0,11,1)10]S[t2(Nln2α)2,t(tT)Nln2αT|[1,00,0]1|(0,11,0)1|(0,11,1)10]}Nln2αeμt0+eNln2αxS[xμ,Tx|[0,00,0]|(0,11,0)1|(0,11,1)10]S[1Nln2αμ,1Nln2α(tx)|[1,00,0]1|(0,11,0)1|(0,11,1)10]dx+Nln2αeμt0+eNln2αxS[xμ,(tT)x|[0,00,0]|(0,11,0)1|(0,11,1)10]S[1Nln2αμ,1Nln2α(tx)|[1,00,0]1|(0,11,0)1|(0,11,1)10]dx+Nln2αeμTNln2αtTg(T)(Nln2α)2eμtg(T)g(tT)+h(T)eαtT,t(T,2T],e2Nln2αT(Nln2α)2eμtg(T),t(2T,+),0,else,F_{T_{all}}(t)=\left\{\begin{array}[]{l}e^{-\frac{2N\ln{2}\cdot\alpha}{t}}H\begin{matrix}0,2\\ 2,0\end{matrix}\left[\frac{t^{2}}{\left(N\ln{2}\cdot\alpha\right)^{2}}\bigg{|}\begin{matrix}(1,1),(0,1)\\ -\end{matrix}\right]-N\ln{2}\cdot\alpha e^{-\mu t}\int_{0}^{+\infty}e^{-N\ln{2}\cdot\alpha x}\\ S\left[\frac{x}{\mu},tx\bigg{|}\begin{bmatrix}0,0\\ 0,0\end{bmatrix}_{-}^{-}\begin{pmatrix}0,1\\ 1,0\end{pmatrix}\begin{matrix}1\\ -\end{matrix}\begin{pmatrix}0,1\\ 1,1\end{pmatrix}\begin{matrix}1\\ 0\end{matrix}\right]S\left[-\frac{1}{N\ln{2}\cdot\alpha\mu},\frac{1}{N\ln{2}\cdot\alpha\left(t-x\right)}\bigg{|}\begin{bmatrix}1,0\\ 0,0\end{bmatrix}_{1}^{-}\bigg{|}\begin{pmatrix}0,1\\ 1,0\end{pmatrix}\begin{matrix}1\\ -\end{matrix}\bigg{|}\begin{pmatrix}0,1\\ 1,1\end{pmatrix}\begin{matrix}1\\ 0\end{matrix}\right]\mathrm{d}x,\\ \qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad t\in(0,T],\\ e^{-\frac{2N\ln{2}\cdot\alpha}{t}}\left\{S\left[\frac{t^{2}}{\left(N\ln{2}\cdot\alpha\right)^{2}},\frac{t\cdot T}{N\ln{2}\cdot\alpha\left(t-T\right)}\bigg{|}\begin{bmatrix}1,0\\ 0,0\end{bmatrix}_{-}^{1}\bigg{|}\begin{pmatrix}0,1\\ 1,0\end{pmatrix}\begin{matrix}1\\ -\end{matrix}\bigg{|}\begin{pmatrix}0,1\\ 1,1\end{pmatrix}\begin{matrix}1\\ 0\end{matrix}\right]\right.\\ \phantom{=\;\;}\left.-S\left[\frac{t^{2}}{\left(N\ln{2}\cdot\alpha\right)^{2}},\frac{t\left(t-T\right)}{N\ln{2}\cdot\alpha T}\bigg{|}\begin{bmatrix}1,0\\ 0,0\end{bmatrix}_{-}^{1}\bigg{|}\begin{pmatrix}0,1\\ 1,0\end{pmatrix}\begin{matrix}1\\ -\end{matrix}\bigg{|}\begin{pmatrix}0,1\\ 1,1\end{pmatrix}\begin{matrix}1\\ 0\end{matrix}\right]\right\}-N\ln{2}\cdot\alpha e^{-\mu t}\int_{0}^{+\infty}e^{N\ln{2}\cdot\alpha x}\\ S\left[\frac{x}{\mu},Tx\bigg{|}\begin{bmatrix}0,0\\ 0,0\end{bmatrix}_{-}^{-}\bigg{|}\begin{pmatrix}0,1\\ 1,0\end{pmatrix}\begin{matrix}1\\ -\end{matrix}\bigg{|}\begin{pmatrix}0,1\\ 1,1\end{pmatrix}\begin{matrix}1\\ 0\end{matrix}\right]\\ S\left[-\frac{1}{N\ln{2}\cdot\alpha\mu},\frac{1}{N\ln{2}\cdot\alpha\left(t-x\right)}\bigg{|}\begin{bmatrix}1,0\\ 0,0\end{bmatrix}_{-}^{1}\bigg{|}\begin{pmatrix}0,1\\ 1,0\end{pmatrix}\begin{matrix}1\\ -\end{matrix}\bigg{|}\begin{pmatrix}0,1\\ 1,1\end{pmatrix}\begin{matrix}1\\ 0\end{matrix}\right]\mathrm{d}x+N\ln{2}\cdot\alpha e^{-\mu t}\int_{0}^{+\infty}e^{-N\ln{2}\cdot\alpha x}\\ S\left[\frac{x}{\mu},(t-T)x\bigg{|}\begin{bmatrix}0,0\\ 0,0\end{bmatrix}_{-}^{-}\bigg{|}\begin{pmatrix}0,1\\ 1,0\end{pmatrix}\begin{matrix}1\\ -\end{matrix}\bigg{|}\begin{pmatrix}0,1\\ 1,1\end{pmatrix}\begin{matrix}1\\ 0\end{matrix}\right]\\ S\left[-\frac{1}{N\ln{2}\cdot\alpha\mu},\frac{1}{N\ln{2}\cdot\alpha\left(t-x\right)}\bigg{|}\begin{bmatrix}1,0\\ 0,0\end{bmatrix}_{-}^{1}\bigg{|}\begin{pmatrix}0,1\\ 1,0\end{pmatrix}\begin{matrix}1\\ -\end{matrix}\bigg{|}\begin{pmatrix}0,1\\ 1,1\end{pmatrix}\begin{matrix}1\\ 0\end{matrix}\right]\mathrm{d}x\\ +N\ln{2}\cdot\alpha e^{-\mu T-\frac{N\ln{2}\cdot\alpha}{t-T}}g\left(T\right)-\left(N\ln{2}\cdot\alpha\right)^{2}e^{-\mu t}g\left(T\right)g\left(t-T\right)+h\left(T\right)e^{-\frac{\alpha}{t-T}},t\in(T,2T],\\ e^{-\frac{2N\ln{2}\cdot\alpha}{T}}-\left(N\ln{2}\cdot\alpha\right)^{2}e^{-\mu t}g\left(T\right),t\in(2T,+\infty),\\ 0,else,\end{array}\right. (20)

Second, Z(i.e.,Tall)Z(i.e.,T_{all}) is defined as Z=Tcomup+Tserv+Tcomdown=Y+TcomdownZ=T_{comup}+T_{serv}+T_{comdown}=Y+T_{comdown}, y(0,+),tcomdown(0,T]y\in(0,+\infty),t_{comdown}\in(0,T]. The calculation is the same as for YY. Then, in linear case, the distribution function FTall(t)F_{T_{all}}(t) is obtained in eq(20), where

h(T)\displaystyle h\left(T\right) =eαTαeμTg(T).\displaystyle=e^{-\frac{\alpha}{T}}-\alpha e^{-\mu T}g\left(T\right). (21)

FTall(t)F_{T_{all}}(t) is divided into three segments according to its domain. When tt is less than 2T2T, FTall(t)F_{T_{all}}(t) grows rapidly, that is, the total service time of a customer is around 2T2T. FTall(t)F_{T_{all}}(t) eventually approaches maximum.

III-B2 Nonlinear Case

In nonlinear case, there is a nonlinear relationship between capacity and signal power in some SISO.

First of all, the probability density function of the service times TservT_{serv}, in this case, is as same as in eq(17) because the DATABASE SYSTEM is as same as the nonlinear case. According to capacity C=Blog2(1+SN)C=B\log_{2}\left(1+\frac{S}{N}\right), we arrive at

Tcom=1C=1Blog2(1+SN).T_{com}=\frac{1}{C}=\frac{1}{B\log_{2}{\left(1+\frac{S}{N}\right)}}. (22)

In Rayleigh fading channel, TcomupT_{comup} and TcomdownT_{comdown} have the same distribution function FTcom(t)F_{T_{com}}(t) which is deduced from eq(14) and eq(22).

FTcom(t)\displaystyle F_{T_{com}}\left(t\right) =P{SN(21Bt1)}\displaystyle=P\left\{S\geq N\left(2^{\frac{1}{Bt}}-1\right)\right\} (23)
=eαN(21Bt1),t(0,T].\displaystyle=e^{-\alpha N\left(2^{\frac{1}{Bt}}-1\right)},t\in(0,T].

According to eq(17) and eq(23), the distribution function FTall(t)F_{T_{all}}(t) of time Tall=Tcomup+Tserv+TcomdownT_{all}=T_{comup}+T_{serv}+T_{comdown} is shown in eq(24).

FTall(t)={0zfTcom(x)F1(tx)dx,t(0,T],0tTfTcom(x)F2(tx)dx+tTTfTcom(x)F1(tx)dx,t(T,2T],0TfTcom(x)F2(tx)dx,t(2T,+),0,else.F_{T_{all}}(t)=\left\{\begin{array}[]{l}\int_{0}^{z}f_{T_{com}}\left(x\right)F_{1}\left(t-x\right)\mathrm{d}x,t\in(0,T],\\ \int_{0}^{t-T}f_{T_{com}}\left(x\right)F_{2}\left(t-x\right)\mathrm{d}x\\ +\int_{t-T}^{T}f_{T_{com}}\left(x\right)F_{1}\left(t-x\right)\mathrm{d}x,\\ \qquad\qquad\qquad\qquad\qquad t\in(T,2T],\\ \int_{0}^{T}f_{T_{com}}\left(x\right)F_{2}\left(t-x\right)\mathrm{d}x,\\ \qquad\qquad\qquad\qquad t\in(2T,+\infty),\\ 0,else.\end{array}\right. (24)

Notation: In eq(24), it is assumed that F1(x)=F(x),x(0,T]F_{1}\left(x\right)=F(x),x\in(0,\mathrm{T}] and F2(x)=F(x),x(T,+)F_{2}\left(x\right)=F(x),x\in(\mathrm{T},+\infty). The F(x)(i.e.,X=Tcomup+Tserv)F(x)(i.e.,X=T_{comup}+T_{serv}) is shown in eq(25).

F(x)={μeμx+αN0xeμtαN21Btdt,x(0,T],F(T)(1eμTμx)+μeμx+αN0TeμtαN21Btdt,x(T,+),0,else.F(x)=\left\{\begin{array}[]{l}\mu e^{-\mu x+\alpha N}\int_{0}^{x}e^{-\mu t-\alpha N\cdot 2^{\frac{1}{Bt}}}\mathrm{d}t,\\ \qquad\qquad\qquad\qquad x\in(0,T],\\ F\left(T\right)\left(1-e^{\mu T-\mu x}\right)+\mu e^{-\mu x+\alpha N}\\ \cdot\int_{0}^{T}e^{\mu t-\alpha N\cdot 2^{\frac{1}{Bt}}}\mathrm{d}t,x\in(T,+\infty),\\ 0,else.\end{array}\right. (25)

IV SIMULATION RESULTS

This section describes the parameters of procedure code and results of the C-D Model in figures. The lines in our figures represent the theoretical results gained from the section III, while the marks represent the simulation results received from the queue program.

The results will be presented in three parts. The first is the distribution function FTall(t)F_{T_{all}}(t) in two cases, which is the correctness verification of the mathematical derivation. The second group consists of client-related metrics including L and W. The others, WS and LS are shown in Appendix C333The full paper is recorded on http://arxiv.org/abs/2212.09219.. The third aspect is the BP, where observe the effectiveness of the C-D Model from the standpoint of the database.

IV-A PDF:The probability density function of TallT_{all}

The values of the parameters are set as follows: In linear case, μ\mu=1/10, TT=3, α\alpha=3. In nonlinear case, μ\mu=1/10, TT=3, α\alpha=3, BB=1, NN=2.

Refer to caption
Figure 3: Probability Density Function of time Tall=Tcomup+Tserv+TcomdownT_{all}=T_{comup}+T_{serv}+T_{comdown}.

In section III, the probability density function of TallT_{all} is calculated in both nonlinear and linear case. In Fig. 3, the results we get from eq(20) and eq(24) are shown in lines, while marks represent the simulation results. Evidently, our analysis corresponds to the simulation. Moreover, the tt is concentrated around a smaller number in the linear case. This illustrates that the communication quality is indeed improved under some MIMO technologies.

IV-B Different α\alpha of Rayleigh Fading Channel

In this part, the values of the parameters are set as follows: KK=10, μ\mu=1/10, TT=3, nonlin-BB=1, nonlin-NN=1, γ\gamma=1/2.

Notation: The abscissa, 1/λ1/\lambda, represents the average time interval between client arrivals. When 1/λ1/\lambda increases, the density of client arrival decreases.

Refer to caption
Figure 4: The busy time(i.e., consists of alternating service periods and periods during which the Service Area is unlocked and there are repeated transactions in the Waiting Area) of DATABASE SYSTEM with different α\alpha.

Fig. 4 presents the results of the busy period of the DATABASE SYSTEM, which is the only metric from the database perspective. First of all, the theoretical results of the model are compatible with its simulation results. The observations show that better communication quality(i.e., smaller α\alpha) facilitates the reduction of BP. These lines decrease fast as 1/λ1/\lambda increases in both cases. In addition, using the exponential correlation matrix(i.e., MIMO in [20]) does ease the busyness of the DATABASE SYSTEM.

Refer to caption
Figure 5: Different α\alpha: Theoretical(from equation) and simulation(from code) results on W.

Fig. 5 presents the results of the W. In both cases, W increases as communication quality declines. And from a lateral perspective, the more intensive the transactions(i.e., smaller 1/λ1/\lambda), the more clogged the system(i.e., bigger W). The most important one is that the theoretical results from equations are consistent with the simulation results, indicating means our model works.

IV-C Different B and N of Rayleigh Fading Channel(Nonlinear Case)

In this part, the values of the parameters are set as follows: KK=10, μ\mu=1/10, TT=3, α\alpha=1/2, γ\gamma=1/2 and initial value: BB=1, NN=1.

Refer to caption
Figure 6: Different BB and NN: Theoretical(from equation) and simulation(from code) results on L.

Fig. 6 depicts the metrics of L in different BB and NN settings. It can be seen that the theoretical results of the model and simulation results match each other. In addition to L decreasing as transaction density decreases, it can also be seen that the spacing between lines decreases as BB increases. And once the bandwidth increases to a certain extent, neither the lowering of L nor the optimization of the system are significantly affected by it. As NN reduces, L also reduce at the same 1/λ1/\lambda. It simply demonstrates that channel quality with low noise can reduce database processing congestion.

V Conclusion

This paper proposes a new model, named the C-D Model, based on communication quality and the service capability of the database system, in which theory and simulation are complementary. The M/G/1//K is selected to describe the database system. The C-D Model can be used to study online services under various communication qualities with the assumption of the linear and nonlinear cases. Future work will consider optimizing the C-D Model by adopting more complex channel models and database processing models closer to real applications, such as M/G/c//K. Combining the C-D Model with cloud computing produces observation models for improving the performance of cloud computing.

References

  • [1] O. Ulusoy and G. G. Belford, “A simulation model for distributed real-time database systems,” in Proceedings. 25th Annual Simulation Symposium.   IEEE, 1992, pp. 232–240.
  • [2] H. Garcia-Molina, Performance of update algorithms for replicated data in a distributed database.   Stanford University, 1979.
  • [3] W. Mariasoosai and M. Singhal, “A concurrency control algorithm for replicated database systems,” in Proceedings of the ISMM International Conference, New York, 1990, pp. 143–147.
  • [4] M. Singhal, “Concurrency control algorithms and their performance for replicated database systems, º phd dissertation,” Dept. of Computer Science, Univ. of Maryland, 1986.
  • [5] Y. Kuang and R. Mukkamala, “Performance analysis of static locking in replicated distributed database systems,” Building a Generalized Distributed System Model, 1991.
  • [6] J. F. Ren, Y. Takahashi, and T. Hasegawa, “Analysis of impact of network delay on multiversion conservative timestamp algorithms in ddbs,” Performance Evaluation, vol. 26, no. 1, pp. 21–50, 1996.
  • [7] S.-C. Shyu and V. O. K. Li, “Performance analysis of static locking in distributed database systems,” IEEE Transactions on Computers, vol. 39, no. 6, pp. 741–751, 1990.
  • [8] J. Du, W. Cheng, G. Lu, H. Cao, X. Chu, Z. Zhang, and J. Wang, “Resource pricing and allocation in mec enabled blockchain systems: An a3c deep reinforcement learning approach,” IEEE Transactions on Network Science and Engineering, vol. 9, no. 1, pp. 33–44, 2021.
  • [9] J. Du, F. R. Yu, G. Lu, J. Wang, J. Jiang, and X. Chu, “Mec-assisted immersive vr video streaming over terahertz wireless networks: A deep reinforcement learning approach,” IEEE Internet of Things Journal, vol. 7, no. 10, pp. 9517–9529, 2020.
  • [10] F. Baccelli and E. G. Coffman, “A data base replication analysis using an m/m/m queue with service interruptions,” in Proceedings of the 1982 ACM SIGMETRICS conference on Measurement and modeling of computer systems, 1982, pp. 102–107.
  • [11] R. D. Nelson and B. R. Iyer, “Analysis of a replicated data base,” Performance Evaluation, vol. 5, no. 3, pp. 133–148, 1985.
  • [12] B. Ciciani, D. M. Dias, and P. S. Yu, “Analysis of replication in distributed database systems,” IEEE Transactions on knowledge and data engineering, vol. 2, no. 2, pp. 247–261, 1990.
  • [13] ——, “Analysis of concurrency-coherency control protocols for distributed transaction processing systems with regional locality,” IEEE Transactions on Software Engineering, vol. 18, no. 10, pp. 899–914, 1992.
  • [14] G. I. Falin and J. R. Artalejo, “A finite source retrial queue,” European Journal of Operational Research, vol. 108, no. 2, pp. 409–424, 1998.
  • [15] S.-Y. Hwang, K. K. Lee, and Y. Chin, “Data replication in a distributed system: A performance study,” in International Conference on Database and Expert Systems Applications.   Springer, 1996, pp. 708–717.
  • [16] P. N. D. Bukh, “The art of computer systems performance analysis, techniques for experimental design, measurement, simulation and modeling,” 1992.
  • [17] K. K. Leung, “Update algorithm for replicated signaling databases in wireless and advanced intelligent networks,” IEEE Transactions on Computers, vol. 46, no. 3, pp. 362–367, 1997.
  • [18] Y. Xi, A. Burr, J. Wei, and D. Grace, “A general upper bound to evaluate packet error rate over quasi-static fading channels,” IEEE Transactions on Wireless Communications, vol. 10, no. 5, pp. 1373–1377, 2011.
  • [19] A. Ghrayeb and T. Duman, “Performance analysis of mimo systems with antenna selection over quasi-static fading channels,” IEEE Transactions on Vehicular Technology, vol. 52, no. 2, pp. 281–288, 2003.
  • [20] S. L. Loyka, “Channel capacity of mimo architecture using the exponential correlation matrix,” IEEE Communications letters, vol. 5, no. 9, pp. 369–371, 2001.
  • [21] J. R. Artalejo, “Retrial queues with a finite number of sources,” Journal of the Korean Mathematical Society, vol. 35, no. 3, pp. 503–525, 1998.
  • [22] Y. Zhang, I. L. Tan, C. Chun, K. Laberteaux, and A. Bahai, “A differential ofdm approach to coherence time mitigation in dsrc,” in Proceedings of the Fifth ACM International Workshop on VehiculAr Inter-NETworking, ser. VANET ’08.   New York, NY, USA: Association for Computing Machinery, 2008, p. 1–6. [Online]. Available: https://doi.org/10.1145/1410043.1410045

Appendix A The derivation of M/G/1//K

In [21], the C(t)C(t) is 0 or 1 according as the server is free or busy at time tt, N(t)N(t) is the number of sources in orbit. The length of the busy periods will be denoted by LBPL_{BP}. The probabilities(densities) are defined as follows:

p0n=𝐏{LBP>t,C(t)=0,N(t)=n},0nK1,\begin{split}p_{0n}=\mathbf{P}\{L_{BP}>t,C(t)=0,N(t)=n\},\\ \quad 0\leq n\leq K-1,\end{split} (26)
p1n(x)=ddx𝐏{LBP>t,C(t)=1,ξ(t)x,\displaystyle p_{1n}(x)=\frac{\mathrm{d}}{\mathrm{d}x}\mathbf{P}\{L_{BP}>t,C(t)=1,\xi(t)\leq x, (27)
N(t)=n},0nK1,\displaystyle N(t)=n\},\quad 0\leq n\leq K-1,
p1n=𝐏{LBP>t,C(t)=1,N(t)=n}=0p1n(x)dx,0nK1,\begin{split}p_{1n}&=\mathbf{P}\{L_{BP}>t,C(t)=1,N(t)=n\}\\ &=\int_{0}^{\infty}p_{1n}(x)\mathrm{d}x,\quad 0\leq n\leq K-1,\end{split} (28)

where ξ(t)\xi(t) is the service time that has lasted when C(t)=1C(t)=1.

Then, following the method of supplementary variables, the limiting probabilities as tt approaches ++\infty satisfy the equations of statistical equilibrium:

((Kn)α+nμ)p0n=0p1n(x)fTall(x)dx,((K-n)\alpha+n\mu)p_{0n}=\int_{0}^{\infty}p_{1n}(x)f_{T_{all}}(x)\mathrm{d}x, (29)
p1n(x)=\displaystyle p_{1n}^{\prime}(x)= ((Kn1)α+fTall(x))p1n(x)\displaystyle-((K-n-1)\alpha+f_{T_{all}}(x))p_{1n}(x) (30)
+(Kn)αp1,n1(x),\displaystyle+(K-n)\alpha p_{1,n-1}(x),

where fTall(x)=FTall(x)/(1FTall(x))f_{T_{all}}(x)=F_{T_{all}}^{\prime}(x)/(1-F_{T_{all}}(x)) is the hazard rate function of FTall(x)F_{T_{all}}(x) and p0K=p1,1=0p_{0K}=p_{1,-1}=0. With the help of so-called discrete transformations in [21], a set of unknown variables p=(p0,,pK1)p=(p_{0},...,p_{K-1}) is replaced by q=(q0,,qK1)=Apq^{\prime}=(q_{0},...,q_{K-1})^{\prime}=Ap^{\prime}, where AA is a non-singular K×KK\times K matrix.

pn=m=0n(1)m(K1n+mm)qK1n+m,0nK1.\begin{split}p_{n}=\sum_{m=0}^{n}(-1)^{m}\left(\begin{array}[]{c}K-1-n+m\\ m\end{array}\right)q_{K-1-n+m},\\ \quad 0\leq n\leq K-1.\end{split} (31)

Appendix B The derivation of the probability density function for Y

It is assumed that Y=Tcomup+TservY=T_{comup}+T_{serv}, (i.e.In order to make it easier to write, it is assumed that Tcomup=Tcomdown=Tcom=U,Tserv=XT_{comup}=T_{comdown}=T_{com}=U,T_{serv}=X), u(i.e.tcomup)(0,T],x(i.e.tserv)(0,+)u(i.e.t_{comup})\in(0,T],x(i.e.t_{serv})\in(0,+\infty).

When Y0Y\leq 0, FY(y)=0F_{Y}\left(y\right)=0. When 0<YT0<Y\leq T,

FY(y)=eNln2αyeμy\displaystyle F_{Y}\left(y\right)=e^{-\frac{N\ln{2}\cdot\alpha}{y}}-e^{-\mu y} (32)
0yNln2αeNln2αu+μuu2du,y(0,T].\displaystyle\int_{0}^{y}\frac{N\ln{2}\cdot\alpha e^{-\frac{N\ln{2}\cdot\alpha}{u}+\mu u}}{u^{2}}\mathrm{d}u,y\in(0,T].
fY(y)=Nln2αμeμy1yeNln2αr+μrdr,\displaystyle f_{Y}\left(y\right)=N\ln{2}\alpha\mu e^{-\mu y}\int_{\frac{1}{y}}^{\infty}e^{-N\ln{2}\cdot\alpha r+\frac{\mu}{r}}\mathrm{d}r, (33)
y(0,T].\displaystyle y\in(0,T].

When Y>TY>T,

FY(y)=\displaystyle F_{Y}\left(y\right)= eNln2αT\displaystyle e^{-\frac{N\ln{2}\cdot\alpha}{T}} (34)
eμy0TNln2αeNln2αu+μuu2du,\displaystyle-e^{-\mu y}\int_{0}^{T}\frac{N\ln{2}\cdot\alpha e^{-\frac{N\ln{2}\cdot\alpha}{u}+\mu u}}{u^{2}}\mathrm{d}u,
y(T,).\displaystyle\qquad\qquad\qquad\qquad\qquad y\in(T,\infty).
fY(y)=Nln2αμeμy1TeNln2αr+μrdr,\displaystyle f_{Y}\left(y\right)=N\ln{2}\alpha\mu e^{-\mu y}\int_{\frac{1}{T}}^{\infty}e^{-N\ln{2}\cdot\alpha r+\frac{\mu}{r}}\mathrm{d}r, (35)
y(T,).\displaystyle y\in(T,\infty).

Appendix C figures of theoretical and simulation results

Refer to caption
Figure 7: Different α\alpha: Theoretical(from equation) and simulation(from code) results on WS.
Refer to caption
Figure 8: Different α\alpha: Theoretical(from equation) and simulation(from code) results on LS.

In Fig. 7, Fig. 8 and Fig. 9, all lines increase as communication quality declines. And from a lateral perspective, the more intensive the transactions(i.e., smaller 1/λ1/\lambda), the more clogged the system(i.e., bigger WS, LS and L). The most important one is that the analytic results from equations are consistent with the simulation results, indicating means our model works.

Refer to caption
Figure 9: Different α\alpha: Theoretical(from equation) and simulation(from code) results on L.
Refer to caption
Figure 10: Different B and N: Theoretical(from equation) and simulation(from code) results on WS.

Fig. 10, Fig. 11, Fig. 12 depict WS, W, and LS in different B and N settings. It can be seen that the analysis results of the model and simulation results match each other. In addition to these metrics decreasing as transaction density decreases, it can also be seen that the spacing between lines decreases as B increases. And once the bandwidth increases to a certain extent, neither the lowering of these metrics nor the optimization of the system are significantly affected by it. As N reduces, these metrics also reduce at the same 1/λ1/\lambda. It simply demonstrates that channel quality with low noise can reduce database processing congestion.

Refer to caption
Figure 11: Different B and N: Theoretical(from equation) and simulation(from code) results on W.
Refer to caption
Figure 12: Different B and N: Theoretical(from equation) and simulation(from code) results on LS.