Network calculus is a theory initiated primarily in computer communication networks, especially in the aspect of real-time communications, where min-plus algebra plays a role. Cyber-physical networking systems (CPNSs) are recently developing fast and models in data flows as well as systems in CPNS are, accordingly, greatly desired. Though min-plus algebra may be a promising tool to linearize any node in CPNS as can be seen from its applications to the Internet computing, there are tough problems remaining unsolved in this regard. The identity in min-plus algebra is one problem we shall address. We shall point out the confusions about the conventional identity in the min-plus algebra and present an analytical expression of the asymptotic identity that may not cause confusions.
1. Introduction
We use the term cyber-physical networking systems (CPNS) instead of cyber-physical systems (CPS) as that in Song et al. [1] for the meaning of Internet of Things (IoT) that was stated by Commission of the European Communities [2] or Networks of Things (NoT) as discussed by Ferscha et al. [3], intending to emphasize the point that we are interested in the networking theory in CPS. Communication networks in CPNS include, but are never limited to, the Internet. Physical systems considered in CPNS are heterogeneous, ranging from telemedicine systems to geophysical ones, see, for example, Clifton et al. [4], Traynor [5], Chang [6]. Obviously, data in various physical systems are heterogeneous, see, for example, Chang [6], Goodchild [7], Lai and Xing [8], Mandelbrot [9–11], Hainaut and Devolder [12], Cattani [13–17], Chen et al. [18–22], Mikhael and Yang [23], Bakhoum and Toma [24–26], Li [27–32], Li et al. [33–39], Messina et al. [40], Humi [41], Dong [42], Liu [43], Toma [44], Abuzeid et al. [45], [46–49], Werner [50], and West [51], just naming a few.
There are two challenge issues in CPNS. On the one hand, data models that are irrelevant of statistics of a random function x(t) are greatly desired. On the other hand, theory that may be used to linearize nonlinear data transmission systems but irrelevant of their nonlinearity is particularly expected, because communication systems, including the Internet, are, in nature, nonlinear due to queuing, see, for example, Akimaru and Kawashima [52], Yue et al. [53], Gibson [54], Cooper [55], Pitts and Schormans [56], McDysan [57], and Stalling [58]. In short, we are interested in data models that are irrelevant of their statistics and system theory that is irrelevant of the nonlinearity of systems.
The early work regarding the above in italic may refer to Cruz [59–61], Zhao and Ramamritham [62], Raha et al. [63], Chang [64, 65], Boudec [66], Boudec and Patrick [67], Firoiu et al. [68], and Agrawal et al. [69]. Following Cruz [59, 60], the theory for the above in italic is called network calculus, see, for example, [66, 67], Jiang and Liu [70]. Chang [71] uses the term (σ,ρ) calculus, which is taken as the synonym of network calculus of Cruz in this paper.
The main application area of network calculus is conventionally to computer science, the Internet in particular, see, for example, Wang et al. [72, 73], Li and Zhao [74, 75], Fidler [76], Jiang [77], Jiang et al. [78], Liu et al. [79], Li et al. [80], Li and Kinghtly [81], Burchard et al. [82], Ng et al. [83], Raha et al. [84, 85], Starobinski and Sidi [86], Fukś et al. [87], Jia et al. [88], Golestani [89], and Lenzini et al. [90]. However, we have to emphasize the point that its applications are never limited to computer science. Rather, it is a theory to model data irrelevant of their statistics and to deal with data transmission without the necessity in principle to consider the nonlinearity of transmission systems, as we shall explain in the next section. Therefore, it may be a promising tool to deal with data and systems in CPNS.
Basically, the fundamental theory of network calculus consists of three parts as described below.
(σ,ρ) model of arrival data x(t),
relationship between x(t), single system (or node or server) S(t) that is usually called service curve, and departure data y(t),
departure data y(t) of a series of systems (nodes or servers) Sn(t)(n=1,2,…), driven by arrival data x(t),
where min-plus algebra plays a role, see, for example, [66, 67, 70, 71, 76].
The contributions of this paper are in the following three aspects:
the problem statement,
the proof of the existence of the identity in the min-plus algebra in the domain of generalized functions,
the asymptotic expression of the identity.
The rest of paper is organized as follows. Research background is discussed in Section 2. In Section 3, we will brief the min-plus algebra and state the problem regarding the identity in this algebra system. In Section 4, we shall address the existence of the identity in the min-plus algebra. The asymptotic expression of the identity is presented in Section 5. Discussions are given in Section 6, which is followed by conclusions.
2. Research Background
Data in CPNS are heterogeneous. They may be from sensors like radio-frequency identification (RFID), see, for example, [91], Ilie-Zudor et al. [92], Ahuja and Potti [93], data traffic in the Internet [38], transportation traffic (see [94–98]), ocean waves (see [31]), sea level (see [36, 99]), medical signals (see [14]), hydrological data (see [100]), financial data (see [101]), and so on. They may be Gaussian (see [29, 31]) or non-Gaussian (see [12, 102]). They may be in fractional order or integer order. In the case of fractional order, they may be unifractal or multifractal. The sample size of data of interest may be long enough for statistical analysis or very short, for example, a short conversation in mobile phone networks. On the other side, systems are also heterogeneous. Therefore, CPNS challenges us two tough issues. One is in data modeling and the other system modeling. We shall exhibit that the min-plus algebra in network calculus may yet serve as a tool in this regard.
2.1. Network Model
We first explain a single node in CPNS. Then, a model of tandem network is mentioned.
2.1.1. Nonlinearity of Node in CPNS
Denote by N a node in CPNS, see Figure 1. Suppose there are m clients arriving at the input of N at time t, see, for example, Starobinski et al. [103].
Single node in CPNS.
Without confusions, we use N to represent the operator of node N such thatyi(t)=Nxi(t),1≤i≤m.
Recall that queuing is a phenomenon often occurring in CPNS. For instance, cars in highways are often queued. Clients in a library for borrowing or returning books need queuing. Suppose client xi(t) suffers from delay di(t). Then,yi(t)=xi(t+di(t)),1≤i≤m.
Note that di(t) is a random variable in two senses. One is di(t)≠dj(t),1≤i≤m,1≤j≤m,i≠j.
The other isdi(t1)≠di(t2),1≤i≤m,t1≠t2.
Therefore, we have the following remark.
Remark 1 (nonlinearity).
A node N in CPNS is usually nonlinear. That is,
∑yi(t)≠∑Nxi(t),1≤i≤m.
2.1.2. Number of Arrivals is Random
The number of arrivals, denoted by m in Figure 1, is random.
Note 1.
We need theory to deal with a nonlinear node N with m arrival clients, where m is a random variable.
2.1.3. Tandem Network Model
A single node previously described is not enough in CPNS since a client may be served by a series of n nodes, which we call tandem network, see Figure 2.
Tandem network.
According to Remark 1, each node in Figure 2 is nonlinear. In addition, considering Note 1, we see that the number of arrival clients at the input of each node is random. Some clients may go through from N1 to Nn while others may not. For instance, client x1i1(t) leaves the tandem network when it passes through N1. Further more, some clients, for example, x21(t), arrive at this tandem network at the input of N2. In general, how many clients leave the tandem network at the output of a specific node and how many clients arrive at the input of another specific node are uncertain.
Note 2.
We need theory to handle a nonlinear system that is a tandem network as that in Figure 2 to assure the quality of service (QoS) of a specific client or of a specific class of clients within a given period of time.
The above Note 1 and Note 2 propose two challenge tasks in system theory. We shall explain how min-plus algebra is capable of dealing with those tasks late.
2.2. Data Modeling
We consider two classes of data flow. One is arrival data in the aggregated case, or aggregated clients, and the other arrival data of a specific client. In terms of network communications, the former is usually called aggregated arrival traffic while later arrival traffic at connection level. Without confusions, we use the term traffic rather than client.
One of radical properties of arrival traffic (traffic for short) is remarked below.
Remark 2 (positive).
Traffic xi(t) is positive. That is,
xi(t)≥0,t∈R,
where R is the set of real numbers.
Another radical property of traffic is that the maximum of xi(t) is finite. More precisely, the value of xi(t) may never be infinite. Thus, we have the following remark.
Remark 3 (finite range).
The maximum of xi(t) is finite. That is,
0≤xi(t)≤xi,max.
Remark 4 (randomness).
The function xi(t) is usually random. This implies that
xi(t1)≠xi(t2)fort1≠t2.
2.2.1. Traffic at Connection Level
At connection level, for instance, for the ith connection, traffic is xi(t). One particularity of xi(t) is that t for xi(t) usually lasts within a finite time interval, say, [0,T]. The width of the interval may be short, such as a short conversation like a word “hello” or long, such as a long speech over a network. In any case, it is finite. Modeling xi(t) with short interval is particularly desired and challenging.
Note 3.
In the discrete case, the length of xi(t) may be too short to the proper statistical analysis of xi(t) in practice.
Note 4.
Without confusions, we use [0,T] to represent the interval in both the continuous case and the discrete one. In the continuous case, [0,T]∈R. In the discrete case, [0,T]∈Z, where Z is the set of integer numbers, implying t=0,1,…,T. We use [t1,t2] to represent an interval the starting point of which is nonzero.
2.2.2. Aggregated Traffic
We adopt Figure 1 to discuss aggregated traffic. At time t, aggregated traffic denoted by x(t) at a node is expressed byx(t)=∑xi(t),i=1,…,m.
In contrary to xi(t), the particularity of x(t) is that t for x(t) usually lasts within an interval longer than that of xi(t). As a matter of fact, if xi(t) passes through a node, another arrival flow xj(t)(j=1,…,m) may arrive at the node. Consequently, in general, we should consider t∈(0,∞) for x(t).
2.3. Accumulated Traffic
Traffic, either xi(t) or x(t), discussed previously is instantaneous one. Data modeling of instantaneous traffic is essential, as we need understanding what its behaviors are at instantaneous time t at the input of a node. However, from the point of view of the service of a node, we also need data modeling of accumulated traffic within a time interval, say, [0,T], without loss of generality, because it is desired for us to understand what the service performance of the node is for the purpose of proper design of a buffer size as well as scheduling policy of the node.
2.3.1. Accumulated Traffic at Connection Level
In the continuous case, the accumulated traffic of xi(t) within the interval [0,T] is denoted by Xi(T). It is given byXi(T)=∫0Txi(t)dt,t∈R.
In the discrete case, Xi(T)=∑t=0T-1xi(t),t∈Z.
2.3.2. Accumulated Traffic in the Aggregated Case
Denote by X(T) the accumulated traffic in the aggregated case within the interval [0,T]. Then, in the continuous case, we haveX(T)=∫0Tx(t)dt,t∈R.
In the discrete case, X(T)=∑t=0T-1x(t),t∈Z.
The mathematical expressions of X(T) and Xi(T) appear similar except the subscript i. However, X(T) differs from Xi(T) substantially in analysis in methodology. On the one hand, T for Xi(T) should be assumed to be short such that conventional methods in statistics fail to its statistical analysis. On the other hand, T for X(T) may be large enough such that it may be sectioned for the statistical analysis, see, for example, Li et al. [104].
2.3.3. A Basic Property of Accumulated Traffic
One property of accumulated traffic, either X(T) or Xi(T), is the wide sense increasing. By wide sense increasing, we mean that Xi(T1)≤Xi(T2)forT1≤T2,
orX(T1)≤X(T2)forT1≤T2.
Therefore, the data functions or series we face with are increasing ones in the wide sense.
2.3.4. (σ,ρ) Model of Data
For σ≥0 and ρ≥0, the following is called the (σ,ρ) model of data xi(t),Xi(T)=∫0Txi(u)du≤σi+ρiT.
Note 5.
The model expressed by (16) is irrelevant of any information of statistics of xi(t). The advantage of this model is at the cost of using inequality instead of equality.
Note 6.
The model of (16) is simple in computation. Thus, it may be effective in practice, particularly in environments of CPNS, where simple computations are always expected.
For accumulated traffic X(T), we haveX(T)=∫0Tx(u)du≤σ+ρT.
Due to sufficiently large T, we may set the starting time by T0. In this case, we have∫T0Tx(u)du≤σ(T0)+ρ(T-T0).
Moreover, we are allowed to section the above integral such that∫nT(n+1)Tx(u)du≤σ(nT)+ρ(T),n=0,1,….
Without loss of generality, we use (17) to explain σ and ρ.
Remark 5.
The parameter σ represents the bound of the burstness or local irregularity of x(t), because
0≤limT→0∫0Tx(u)du≤σ.
Note that the above integral does not make sense if limT→0∫0Tx(t)dt≠0 for the continuous x(t) even in the field of the Lebesgue’s integrals, see Dudley [105], Bartle and Sherbert [106], and Trench [107] for the contents of the Lebesgue’s integrals. However, it makes sense when it is considered in the domain of generalized functions, which we shall brief in the following section. A simple way to explain (20) islimT→0∫0Tx(t)dt=∫0Tσ1δ(t)dt,
where σ1≤σ and δ(t) is the Dirac-δ function.
Remark 6.
The parameter ρ represents the bound of the average rate of X(T), because
0≤limT→∞∫0Tx(t)dtT≤ρ=constant.
Remark 7.
The parameter σ measures the local property of x(t) while ρ is a measure of global property of x(t).
3. Min-Plus Algebra and Problem Statement
Min-plus convolution is essential in the min-plus algebra. In this section, we first briefly review the conventional convolution in linear systems. Then, we shall visit min-plus convolution. Finally, we shall state the problem in the aspect of identity in the min-plus algebra.
3.1. Conventional Convolution
Denote by p a real number that satisfies 1≤p<∞. If a function f(t) defined on [a,b], where a is allowed to be -∞and b is allowed to be ∞, is measurable and∫ab|f(u)|pdu<∞,
we say that f(t)∈Lp(a,b).
Suppose that two functions f1(t),f2(t)∈L1(-∞,∞). Then, one says that f1(t) convolutes f2(t) if f1(t)*f2(t)=∫-∞∞f1(u)f2(t-u)du,
where * is the symbol implying the operation of convolution. We call it conventional convolution so as to distinguish it from the min-plus convolution we are discussing in this paper.
The conventional convolution is crucial for linear systems, see, for example, Gibson [54], Box et al. [108], Mitra and Kaiser [109], Papoulis [110], Harris [111], Mikusinski [112], Fuller [113], and Bendat and Piersol [114], just naming a few. It has the properties described by the following lemmas.
Lemma 1.
In the algebra system (L1;*), the conventional convolution is commutative.
Lemma 2 (closure of *).
If f1(t),f2(t)∈L1, then f1(t)*f2(t)∈L1.
Lemma 3.
In the algebra system (L1;+,*), where + implies the ordinary addition, * with respect to + is distributive.
Lemma 4.
For a∈R, [af1(t)]*f2(t)=f1(t)*[af2(t)]=a[f1(t)*f2(t)].
Lemma 5.
The identity in (L1;*) is the Dirac-δ function δ(t) that is defined by
f(t)=∫-∞∞f(u)δ(t-u)du,
where f(t)∈L1(-∞,∞) is continuous at t.
In fact, in the domain of generalized functions, we have∫-∞∞δ(u)du<∞.
Thus, δ(t)∈L1(-∞,∞)in the sense of generalize functions. Consequently, δ(t) is taken as the asymptotic identity in (L1;*) in the domain of generalized functions. Accordingly, the inverse of the conventional convolution discussed by, for instance, Mikusinski [112], Bracewell [115], Huang and Qiu [116], Abutaleb et al. [117], Rhoads and Ekstrom [118], Todoeschuck and Jensen [119], and Moreau et al. [120], exists because the necessary and sufficient condition that the inverse of an operation exists is that there exists the identity in that system, see, for example, Korn and Korn [121], Zhang [122], Riley et al. [123], Bronshtein et al. [124], and Stillwell [125], but it should be in the sense of generalized functions. As a matter of fact, the conventional convolution itself is in that sense, see, for example, Smith [126].
Theorem 1.
The algebra system (L1;*) is a group.
Proof.
First, the operation * is closed in L1. Second, * is commutative because, for any f1(t),f2(t),f3(t)∈L1(-∞,∞),
f1(t)*[f2(t)*f3(t)]=[f1(t)*f2(t)]*f3(t).
Finally, there exists the left identity denoted by δ(t) and the right one again denoted by δ(t) in (L1;*) such thatf(t)*δ(t)=δ(t)*f(t)foranyf(t)∈L1(-∞,∞).
Thus, (L1;*) is a group.
3.2. Min-Plus Convolution
Considering the property of wide sense increasing of accumulated traffic mentioned in Section 2.3, we denote by 𝕊 the set that contains all functions that are greater than or equal to zero and that are wide sense increasing.
Definition 1.
Let X1(t),X2(t)∈𝕊. Then, the following operation is called min-plus convolution:
X1(t)⊗X2(t)=inf0≤u≤t{X1(u)+X2(t-u)},
where ⊗ represents the operation of the min-plus convolution.
Example 1.
Let X(t)=t2 for t>0 and 0 elsewhere. Then, X(t)⊗X(t)=t2/2.
Lemma 6 . (closure of ⊗).
Let X1(t),X2(t)∈𝕊. Then, X1(t)⊗X2(t)∈𝕊.
Lemma 7.
The operation ⊗ is commutative. That is,
X1(t)⊗X2(t)=X2(t)⊗X1(t)forX1(t),X2(t)∈S.
Define another operation that is denoted by ∧ such thatX1(t)∧X2(t)=inf[X1(t),X2(t)]forX1(t),X2(t)∈S.
Then, we have an algebra system denoted by (𝕊,∧,⊗) that follows the distributive law.
Lemma 8.
The operation ⊗ with respect to ∧ is distributive. That is, for X1(t),X2(t),X3(t)∈𝕊, one has
[X1(t)∧X2(t)]⊗X3(t)=[X1(t)⊗X3(t)]∧[X2(t)⊗X3(t)].
The following rule useful in this research is stated as follows.
Lemma 9.
Suppose K∈R. Then, for X1(t),X2(t)∈𝕊, one has
[X1(t)+K]⊗X2(t)=X1(t)⊗X2(t)+K,
where + is the ordinary addition.
Denote by I1(t) the conventional identity in the min-plus algebra, which is defined byI1(t)={∞,t>0,0,t<0,
see [66–70].
It seems quite obvious when one takes I1(t) as the identity in the min-plus algebra sinceX(t)⊗I1(t)=I1(t)⊗X(t)=X(t).
However, we shall soon point the contradictions of I1(t) below.
3.3. Problem Statement
Denote by u(t) the Heavyside unit step function. That is,u(t)={1,t>0,0,t<0.
Then, for K∈R, we haveKu(t)={K,t>0,0,t<0.
Using (34), we haveI1(t)+Ku(t)={∞+K,t>00,t<0={∞,t>00,t<0=I1(t).(Contradiction1)
The above is an obvious contradiction regarding the conventional identity defined by (34).
In addition to the above contradiction, we now state another problem regarding (34). As a matter of fact, if we let X1(t)=I1(t) and Ku(t) in Lemma 9, then, on the left side of (33) in Lemma 9, we have [I1(t)+Ku(t)]⊗X2(t)=I1(t)⊗X2(t)=X2(t).
On the other side, on the right side of (33) in Lemma 9, we have[I1(t)+Ku(t)]⊗X2(t)=I1(t)⊗X2(t)+Ku(t)=X2(t)+Ku(t).
Comparing the right sides of (39) with that of (40) yields another contradiction expressed by X2(t)=X2(t)+Ku(t),(Contradiction2)
The above discussions imply that the definition of the identity of (34) in the min-plus algebra, which is commonly used in literature, see, for example, [66–70], may not be rigorous at least. Therefore, the conventional representation of the identity, that is, (34), may be inappropriate since it may mislead computation results like those in (39) and (40). Consequently, rigorous definition of the identity needs studying.
4. Existence of Identity in Min-Plus Algebra
The problems regarding the definition of the conventional identity, which we stated in Section 3.3, give rise to a question whether or not the identity in the min-plus algebra exists. The answer to this question is rarely seen, to the best of our knowledge. Another question resulted from Section 3.3 is what the rigorous representation of the identity is. We shall provide the answer to the first question in this section. The answer to the second will be explained in the next section.
4.1. Preliminaries
We brief some results in generalized functions [127–129] for the purpose of discussing the existence of identity.
Definition 2.
Let supp(f) be the support of a function f:R→C. It implies {t:f(t)≠0}. The function is said to have a bounded support if there exist a,b∈R such that supp(f)⊂[a,b].
Definition 3.
A function f:R→C is said to have n time continuous derivatives if its first n derivatives exist and are continuous. If its derivatives of all orders exist and are continuous, f is said to be infinitely differentiable. In this case, f is said to be smooth.
Definition 4.
A test function is a smooth R→C with supp(f)⊂[a,b]. The set of all test functions is denoted by D.
Definition 5.
A linear functional f on D is a map f:D→C such that, for a,b∈C and ϕ,ψ∈D, f(aϕ+bψ)=af(ϕ)+bf(ψ).
Definition 6.
Denote by (ϕn) a sequence of test functions and Φ another test function. We say that ϕn→Φ if the following holds:
there is an interval [a,b] that contains supp(Φ) and supp(ϕn) for all n,
limn→∞ϕn(k)(t)→Φ(k)(t) uniformly for t∈[a,b].
Definition 7.
A functional f on D is continuous if it maps every convergent sequence in D into a convergent sequence in C. A continuous linear functional f on D is termed a generalized function. It is often called a distribution in the sense of Schwartz.
Definition 8.
A function f:R→C is locally integrable if ∫abf(t)dt<∞ for all a,b.
Lemma 10.
Any continuous, including piecewise continuous, function is locally integrable.
Lemma 11 (regular).
Any locally integrable function f is a generalized function defined by
〈f,ϕ〉=∫-∞∞f(t)ϕ(t)dt<∞.
In this case, f is called regular.
Lemma 12.
Any generalized function has derivatives of all orders.
Lemma 13.
There exists the Fourier transform of any generalized function.
Definition 9 (rapid function).
A function of rapid decay is a smooth function ϕ:R→C such that tnϕ(r)(t)→0 as t→±∞ for all n,r≥0, where C is the space of complex numbers. The set of all functions of rapid decay is denoted by S.
Lemma 14.
Every function belonging to S is absolutely integrable.
4.2. Proof of Existence
Define the norm and inner product of X∈𝕊 by‖X‖2=〈X,X〉=∫0∞X2(u)w(u)du,
where w∈S. Combining any X∈𝕊 with its limit yields a Hilbert space that we denote again by 𝕊 without confusions.
Let g∈𝕊 be a system function such that it transforms its input X∈𝕊 to the output byy=(X⊗g)∈S.
Denote the system by the operator L. Then, we purposely force the functionality of L such that it maps an element X∈𝕊 to another element (X⊗g)∈𝕊. Note that L is a linear operator. In fact, according to Lemma 8, we haveL(X∧g)=L(X)∧L(g).
In addition, from Lemma 9, we haveL(X+K)=L(X)+K.
Therefore, L is a linear mapping from 𝕊 to 𝕊.
Denote by L the space consisting of all such operators byL(S,S)=L(S).
Then, from Lemmas 8 and 9, one can easily see that L(𝕊) is a linear space.
Lemma 15 (archimedes criterion).
For any positive real numbers a>0 and b>0, there exists positive integer n∈Z such that na>b (see [130]).
Lemma 16 (archimedes).
If b∈R, there exists n∈Z such that b<n (see [106]).
Lemma 17.
An operator T:X↦Y is invertible if and only if there exists constant m>0 such that for all x∈X, ∥Tx∥≥m∥x∥, where X and Y are linear normed spaces (see [131]).
From the above discussions, we obtain the following theorem.
Theorem 2 (existence).
For X,g∈𝕊 and X(0)≠0 and g(0)≠0, if L(X)=X⊗g or L1(g)=g⊗X, then both L and L1 are invertible. Consequently, the identity in the min-plus algebra exists.
Proof.
Consider
‖LX‖=‖X⊗g‖=∫0∞[inf0≤u≤t{X(u)+g(t-u)}]2w(u)du.
Since
inf0≤u≤t{X(u)+g(t-u)}≥inf{X(u)}=X(0)
and X(u)∈𝕊, we have
0<X(0)≤X(u).
According to Lemmas 15 and 16, there exists m>0 such that
X(0)≥m2X(u).
Therefore,
‖LX‖≥∫0∞[inf{X(u)}]2w(u)du=∫0∞[X(0)]2w(u)du≥m∫0∞X(u)2w(u)du=m‖X‖.
Similarly, if L1∈L(𝕊)is such that L1(g)=g⊗X, we have ∥L1g∥≥m1∥g∥ since g(0)≠0, where m1>0 is a constant. Thus, according to Lemma 17, Theorem 2 holds.
Note 7.
In Theorem 2, we need the conditions of X(0)≠0 and g(0)≠0. Since X(t) and g(t) are wide sense increasing, we need in fact X(0)>0 and g(0)>0.
5. Representation of Identity in Min-Plus Algebra
Express the Dirac-δ function byδ(t)=12π+1π∑k=-∞∞cos(kt).
For the purpose of distinguishing the identity we present from the conventional one, we denote I(t) as the identity in what follows instead of I1(t) as used in Section 3.
Theorem 3 (representation).
The identity in the min-plus algebra is expressed by
I(t)=limT→0[2T+4T∑n=1∞cos(2nπtT)].
Proof.
Take the following into account
∑n=0∞δ(t-nT)(T>0).
Then, the identity in the discrete case is given by
I(k)=∑n=0∞δ(k-nT).
The identity in the continuous case is taken as the limit expressed by
I(t)=limT→0∑n=0∞δ(t-nT).
Considering the Poisson’s summation formula, we have
I(k)=2T+4T∑n=1∞cos(2nπkT).
In the limit case,
I(t)=limT→0[2T+4T∑n=1∞cos(2nπtT)].
This completes the proof.
Remark 8.
If one uses the representation in Theorem 3, the contradictions given in (38) and (41) vanish.
Note 8.
The identity expressed by (59) is an asymptotic one.
6. Discussions
We mention an application of min-plus algebra to CPNS. Denote by Yi(t) the accumulated function characterizing the output of the ith node (Figure 3). Then, the min-plus convolution can be used to establish the relationship between Xi(t), Si(t), and Yi(t) byYi(t)≥Xi(t)⊗Si(t)=inf0≤u≤t{Si(u)+Xi(t-u)}.
Single node with arrival and departure traffic.
Suppose a traffic function passes through N tandem nodes from the first node with the service curve S1(t) to the Nth node with the service curve SN(t) to reach the destination as indicated in Figure 4. Denote the departure traffic of the Nth node by YN(t). Then,YN(t)≥X1(t)⊗SN1(t)=inf0≤u≤t{SN1(u)+X1(t-u)},
where (see [132])SN1(t)=S1(t)⊗S2(t)⊗⋯⊗Si(t)⋯⊗SN(t).
N tandem nodes with arrival and departure traffic.
Note 9.
Min-plus algebra can be used to linearize a nonlinear system as can be seen from (62). Thus, it may yet be used as a theory in the aspect of data transmission systems in CPNS.
7. Conclusions
We have proposed the problem regarding the conventional identity in the min-plus algebra. In addition, we have presented the proof that the identity in the min-plus algebra exists in the domain of generalized function. Moreover, we have given the asymptotic expression of the identity in the system of min-plus algebra.
Acknowledgment
This work was partly supported by the National Natural Science Foundation of China (NSFC) under the project Grant nos. 60873264, 61070214, and the 973 plan under the Project no. 2011CB302801/2011CB302802.
SongZ.ChenY. Q.SastryC. R.TasN. C.2009SpringerCommission of the European CommunitiesInternet of things—an action plan for Europe2009121-21081202-s2.0-7564913531710.1080/13880290902938435FerschaA.HechingerM.RienerA.dos Santos RochaM.ZeidlerA.FranzM.MayrhoferR.Peer-it: stick-on solutions for networks of things20084334484792-s2.0-4354912144310.1016/j.pmcj.2008.01.003CliftonG. D.ByerH.HeatonK.HabermanD. J.GillH.Provision of pharmacy services to underserved populations via remote dispensing and two-way videoconferencing20036024257722822-s2.0-1642360158TraynorK.Navy takes telepharmacy worldwide2010671411341136ChangK. T.2008New York, NY, USAMcGraw–HillGoodchildM. F.Twenty years of progress: GIScience in 2010201020101320LaiT. L.XingH.2008Springer2434025MandelbrotB. B.2001Springer1878884MandelbrotB. B.1998SpringerMandelbrotB. B.1982New York, NY, USAW. H. FreemanHainautD.DevolderP.Mortality modelling with Lévy processes20084214094182-s2.0-3864908765710.1016/j.insmatheco.2007.05.007CattaniC.Harmonic wavelet approximation of random, fractal and high frequency signals2010433-42072172-s2.0-7795099735910.1007/s11235-009-9208-3CattaniC.ccattani@unisa.itFractals and hidden symmetries in DNA2010201031266004550705610.1155/2010/507056MattioliG.giannifrancesco.mattioli@uniroma1.itScaliaM.massimo.scalia@uniroma1.itCattaniC.ccattani@unisa.itAnalysis of large-amplitude pulses in short time intervals: application to neuron interactions201020101589578510.1155/2010/895785CattaniC.Shannon wavelets for the solution of integrodifferential equations20102010222-s2.0-7795250270610.1155/2010/408418CattaniC.Shannon wavelets theory20082008241648082-s2.0-5454911129710.1155/2008/164808ChenS. Y.LiY. F.ZhangJ.Vision processing for realtime 3-D data acquisition based on coded structured light20081721671762-s2.0-3954910499210.1109/TIP.2007.914755ChenS. Y.sy@IEEEorgTongH.hytong@0818.netWangZ.zjwang@0818.netLiuS.edliu@zjut.edu.cnLiM.ming_lihk@yahoo.comZhangB.zhangbeiwei@hotmail.comImproved generalized belief propagation for vision processing201120111241696310.1155/2011/416963ChenS. Y.sy@IEEEorgLiY. F.meyfli@cityu.edu.hkDetermination of stripe edge blurring for depth sensing201111238939010.1109/JSEN.2010.2070062ChenS. Y.sy@IEEEorgGuanQ.gq@zjut.edu.cnParametric shape representation by a deformable NURBS model for cardiac functional measurements201158348048710.1109/TBME.2010.2087331ChenS.sy@IEEEorgZhangJ.jzhang@informatik.uni-hamburg.deZhangH.GuanQ.DuY.YaoC.ZhangJ.Myocardial motion analysis for determination of tei-index of human heart20101012114281143910.3390/s101211428MikhaelW.YangT.A gradient-based optimum block adaptation ICA technique for interference suppression in highly dynamic communication channels200620061010.1155/ASP/2006/8405784057BakhoumE. G.TomaC.Dynamical aspects of macroscopic and quantum transitions due to coherence function and time series events20102010132-s2.0-7795143855410.1155/2010/428903428903BakhoumE. G.ebakhoum@uwf.eduTomaC.cgtoma@physics.pub.roMathematical transform of traveling-wave equations and phase aspects of quantum interaction201020101569520810.1155/2010/695208BakhoumE. G.TomaC.Relativistic short range phenomena and space-time aspects of pulse measurements20082008204101562-s2.0-5294909830610.1155/2008/410156LiM.Change trend of averaged Hurst parameter of traffic under DDOS flood attacks20062532132202-s2.0-3364690018710.1016/j.cose.2005.11.007LiM.ming_lihk@yahoo.comA class of negatively fractal dimensional gaussian random functions201120111829102810.1155/2011/291028LiM.Generation of teletraffic of generalized cauchy type20108122-s2.0-7714912707410.1088/0031-8949/81/02/025007025007LiM.ming_lihk@yahoo.comFractal time series-a tutorial review201020102615726410.1155/2010/157264LiM.A method for requiring block size for spectrum measurement of ocean surface waves2006556220722152-s2.0-3394731561110.1109/TIM.2006.884134LiM.Modeling autocorrelation functions of long-range dependent teletraffic series based on optimal approximation in hilbert space-a further study20073136256312-s2.0-3375084532110.1016/j.apm.2005.11.029LiM.ming_lihk@yahoo.comZhaoW.zhao8686@gmail.comChenS.sy@IEEEorgMBm-based scalings of traffic propagated in internet201120112138980310.1155/2011/389803LiM.ZhaoW.Variance bound of ACF estimation of one block of fGn with LRD201020101410.1155/2010/560429560429LiM.ZhaoW.Detection of variations of local irregularity of traffic under DDOS flood attack20082008114758782-s2.0-5294915428610.1155/2008/475878LiM.ming_lihk@yahoo.comCattaniC.ccattani@unisa.itChenS.-Y.sy@IEEEorgViewing sea level by a one-dimensional random function with long memory201120111365428410.1155/2011/654284LiM.ming_lihk@yahoo.comLiJ. Y.On the predictability of long-range dependent series20102010939745410.1155/2010/397454LiM.LimS. C.Modeling network traffic using generalized cauchy process200838711258425942-s2.0-3964912398310.1016/j.physa.2008.01.026LiM.ming_lihk@yahoo.comLimS. C.sclim47@gmail.comChenSy.sy@IEEEorgExact solution of impulse response to a class of fractional oscillators and its stability20112011965783910.1155/2011/657839MessinaA. R.aroman@gdl.cinvestav.mxEsquivelP.pesquive@gdl.cinvestav.mxLezamaF.flezama@gdl.cinvestav.mxTime-dependent statistical analysis of wide-area time-synchronized data201020101775165910.1155/2010/751659HumiM.Assessing local turbulence strength from a time series20102010133168412-s2.0-7795351762810.1155/2010/316841DongM.mdong@sjtu.edu.cnA tutorial on nonlinear time-series data mining in engineering asset health and reliability prediction: concepts, models, and algorithms201020102217593610.1155/2010/175936LiuZ.Chaotic time series analysis20102010317201902-s2.0-7795253089510.1155/2010/720190TomaG.mdoboga@yahoo.comSpecific differential equations for generating pulse sequences201020101132481810.1155/2010/324818AbuzeidO. M.oabuzeid@ju.edu.joAl-RabadiA. N.a.alrabadi@ju.edu.joAlkhaldiH. S.h.alkhaldi@ju.edu.joFractal geometry-based hypergeometric time series solution to the hereditary thermal creep model for the contact of rough surfaces using the Kelvin-Voigt medium201020102265230610.1155/2010/652306LiM.ZhaoW.Visiting power laws in cyber-physical networking systems2012201213302786LiM.LimS. C.Power spectrum of generalized cauchy process2010433-42192222-s2.0-7795102562810.1007/s11235-009-9209-2HeJ.hallyhejun@163.comQianH.hfqian@cs.ecnu.edu.cnZhouY.zhouyuantdt@gmail.comLiZ.lizb@cs.ecnu.edu.cnCryptanalysis and improvement of a block cipher based on multiple chaotic systems201020101459059010.1155/2010/590590LiaoZ.HuS.ChenW.Determining neighborhoods of image pixels automatically for adaptive image denoising using nonlinear time series analysis201020102-s2.0-7795350083410.1155/2010/914564WernerG.Fractals in the nervous system: conceptual implications for theoretical neuroscience20101 28WestB. J.Fractal physiology and the fractional calculus: a perspective20101AkimaruH.KawashimaK.1993SpringerYueW.TakagiH.TakahashiY.2009SpringerGibsonJ. D.1997IEEE PressCooperR. B.19812ndElsevierPittsJ. M.SchormansJ. A.20002ndNew York, NY, USAJohn Wiley & SonsMcDysanD.2000New York, NY, USAMcGraw-HillStallingW.20022ndPrentice HallCruzR. L.A calculus for network delay—part 1: network elements in isolation part 219913711141412-s2.0-002600066010.1109/18.61109CruzR. L.A calculus for network delay—part 2: network analysis19913711321412-s2.0-002599495910.1109/18.61110CruzR. L.Quality of service guarantees in virtual circuit switched networks1995136104810562-s2.0-002935739510.1109/49.400660ZhaoW.RamamrithamK.Virtual time csma protocols for hard real-time communication19871389389522-s2.0-0023399417RahaA.KamatS.ZhaoW.Guaranteeing end-to-end deadlines in ATM networksProceedings of the 15th International Conference on Distributed Computing SystemsJune 199560682-s2.0-0029235663ChangC. S.On deterministic traffic regulation and service guarantees: a systematic approach by filtering1998443109711102-s2.0-0032073055ChangC. S.Stability, queue length, and delay of deterministic and stochastic queueing networks19943959139312-s2.0-002843901210.1109/9.284868Le BoudecJ. Y.Application of network calculus to guaranteed service networks1998443108710962-s2.0-0032072324Le BoudecJ. Y.PatrickT.2001SpringerFiroiuV.Le BoudecJ. Y.TowsleyD.ZhangZ. L. I.Theories and models for internet quality of service2002909156515912-s2.0-3364680225510.1109/JPROC.2002.802002AgrawalR.BaccelliF.RajanR.1998INRIARR-3435JiangY. M.LiuY.2008SpringerChangC. S.2000SpringerWangH.SchmittJ. B.jschmitt@informatik.uni-kl.deMartinovicI.Dynamic demultiplexing in network calculus—theory and application201168220121910.1016/j.peva.2010.12.002WangS. Q.XuanD.BettatiR.ZhaoW.Toward statistical QoS guarantees in a differentiated services network2010433-42532632-s2.0-7795102228010.1007/s11235-009-9212-7LiC. Z.ZhaoW.Stochastic performance analysis of non-feedforward networks2010433-42372522-s2.0-7795102342610.1007/s11235-009-9211-8LiM.ZhaoW.Representation of a stochastic traffic bound201021913681372FidlerM.Survey of deterministic and stochastic service curve models in the network calculus201012159862-s2.0-7724913071810.1109/SURV.2010.020110.00019JiangY. M.Per-domain packet scale rate guarantee for expedited forwarding20061436306432-s2.0-3374558467710.1109/TNET.2006.876177JiangY. M.YinQ.LiuY.JiangS.Fundamental calculus on generalized stochastically bounded bursty traffic for communication networks20095312201120192-s2.0-6754913212410.1016/j.comnet.2009.03.004LiuY.ThamC. K.JiangY. M.A calculus for stochastic QoS analysis20076465475722-s2.0-3394715858210.1016/j.peva.2006.07.003LiC.BurchardA.LiebeherrJ.A network calculus with effective bandwidth2007156144214532-s2.0-3754902065410.1109/TNET.2007.896501LiC.KnightlyE.Schedulability criterion and performance analysis of coordinated schedulers20051322762872-s2.0-1884443731910.1109/TNET.2005.845541BurchardA.LiebeherrJ.PatekS. D.A min-plus calculus for end-to-end statistical service guarantees2006529410541142-s2.0-3374853673010.1109/TIT.2006.880019NgJ. K. Y.SongS.ZhaoW.Integrated end-to-end delay analysis for regulated ATM networks2003251931242-s2.0-003868194710.1023/A:1022976920366RahaA.KamatS.JiaX.ZhaoW.Using traffic regulation to meet end-to-end deadlines in ATM networks19994899179352-s2.0-003334035210.1109/12.795221RahaA.ZhaoW.KamatS.JiaW.Admission control for hard real-time connections in ATM LANs200114841122-s2.0-003541606410.1049/ip-com:20010300StarobinskiD.SidiM.Stochastically bounded burstiness for communication networks20004612062122-s2.0-003390513110.1109/18.817518FukśH.LawniczakA. T.VolkovS.Packet delay in models of data networks20011132332502-s2.0-014183455110.1145/502109.502110JiaX.ZhaoW.LiJ.An integrated routing and admission control mechanism for real-time multicast connections in ATM networks2001499151515192-s2.0-003543975610.1109/26.950337GolestaniS. J.Network delay analysis of a class of fair queueing algorithms1995136105710702-s2.0-002935739610.1109/49.400661LenziniL.MingozziE.SteaG.A methodology for computing end-to-end delay bounds in FIFO-multiplexing tandems20086511-129229432-s2.0-5344909322410.1016/j.peva.2008.04.002INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro & Nanosystems, in co-operation with the Working Group RFID of the ETP EPOSS, Internet of Things in 2020, Roadmap for the Future[R]. Version 1.1, May 2008Ilie-ZudorE.ilie@sztaki.huKeményZ.kemeny@sztaki.huvan BlommesteinF.fred@flowcanto.comMonostoriL.monostori@sztaki.huvan Der MeulenA.andre@acvdm.nlA survey of applications and requirements of unique identification systems and RFID techniques201162322725210.1016/j.compind.2010.10.004AhujaS.PottiP.An introduction to RFID technology201023183186WangR.ZhangL.SunR.GongJ.CuiL.A pervasive traffic information acquisition system based on wireless sensor networks201112261562110.1109/TITS.2010.2096467LamW. H. K.WongS. C.LoH. K.Emerging theories in traffic and transportation; and emerging methods for transportation planning and operations2011192169171EmmanuelL. N.AntonioR. T.ErnestoL. M.A modeling framework for urban traffic systems microscopic simulation201018811451161LavalJ. A.jorge.laval@ce.gatech.eduHysteresis in traffic flow revisited: an improved measurement method201145238539110.1016/j.trb.2010.07.006HeydeckerB. G.AddisonJ. D.Analysis and modelling of traffic flow under variable speed limits2011192206217SantoroP.psantoro@fing.edu.uyFernándezM.mfernand@fing.edu.uyFossatiM.mfossati@fing.edu.uyCazesG.TerraR.Piedra-CuevaI.ismaelp@fing.edu.uyPre-operational forecasting of sea level height for the Río de la Plata20113552264227810.1016/j.apm.2010.11.065SheD.shedunxian@sina.comYangX.xiaohuayang@bnu.edu.cnA new adaptive local linear prediction method and its application in hydrological time series201020101520543810.1155/2010/205438MuniandyS. V.LimS. C.MuruganR.Inhomogeneous scaling behaviors in Malaysian foreign currency exchange rates20013011–44074282-s2.0-003557581210.1016/S0378-4371(01)00387-9SamorodnitskyG.TaqquM. S.1994New York, NY, USAChapman and HallStarobinskiD.staro@bu.eduKarpovskyM.markkar@bu.eduZakrevskiL. A.zakr@adm.njit.eduApplication of network calculus to general topologies using turn-prohibition200311341142110.1109/TNET.2003.813040LiM.WangS.ZhaoW.A real-time and reliable approach to detecting traffic variations at abnormally high and low rates200641585415502-s2.0-33750044557DudleyR. M 2002Cambridge University PressBartleR. G.SherbertD. R.20003rdJohn Wiley & SonsTrenchW. F.2003Pearson EducationBoxG. E. P.JenkinsG. M.ReinselG. C.1994Prentice HallMitraS. K.KaiserJ. F.1993John Wiley & Sons1312604PapoulisA.1962McGraw-HillHarrisC. M.19954thMcGraw-HillMikusinskiJ.1959Pergamon PressFullerW. A.19962ndWileyBendatJ. S.PiersolA. G.20003rdJohn Wiley & SonsBracewellR. N.19782ndNew York, NY, USAMcGraw-HillHuangX.QiuP. H.Blind deconvolution for jump-preserving curve estimation2010201093508492-s2.0-7795251862310.1155/2010/350849AbutalebA. S.ataleb@mcit.gov.egElhamyN. M.norhesham98@yahoo.comWaheedM. E. S.mewaheed@yahoo.comBlind deconvolution of the aortic pressure waveform using the malliavin calculus201020102710258110.1155/2010/102581RhoadsR. L.EkstromM. P.Removal of interfering system distortion by deconvolution1968174333337TodoeschuckJ. P.JensenO. G.Scaling geology and seismic deconvolution19891311-22732872-s2.0-002457082510.1007/BF00874491MoreauS.PlantierG.ValièreJ. C.BaillietH.SimonL.Estimation of power spectral density from laser Doppler data via linear interpolation and deconvolution 20115011791882-s2.0-7795334700310.1007/s00348-010-0905-1KornG. A.KornT. M.1961McGraw-HillZhangH. R.1978ChinaPeople's Education PressRileyK. F.HobsonM. P.BenceS. J.2006Cambridge PressBronshteinI. N.SemendyayevK. A.MusiolG.MuehligH.2007SpringerStillwellJ.20103rdSpringerSmithD. C.An introduction to distribution theory for signals analysis—part 2. The convolution20061644194442-s2.0-3374539603810.1016/j.dsp.2005.10.004LighthillJ.1958Cambridge University PressKanwalR. P.20043rdBirkhauserGelfandI. M.VilenkinK.19641New York, NY, USAAcademic PressAleksandroA. D.19523USSR Academy of SciencesIstratescuV. I.1981New York, NY, USAMarcel DekkerLiM.ZhaoW.Sufficient condition for min-plus deconvolution to be closed in the service-curve set in computer networks200713163166