<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article  PUBLIC "-//NLM//DTD Journal Publishing DTD v3.0 20080202//EN" "http://dtd.nlm.nih.gov/publishing/3.0/journalpublishing3.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="3.0" xml:lang="en" article-type="research article"><front><journal-meta><journal-id journal-id-type="publisher-id">AJOR</journal-id><journal-title-group><journal-title>American Journal of Operations Research</journal-title></journal-title-group><issn pub-type="epub">2160-8830</issn><publisher><publisher-name>Scientific Research Publishing</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.4236/ajor.2013.31A008</article-id><article-id pub-id-type="publisher-id">AJOR-27533</article-id><article-categories><subj-group subj-group-type="heading"><subject>Articles</subject></subj-group><subj-group subj-group-type="Discipline-v2"><subject>Physics&amp;Mathematics</subject></subj-group></article-categories><title-group><article-title>
 
 
  Stochastic Design of Enhanced Network Management Architecture and Algorithmic Implementations
 
</article-title></title-group><contrib-group><contrib contrib-type="author" xlink:type="simple"><name name-style="western"><surname>ong-Kyoo</surname><given-names>Kim</given-names></name><xref ref-type="aff" rid="aff1"><sub>1</sub></xref><xref ref-type="corresp" rid="cor1"><sup>*</sup></xref></contrib></contrib-group><aff id="aff1"><label>1</label><addr-line>W. CySip Graduate School of Business, Asian Institute of Management, Makati, Philippines</addr-line></aff><author-notes><corresp id="cor1">* E-mail:<email>SKim@aim.edu</email></corresp></author-notes><pub-date pub-type="epub"><day>30</day><month>01</month><year>2013</year></pub-date><volume>03</volume><issue>01</issue><fpage>87</fpage><lpage>93</lpage><history><date date-type="received"><day>October</day>	<month>2,</month>	<year>2012</year></date><date date-type="rev-recd"><day>November</day>	<month>5,</month>	<year>2012</year>	</date><date date-type="accepted"><day>November</day>	<month>16,</month>	<year>2012</year></date></history><permissions><copyright-statement>&#169; Copyright  2014 by authors and Scientific Research Publishing Inc. </copyright-statement><copyright-year>2014</copyright-year><license><license-p>This work is licensed under the Creative Commons Attribution International License (CC BY). http://creativecommons.org/licenses/by/4.0/</license-p></license></permissions><abstract><p>
 
 
   The paper is focused on available server management in Internet connected network environments. The local backup servers are hooked up by LAN and replace broken main server immediately and several different types of backup servers are also considered. The remote backup servers are hooked up by VPN (Virtual Private Network) with high-speed optical network. A Virtual Private Network (VPN) is a way to use a public network infrastructure and hooks up long-distance servers within a single network infrastructure. The remote backup servers also replace broken main severs immediately under the different conditions with local backups. When the system performs a mandatory routine maintenance of main and local backup servers, auxiliary servers from other location are being used for backups during idle periods. Analytically tractable results are obtained by using several mathematical techniques and the results are demonstrated in the framework of optimized networked server allocation problems. The operational workflow give the guidelines for the actual implementations.  
    
 
</p></abstract><kwd-group><kwd>Stochastic Network Management; N-policy; Closed Queue; Algorithmic Implementation; Stochastic Optimization</kwd></kwd-group></article-meta></front><body><sec id="s1"><title>1. Introduction</title><p>In light of the recent acts of terrorism and cyberterrorism, it becomes imperative not only to provide a network security (that has never been a full-proof), but to offer a paradigm of a “network security system” which can be applied to networking for the business continuity such as stock market, postal offices, nuclear power plants, and government offices. Availability [<xref ref-type="bibr" rid="scirp.27533-ref1">1</xref>] of networked servers is a major issue in security respects because of rapid growth of Internet. The paper is focused on enhancement of network availability to support more reliable services. Two types of backup servers are considered. Local backup servers are located in same area and hooked up via LAN (Local Area Network) and he remote backup servers are geometrically separated with main servers but remote backups are hooked up by a Virtual Private Network (VPN) with high-speed optical Internet. A VPN is networking between remote servers and clients via using a public telecommunication infrastructure with secure access to their organization’s network. Unlike an expensive system of owned or leased lines, a VPN can provide the organization with the same capabilities, but at a much lower cost. The <img src="2-1040167\0fd115bb-188e-480e-ba17-b9cec09aa53c.jpg" /> main working servers with the <img src="2-1040167\b851ea0f-39e3-4c44-9ea3-0f230b593f2e.jpg" /> local backups and <img src="2-1040167\fd79599a-78ab-4ac2-82a1-bcb9577788e5.jpg" /> remote backup servers are geometrically separated with main servers.</p><p>The remote (backup) servers are hooked up by a Virtual Private Network (VPN) and can be used during the maintenance of internal backup servers or absence of the repair facility (see <xref ref-type="fig" rid="fig1">Figure 1</xref>). The number of the remote backups has the control level <img src="2-1040167\6b144060-cabb-4fb9-ba2f-6f996ffb0a49.jpg" /> within the total number <img src="2-1040167\1d7dfa84-74e9-49f5-b004-c01841af84ce.jpg" /> of remote backups. Unlike previous research from author [<xref ref-type="bibr" rid="scirp.27533-ref2">2</xref>], N-policy is applied to restrict the quantity of external resources. A VPN is networking between remote servers and client via using either a public telecommunication infrastructure such as Internet with secure access to private network and secured network such as military system.</p><p>In this article we study a class of closed queueing systems with the initial quantity of <img src="2-1040167\b7e31752-439f-4e1d-b730-2b85ebb0deb2.jpg" /> main unreliable machines, <img src="2-1040167\11b9d4cd-9c5e-4f86-aed2-804f4d0835a4.jpg" />reserve machines and <img src="2-1040167\d0abfd0c-1a4f-42b9-babf-43156e15fb4f.jpg" /> auxiliary reserve machines, also called “super-reserve” machines [3-4]. Main working machines are subject to “exponential failures” and their repairs are rendered (in the FIFO order) by a single repair facility (referred to as the repairman) with generally distributed repair times or replacement times to exchange as new machines. As soon as a main working machine breaks down, it is immediately replaced by a reserve machine if available. The total quantity of working machines must not exceed<img src="2-1040167\26715b96-68d5-4d38-b1c7-61f81a462d63.jpg" />. Occasionally, the group of reserve machines is blocked for the sake of some routine maintenance, and during this</p><p>period of time, super-reserve machines take over the duties of reserve machines. The super-reserve facility is “activated” whenever the main and reserve facilities combined are restored to its original quantity<img src="2-1040167\a717c92a-8ac3-4215-ae40-7c2a0b219a8b.jpg" />, and then the system “regenerates”. While all main machines keep on working, in the event of failures, the system turns to super-reserve facility, and the repairman is unavailable.</p><p>Defective machines are replaced by auxiliary reserve machines whose total number is<img src="2-1040167\356bdd47-8cb2-46f8-9efc-c3e50f6d7d73.jpg" />. However, the system tries not exhaust this quantity and sets up a smaller control number<img src="2-1040167\2270df1c-459c-46d6-acad-5ff9d8d78c31.jpg" />. During this period of time, the system is observed only upon some random epochs of time, while dropped machines line up in the “waiting room”. If at one of these observation epochs, the number of defective machines reaches or exceeds <img src="2-1040167\22f25839-032b-4e5c-a5e2-355b20789846.jpg" /> (after some delay), the repairman returns to his duties, a busy period begins, and thereby the busy cycle continues. This is a more realistic scenario of a reliability system that functions under restricted observations, at least during its maintenance periods. The scenario can be directly applied for network management. The control integer variable <img src="2-1040167\50229ce9-5cf0-4737-9da9-635ee736355e.jpg" /> (less than or equal to<img src="2-1040167\6a10a224-c111-4427-9928-d0bf585bbe94.jpg" />), whose value, among other parameters, is determined in the framework of a comprehensive optimization. Operational workflow gives the implementation guidelines for network management based on the mathematical results. The mathematical values are the initial conditions for network management operations and the detailed workflow will be explained in this paper.</p></sec><sec id="s2"><title>2. Mathematical Design for Enhance Network Architecture</title><p>The Duality Principle [<xref ref-type="bibr" rid="scirp.27533-ref5">5</xref>] is applied and it includes another reliability model, which is more simple than the main model (i.e., Model 1) and to which we will refer as to Model 2. Model 2 is similar to Model 1, except that it does not have the super-reserve facility and idle periods. Besides, the total number of reserve machines is <img src="2-1040167\15d90746-1fe2-4661-aae3-bd6ba00f2bbe.jpg" /> (i.e. less by one than in Model 1. We rather associate it with repairman’s vacations, which are distributed as regular repairs. However, upon his return, the repairman brings a brand new machine, which replaces any one that breaks down during his vacation trip if any such available. Otherwise, the new machine he brings in substitutes any other machine and in both cases the old machine is disposed. Model 2 is directly connected with yet another model, which we will call Model 3. Model 3 is a multichannel queueing system, with buffer of capacity<img src="2-1040167\e99ca3d3-c566-4c50-80f5-468140d2e865.jpg" />, and state dependent arrival process, in notation,<img src="2-1040167\a80a6b5f-5fb5-413e-94a5-59abc6515de5.jpg" />.</p><p>Let <img src="2-1040167\57ca5f5e-bb27-430e-808e-ffad4317c487.jpg" /> be the successive moments of repair<img src="2-1040167\d192fa14-b3f1-4428-bb3e-609d32ae38b3.jpg" />completions and let<img src="2-1040167\dcccf0ce-c3d3-4c3f-be51-4bb3b093fb9d.jpg" />. be the successive repair durations all during a busy period. (For brevity of notation, we use<img src="2-1040167\9e3383ca-0aa6-4a5b-8d35-ec50c0493327.jpg" />. as generic random variables for every busy period.) The random variables <img src="2-1040167\e0e374de-bc29-4dce-9439-cdf442f2f062.jpg" /> are iid with a common probability distribution function [<xref ref-type="bibr" rid="scirp.27533-ref6">6</xref>]</p><disp-formula id="scirp.27533-formula48329"><label>(2.1)</label><graphic position="anchor" xlink:href="2-1040167\3877226c-63de-46d7-9721-0a04c1cb586f.jpg"  xlink:type="simple"/></disp-formula><p>and mean<img src="2-1040167\54ce76e8-a283-4f42-a996-c4439defbb0b.jpg" />. Each of the main machines breaks down independently of each other and of repairs, and according to the exponential distribution with parameter<img src="2-1040167\c6649d82-8a7e-4247-8c3b-05f107445932.jpg" />. Notice that <img src="2-1040167\8e851758-dac5-4c53-8a9b-6e92d7c9b3c2.jpg" /> need not equal<img src="2-1040167\1f226204-45d1-471e-9010-6226a811b07f.jpg" />, unless the corresponding repair belongs to a busy period. The prebusy period is included in the busy period; the reason for distinguishing this time from the rest of the busy period is for the descriptional convenience and for below arguments regarding the duality principle. We interpret the entire prebusy period as a part of state dependent service with the first service initiating a busy period distributed as the convolution</p><disp-formula id="scirp.27533-formula48330"><label>(2.2)</label><graphic position="anchor" xlink:href="2-1040167\2192fc6f-24d9-4c70-a651-a1a4b4437d6c.jpg"  xlink:type="simple"/></disp-formula><p>where <img src="2-1040167\0efcabc9-0885-47ef-8c8a-ae354d31db72.jpg" /> denotes the PDF of the random variable<img src="2-1040167\9c769392-db37-4213-bffb-2e1cc4df4a23.jpg" />. If at time <img src="2-1040167\cfd08647-7a84-46d5-8ef6-e702a117e155.jpg" /> (immediately after the <img src="2-1040167\f92ca7b3-a32f-4fa9-9273-8282c4610d9a.jpg" />th repair completion), the total quantity of intact (i.e. main working and reserve machines) is less than<img src="2-1040167\3f3407c6-a519-4551-adc9-4cf6257d5848.jpg" />, the busy period goes on.</p><p>Model 3 describes the number of customers in a <img src="2-1040167\7f0f4add-5e57-4bce-a81d-809d9f855a05.jpg" /> queueing system with state dependent arrival stream. More specifically, it is like a multichannel queue <img src="2-1040167\87b580e6-0057-4dff-b313-e62e01434e79.jpg" /> (of Takacs [<xref ref-type="bibr" rid="scirp.27533-ref7">7</xref>]), except for the input is not a “general independent”, but it “varies” dependent on the queue length. If upon any arrival, the total number of customers (including those in service) are less than<img src="2-1040167\cb9dd679-dcbf-4e6b-8f96-558adb6d0519.jpg" />, the PDF of the next inter-arrival time is<img src="2-1040167\dd5f5377-6c09-4ea0-a32a-468ac75121f9.jpg" />. Otherwise, the customers gets lost and the next inter-arrival time is distributed as <img src="2-1040167\5c910b5a-cc28-4ddb-a258-273dbb0efe4a.jpg" /> of (2.2). While Models 2 and 3 seem to be identical, we call them stochastically congruent.</p><p>Let <img src="2-1040167\003ca4dd-951c-45cd-984b-7baa44fbfc86.jpg" /> be the limiting probabilities of the process <img src="2-1040167\4ba24eae-e998-48e0-a766-25d8b41da3da.jpg" />These probabilities exist under the same conditions as those for the embedded process [<xref ref-type="bibr" rid="scirp.27533-ref2">2</xref>].</p><disp-formula id="scirp.27533-formula48331"><label>(2.3)</label><graphic position="anchor" xlink:href="2-1040167\aa4ae3ab-422b-45a9-bd05-132bfdfbd55e.jpg"  xlink:type="simple"/></disp-formula><p>and</p><disp-formula id="scirp.27533-formula48332"><label>(2.4)</label><graphic position="anchor" xlink:href="2-1040167\bbb5b3ca-f6cd-4c73-a2d1-1182f78b7209.jpg"  xlink:type="simple"/></disp-formula><p>where</p><p><img src="2-1040167\884b9236-845f-40f0-95e2-e96f8d8a8f19.jpg" /></p><p>and</p><p><img src="2-1040167\5a2ca44b-4cbe-43a0-b226-133c0211ee50.jpg" /></p><p>And <img src="2-1040167\e07271bf-155a-4be6-aa92-1d7ffa6ede56.jpg" /> is subject to our further consideration.</p><p>In the other hand, this model is controlled by the socalled “first excess level process” from fluctuation theory. This is a marked three-variate point renewal process with all dependent components. This process by itself can be applied the practical applications such as router design 8. The process will be “terminated” at some of the random observation times when one of its “active” components crosses<img src="2-1040167\79bdd79c-c072-4aff-8f3d-a52454fa6ac4.jpg" />, and because its value can be of any magnitude with positive probability, the first excess level will be curtailed to its maximal number <img src="2-1040167\360b1d92-a622-46fd-b498-ae5669c73e0f.jpg" /> should it formally exceed<img src="2-1040167\55d35c94-bed7-4531-a7e5-5ecb5bba5547.jpg" />. The vacation period ends and the repairman resumes his usual duty. The period of time from <img src="2-1040167\a61c6ce1-5d85-4b10-bce9-4133c0d3e20b.jpg" /> until <img src="2-1040167\eefe0a3f-e85a-45b7-9910-86fae4621ecb.jpg" /> may or may not include a vacation period and we therefore call it the <img src="2-1040167\1aa9dff8-4ca3-42d6-8c4f-ede51ab38229.jpg" />th service cycle. During repairman’s vacation period, all <img src="2-1040167\8e1bce5a-acbf-47bf-8b98-45e5363de588.jpg" /> reserve machines are blocked and the main working facility is backed up by super-reserve machines, which the system “borrows” from a source limited to <img src="2-1040167\f94b9770-005c-490c-9dd4-f69820fa4b9a.jpg" /> units. While all <img src="2-1040167\40fda396-ff38-44c6-8271-62ae33ef62b0.jpg" /> of them are available, the system attempts to utilize not all superreserve machines. Namely, it sets up a threshold<img src="2-1040167\17e82b2b-41f5-4527-b0ed-a28f881e2f64.jpg" />, a specific reference number (to be optimized), the system tries not to exceed.</p><p>It is assumed that from the beginning of a vacation period, the status of the system is observed upon some random epochs of time. To simplify notation and without loss of generality we will formalize this process on the first service cycle. Suppose that at<img src="2-1040167\d7b802d8-6e6e-47ef-8173-b1d07618b82a.jpg" />, when all of <img src="2-1040167\e295a114-8fef-46d4-8e2b-18a6b7f4857d.jpg" /> machines become intact, the repairman leaves the main reserve facility, and the system is observed upon the times<img src="2-1040167\81232849-c010-463f-aeef-c8240bf4108c.jpg" />. We will begin with <img src="2-1040167\11c09042-f144-4d52-b141-028ca12cd1a3.jpg" /> which is the average period of using the super-reserve machines. Let us assume that the random variables <img src="2-1040167\5d0baad3-92ff-466b-9927-b528171a529a.jpg" />are exponentially distributed, with common mean<img src="2-1040167\98d391ed-28aa-400d-8e63-31a5dd2345fc.jpg" />. By the theorem by author [3-4], we have</p><p><img src="2-1040167\1a310649-f3cc-40e1-b655-2cd608ed0283.jpg" /></p><p>Now, we turn to <img src="2-1040167\3f573c26-32bb-40ff-8447-4c2df17aa862.jpg" /> that is the average number of super-reserve machine usage:</p><p><img src="2-1040167\f278f4fb-758c-441d-9232-0fb932812bf7.jpg" /></p><p>where <img src="2-1040167\dbef1e44-1c64-43fe-9f1b-18b376f55018.jpg" /> is the average repair time for single machine. Since<img src="2-1040167\618fe8f0-2b30-4f9e-9e7f-680916fe0151.jpg" />, we get</p><p><img src="2-1040167\f4f4983a-6865-400b-a7f2-41a1e996e060.jpg" /></p><p>where</p><p><img src="2-1040167\88aafc95-cbac-46eb-84d6-f4c6a369601f.jpg" /></p><p>Model 3, as mentioned, is the <img src="2-1040167\01bca359-6dcf-4a23-99d5-3ae2e33551db.jpg" /> (multi-channel) queue with state dependent arrivals, <img src="2-1040167\39bfea5c-6b82-43db-a78a-d74efb3c94cd.jpg" />parallel channels, and a buffer or waiting room of capacity <img src="2-1040167\a3022c6d-0e19-4737-a3e1-7df6a869cb49.jpg" /> [<xref ref-type="bibr" rid="scirp.27533-ref7">7</xref>]. A customer enters a free channel available with his service demand distributed exponentially with parameter<img src="2-1040167\6c80e42a-d1f2-4d66-81ff-729da367f999.jpg" />. Model 2, as we see it, is congruent to Model 3, while Model 1 is dual with Model 2 (See Dshalalow [<xref ref-type="bibr" rid="scirp.27533-ref5">5</xref>] and Kim [<xref ref-type="bibr" rid="scirp.27533-ref4">4</xref>]<img src="2-1040167\aa3066c6-ee49-4645-9a19-3377696a58d3.jpg" />. The stationary probabilities <img src="2-1040167\f67aa918-c6bc-447f-b38b-c7b1cb777d3c.jpg" /> for the embedded process are known to satisfy the following formulas<img src="2-1040167\94eeb20e-1d84-4aeb-a41d-782f9e863ea6.jpg" /></p><p><img src="2-1040167\53e6cd25-5bb3-4410-83eb-d0b7c1eadc16.jpg" /></p><p>where</p><disp-formula id="scirp.27533-formula48333"><label>(2.7)</label><graphic position="anchor" xlink:href="2-1040167\10ada0be-cc04-4d98-87d6-cfc29f881526.jpg"  xlink:type="simple"/></disp-formula><p><img src="2-1040167\ad0f1a3b-6a59-4428-b02f-5e07a70cb28f.jpg" /></p><p><img src="2-1040167\fc911e46-cd1b-42e2-bd47-3a193d7ee213.jpg" /></p><p>and <img src="2-1040167\9ef92d1f-1dd7-4a9a-83bb-f3218053095c.jpg" /> of (4.1) is the generating function, convergent in the open disc centered at zero. By using the Kolmogorov differential equation and the semi-regenerative techniques [2-4,8-9], this system has been solved by Dshalalow [<xref ref-type="bibr" rid="scirp.27533-ref6">6</xref>]. The limiting distribution <img src="2-1040167\580ca9a6-8eb7-4b99-a48a-e2e0bb38a739.jpg" /> is:</p><disp-formula id="scirp.27533-formula48334"><label>(2.8)</label><graphic position="anchor" xlink:href="2-1040167\94dc31e9-29f1-4b59-8924-8a973d2db0a3.jpg"  xlink:type="simple"/></disp-formula><p>where</p><p><img src="2-1040167\df138aeb-58f6-42b9-aa3a-a29d9e5bd365.jpg" /></p><p>For the process <img src="2-1040167\83384f2e-cd6e-494d-b913-dcde767640ed.jpg" />the corresponding formulas yield</p><disp-formula id="scirp.27533-formula48335"><label>(2.9)</label><graphic position="anchor" xlink:href="2-1040167\83c54632-425c-48b7-9951-f68239fa1769.jpg"  xlink:type="simple"/></disp-formula><disp-formula id="scirp.27533-formula48336"><label>(2.10)</label><graphic position="anchor" xlink:href="2-1040167\e4494eeb-a9db-4ba2-a9f9-7051912e87a8.jpg"  xlink:type="simple"/></disp-formula><p>along with (2.8).</p></sec><sec id="s3"><title>3. Networked Server with Controlled Backup Optimization</title><p>The stochastic optimization techniques are used for the sample illustration of the optimization and the stochastic optimization techniques by itself can be applied to realworld problems such as computer-networking, human resources and manufacturing process. Let a strategy, say<img src="2-1040167\6c2b5221-9567-4079-9fd6-a626ebf9a6fa.jpg" />, specify, ahead of the time, a set of acts we impose on the system and the system can be subject to a set <img src="2-1040167\fa89f733-fa00-4866-a46f-be40991980b9.jpg" /> of cost functions. The general formula of stochastic optimization is [2-4]:</p><disp-formula id="scirp.27533-formula48337"><label>(3.1)</label><graphic position="anchor" xlink:href="2-1040167\4b7486f1-7462-4be5-a00a-2f11eddbca77.jpg"  xlink:type="simple"/></disp-formula><p>Now we turn to convergence theorems for semiregenerative, semi-Markov, and Markov renewal processes [<xref ref-type="bibr" rid="scirp.27533-ref10">10</xref>],</p><p><img src="2-1040167\236be4b6-9bda-4867-bf80-0a3f77bac21b.jpg" /></p><p>to arrive at the objective function <img src="2-1040167\fcaf2e12-0560-475b-aec5-5b1b7b1f7570.jpg" />which gives the total expected rate of all processes over an infinite horizon. As a reasonable performance measure, let us consider the reliability factor<img src="2-1040167\9778b438-80db-4664-9408-18897a843aae.jpg" />, which represents the probability of the number of intact machines at any moment of time in equilibrium:</p><disp-formula id="scirp.27533-formula48338"><label>(3.2)</label><graphic position="anchor" xlink:href="2-1040167\dcccbd3c-0a3c-4de7-81e8-24e99d5caa7c.jpg"  xlink:type="simple"/></disp-formula><p>This is not only a reliability measure of the system, but it can also serve as a constraint to an optimally functioning the system. We arrive at the following expression for the sample objective function [<xref ref-type="bibr" rid="scirp.27533-ref2">2</xref>]:</p><disp-formula id="scirp.27533-formula48339"><label>(3.3)</label><graphic position="anchor" xlink:href="2-1040167\df8ac60a-cee6-4e9e-8ba0-de5b8ce32813.jpg"  xlink:type="simple"/></disp-formula><p>Take the total number of main networked servers as 2 and the total number of local backups is<img src="2-1040167\b0c29713-dc93-4de9-aed6-927e528cb2c8.jpg" />. We are setting up the maximal availability of remote backup servers to 15. Hence, <img src="2-1040167\afe0f574-090d-4309-abaa-ae77e0eb8a9e.jpg" />and<img src="2-1040167\a23817c6-e42d-4afb-9116-ca9b4f7503f5.jpg" />.</p><p>Now, we calculate <img src="2-1040167\2aa234be-5229-4077-aabc-9e21ef27efee.jpg" /> and <img src="2-1040167\af800c77-cb77-4828-8140-2b8833e9a7da.jpg" /> that gives a minimum for<img src="2-1040167\bc18af36-38dd-4e60-ab5c-94a06da98f92.jpg" />. In other words, the control level <img src="2-1040167\5cc2831b-1e70-4988-bf51-29f1d4d98bc1.jpg" /> stands for the excess level of remote backup which minimizes the total cost of this system. Below is a plot of <img src="2-1040167\79757708-4987-49f7-bf12-ad7fc88d6ddf.jpg" /> for<img src="2-1040167\a3a5a1af-49a4-4b62-8655-32f4050c3772.jpg" />.</p><p>Our calculation yields that <img src="2-1040167\18f931a5-59aa-4748-904c-a52959d88e75.jpg" /> for which the minimal cost equals 15.6445. It means that we allocate our internal resources to 2 main<img src="2-1040167\0a5818e4-52c8-4576-8d28-87bab132c466.jpg" />and 4 internal <img src="2-1040167\b0b4200b-6ccd-412e-afc4-7dc74f19f9c7.jpg" /> networked servers and obtain the threshold value <img src="2-1040167\1add1d00-73e1-4e64-b296-704205a6e0e8.jpg" /> which gives us the decision point that is the number of remote backups which we need from external resources to minimize the cost of the backup system. Using the above example of our model, we arrive at the reliability factor is<img src="2-1040167\c8668084-13f9-48c4-a7fe-52004dbee67b.jpg" />. It tells us that the likelihood of having at least <img src="2-1040167\e6847967-8aaa-458b-8c12-ff92035182f6.jpg" /> intact main networked server is 0.2607.</p></sec><sec id="s4"><title>4. Algorithmic Implementations for the Enhanced Network Architecture</title><p>The network architecture that has mentioned in the previous is the mathematical and theoretical approach to analyze the stochastic model. The operational method is the guideline for actual implementation. The workflow of operating the enhance network management can be easily adapted for software programming and simulation. All of the mathematical results from the previous sections are applied into the operational method as the initial conditions. The variables need to be defined for using the results from the mathematical model. Number of iteration, number of main and backup servers, the status of the repair facility are some of key factors for implementation. The variables for operations of enhanced network management are as follow:</p><p><img src="2-1040167\7224f8da-11cd-42f8-b319-b80eaf188608.jpg" />number of iterations</p><p><img src="2-1040167\7c462763-8d49-445f-9601-fb3138b65354.jpg" />number of main servers at iteration <img src="2-1040167\0332ddec-cf59-4aad-8d08-7459c7f38cda.jpg" /></p><p><img src="2-1040167\e761107d-223d-4ad4-9cb7-a86abbbf7444.jpg" />number of local backup servers at iteration <img src="2-1040167\0c6c2521-01db-49ca-8da2-1ee5ae331c0a.jpg" /></p><p><img src="2-1040167\e1e81fa5-1cca-4023-9460-d876a4b6c553.jpg" />number of remote backup servers at iteration <img src="2-1040167\c3bc9192-4e22-43c6-8341-29a7487188ee.jpg" /></p><p><img src="2-1040167\7dd5a1d9-b40e-4f62-b271-73d72d7f2930.jpg" /></p><p><img src="2-1040167\a63a850f-fcf1-4e85-9f97-ad028e5c3478.jpg" />control level of remote backup servers</p><p><img src="2-1040167\8da3493d-c8cc-45a3-b623-aaef4c55109a.jpg" />counting number of remote backup usage</p><p><img src="2-1040167\3e819f90-01e6-4173-bf32-e8bee1e3fb1b.jpg" />number of servers that have been fixed within Iterations</p><p><img src="2-1040167\922702b8-6d67-4696-a4b5-268668aa3b19.jpg" /></p><p>The values in the mathematical model are applied as the initial conditions in the operational workflow but the notations are different. The delta of notations between mathematical model and operational method is shown in <xref ref-type="table" rid="table1">Table 1</xref>.</p><p>The operational workflow can be presented after defining the initial condition (see <xref ref-type="fig" rid="fig2">Figure 2</xref>) The workflow is the depiction of a sequence of operations for enhanced network management that is focused on service availability.</p><p>If the operations is applied in the example case in Section 3, the actual values of the initial condition are given:</p><p><img src="2-1040167\5b6205fc-2948-4b70-ad57-474b493ce046.jpg" /></p><p>based on the delta list (see <xref ref-type="table" rid="table1">Table 1</xref>) The network management based on above operation workflow gives the optimal performance in server availability perspective.</p></sec><sec id="s5"><title>5. Conclusion</title><p>In this article theoretical approaches of the network defense model is presented. Unlike simulated model, we can find the explicit formulas that is the key elements of the complex model. In addition, this model can be also applied various real-world applications such as network system design 8 and software architecture [<xref ref-type="bibr" rid="scirp.27533-ref11">11</xref>]. Analytically tractable results are obtained by using a duality principle</p><p><xref ref-type="table" rid="table1">Table 1</xref>. Delta list of the initial condition.</p><p>(which enables us to treat a more rudimentary system), semi-regenerative analysis, and the theory of fluctuations of multivariate marked renewal processes. The results are applied in the framework of optimization problems.</p></sec><sec id="s6"><title>REFERENCES</title></sec></body><back><ref-list><title>References</title><ref id="scirp.27533-ref1"><label>1</label><mixed-citation publication-type="other" xlink:type="simple">D. Russell and G. T. Ganemi Sr., “Computer Security Basics,” O’ Reilly and Asso. Inc., Sebastopol, 2006.</mixed-citation></ref><ref id="scirp.27533-ref2"><label>2</label><mixed-citation publication-type="other" xlink:type="simple">S.-K. Kim, “Enhanced Networked Server mgt. with Random Remote Backups,” Proceedings of SPIE 5244, Orlando, 7 September 2003, pp. 106-114.  
doi:10.1117/12.511412</mixed-citation></ref><ref id="scirp.27533-ref3"><label>3</label><mixed-citation publication-type="other" xlink:type="simple">S.-K. Kim, “Enhanced Management Method of Storage Area Network (SAN) Server with Random Remote Backups,” Mathematical and Computer Modelling, Vol. 42, No. 9-10, 2005, pp. 947-958.  
doi:10.1016/j.mcm.2005.06.006</mixed-citation></ref><ref id="scirp.27533-ref4"><label>4</label><mixed-citation publication-type="other" xlink:type="simple">S.-K. Kim, “Enhanced Stochastic Methodology for Combined Architecture of e-Commerce and Security Networks,” Mathematical Problems in Engineering, 2009, Vol. 2009, 2009, Article ID: 691680.</mixed-citation></ref><ref id="scirp.27533-ref5"><label>5</label><mixed-citation publication-type="other" xlink:type="simple">J. H. Dshalalow, “On a Duality Principle in Processes of Servicing Machines with Double Control,” Journal of Applied Mathematics, Vo. 1, No. 3, 1988, pp. 245-251.</mixed-citation></ref><ref id="scirp.27533-ref6"><label>6</label><mixed-citation publication-type="other" xlink:type="simple">J. H. Dshalalow, “Queueing Systems with State Dependent Parameters,” In: J. H. Dshalalow, Ed., Frontiers in Queueing, CRC Press, Boca Raton, 1997, pp. 61-116.</mixed-citation></ref><ref id="scirp.27533-ref7"><label>7</label><mixed-citation publication-type="other" xlink:type="simple">L. Takacs, “Some Probability Questions in the Theory of Telephone Traffic,” Magyar Tudomanyos Akademia. Matematikai es Fizikai Osztaly Kozleményei, Vol. 8, 1958, pp. 155-175.</mixed-citation></ref><ref id="scirp.27533-ref8"><label>8</label><mixed-citation publication-type="other" xlink:type="simple">S.-K. Kim, “Design of Stochastic Hitless-Prediction Router by Using the First Exceed Level Theory,” Mathematical Methods in the Applied Sciences, Vol. 28, No. 12, 2005, pp. 1481-1490. doi:10.1002/mma.626</mixed-citation></ref><ref id="scirp.27533-ref9"><label>9</label><mixed-citation publication-type="other" xlink:type="simple">J. H. Dshalalow, “On the Multiserver Queue with Finite Waiting Room and Controlled Input,” Advanced Applied Probability, Vol. 17, No. 2, 1985, pp. 408-423.  
doi:10.2307/1427148</mixed-citation></ref><ref id="scirp.27533-ref10"><label>10</label><mixed-citation publication-type="other" xlink:type="simple">E. Cinlar, “Introduction to Stochastic Processes,” Prentice Hall, Englewood Cliffs, 1975.</mixed-citation></ref><ref id="scirp.27533-ref11"><label>11</label><mixed-citation publication-type="other" xlink:type="simple">S.-K. Kim, “Design of Enhanced Software Protection Architecutre by Using Theory of Inventive Problem Solving,” IEEE Proceedings of IEEM, Hong Kong, 8-11 December 2009, pp. 978-982.</mixed-citation></ref></ref-list></back></article>