_{1}

^{*}

The paper is focused on available server management in Internet connected network environments. The local backup servers are hooked up by LAN and replace broken main server immediately and several different types of backup servers are also considered. The remote backup servers are hooked up by VPN (Virtual Private Network) with high-speed optical network. A Virtual Private Network (VPN) is a way to use a public network infrastructure and hooks up long-distance servers within a single network infrastructure. The remote backup servers also replace broken main severs immediately under the different conditions with local backups. When the system performs a mandatory routine maintenance of main and local backup servers, auxiliary servers from other location are being used for backups during idle periods. Analytically tractable results are obtained by using several mathematical techniques and the results are demonstrated in the framework of optimized networked server allocation problems. The operational workflow give the guidelines for the actual implementations.

In light of the recent acts of terrorism and cyberterrorism, it becomes imperative not only to provide a network security (that has never been a full-proof), but to offer a paradigm of a “network security system” which can be applied to networking for the business continuity such as stock market, postal offices, nuclear power plants, and government offices. Availability [

The remote (backup) servers are hooked up by a Virtual Private Network (VPN) and can be used during the maintenance of internal backup servers or absence of the repair facility (see

In this article we study a class of closed queueing systems with the initial quantity of main unreliable machines, reserve machines and auxiliary reserve machines, also called “super-reserve” machines [3-4]. Main working machines are subject to “exponential failures” and their repairs are rendered (in the FIFO order) by a single repair facility (referred to as the repairman) with generally distributed repair times or replacement times to exchange as new machines. As soon as a main working machine breaks down, it is immediately replaced by a reserve machine if available. The total quantity of working machines must not exceed. Occasionally, the group of reserve machines is blocked for the sake of some routine maintenance, and during this

period of time, super-reserve machines take over the duties of reserve machines. The super-reserve facility is “activated” whenever the main and reserve facilities combined are restored to its original quantity, and then the system “regenerates”. While all main machines keep on working, in the event of failures, the system turns to super-reserve facility, and the repairman is unavailable.

Defective machines are replaced by auxiliary reserve machines whose total number is. However, the system tries not exhaust this quantity and sets up a smaller control number. During this period of time, the system is observed only upon some random epochs of time, while dropped machines line up in the “waiting room”. If at one of these observation epochs, the number of defective machines reaches or exceeds (after some delay), the repairman returns to his duties, a busy period begins, and thereby the busy cycle continues. This is a more realistic scenario of a reliability system that functions under restricted observations, at least during its maintenance periods. The scenario can be directly applied for network management. The control integer variable (less than or equal to), whose value, among other parameters, is determined in the framework of a comprehensive optimization. Operational workflow gives the implementation guidelines for network management based on the mathematical results. The mathematical values are the initial conditions for network management operations and the detailed workflow will be explained in this paper.

The Duality Principle [

Let be the successive moments of repaircompletions and let. be the successive repair durations all during a busy period. (For brevity of notation, we use. as generic random variables for every busy period.) The random variables are iid with a common probability distribution function [

and mean. Each of the main machines breaks down independently of each other and of repairs, and according to the exponential distribution with parameter. Notice that need not equal, unless the corresponding repair belongs to a busy period. The prebusy period is included in the busy period; the reason for distinguishing this time from the rest of the busy period is for the descriptional convenience and for below arguments regarding the duality principle. We interpret the entire prebusy period as a part of state dependent service with the first service initiating a busy period distributed as the convolution

where denotes the PDF of the random variable. If at time (immediately after the th repair completion), the total quantity of intact (i.e. main working and reserve machines) is less than, the busy period goes on.

Model 3 describes the number of customers in a queueing system with state dependent arrival stream. More specifically, it is like a multichannel queue (of Takacs [

Let be the limiting probabilities of the process These probabilities exist under the same conditions as those for the embedded process [

and

where

and

And is subject to our further consideration.

In the other hand, this model is controlled by the socalled “first excess level process” from fluctuation theory. This is a marked three-variate point renewal process with all dependent components. This process by itself can be applied the practical applications such as router design 8. The process will be “terminated” at some of the random observation times when one of its “active” components crosses, and because its value can be of any magnitude with positive probability, the first excess level will be curtailed to its maximal number should it formally exceed. The vacation period ends and the repairman resumes his usual duty. The period of time from until may or may not include a vacation period and we therefore call it the th service cycle. During repairman’s vacation period, all reserve machines are blocked and the main working facility is backed up by super-reserve machines, which the system “borrows” from a source limited to units. While all of them are available, the system attempts to utilize not all superreserve machines. Namely, it sets up a threshold, a specific reference number (to be optimized), the system tries not to exceed.

It is assumed that from the beginning of a vacation period, the status of the system is observed upon some random epochs of time. To simplify notation and without loss of generality we will formalize this process on the first service cycle. Suppose that at, when all of machines become intact, the repairman leaves the main reserve facility, and the system is observed upon the times. We will begin with which is the average period of using the super-reserve machines. Let us assume that the random variables are exponentially distributed, with common mean. By the theorem by author [3-4], we have

Now, we turn to that is the average number of super-reserve machine usage:

where is the average repair time for single machine. Since, we get

where

Model 3, as mentioned, is the (multi-channel) queue with state dependent arrivals, parallel channels, and a buffer or waiting room of capacity [

where

and of (4.1) is the generating function, convergent in the open disc centered at zero. By using the Kolmogorov differential equation and the semi-regenerative techniques [2-4,8-9], this system has been solved by Dshalalow [

where

For the process the corresponding formulas yield

along with (2.8).

The stochastic optimization techniques are used for the sample illustration of the optimization and the stochastic optimization techniques by itself can be applied to realworld problems such as computer-networking, human resources and manufacturing process. Let a strategy, say, specify, ahead of the time, a set of acts we impose on the system and the system can be subject to a set of cost functions. The general formula of stochastic optimization is [2-4]:

Now we turn to convergence theorems for semiregenerative, semi-Markov, and Markov renewal processes [

to arrive at the objective function which gives the total expected rate of all processes over an infinite horizon. As a reasonable performance measure, let us consider the reliability factor, which represents the probability of the number of intact machines at any moment of time in equilibrium:

This is not only a reliability measure of the system, but it can also serve as a constraint to an optimally functioning the system. We arrive at the following expression for the sample objective function [

Take the total number of main networked servers as 2 and the total number of local backups is. We are setting up the maximal availability of remote backup servers to 15. Hence, and.

Now, we calculate and that gives a minimum for. In other words, the control level stands for the excess level of remote backup which minimizes the total cost of this system. Below is a plot of for.

Our calculation yields that for which the minimal cost equals 15.6445. It means that we allocate our internal resources to 2 mainand 4 internal networked servers and obtain the threshold value which gives us the decision point that is the number of remote backups which we need from external resources to minimize the cost of the backup system. Using the above example of our model, we arrive at the reliability factor is. It tells us that the likelihood of having at least intact main networked server is 0.2607.

The network architecture that has mentioned in the previous is the mathematical and theoretical approach to analyze the stochastic model. The operational method is the guideline for actual implementation. The workflow of operating the enhance network management can be easily adapted for software programming and simulation. All of the mathematical results from the previous sections are applied into the operational method as the initial conditions. The variables need to be defined for using the results from the mathematical model. Number of iteration, number of main and backup servers, the status of the repair facility are some of key factors for implementation. The variables for operations of enhanced network management are as follow:

number of iterations

number of main servers at iteration

number of local backup servers at iteration

number of remote backup servers at iteration

control level of remote backup servers

counting number of remote backup usage

number of servers that have been fixed within Iterations

The values in the mathematical model are applied as the initial conditions in the operational workflow but the notations are different. The delta of notations between mathematical model and operational method is shown in

The operational workflow can be presented after defining the initial condition (see

If the operations is applied in the example case in Section 3, the actual values of the initial condition are given:

based on the delta list (see

In this article theoretical approaches of the network defense model is presented. Unlike simulated model, we can find the explicit formulas that is the key elements of the complex model. In addition, this model can be also applied various real-world applications such as network system design 8 and software architecture [

(which enables us to treat a more rudimentary system), semi-regenerative analysis, and the theory of fluctuations of multivariate marked renewal processes. The results are applied in the framework of optimization problems.