Next Article in Journal
Constructing an Adoption Model of Proactive Environmental Strategy: A Novel Quantitative Method of the Multi-Level Growth Curve Model
Previous Article in Journal
Analytical Solution of Laterally Loaded Free-Head Long Piles in Elasto-Plastic Cohesive Soils
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Stability Analysis of a Double-X Queuing Network Occurring in the Banking Sector

1
School of Economics and Management, Changzhou Institute of Technology, Changzhou 213032, China
2
Department of Mathematics and Statistics, Ho Technical University, Ho Volta Region P.O. Box HP 217, Ghana
3
Faculty of Science, University of Education, Winneba P.O. Box 25, Ghana
4
Department of Mathematics and Statistics, University of Ottawa, Ottawa, ON K1N 6N5, Canada
5
Department of Mathematics and Statistics, School of Applied Sciences and Technology, Cape Coast Technical University, Cape Coast P.O. Box DL 50, Ghana
6
Department of Mathematics, Technical University of Iaşi, Bd. Copou 11A, 700506 Iaşi, Romania
*
Author to whom correspondence should be addressed.
Mathematics 2021, 9(16), 1957; https://doi.org/10.3390/math9161957
Submission received: 7 July 2021 / Revised: 8 August 2021 / Accepted: 11 August 2021 / Published: 16 August 2021

Abstract

:
We model a common teller–customer interaction occurring in the Ghanaian banking sector via a Double-X queuing network consisting of three single servers with infinite-capacity buffers. The servers are assumed to face independent general renewal of customers and independent identically distributed general service times, the inter-arrival and service time distributions being different for each server. Servers, when free, help serve customers waiting in the queues of other servers. By using the fluid limit approach, we find a sufficient stability condition for the system, which involves the arrival and service rates in the form of a set of inequalities. Finally, the model is validated using an illustrative example from a Ghanaian bank.

1. Introduction

The competition resulting from a decade of deregulation in the Ghanaian banking industry is now becoming more intense, due to the regulatory imperatives of worldwide banking and to the customers becoming increasingly aware of their rights [1,2]. On the one hand, bank customers have become increasingly demanding, requiring high quality, low priced and immediate service delivery [3], a key development being the entry of private banks into the market and the expansion of branches of existing banks. On the other hand, banks have found new methods to differentiate their products and services to attract new customers [4].
Queuing theory aims at developing mathematical and numerical models to investigate the formation and congestion of waiting lines when a service is requested, its basic ideas being proposed by A. K. Erlang. In this regard, there is a high probability for one to queue at least once during everyday activities before a service is rendered [5,6]. Common experience suggests that the act of queuing is associated with waiting, which is an inevitable part of modern life. This leads to the idea that queuing theory has very wide applications [7]. For example, customers waiting to be served at grocery stores, banks and post offices, people having to wait for an operator during a telephone call, people waiting for a taxi or a bus on the way to the workplace can be thought as subjects of queuing theory [8,9].
Even queues that are generally non-problematic may become a nuisance if not managed well. For the banking sector, this requires a swift management of the server–customer relationship since queuing cannot be excluded from the daily operation of a bank [10,11]. Service delivery in banks is personal, customers being either served immediately or joining a queue (waiting line) if servers are busy. A queue occurs if facilities are limited and cannot satisfy the demand during a particular period. However, most customers are not comfortable with waiting or queuing, the time wasted in the queue being perceived as an opportunity cost [12,13]. Performing financial activities can, however, be time consuming and tedious within the limitations of the traditional methods of banking. A recent contribution by [14] found that the banks in Ghana have grown through different eras and now comprise several branches across the breadth of the country, operating in almost every district. The majority of banks in Ghana have been listed on the Ghana stock exchange market since 1996 [15]. Their growth has been synonymous with the growth of their customer base, performance, innovative product and services profitability.
As far as the modeling of the banking sector is concerned, a queuing system consisting of two basic customer classes; two servers were discussed from a mathematical viewpoint in [16,17]. Class-j customers were primarily assigned to station-j, j = 1 , 2 . However, customers could move from station-1 to station-2 but not from station-2 to station-1. Additionally, an arriving class-2 customer would interrupt the current service of a customer who moved from station-1 to station-2, the former being served immediately, while the latter could not come back to station-1, even if Server-1 was free. The service of the moving customers would later be resumed from the point at which it was interrupted. Such a two-station system is called a cascade network [17].
In [18], a bi-objective optimization problem was considered, the first objective being to maximize the total profit and the second one being to minimize the average length of queuing at workstations, and optimal values for the decision variables were determined. According to [19], competitive queuing (CQ) models of working memory (WM) rely upon two underlying mechanisms, namely excitatory parallel planning and inhibitory competitive choice/response suppression. While the former mechanism is responsible for item activation, the latter is responsible for item recall followed by item suppression. Other models in [16,20,21] revealed closely related systems with flexible servers, for which a server might transfer the service capacity to accommodate the workload accumulated in another server. In addition, systems with cross-trained servers in which certain servers can handle a reduced set of customer types, whereas others accept all types, were also discussed in [22,23]. A variety of real-life systems conforming to the above paradigm, including service centers, production systems, computer networks with rescheduling of jobs, and parallel computing systems for which processors have overlapping capabilities, are described in [17]. The same considerations are applicable to manufacturing machines, which have certain primary functions and a number of secondary ones, as described in [24] via the so-called N-models with static priority rules. The particular case of a N-station cascade network in which each station is only able to support the previous one was analyzed in [16] from a stability viewpoint by using a fluid limit approach rather than a more standard Foster type argument. Further details regarding this class of models are given in [16].
However, most of these studies have limited practical success and little subsequent impact, the vast majority of the existing models remaining unvalidated against real waiting time and service time data. This happened since collecting these data were time-consuming, expensive and record error in manual operation (see [6,25,26]).
A bare-bones model of a queuing network consists of two single-server stations with independent general renewal inputs, independently identically distributed (i.i.d.) general service times and infinite capacity buffers. However, most banks in Ghana operate with three servers and with three buffers for customers [27], in which the first server only assists the second server, the second server assists the first and third server if available, and the third server in turn assists the second server only (see Figure 1). In view of these characteristics of Ghanaian banking, so far, there is no existing model to formulate a queuing network of immediate use in the Ghanaian banking sector.
Consequently, the main objective of this paper is to formulate and analyze a so-called Double-X queuing network model, and in this regard we have a prime opportunity to take advantage of the detailed customer arrival time and service time data, automatically collected by the Ghanaian Agricultural Development Bank to monitor compliance with targets. The model is then validated using an illustrative example from the real data, for which we find the arrival and service rate of customers over a given time slot. We then ascertain the appropriateness of bank queue utilization at different levels and also give a fair idea to customers on the amount of time they would be expected to spend in the banking hall.
In this model, each server has an unlimited-capacity buffer for awaiting customers. Customers arrive following an independent general renewal input and have i.i.d. general service times when served at the same station. Inter-arrival times and service times are possibly different for different customer classes. The service discipline is work-conserving and obeys a FIFO (first in first out) scheduling algorithm within each class. Whenever a buffer becomes empty while customers are awaiting service in other buffers, a customer moves to be served there, provided that this is allowed in the given model.
In order to establish the stability of the fluid limit model associated to the queuing network, we start by employing functional laws of large numbers for the renewal processes, as motivated by [28]. In this regard, the choice of an appropriate Lyapunov function is of paramount importance. Although the approaches are related, they do differ in certain technical details. Particularly, we are not prompted to consider a Skorokhod problem for our model [29], which means that we do not address the boundary problems of the state spaces of the job count and workload processes, provided that a service station in a queuing network is empty.
The remaining part of this paper is organized as follows. In Section 2, we introduce and describe our Double-X queuing model, the research assumptions and the equations that govern the processes associated with the network structure. Section 3 looks into the stability analysis of this model. In particular, Section 3.1 introduces the associated fluid limit model, and Section 3.2 is devoted to proving the stability result. Section 4 is concerned with an analysis of real data. Finally, we present the summary of our findings and conclusions in Section 5.

2. The Model

2.1. Model Description

Servers
The teller position is a key one in banking, requiring qualified and experienced personnel since tellers are generally the employees that customers first see and interact with. We consider a queuing system consisting of three servers (tellers), which is a quite common occurrence in a Ghanaian bank. The main job tasks and responsibilities of a server towards customers are as follows:
  • Identify customers and process validation and cashing of checks.
  • Process cash and checks depositing and check the accuracy of subsequent deposit slips.
  • Process cash withdrawals.
  • Prepare and issue cashier’s checks, traveler’s checks and personal money orders, and also exchange foreign currency.
  • Receive and verify payments of utility bills, loans and mortgages.
  • Answer inquiries regarding checking and savings accounts and other banking products.
  • Attempt to resolve issues raised by the customers.
  • Open new accounts.
  • Explain, advise on and promote bank products and services to customers.
Servers typically work from a station, usually located on a server line as shown in Figure 1. In our model, the responsibilities of Server-1 are to serve customers who fall within categories 1–4, and as soon as Server-2 becomes free, customers waiting in Buffer-1 (if any) switch to Buffer-2 to be served there immediately. The responsibilities of Server-2 are to serve customers who fall within category 1–9 and, if Server-1 is free, customers who require services 1–4 switch to Buffer-1 for service, while those requiring services 5–9 move to Buffer-3, if Server-3 is free for service. The responsibilities of Server-3 are to serve customers who fall within categories 5–9; if Server-2 is free, customers waiting in Buffer-3 (if any) switch to start service there immediately. Servers are cross-trained so that they can serve customers from other buffers when they become free.
Customer classes
Class-j, j = 1 , 2 , 3 are the exogenous customers who arrive at Server-j for service, while Class- ( i , j ) customers are those moving from Server-i to Server-j for service, ( i , j ) = ( 1 , 2 ) , ( 2 , 1 ) , ( 2 , 3 ) and ( 3 , 2 ) . In what follows, we use the index j (the double index ( i , j ) ) to denote Class-j (respectively Class- ( i , j ) ) customers.
Service and arrival times
Following the standard definitions on interarrival times and service times given in [28], we let ξ j ( i ) , i 2 be the i.i.d. inter-arrival times of i-th Class-j customer entering the network after instant 0, where j = 1 , 2 , 3 and let η k ( i ) , i 2 be the i.i.d. service times of the i-th Class-k customer being served after instant 0, k = 1 , 2 , 3 , ( 1 , 2 ) , ( 2 , 1 ) , ( 2 , 3 ) and ( 3 , 2 ) . All sequences (service and arrival time) are mutually independent. The residual arrival time ξ j ( 1 ) of the first Class-j customer entering the system after instant 0 is independent of ξ j ( i ) , i 2 , j = 1 , 2 , 3 . Additionally, the residual service time η k ( 1 ) , of a Class-k customer initially being served, if any, is independent of η k ( i ) , i 2 .
Following the idea from [16], we introduce the arrival rate λ j = 1 E ξ j of Class-j customers, j = 1 , 2 , 3 and the service rate μ k = 1 E η k of Class-k customers, k = 1 , 2 , 3 , ( 1 , 2 ) , ( 2 , 1 ) , ( 2 , 3 ) and ( 3 , 2 ) (see Figure 1). Additionally, the following standard conditions are imposed:
E ξ j < , j = 1 , 2 , 3 . E η k < , k = 1 , 2 , 3 , ( 1 , 2 ) , ( 2 , 1 ) , ( 2 , 3 ) , ( 3 , 2 ) . P ( ξ j x ) > 0 , j = 1 , 2 , 3 , for any x [ 0 , ) .
We also assume that inter-arrival times are spread out, that is, for some integers s j > 1 and functions f j 0 with 0 f j ( y ) d y > 0 as follows:
P a i = 2 s j ξ j ( i ) b a b f j ( y ) d y , 0 a b , j = 1 , 2 , 3 .

2.2. Model Assumptions

The Double-X cascade model is an appropriate one to use for this study under the following assumptions.
(i)
Service discipline is assumed to be non-idling, that is, servers cannot be idle if there are waiting customers in their allocated buffers.
(ii)
Service discipline is also non-preemptive, which means that a running task cannot be disturbed, that is, customers who are in the process of being served cannot be interrupted.
(iii)
Priority is given to customers waiting in their approved buffers over those who move from their rightful buffers to a different buffer.
(iv)
Customers who enter the system do not leave unless they are served.
We begin by introducing several notations and primitive processes of the network. The exogenous arrival process is denoted by the following:
E ( t )   E 1 ( t ) , E 2 ( t ) , E 3 ( t ) , t 0 ,
for which
E j ( t ) max n 1 : i = 1 n ξ j ( i ) t
is the total number of Class-j arrivals in the interval [ 0 , t ] , j = 1 , 2 , 3 . The served customers process is given by the following:
S ( S 1 ( t ) , S 2 ( t ) , S 3 ( t ) , S 1 , 2 ( t ) , S 2 , 1 ( t ) , S 2 , 3 ( t ) , S 3 , 2 ( t ) ) , t 0 ,
and the renewal process
S k ( t ) max n 1 : i = 1 n η k ( i ) t
representing the total number of Class-k customers served in [ 0 , t ] , if the server devotes all time to Class-k customers, k = 1 , 2 , 3 , ( 1 , 2 ) , ( 2 , 1 ) , ( 2 , 3 ) and ( 3 , 2 ) . By definition, E j ( 0 ) = S k ( 0 ) = 0 for all k , j .
We now introduce descriptive processes which measure the performance of the network. Let us denote the following:
D = D ( t ) ( D 1 ( t ) , D 2 ( t ) , D 3 ( t ) , D 1 , 2 ( t ) , D 2 , 1 ( t ) , D 2 , 3 ( t ) , D 3 , 2 ( t ) ) , t 0 , Z = Z ( t ) ( Z 1 ( t ) , Z 2 ( t ) , Z 3 ( t ) , Z 1 , 2 ( t ) , Z 2 , 1 ( t ) , Z 2 , 3 ( t ) , Z 3 , 2 ( t ) ) , t 0 , T = T ( t ) ( T 1 ( t ) , T 2 ( t ) , T 3 ( t ) , T 1 , 2 ( t ) , T 2 , 1 ( t ) , T 2 , 3 ( t ) , T 3 , 2 ( t ) ) , t 0 , Q = Q ( t ) ( Q 1 ( t ) , Q 2 ( t ) , Q 3 ( t ) ) , t 0 , Y = Y ( t ) ( Y 1 ( t ) , Y 2 ( t ) , Y 3 ( t ) ) , t 0 , U = U ( t ) ( U 1 ( t ) , U 2 ( t ) , U 3 ( t ) ) , t 0 , V = V ( t ) ( V 1 ( t ) , V 2 ( t ) , V 3 ( t ) , V 1 , 2 ( t ) , V 2 , 1 ( t ) , V 2 , 3 ( t ) , V 3 , 2 ( t ) ) , t 0 ,
their definitions being summarized in Table 1 below.
The processes D, T and Y are nondecreasing and satisfy the initial conditions D ( 0 ) = T ( 0 ) = Y ( 0 ) = 0 , being assumed that Z ( 0 ) and Q ( 0 ) are independent. Assume the processes U and V to be right continuous and define V k ( t ) = 0 if Z k ( t ) = 0 . Additionally, note that U j ( 0 ) = ξ j ( 1 ) , while V k ( 0 ) = η k ( 1 ) if Z k ( 0 ) = 1 . We then define the following process:
X ( t ) = Q ( t ) , Z ( t ) , U ( t ) , V ( t ) , t 0 ,
describing the dynamics of the network within the state space Z + 3 × 0 , 1 7 × R + 3 × R + 7 . Then the process X is a piecewise-deterministic Markov process.

2.3. The Queuing Network Equations

The following queuing network equations hold for t 0 :
D k ( t ) = S k ( T k ( t ) ) , k = 1 , 2 , 3 , ( 1 , 2 ) , ( 2 , 1 ) , ( 2 , 3 ) , ( 3 , 2 ) .
Equation (3) counts the total number of service completions for Class-k customers, equal to the total number of Class-k customers departing from the bank at time t.
Q 1 ( t ) = Q 1 ( 0 ) + E 1 ( t ) ( D 1 ( t ) + Z 1 ( t ) + D 1 , 2 ( t ) + Z 1 , 2 ( t ) ) .
Equation (4) indicates how customers are queuing in Buffer-1, waiting for service from Server-1.
Q 2 ( t ) = Q 2 ( 0 ) + E 2 ( t ) ( D 2 ( t ) + Z 2 ( t ) + D 2 , 1 ( t ) + Z 2 , 1 ( t ) + D 2 , 3 ( t ) + Z 2 , 3 ( t ) ) .
Equation (5) shows how customers are queuing in Buffer-2, waiting for service from Server-2.
Q 3 ( t ) = Q 3 ( 0 ) + E 3 ( t ) ( D 3 ( t ) + Z 3 ( t ) + D 3 , 2 ( t ) + Z 3 , 2 ( t ) ) .
Equation (6) also captures how customers are queuing in Buffer-3, waiting for service from Server-3.
( T 1 ( t ) + T 2 , 1 ( t ) ) + Y 1 ( t ) = ( T 2 ( t ) + T 1 , 2 ( t ) + T 3 , 2 ( t ) ) + Y 2 ( t ) = ( T 3 ( t ) + T 2 , 3 ( t ) ) + Y 3 ( t ) = t .
Equation (7) counts the total service time of Server-j, j = 1 , 2 , 3 , including the idle time.
0 Q j ( t ) d Y j ( t ) = 0 , j = 1 , 2 , 3 .
Equation (8) corresponds to a work-conserving scheduler, which always tries to keep the scheduled resources busy.
0 Q 2 ( t ) d Y 1 ( t ) = 0 .
Equation (9) shows that Server-1 supports Server-2 and cannot be idle if there are customers who require services 1–4 waiting in Buffer-2.
0 ( Q 1 ( t ) + Q 3 ( t ) ) d Y 2 ( t ) = 0 .
Equation (10) means that Server-2 supports Server-1 and Server-3 and cannot be idle if there are customers waiting in Buffer-1 and Buffer-3 for service.
0 Q 2 ( t ) d Y 3 ( t ) = 0 .
Equation (11) shows that Server-3 cannot be idle if there are waiting customers in Buffer-2 demanding services 5–9.
0 ( Q 1 ( t ) + Z 1 ( t ) ) d T 2 , 1 ( t ) = 0 .
Equation (12) means that Server-1 gives priority to Class-1 customers over Class-2 customers who move from Buffer-2 to Buffer-1.
0 ( Q 3 ( t ) + Z 3 ( t ) ) d T 2 , 3 ( t ) = 0 .
Equation (13) means that Server-3 gives priority to Class-3 customers over customers who move from Buffer-2 to Buffer-3.
0 ( Q 2 ( t ) + Z 2 ( t ) + Z 3 , 2 ( t ) ) d T 1 , 2 ( t ) = 0 and 0 ( Q 2 ( t ) + Z 2 ( t ) + Z 1 , 2 ( t ) ) d T 3 , 2 ( t ) = 0 .
Equation (14) means that Server-2 gives priority to Class-2 customers.
We still consider two priority phases for Server-2.
Phase 1 ( priority 2 > 1 > 3 ) : from Equation (15), Server-2 serves customers in their rightful buffer, that is, Buffer-2, then proceeds to serve customers from Buffer-1 before serving customers from Buffer-3:
0 ( Q 2 ( t ) + Z 2 ( t ) + Q 1 ( t ) + Z 1 , 2 ( t ) ) d T 3 , 2 ( t ) = 0 .
Phase 2 ( priority 2 > 3 > 1 ) : also from Equation (16), Server-2 gives priority to Class-2 customers and customers who move from Buffer-3 to Buffer-2 over customers who move from Buffer-1 to Buffer-2 for service:
0 ( Q 2 ( t ) + Z 2 ( t ) + Q 3 ( t ) + Z 3 , 2 ( t ) ) d T 1 , 2 ( t ) = 0 .

3. Results

Let us recall that a queuing network is said to be stable if its corresponding Markov process X is positive Harris recurrent, i.e. it has a unique invariant probability measure [16,30]. For instance, a Markov chain where the chain returns to a particular part of the state space an unbounded number of times is positive Harris recurrent. Harris chains are regenerative processes [16,30].
Lemma 1
([16]). For almost all sample paths, any sequence of initial states x n n 1 X with lim n | x n | = , there exists a sub-sequence x n r r 1 x n n 1 with lim r | x n r | = , such that
lim r 1 | x n r | X x n r ( 0 ) X ¯ ( 0 )
and the following limit exists uniformly on compact sets:
lim r 1 | x n r | ( X x n r ( | x n r | t ) , D x n r ( | x n r | t ) , T x n r ( | x n r | t ) , Y x n r ( | x n r | t ) ) ( X ¯ ( t ) , D ¯ ( t ) , T ¯ ( t ) , Y ¯ ( t ) ) ,
where
X ¯ ( t ) = Q ¯ ( t ) , Z ¯ ( t ) , U ¯ ( t ) , V ¯ ( t ) .
Definition 1
([28,31,32]). The fluid limit model ( X ¯ , D ¯ , T ¯ , Y ¯ ) associated to the Double-X model, with X ¯ = ( Q ¯ , Z ¯ , U ¯ , V ¯ ) , is stable if there exists t 1 0 (depending on the arrival and service rates only) such that if | Q ¯ ( 0 ) | + | U ¯ ( 0 ) | + | V ¯ ( 0 ) | = 1 . Then, the following holds:
Q ¯ ( t ) = 0 t t 1 .

3.1. The Fluid Limit Model

The following equations are satisfied for any t 0 , k = 1 , 2 , 3 , ( 1 , 2 ) , ( 2 , 1 ) , ( 2 , 3 ) , ( 3 , 2 ) and j = 1 , 2 , 3 , ( 1 , 2 ) , ( 2 , 1 ) , ( 2 , 3 ) , ( 3 , 2 ) . By using the (functional) Strong Law of Large Numbers for the renewal processes, we deduce the following Lemma 4.2 in [28] that the following (u.o.c) limits hold with probability 1 (w.p.1) as r :
E j x n r ( | x n r | t ) | x n r | λ j ( t U ¯ j ( 0 ) ) + , S k x n r ( | x n r | t ) | x n r | μ k ( t V ¯ k ( 0 ) ) + , D k x n r ( | x n r | t ) | x n r | D ¯ k ( t ) .
From Equation (3), we obtain the following:
D ¯ k ( t ) = μ k ( T ¯ k ( t ) V ¯ k ( 0 ) ) .
Because Z k x ( t ) 1 for all x , t and k, where Z k ( t ) 0 , 1 , then as r , the number of Class-k customers that are being served at time t goes to zero.
Z ¯ k ( t ) = lim r Z k x n r ( | x n r | t ) | x n r | = 0 .
We obtain equalities (21) and (22), which are used to deduce the fluid model Equations (23)–(25) and (31)–(36) from Equations (4)–(6) and (12)–(16) above:
Q ¯ 1 ( t ) = Q ¯ 1 ( 0 ) + λ 1 ( t U ¯ 1 ( 0 ) ) ( D ¯ 1 ( t ) + D ¯ 1 , 2 ( t ) ) = Q ¯ 1 ( 0 ) + λ 1 ( t U ¯ 1 ( 0 ) ) ( μ 1 ( T ¯ 1 ( t ) V ¯ 1 ( 0 ) ) + μ 1 , 2 ( T ¯ 1 , 2 ( t ) V ¯ 1 , 2 ( 0 ) ) ) .
Q ¯ 2 ( t ) = Q ¯ 2 ( 0 ) + λ 2 ( t U ¯ 2 ( 0 ) ) ( D ¯ 2 ( t ) + D ¯ 2 , 1 ( t ) + D ¯ 2 , 3 ( t ) ) , = Q ¯ 2 ( 0 ) + λ 2 t U ¯ 2 ( 0 ) ( μ 2 ( T ¯ 2 ( t ) V ¯ 2 ( 0 ) ) + μ 2 , 1 ( T ¯ 2 , 1 ( t ) V ¯ 2 , 1 ( 0 ) ) + μ 2 , 3 ( T ¯ 2 , 3 ( t ) V ¯ 2 , 3 ( 0 ) ) ) .
Q ¯ 3 ( t ) = Q ¯ 3 ( 0 ) + λ 3 ( t U ¯ 3 ( 0 ) ) ( D ¯ 3 ( t ) + D ¯ 3 , 2 ( t ) ) , = Q ¯ 3 ( 0 ) + λ 3 ( t U ¯ 3 ( 0 ) ) ( μ 3 ( T ¯ 3 ( t ) V ¯ 3 ( 0 ) ) + μ 3 , 2 ( T ¯ 3 , 2 ( t ) V ¯ 3 , 2 ( 0 ) ) ) .
It follows that Equations (26)–(30) can be obtained from Equations (7)–(11) above, respectively.
( T ¯ 1 ( t ) + T ¯ 2 , 1 ( t ) ) + Y ¯ 1 ( t ) = ( T ¯ 2 ( t ) + T ¯ 1 , 2 ( t ) + T ¯ 3 , 2 ( t ) ) + Y ¯ 2 ( t ) = ( T ¯ 3 ( t ) + T ¯ 2 , 3 ( t ) ) + Y ¯ 3 ( t ) = t .
0 Q ¯ j ( t ) d Y ¯ j ( t ) = 0 , j = 1 , 2 , 3 .
0 Q ¯ 2 ( t ) d Y ¯ 1 ( t ) = 0 .
0 ( Q ¯ 1 ( t ) + Q ¯ 3 ( t ) ) d Y ¯ 2 ( t ) = 0 .
0 Q ¯ 2 ( t ) d Y ¯ 3 ( t ) = 0 .
0 Q ¯ 1 ( t ) d T ¯ 2 , 1 ( t ) = 0 .
0 Q ¯ 3 ( t ) d T ¯ 2 , 3 ( t ) = 0 .
0 Q ¯ 2 ( t ) d T ¯ 1 , 2 ( t ) = 0 .
0 Q ¯ 2 ( t ) d T ¯ 3 , 2 ( t ) = 0 .
Phase 1 ( 2 > 1 > 3 ) :
0 ( Q ¯ 2 ( t ) + Q ¯ 1 ( t ) ) d T ¯ 3 , 2 ( t ) = 0 .
Phase 2 ( 2 > 3 > 1 ) :
0 ( Q ¯ 2 ( t ) + Q ¯ 3 ( t ) ) d T ¯ 1 , 2 ( t ) = 0 .
The residual life process associated with the delayed renewal process is given by the following:
U ¯ ( t ) = ( U ¯ ( 0 ) t ) + , V ¯ ( t ) = ( V ¯ ( 0 ) t ) + .
For any 0 s t , the following holds:
0 T ¯ k ( t + s ) T ¯ k ( s ) t .
Without any loss of generality, one may assume that U ¯ ( 0 ) = V ¯ ( 0 ) = 0 . By (37), this leads to U ¯ ( t ) = V ¯ ( t ) = 0 for all t > 0 , which can be shortened as U ¯ = V ¯ = 0 .

3.2. The Stability Analysis

In this section, we present a stability result for the Double-X model. We denote r 1 , 2 = μ 2 μ ( 1 , 2 ) , r 2 , 1 = μ 1 μ ( 2 , 1 ) , r 2 , 3 = μ 3 μ ( 2 , 3 ) and r 3 , 2 = μ 2 μ ( 3 , 2 ) , all in the interval ( 0 , ) .
Let conditions (1) and (2) hold and assume that either one of the assumptions H 1 , H 2 takes place (Table 2).
Then, the Double-X model is stable, provided that the following six conditions are satisfied:
( A 1 ) λ 1 μ 1 + λ 2 μ 2 r 1 , 2 < 0 , ( A 2 ) λ 2 μ 2 + λ 1 μ 1 r 2 , 1 + λ 3 μ 3 r 2 , 3 < 0 , ( A 3 ) λ 3 μ 3 + λ 2 μ 2 r 3 , 2 < 0 , ( A 4 ) λ 1 μ 1 r 2 , 1 + λ 2 μ 2 r 1 , 2 r 3 , 2 + λ 3 μ 3 r 1 , 2 r 3 , 2 r 2 , 3 < 0 , ( A 5 ) λ 2 μ 2 r 1 , 2 r 3 , 2 + λ 3 μ 3 r 2 , 3 + λ 1 μ 1 r 2 , 3 r 3 , 2 r 2 , 1 < 0 , ( A 6 ) λ 1 μ 1 r 2 , 1 + λ 2 μ 2 r 2 , 1 r 3 , 2 + λ 3 μ 3 r 2 , 3 < 0 .
Remark 1.
Assumption H 1 corresponds to the situation in which customers are served slower at a changed buffer, while assumption H 2 reflects just the opposite situation.
The detailed proof of the above-mentioned result is placed in the Appendix A.

4. Numerical Simulations

The data for the illustrative example were collected on 27 June 2017 (9:00 a.m.–12:00 p.m. (noon)), from the Agricultural Development Bank, Juapong branch, Ghana. The mean arrival rates and the mean service rates are calculated from the collected data, and the subsequent results are used to measure the performance of the system.
Table 3 shows the number of customers served within a given time interval. As shown in Table 3, we recorded 47 exogenous customers, with 6 customers moving from Buffer-1 to Buffer-2 for service, indicating that 41 customers stayed in Buffer-1 for service. The total time for service for customers in Buffer-1 is 177 min.
Table 4 shows the mean arrival rate for Buffer-1. According to Table 4, the highest number of customers (16) arrived within the time interval 9:30–10:00 a.m. and the lowest number of customers (4) arrived within the time interval 11:30 a.m.–12:00 p.m. The mean arrival rate for Buffer-1 is λ 1 = 1.57 6 0.26 . The service rate of customers served in Buffer-1 is given by μ 1 = 1 E η 1 , where η 1 is the expectation of the service times. E η 1 = 151.71 41 3.70 . The service rate for Buffer-1 is μ 1 = 1 3.70 0.27 . The service rate for Buffer-2 customers served in Buffer-1 is given by E η 2 , 1 = 24.79 7 3.54 and μ 2 , 1 = 1 3.54 0.28 .
Table 5 shows that 37 out of 49 exogenous customers who arrived within the given time slot were served in their rightful buffer, whereas 7 customers moved from Buffer-2 to Buffer-1 for service and 5 customers moved from Buffer-2 to Buffer-3 for service. The total service time spent by customers in Buffer-2 is 174 min.
The mean arrival rate for Buffer-2 is shown in Table 6. According to Table 6, the highest number of customers (17) arrived within the time interval 9:00–9:30 a.m. and the lowest number of customers (2) arrived within the time interval 11:30 a.m.–12:00 p.m. The mean arrival rate for Buffer-2 is λ 2 = 1.63 6 0.27 . The service rate of customers served in Buffer-2 is given by μ 2 = 1 3.76 0.28 . The service rate for Buffer-1 customers served in Buffer-2 is given by E η 1 , 2 = 18.64 6 3.11 and μ 1 , 2 = 1 3.11 0.32 . The service rate for Buffer-3 customers served in Buffer-2 is given by E η 3 , 2 = 16.35 6 2.73 and μ 3 , 2 = 1 2.73 0.37 .
As shown in Table 7, we recorded 35 exogenous customers within the given time slot, with 6 customers joining Buffer-3 for service. The total service time recorded in Buffer-3 is 175 min.
Table 8 shows the mean arrival rate for Buffer-3. According to Table 8, the highest number of customers (12) arrived within the time interval 9:30–10:00 a.m. The mean arrival rate for Buffer-3 is λ 3 = 1.17 6 0.19 . The service rate of customers served in Buffer-3 is μ 3 = 1 4.52 = 0.22 2 . The service rate for Buffer-2 customers served in Buffer-3 is given by E η 2 , 3 = 17.43 5 3.54 and μ 2 , 3 = 1 3.54 0.28 .
Figure 2 shows the movements of customers within the three buffers at a specific time intervals. It can be deduced that more customers are served in Buffer-1 from 9:30–10:00 a.m. and from 11:30 a.m.–12:00 p.m. In addition, more customers are also served in Buffer-2 from 9:00–9:30 a.m. followed by 10:00–10:30 a.m. Generally, Figure 2 depicts that Buffer-3 recorded the smallest number of customers served in the various specific time interval as compared to Buffer-1 and Buffer-2.
Table 9 shows the comparison between the arrival and service rates among customers. According to the results shown in Table 9, the mean arrival and service rates for Buffer-1 and Buffer-2 are approximately 3 minutes per customer, whereas the arrival and service rate is about 3 min for Buffer-3. Customers spent 3 min with a server while being served at a changed buffer; also, the average service time a customer spent in their rightful buffer is less than the average service time that customers spent in a changed buffer. This, therefore, supports Remark 1.
Figure 3, Figure 4 and Figure 5 show the relationship among customers arrival, service and departure times for the three buffers.
In comparing the arrival and service rates, it is to be noted that the performance measures from the study in Table 10 satisfy all the six stability conditions for the Double-X model. This, therefore, indicates that the model is fit to make predictions of the customers’ arrival and service rate at the bank.

5. Conclusions

In this paper, we model a server–customer interaction occurring in the banking sector, using a Double-X cascade network. In the model, each server has a renewal customer with general i.i.d. inter-arrival times and general i.i.d. service times. The Double-X cascade model contains three servers with three classes of customers awaiting in three buffers for service. Server-1, when free, serves customers who desire services 1–4 waiting in the queue of Buffer-2 to be served; Server-2, when free, serves customers in the queue of Buffer-1 and Buffer-3, while Server-3, when free, serves customers who require services 5–9 in queue of Buffer-2. The main component of the analysis is the finding of the Lyapunov function, which is used to characterize the positive recurrence of the basic Markov process describing stochastic dynamics of the network [16].
We find a sufficient stability condition for the Double-X cascade network system, using the fluid limit approach. Furthermore, we present an illustrative example describing the real-world functioning of the banking system. The average time a customer spends in the system with Server-j, j = 1 , 2 , 3 is determined to be 0.27, 0.28 and 0.22 h, respectively. Based on our mathematical findings and observations made for the case study, we find adequate arrival and service rates to meet customer demands, even in situations in which periods of high demand arise during business hours.

Author Contributions

Conceptualization, H.Z. and S.W.A.; formal analysis, H.Z., S.W.A., W.O.A., P.H., D.Y. and P.G.; investigation, H.Z., S.W.A., W.O.A., P.H., D.Y. and P.G.; writing—original draft preparation, H.Z., S.W.A., W.O.A., P.H. and P.G.; writing—review and editing, H.Z., S.W.A. and P.G.; supervision, H.Z.; funding acquisition, H.Z. All authors have read and agreed to the published version of the manuscript.

Funding

H.Z. acknowledges the financial support of the Chinese Ministry of Education of Humanities and Social Science Project 20YJA630088 and the Qinlan Project of Jiangsu Province.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this paper are available in the article.

Conflicts of Interest

The authors declare that they have no conflict of interest regarding the publication of the research article.

Appendix A

This Appendix contains proofs of the stability conditions shown in Equation (39). Let us consider a fluid limit model ( X ¯ , D ¯ , T ¯ , Y ¯ ) , where X ¯ = ( Q ¯ , Z ¯ , U ¯ , V ¯ ) satisfies (23)–(37), and assume that | Q ( 0 ) | = 1 . We introduce the following Lyapunov function:
f ( t ) = Q ¯ 1 ( t ) r 2 , 1 + Q ¯ 2 ( t ) r 1 , 2 r 3 , 2 + Q ¯ 3 ( t ) r 2 , 3 , t 0 .
Then, Q ¯ and f have the same differentiability points. It follows from (23)–(25) that for any regular point t of Q ¯ , the following holds:
Q ¯ ˙ 1 ( t ) = λ 1 ( μ 1 T ¯ ˙ 1 ( t ) + μ 1 , 2 T ¯ ˙ 1 , 2 ( t ) ) ,
Q ¯ ˙ 2 ( t ) = λ 2 ( μ 2 T ¯ ˙ 2 ( t ) + μ 2 , 1 T ¯ ˙ 2 , 1 ( t ) + μ 2 , 3 T ¯ ˙ 2 , 3 ( t ) ) ,
Q ¯ ˙ 3 ( t ) = λ 3 ( μ 3 T ¯ ˙ 3 ( t ) + μ 3 , 2 T ¯ ˙ 3 , 2 ( t ) ) ,
which altogether imply the following:
f ˙ ( t ) = λ 1 r 2 , 1 μ 1 r 2 , 1 T ¯ ˙ 1 ( t ) + μ 1 , 2 r 2 , 1 T ¯ ˙ 1 , 2 ( t ) + λ 2 r 1 , 2 r 3 , 2 ( μ 2 r 1 , 2 r 3 , 2 T ¯ ˙ 2 ( t ) + μ 2 , 1 r 1 , 2 r 3 , 2 T ¯ ˙ 2 , 1 ( t ) + μ 2 , 3 r 1 , 2 r 3 , 2 T ¯ ˙ 2 , 3 ( t ) ) + λ 3 r 2 , 3 μ 3 r 2 , 3 T ¯ ˙ 3 ( t ) + μ 3 , 2 r 2 , 3 T ¯ ˙ 3 , 2 ( t ) .
Let t 0 be a differentiability point of f such that f ( t ) > 0 . Then, Q ¯ 1 ( t ) > 0 , Q ¯ 2 ( t ) > 0 or Q ¯ 3 ( t ) > 0 . We show that in either case, f ˙ ( t ) C , for a constant C > 0 . Then, f is non-increasing and f ( t ) = 0 for all t f ( 0 ) C .
Because | Q ¯ ( 0 ) | = Q ¯ 1 ( 0 ) + Q ¯ 2 ( 0 ) + Q ¯ 3 ( 0 ) = 1 from Definition (1), we have Q ¯ ( t ) = 0 for all t t 1 . This happens since the following is true:
f ( 0 ) = Q ¯ 1 ( 0 ) r 2 , 1 + Q ¯ 2 ( 0 ) r 1 , 2 r 3 , 2 + Q ¯ 3 ( 0 ) r 2 , 3 1 r 2 , 1 + 1 r 1 , 2 r 3 , 2 + 1 r 2 , 3 .
Then (20) will follow:
t 1 = 1 C 1 r 2 , 1 + 1 r 1 , 2 r 3 , 2 + 1 r 2 , 3 > 0 .
Case 1:Assume that Q ¯ 1 ( t ) > 0 and Q ¯ 2 ( t ) = Q ¯ 3 ( t ) = 0 . Then, by (26) and (27), Y ¯ ˙ 1 ( t ) = Y ¯ ˙ 2 ( t ) = Y ¯ ˙ 3 ( t ) = 0 and by (31) and (34), T ¯ ˙ 2 , 1 ( t ) = T ¯ ˙ 3 , 2 ( t ) = 0 . We obtain the following:
T ¯ ˙ 1 ( t ) + T ¯ ˙ 2 , 1 ( t ) + Y ¯ ˙ 1 ( t ) = 1 T ¯ ˙ 1 ( t ) = 1 .
From Equations (A2) and (A3), Q ¯ 2 ( t ) = Q ¯ 3 ( t ) = 0 , so t is a local minimum. As t is a regular point, then by Fermat’s theorem on stationary points, Q ¯ ˙ 2 ( t ) = Q ¯ ˙ 3 ( t ) = 0 . Therefore, the following holds:
λ 2 = ( μ 2 T ¯ ˙ 2 ( t ) + μ 2 , 1 T ¯ ˙ 2 , 1 ( t ) + μ 2 , 3 T ¯ ˙ 2 , 3 ( t ) ) = μ 2 T ¯ ˙ 2 ( t ) T ¯ ˙ 2 ( t ) = λ 2 μ 2 ,
also from Equation (29). Further, we have from (26) the following:
T ¯ ˙ 2 ( t ) + T ¯ ˙ 1 , 2 ( t ) + T ¯ ˙ 3 , 2 ( t ) = 1 T ¯ ˙ 1 , 2 ( t ) = 1 T ¯ ˙ 2 ( t ) = 1 λ 2 μ 2 .
Moreover, from (A3), Q ¯ ˙ 3 ( t ) = 0 , therefore we have the following:
λ 3 = μ 3 T ¯ ˙ 3 ( t ) + μ 3 , 2 T ¯ ˙ 3 , 2 ( t ) .
Finally, we obtain the following:
f ˙ ( t ) = λ 1 r 2 , 1 μ 1 r 2 , 1 + μ 1 , 2 r 2 , 1 ( 1 λ 2 μ 2 ) + λ 2 r 1 , 2 r 3 , 2 μ 2 r 1 , 2 r 3 , 2 × λ 2 μ 2 , = λ 1 μ 1 r 2 , 1 μ 1 , 2 r 2 , 1 μ 2 λ 2 μ 2 .
Since r 1 , 2 = μ 2 μ 1 , 2 , this implies the following:
f ˙ ( t ) = 1 r 2 , 1 ( λ 1 μ 1 ) + λ 2 μ 2 r 1 , 2 = C 1 ,
the constant
C 1 = 1 r 2 , 1 ( λ 1 μ 1 ) + λ 2 μ 2 r 1 , 2
being positive by condition ( A 1 ) .
Case 2: Assume that Q ¯ 2 ( t ) > 0 and Q ¯ 1 ( t ) = Q ¯ 3 ( t ) = 0 . Then, by (26) and (27), Y ¯ ˙ 2 ( t ) = Y ¯ ˙ 1 ( t ) = Y ¯ ˙ 3 ( t ) = 0 . Equations (33)–(36) give T ¯ ˙ 1 , 2 ( t ) = T ¯ ˙ 3 , 2 ( t ) = 0 . As a result, we obtain from (26) the following:
T ¯ ˙ 2 ( t ) + T ¯ ˙ 1 , 2 ( t ) + T ¯ ˙ 3 , 2 ( t ) + Y ¯ ˙ ( t ) = 1 T ¯ ˙ 2 ( t ) = 1 , T ¯ ˙ 1 ( t ) + T ¯ ˙ 2 , 1 ( t ) = 1 ,
T ¯ ˙ 3 ( t ) + T ¯ ˙ 2 , 3 ( t ) = 1 .
By Fermat’s theorem on stationary points, one sees from Equation (A1) and (A3) that Q ¯ ˙ 1 ( t ) = Q ¯ ˙ 3 ( t ) = 0 . Therefore, we have the following:
λ 1 = μ 1 T ¯ ˙ 1 ( t ) T ¯ ˙ 1 ( t ) = λ 1 μ 1 , λ 3 = μ 3 T ¯ ˙ 3 ( t ) T ¯ ˙ 3 ( t ) = λ 3 μ 3 .
From (A5), we have the following:
T ¯ ˙ 2 , 1 ( t ) = 1 T ¯ ˙ 1 ( t ) = 1 λ 1 μ 1 ,
while from (A6), we have the following:
T ¯ ˙ 2 , 3 ( t ) = 1 T ¯ ˙ 3 ( t ) = 1 λ 3 μ 3 ,
which implies the following:
f ˙ ( t ) = 1 r 1 , 2 r 3 , 2 ( λ 2 μ 2 ) + ( λ 1 μ 1 ) μ 2 , 1 μ 1 + ( λ 3 μ 3 ) μ 2 , 3 μ 3 .
Since r 2 , 1 = μ 1 μ 2 , 1 and r 2 , 3 = μ 3 μ 2 , 3 , this yields the following:
f ˙ ( t ) = 1 r 1 , 2 r 3 , 2 ( λ 2 μ 2 ) + λ 1 μ 1 r 2 , 1 + λ 3 μ 3 r 2 , 3 = C 2 ,
the constant
C 2 = 1 r 1 , 2 r 3 , 2 ( λ 2 μ 2 ) + λ 1 μ 1 r 2 , 1 + λ 3 μ 3 r 2 , 3
being positive by condition ( A 2 ) .
Case 3: Assume that Q ¯ 3 ( t ) > 0 and Q ¯ 1 ( t ) = Q ¯ 2 ( t ) = 0 , then by (26), (27), (31) and (32), Y ¯ ˙ 3 ( t ) = Y ¯ ˙ 2 ( t ) = Y ¯ ˙ 1 ( t ) = T ¯ ˙ 2 , 1 ( t ) = T ¯ ˙ 2 , 3 ( t ) = 0 . From Equation (26), we obtain the following:
T ¯ ˙ 3 ( t ) + T ¯ ˙ 2 , 3 ( t ) + Y ¯ ˙ 3 ( t ) = 1 , T ¯ ˙ 3 ( t ) = 1 .
From Equations (A1) and (A2), Q ¯ 1 ( t ) = Q ¯ 2 ( t ) = 0 , so t is a local minimum. As t is a regular point, then by Fermat’s theorem on stationary points, Q ¯ ˙ 2 ( t ) = Q ¯ ˙ 1 ( t ) = 0 . Therefore, we have the following:
λ 1 = ( μ 1 T ¯ ˙ 1 ( t ) + μ 1 , 2 T ¯ ˙ 1 , 2 ( t ) ) . λ 2 = ( μ 2 T ¯ ˙ 2 ( t ) + μ 2 , 1 T ¯ ˙ 2 , 1 ( t ) + μ 2 , 3 T ¯ ˙ 2 , 3 ( t ) ) = μ 2 T ¯ ˙ 2 ( t ) , T ¯ ˙ 2 ( t ) = λ 2 μ 2 .
From (26), T ¯ ˙ 2 ( t ) + T ¯ ˙ 1 , 2 ( t ) + T ¯ ˙ 3 , 2 ( t ) = 1 , which implies the following:
T ¯ ˙ 3 , 2 ( t ) = 1 λ 2 μ 2 ,
and consequently the following:
f ˙ ( t ) = λ 3 μ 3 r 2 , 3 1 r 2 , 3 μ 2 , 3 ( 1 λ 2 μ 2 ) , f ˙ ( t ) = 1 r 2 , 3 ( λ 3 μ 3 ) + λ 2 μ 2 r 3 , 2 = C 3 ,
the constant
C 3 = 1 r 2 , 3 ( λ 3 μ 3 ) + λ 2 μ 2 r 3 , 2
being positive by condition ( A 3 ) .
Case 4: Assume that Q ¯ 1 ( t ) > 0 , Q ¯ 2 ( t ) = 0 and Q ¯ 3 ( t ) > 0 . Then by (26), (27), (31) and (32), Y ¯ ˙ 1 ( t ) = Y ¯ ˙ 2 ( t ) = Y ¯ ˙ 3 ( t ) = T ¯ ˙ 2 , 1 ( t ) = T ¯ ˙ 2 , 3 ( t ) = 0 , which gives the following:
T ¯ ˙ 1 ( t ) + T ¯ ˙ 2 , 1 ( t ) + Y ¯ ˙ 1 ( t ) = 1 , T ¯ ˙ 3 ( t ) + T ¯ ˙ 2 , 3 ( t ) + Y ¯ ˙ 3 ( t ) = 1 ,
T ¯ ˙ 1 ( t ) = T ¯ ˙ 3 ( t ) = 1 .
Then, from Equation (A2), by Fermat’s theorem on stationary points, Q ¯ ˙ 2 ( t ) = 0 . This implies the following:
λ 2 = μ 2 T ¯ ˙ 2 ( t ) + μ 2 , 1 T ¯ ˙ 2 , 1 ( t ) + μ 2 , 3 T ¯ ˙ 2 , 3 ( t ) , T ¯ ˙ 2 ( t ) = λ 2 μ 2 .
Again from (26), we have the following:
T ¯ ˙ 2 ( t ) + T ¯ ˙ 1 , 2 ( t ) + T ¯ ˙ 3 , 2 ( t ) + Y ¯ ˙ 2 ( t ) = 1 .
From Phase 1:
T ¯ ˙ 3 , 2 ( t ) = 0 T ¯ ˙ 1 , 2 ( t ) = 1 λ 2 μ 2 .
Additionally, from Phase 2 we have the following:
T ¯ ˙ 1 , 2 ( t ) = 0 T ¯ ˙ 3 , 2 ( t ) = 1 λ 2 μ 2 ,
resulting in the following:
f ˙ ( t ) = λ 1 r 2 , 1 μ 1 r 2 , 1 + μ 1 , 2 r 2 , 1 ( 1 λ 2 μ 2 ) + λ 2 r 1 , 2 r 3 , 2 μ 2 r 1 , 2 r 3 , 2 × λ 2 μ 2 , = λ 1 μ 1 r 2 , 1 + 1 r 2 , 1 λ 2 μ 2 μ 2 × μ 1 , 2 μ 2 , = λ 1 μ 1 r 2 , 1 + λ 2 μ 2 r 2 , 1 r 1 , 2 = C 4 .
where the constant
C 4 = 1 r 2 , 1 λ 1 μ 1 + λ 2 μ 2 r 1 , 2 ,
is positive by condition ( A 1 ) .
Case 5: Assume that Q ¯ 1 ( t ) > 0 , Q ¯ 2 ( t ) > 0 and Q ¯ 3 ( t ) = 0 . Then, by (26), (27) and (31), (33), (34), Y ¯ ˙ 1 ( t ) = Y ¯ ˙ 2 ( t ) = Y ¯ ˙ 3 ( t ) = T ¯ ˙ 2 , 1 ( t ) = T ¯ ˙ 1 , 2 ( t ) = T ¯ ˙ 3 , 2 ( t ) = 0 , resulting in
T ¯ ˙ 1 ( t ) = T ¯ ˙ 2 ( t ) = 1 .
From (A3),
λ 3 = μ 3 T ¯ ˙ 3 ( t ) + μ 3 , 2 T ¯ ˙ 3 , 2 T ¯ ˙ 3 ( t ) = λ 3 μ 3 .
Moreover, from (26),
T ¯ ˙ 3 ( t ) + T ¯ ˙ 2 , 3 ( t ) + Y ¯ ˙ 3 ( t ) = 1 T ¯ ˙ 2 , 3 ( t ) = 1 λ 3 μ 3 .
Using (A4), this implies the following:
f ˙ ( t ) = λ 1 r 2 , 1 μ 1 r 2 , 1 + λ 2 r 1 , 2 r 3 , 2 μ 2 r 1 , 2 r 3 , 2 + μ 2 , 3 r 1 , 2 r 3 , 2 ( 1 λ 3 μ 3 ) , = λ 1 μ 1 r 2 , 1 + λ 2 μ 2 r 1 , 2 r 3 , 2 + λ 3 μ 3 r 1 , 2 r 3 , 2 r 2 , 3 , = λ 1 μ 1 r 2 , 1 + λ 2 μ 2 r 1 , 2 r 3 , 2 + λ 3 μ 3 r 1 , 2 r 3 , 2 r 2 , 3 = C 5 ,
the constant
C 5 = λ 1 μ 1 r 2 , 1 + λ 2 μ 2 r 1 , 2 r 3 , 2 + λ 3 μ 3 r 1 , 2 r 3 , 2 r 2 , 3 ,
being positive by condition ( A 4 ) .
Case 6: For Q ¯ 1 ( t ) = 0 , Q ¯ 2 ( t ) > 0 and Q ¯ 3 ( t ) > 0 Then, by (26), (27) and (32)–(34), Y ¯ ˙ 1 ( t ) = Y ¯ ˙ 2 ( t ) = Y ¯ ˙ 3 ( t ) = T ¯ ˙ 2 , 3 ( t ) = T ¯ ˙ 1 , 2 ( t ) = T ¯ ˙ 3 , 2 ( t ) = 0 , resulting in
T ¯ ˙ 2 ( t ) = T ¯ ˙ 3 ( t ) = 1 .
From (A1),
λ 1 = μ 1 T ¯ ˙ 1 ( t ) + μ 1 , 2 T ¯ ˙ 1 , 2 T ¯ ˙ 1 ( t ) = λ 1 μ 1 .
Then Equation (26) gives us the following:
T ¯ ˙ 1 ( t ) + T ¯ ˙ 2 , 1 ( t ) + Y ¯ ˙ 1 ( t ) = 1 T ¯ ˙ 2 , 1 ( t ) = 1 λ 1 μ 1 ,
f ˙ ( t ) = λ 2 μ 2 r 1 , 2 r 3 , 2 + λ 3 μ 3 r 2 , 3 μ 2 , 1 r 1 , 2 r 3 , 2 ( 1 λ 1 μ 1 ) , = λ 2 μ 2 r 1 , 2 r 3 , 2 + λ 3 μ 3 r 2 , 3 + λ 1 μ 1 r 2 , 3 r 3 , 2 r 2 , 1 , = λ 2 μ 2 r 1 , 2 r 3 , 2 + λ 3 μ 3 r 2 , 3 + λ 1 μ 1 r 2 , 3 r 3 , 2 r 2 , 1 = C 6 ,
the constant
C 6 = λ 2 μ 2 r 1 , 2 r 3 , 2 + λ 3 μ 3 r 2 , 3 + λ 1 μ 1 r 2 , 3 r 3 , 2 r 2 , 1
being positive by condition ( A 5 ) .
Case 7: Assume that Q ¯ 1 ( t ) > 0 , Q ¯ 2 ( t ) > 0 and Q ¯ 3 ( t ) > 0 . Then, by (26), (27) and (31)–(36), we have Y ¯ ˙ 1 ( t ) = Y ¯ ˙ 2 ( t ) = Y ¯ ˙ 3 ( t ) = T ¯ ˙ 1 , 2 ( t ) = T ¯ ˙ 2 , 1 ( t ) = T ¯ ˙ 2 , 3 ( t ) = T ¯ ˙ 3 , 2 ( t ) = 0 , implying the following:
T ¯ ˙ 1 ( t ) = T ¯ ˙ 2 ( t ) = T ¯ ˙ 3 ( t ) = 1 .
From (A1)–(A3), we see the following:
f ˙ ( t ) = λ 1 μ 1 r 2 , 1 + λ 2 μ 2 r 2 , 1 r 3 , 2 + λ 3 μ 3 r 2 , 3 = C 7 ,
the constant
C 7 = λ 1 μ 1 r 2 , 1 + λ 2 μ 2 r 2 , 1 r 3 , 2 + λ 3 μ 3 r 2 , 3
being positive by condition ( A 6 ) . Consequently, in either case, f ˙ ( t ) C < 0 , where C : = min C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 .

References

  1. Afanaseva, L.G.; Grishunina, S.A. Stability conditions for a multiserver queuing system with a regenerative input flow and simultaneous service of a customer by a random number of servers. Queueing Syst. 2020, 94, 213–241. [Google Scholar] [CrossRef]
  2. Marfo-Yiadom, E.; Ansong, A. Customers’ perception of innovative banking products in Cape Coast Metropolis Ghana. Int. J. Bus. Adm. Manag. Res. 2012, 7, 162–172. [Google Scholar] [CrossRef]
  3. Dungey, M.; Gajurel, D. Contagion and banking crisis-international evidence for 2007–2009. J. Bank. Financ. 2015, 60, 271–283. [Google Scholar] [CrossRef] [Green Version]
  4. Owusu-Frimpong, N. Patronage behavoiur of Ghanaian bank customers. Int. J. Bank Mark. 1999, 17, 335–342. [Google Scholar] [CrossRef]
  5. Bain, C.A.; Taylor, P.G.; McDonnell, G.; Georgiou, A. Myths of ideal hospital occupancy. Med. J. Aust. 2010, 192, 42–43. [Google Scholar] [CrossRef]
  6. Barak, S.; Fallahnezhad, M.S. Cost analysis of fuzzy queuing systems. Int. J. Appl. Oper. Res. 2014, 2, 25–36. [Google Scholar]
  7. Cascone, A.; Rarità, L.; Trapel, E. Simulation and analysis of a bank’s multi-server queuing system. J. Math. Sci. 2014, 196, 23–29. [Google Scholar] [CrossRef]
  8. Akwasi, A.G. Application of Queueing Model at the Driver and Vehicle Licensing Authority-Kumasi (Eye-Test Section). Master’s Thesis, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana, 2015. Available online: http://ir.knust.edu.gh/bitstream/123456789/8088/1/AKWASI%20ADU%20GYAMFI.pdf (accessed on 13 March 2017).
  9. Yanting, C.; Richard, J.B.; Jasper, G. Necessary conditions for the compensation approach for a random walk in the quarter-plane. Queueing Syst. 2019, 94, 257–277. [Google Scholar]
  10. Sanda, M.A.; Arhin, E. Using ATMs as workload relievers for Ghanaian bank servers: The customer behavioral challenge. J. Econ. Behav. Organ. 2011, 3, 13–21. [Google Scholar]
  11. Nosek, R.A.; Wilson, J.P. Queuing theory and customer satisfaction: A review of terminology, trends and applications to pharmacy practice. Hosp. Pharm. 2001, 36, 275–279. [Google Scholar] [CrossRef]
  12. Kristen, G.; Rhonda, R. Product forms for FCFS queuing models with arbitrary server-job compatibilities: An overview. Queueing Syst. 2020, 96, 3–51. [Google Scholar]
  13. Vasumathi, A.; Dhanavanthan, P. Application of simulation technique in queuing model for ATM facility. Int. J. Appl. Eng. Res. 2010, 1, 103–110. [Google Scholar]
  14. Ibrahim, R.; Whitt, W. Real-time delay estimation in overloaded multiserver queues with abandonments. Manag. Sci. 2009, 55, 1729–1742. [Google Scholar] [CrossRef] [Green Version]
  15. Boako, G.; Alagidede, P. Examining evidence of ‘shift-contagion’ in African stock markets: A CoVaR-copula approach. Rev. Dev. Financ. 2017, 7, 142–156. [Google Scholar] [CrossRef]
  16. Delgado, R.; Morozov, E. Stability analysis of cascade networks via fluid models. Perform. Eval. 2014, 82, 39–54. [Google Scholar] [CrossRef]
  17. Morozov, E.; Steyaert, B. Stability analysis of a two-station cascade queuing network. Ann. Oper. Res. 2013, 202, 135–160. [Google Scholar] [CrossRef]
  18. Maleki, L.; Pasandideh, S.H.R.; Niaki, S.T.A.; Cárdenas-Barrón, L.E. Determining the prices of re-manufactured products, capacity of internal workstations and the contracting strategy within queuing framework. Appl. Soft Comput. 2017, 54, 313–321. [Google Scholar] [CrossRef]
  19. Nafees, A. Queuing Theory and Its Application: Analysis of the Sales Checkout Operation in ICA Supermarket. Master’s Thesis, University of Dalarna, Falun, Sweden, 2007. Available online: http://www.statistics.du.se/essays/D07E.Nafees.pdf (accessed on 13 March 2017).
  20. Ahn, H.S.; Duenyas, I.; Zhang, Q.R. Optimal control of a flexible server. Adv. Appl. Probab. 2004, 36, 139–170. [Google Scholar] [CrossRef]
  21. Kirkizlar, E.; Andradottir, S.; Ayhan, H. Robustness of efficient server assignment policies to service time distributions in finite-buffered lines. Nav. Res. Logist. 2010, 57, 563–582. [Google Scholar] [CrossRef]
  22. Agnihothri, S.R.; Mishra, A.K.; Simmons, D.E. Workforce cross-training decisions in field service systems with two job types. J. Oper. Res. Soc. 2003, 54, 410–418. [Google Scholar] [CrossRef]
  23. Terekhov, D.; Beck, J.C. An extended queuing control model for facilities with front room and back room operations and mixed-skilled workers. Eur. J. Oper. Res. 2009, 198, 223–231. [Google Scholar] [CrossRef]
  24. Tezcan, T. Stability analysis of N-model systems under a static priority rule. Queueing Syst. 2013, 73, 235–259. [Google Scholar] [CrossRef]
  25. Wang, K.; Li, N.; Jiang, Z. Queueing system with impatient customers: A review. In Proceedings of the 2010 IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI 2010, Qingdao, China, 15–17 July 2010; IEEE: Piscataway, NJ, USA, 2015; pp. 82–87. [Google Scholar]
  26. Perry, O.; Whitt, H. Achieving rapid recovery in an overload control for large-scale service systems. INFORMS J. Comput. 2016, 27, 491–506. [Google Scholar] [CrossRef] [Green Version]
  27. Udayabhanu, V.; Sunder, K.; Kannan, S. Optimizing capacity utilization in queuing systems: Parallels with the EOQ model. Calif. J. Oper. Manag. 2010, 8, 54–59. [Google Scholar]
  28. Dai, J.G. On positive Harris recurrence of multiclass queuing networks: A unified approach via fluid limit models. Ann. Appl. Probab. 1995, 5, 49–77. [Google Scholar] [CrossRef]
  29. Burdzy, K.; Kang, W.; Ramanan, K. The Skorokhod problem in a time-dependent interval. Stoch. Proc. Appl. 2009, 119, 428–452. [Google Scholar] [CrossRef] [Green Version]
  30. Dai, J.G.; Meyn, S.P. Stability and convergence of moments for multiclass queuing networks via fluid limit models. IEEE Trans. Automat. Cont. 1995, 40, 1889–1904. [Google Scholar] [CrossRef] [Green Version]
  31. Bramson, M. Stability of queuing networks. Probab. Surv. 2008, 5, 169–345. [Google Scholar] [CrossRef]
  32. Chen, H. Fluid approximations and stability of multiclass queuing networks: Work-conserving disciplines. Ann. Appl. Probab. 1995, 5, 637–665. [Google Scholar] [CrossRef]
Figure 1. The Double-X cascade network.
Figure 1. The Double-X cascade network.
Mathematics 09 01957 g001
Figure 2. Comparison between the numbers of customers served in each buffer.
Figure 2. Comparison between the numbers of customers served in each buffer.
Mathematics 09 01957 g002
Figure 3. Arrival and departure times together with service times in Server-1 for Buffer-1. A point with red shadow represents a customer moving from Buffer-2 to Buffer-1 for service.
Figure 3. Arrival and departure times together with service times in Server-1 for Buffer-1. A point with red shadow represents a customer moving from Buffer-2 to Buffer-1 for service.
Mathematics 09 01957 g003
Figure 4. Arrival and departure times together with service times in Server-2 for Buffer-2. A point with green shadow represents a customer moving from Buffer-1 to Buffer-2 and a point with purple shadow represents a customer moving from Buffer-3 to Buffer-2 for service.
Figure 4. Arrival and departure times together with service times in Server-2 for Buffer-2. A point with green shadow represents a customer moving from Buffer-1 to Buffer-2 and a point with purple shadow represents a customer moving from Buffer-3 to Buffer-2 for service.
Mathematics 09 01957 g004
Figure 5. Arrival and departure times together with service times in Server-3 for Buffer-3. A point with black shadow represents a customer moving from Buffer-2 to Buffer-3 for service.
Figure 5. Arrival and departure times together with service times in Server-3 for Buffer-3. A point with black shadow represents a customer moving from Buffer-2 to Buffer-3 for service.
Mathematics 09 01957 g005
Table 1. Variables used in the model and their definitions, where j = 1 ,2,3 and k = 1 , 2, 3, ( 1 , 2 ) , ( 2 , 1 ) , ( 2 , 3 ) , ( 3 , 2 ) .
Table 1. Variables used in the model and their definitions, where j = 1 ,2,3 and k = 1 , 2, 3, ( 1 , 2 ) , ( 2 , 1 ) , ( 2 , 3 ) , ( 3 , 2 ) .
VariableDefinition
D k ( t ) The number of Class-k customers who depart from the bank in the interval [ 0 , t ] .
Z k ( t ) The number of Class-k customers that are being served at time t ( Z k ( t ) 0 , 1 ).
T k ( t ) The total service time devoted to Class-k customers in the interval [ 0 , t ] .
Y j ( t ) The idle time of Server-j in the interval [ 0 , t ] .
Q j ( t ) The number of customers in Buffer j at time t.
U j ( t ) The remaining time t before the next exogenous customer arrival to Class-j.
V k ( t ) The remaining service time t before the next Class-k customer being served at time t.
Table 2. Stability conditions.
Table 2. Stability conditions.
H 1 H 2
r 1 , 2 , r 2 , 1 , r 2 , 3 , r 3 , 2 1 r 1 , 2 , r 2 , 1 , r 2 , 3 , r 3 , 2 < 1
r 2 , 1 r 1 , 2 , r 1 , 2 r 3 , 2 , r 2 , 3 r 3 , 2 1 r 2 , 1 r 1 , 2 , r 1 , 2 r 3 , 2 , r 2 , 3 r 3 , 2 < 1
r 1 , 2 r 3 , 2 r 2 , 3 , r 2 , 1 r 2 , 3 r 3 , 2 , r 1 , 2 r 2 , 1 r 2 , 3 1 r 1 , 2 r 3 , 2 r 2 , 3 , r 1 , 2 r 2 , 1 r 2 , 3 , r 2 , 1 r 2 , 3 r 3 , 2 < 1
Table 3. Queue-1 (time in minutes).
Table 3. Queue-1 (time in minutes).
E 1 ( t ) D 1 ( t ) Z 1 ( t ) D 1 , 2 ( t ) Z 1 , 2 ( t ) T 1 ( t ) T 2 , 1 ( t )
4741416615225
Table 4. The mean arrival rate of Buffer-1.
Table 4. The mean arrival rate of Buffer-1.
Time Interval (a.m.)Customers’ NumberInter-Arrival Rate
9:00–9:3070.23
9:30–10:00160.53
10:00–10:3050.17
10:30–11:0080.27
11:00–11:3070.23
11:30–12:0040.13
Total471.57
Table 5. Queue-2 (Time in minutes).
Table 5. Queue-2 (Time in minutes).
E 2 ( t ) D 2 ( t ) Z 2 ( t ) D 2 , 1 ( t ) Z 2 , 1 ( t ) D 2 , 3 ( t ) Z 2 , 3 ( t ) T 2 ( t ) T 1 , 2 ( t ) T 3 , 2 ( t )
49373777551391916
Table 6. The mean arrival rate of Buffer-2.
Table 6. The mean arrival rate of Buffer-2.
Time Interval (a.m.)Customers’ NumberInter-Arrival Rate
9:00–9:30170.57
9:30–10:00110.37
10:00–10:3060.20
10:30–11:0070.23
11:00–11:3060.20
11:30–12:0020.07
Total491.63
Table 7. Queue-3 (time in minutes).
Table 7. Queue-3 (time in minutes).
E 3 ( t ) D 3 ( t ) Z 3 ( t ) D 3 , 2 ( t ) Z 3 , 2 ( t ) T 3 ( t ) T 2 , 3 ( t )
3529296615817
Table 8. The mean arrival rate of Buffer-3.
Table 8. The mean arrival rate of Buffer-3.
Time Interval (a.m.)Customers’ NumberInter-Arrival Rate
9:00–9:3070.23
9:30–10:00120.53
10:00–10:3030.17
10:30–11:0070.27
11:00–11:3030.23
11:30–12:0030.13
Total351.17
Table 9. Comparison of the arrival and service rates.
Table 9. Comparison of the arrival and service rates.
QueueArrival Rates Service Rates
Buffer-1 λ 1 = 0.26 μ 1 = 0.27 μ 2 , 1 = 0.28
Buffer-2 λ 2 = 0.27 μ 2 = 0.28 μ 1 , 2 = 0.32 μ 3 , 2 = 0.37
Buffer-3 λ 3 = 0.19 μ 3 = 0.22 μ 2 , 3 = 0.28
Table 10. Stability analysis on the data collected.
Table 10. Stability analysis on the data collected.
Sufficient ConditionStability
( A 1 ) : λ 1 μ 1 + λ 2 μ 2 r 1 , 2 = 0.01 < 0 Stable
( A 2 ) : λ 2 μ 2 + λ 1 μ 1 r 2 , 1 + λ 3 μ 3 r 2 , 3 = 0.02 < 0 Stable
( A 3 ) : λ 3 μ 3 + λ 2 μ 2 r 3 , 2 = 0.03 < 0 Stable
( A 4 ) : λ 1 μ 1 r 2 , 1 + λ 2 μ 2 r 1 , 2 r 3 , 2 + λ 3 μ 3 r 1 , 2 r 3 , 2 r 2 , 3 = 0.001 < 0 Stable
( A 5 ) : λ 2 μ 2 r 1 , 2 r 3 , 2 + λ 3 μ 3 r 2 , 3 + λ 1 μ 1 r 2 , 3 r 3 , 2 r 2 , 1 = 0.001 < 0 Stable
( A 6 ) : λ 1 μ 1 r 2 , 1 + λ 2 μ 2 r 2 , 1 r 3 , 2 + λ 3 μ 3 r 2 , 3 = 0.002 < 0 Stable
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, H.; Akuamoah, S.W.; Apeanti, W.O.; Harvim, P.; Yaro, D.; Georgescu, P. The Stability Analysis of a Double-X Queuing Network Occurring in the Banking Sector. Mathematics 2021, 9, 1957. https://doi.org/10.3390/math9161957

AMA Style

Zhang H, Akuamoah SW, Apeanti WO, Harvim P, Yaro D, Georgescu P. The Stability Analysis of a Double-X Queuing Network Occurring in the Banking Sector. Mathematics. 2021; 9(16):1957. https://doi.org/10.3390/math9161957

Chicago/Turabian Style

Zhang, Hong, Saviour Worlanyo Akuamoah, Wilson Osafo Apeanti, Prince Harvim, David Yaro, and Paul Georgescu. 2021. "The Stability Analysis of a Double-X Queuing Network Occurring in the Banking Sector" Mathematics 9, no. 16: 1957. https://doi.org/10.3390/math9161957

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop