You are on page 1of 9

Wireless Sensor Network, 2010, 2, 218-226

doi:10.4236/wsn.2010.23029 Published Online March 2010 (http://www.scirp.org/journal/wsn)

Performance Analysis of Multi-Parametric Call Admission


Control Strategies in Un-Buffered Multi-Service Cellular
Wireless Networks
Jang Hyun Baek1, Che Soong Kim2, Agassi Melikov3, Mehriban Fattakhova3
1
Department of Industrial and Information Systems Engineering, Chonbuk National University, Jeonju, Republic of Korea
2
Department of Industrial Engineering, Sangji University, Wonju, Republic of Korea
3
Department of Aerospace Information Technologies & Control Systems, National Aviation Academy, Azerbaijan
E-mail: jbaek@chonbuk.ac.kr, dowoo@sangji.ac.kr, {agassi.melikov, meri-fattax}@rambler.ru
Received December 28, 2009; revised January 12, 2010; accepted January 15, 2010

Abstract

In this paper model of integrated voice/data cellular wireless networks (CWN) are investigated. The unified
approximate approach to calculate the desired Quality of Service (QoS) metrics in an isolated cell of such
networks under two multi-parametric call admission control (CAC) strategies is developed. One of them is
based on the guard channels scheme while the second is based on a threshold scheme. Results of the nu-
merical experiments are given and a comparison of QoS metrics under different CAC strategies is carried
out.

Keywords: Cellular Networks, Call Admission Control, Quality of Service, Calculation Algorithm

1. Introduction widely used in existing cellular networks. In this paper


models with FCA schemes are considered.
A cellular wireless network (CWN) consists of radio Quality of service (QoS) in the certain cell with the
access points, called base stations (BS), each covering a FCA scheme could be improved if appropriate call
certain geographic area. With distance, the power of ra- ad-mission control (CAC) strategies for the heterogene-
dio signals fade away (fading or attenuation of signal ous traffic are provided. The use of such an access strat-
occurs) which makes it possible to use the same frequen- egy doesn’t require many resources, therefore this me-
cies over several cells, but in order to avoid interference, thod could be considered operative and more effective in
this process must be carefully planned. For better use of view of problems relating to resource shortages.
frequency resources, existing carrier frequencies are Apart from original (or new) calls (o-calls) flows, ad-
grouped, and the number of cells, in which this group of ditional classes of calls that require a special approach
frequencies is used, defines the so called, frequency re- also exist in wireless cellular networks. These are so-
use factor. Therefore, in densely populated areas with a called handover calls (h-calls). This is specific only for
large number of mobile subscribers (MS), small dimen- wireless cellular networks. The essence of this phe-
sioned cells (micro-cells and pico-cells) are to be used. nomenon is that a moving MS, that already established
In connection with the limitation of transmission spec- connection with a network, passes boundaries between
trum in a CWN, problems of allocation of common spec- cells and gets served by a new cell. From the new cell’s
trum among cells are very important. A unit of the wire- point of view this is an h-call, and since the connection
less spectrum, necessary for serving a single user is with the MS has already been established, the handling
called a channel (for instance, time slots in TDMA are of the transfer to a new cell must be transparent for the
considered as channels). There are three solutions for the user. In other words, in wireless networks the call may
channels allocation problem: Fixed Channel Allocation occupy channels from different cells, several times dur-
(FCA), Dynamic Channel Allocation (DCA) and Hybrid ing the duration of the call. This means that the channel
Channel Allocation (HCA). Advantages and disadvan- occupation period is not the same as the call duration.
tage of each of these are well known [1–3]. At the same Mathematical models of call handling processes in
time, owing to realization simplicity, the FCA scheme is multi-service CWN can be developed adequately enough

Copyright © 2010 SciRes. WSN


J. H. Baek ET AL. 219

based on a queuing theory of networks with different tion 5 we provide some conclusion remarks in conclu-
types of calls and random topology. Such models are sion.
researched poorly in literature [4–6]. This is explained by
the fact, that despite the elegance of those models, in 2. The CAC Based on Guard Channels
practice they are useful only for small dimensional net- Strategy
works and with some limiting simplifying assumptions
that are contrary to fact in real functioning wireless net- It is well-known that in an integrating voice/data CWN
works. In connection with that, in the majority of the voice calls of any type (original or handover) have a high
research work models of an isolated cell are analyzed. priority over data calls and within each, flow handover
In the overwhelming majority of available work, calls have high priority over original calls.
one-dimensional queuing models of call handling proc- As a means of assigning priorities to handover v-calls
esses in an isolated cell of mono-service CWN are pro- (hv-call) in such networks a back-up scheme that in-
posed. However these models cannot describe the study- volves reserving a particular number of guard channels
ing processes in multi-service CWN since in such of a cell, expressly for calls of this type, is often utilized.
net-works calls of heterogeneous traffic differ signifi- According to this scheme any hv-call is accepted if there
cantly with respect to their bandwidth requirement and exists at least one free channel, while calls of the re-
arrival rate and channel occupancy time. In connection maining kind are accepted only when the number of busy
with that in the given paper new two-dimensional (2-D) channels does not exceed some class-dependent thresh-
queuing models of multi-service networks are developed. old value.
In order to be specific we consider integrated voice/data We consider a model of an isolated cell in an inte-
CWN. In such networks voice calls (v-calls) are more grated voice/data CWN without queues. This cell con-
susceptible to possible losses and delays than data (orig-
tains N channels, 1 < N < . These channels are used by
inal or handover) call (d-calls). That is why a number of
Poisson flows of hv-calls, original v-calls (ov-calls),
different CAC strategies for prioritization of v-calls are
handover d-calls (hd-calls) and original d-calls (od-calls).
suggested in various works, mostly implying the use of
Intensity of x-calls is x, xov,hv,od,hd. As in almost
guard channels (cutoff strategy) for high priority calls
all cited works the values of handover intensities are
[7–8] and/or threshold strategies [9] which restrict the
considered known hereinafter, although it is apparent
number of low priority calls in channels.
that definition of their values depending on the intensity
In this paper we introduce a unified approach to ap-
of original calls, shape of a cell, mobility of an MS and
proximate performance analysis of two multi-parametric
etc. is rather challenging and complex. However, if we
CAC in a single cell of un-buffered integrated voice/data
consider the case of a uniform traffic distribution and at
CWN which differs from known works in this area. Our
most one handover per call, the average handover inten-
approach is based on the principles of theory of phase
sity can be given by the ratio of the average call holding
merging of stochastic systems [10].
time to the average cell sojourn time [12].
The proposed approach allows overcoming an as-
To handle any narrow-band v-call (either original or
sumption made in almost all of the known papers about
handover) only one free channel is required, while one
equality of handling intensities of heterogeneous calls.
wide-band d-call (either original or handover) requires
Due to this assumption the functioning of the CWN is
described with one-dimensional Markov chain (1-D MC) simultaneously b  1 channels. Here it is assumed that
and authors managed simple formulas for calculating the wide-band d-calls are inelastic, i.e. all b channels are
QoS metrics of the system. However as it was mentioned occupied and released simultaneously (though can be
in [11] the assumption of the same mean channel occu- investigated as can models with elastic d-calls).
pancy time even for both original and handover calls of Note that the channels’ occupancy time considers both
the same class is unrealistic. The presented models are components of occupancy time: the measure of calls du-
more general in terms of handling intensities and the ration, and their mobility. Distribution functions of
equality is no longer required. channel occupancy time of heterogeneous calls are as-
This paper is organized as follows. In Section 2, we sumed to be independent and exponential, but their pa-
provide a simple algorithm to calculate approximate rameters are different, namely the intensity of handling
values of desired QoS metrics of the model of integrated of voice (data) calls equals v (d), and generally speak-
voice/data networks under CAC based on the guard ing v d. If during call handling the handover proce-
channels strategy. A similar algorithm is suggested in dure is initiated, the remaining handling time of this call
Section 3 for the same model under CAC based on a in a new cell (yet as an h-call) is also exponentially dis-
threshold strategy. In Section 4, we give results of nu- tributed with the same mean due to the memory-free
merical experiments which indicate high accuracy of the property of exponential distribution.
proposed approximate algorithms as well as a compari- In a given CAC the procedure by which the channels
son of QoS metrics in different CAC strategies. In Sec- are engaged by calls of different types is realized in the

Copyright © 2010 SciRes. WSN


220 J. H. Baek ET AL.

following way. As was mentioned before, if upon arrival Phv :  p (n) (nd  nv , N ) , (3)
of an hv-call, there is at least one free channel, this call nS

seizes one of any free channels; otherwise this call is Pov :  p(n) I (nd  nv  N 3 ) , (4)
blocked. With the purpose of defining the proposed CAC nS
for calls of other types, three parameters N1, N2 and N3
(where 1  N1  N2 N3 N) are introduced. It is assumed Phd :  p (n) I (nd  nv  N 2 ) , (5)
nS
that N1 and N2 are multiples of b.
Arrived ov-call is accepted if the number of busy Pod :  p (n) I (nd  nv  N1 ) , (6)
nS
channels is less than N3, otherwise it is blocked. Arrived
od-call (respectively, hd-call) is accepted only in the case where I(A) denoted the indicator function of event А and
at most N1-b (respectively, N2-b) busy channels, other- (i, j) represents Kronecker’s symbols.
wise it is blocked. The mean number of busy channels N is also calcu-
Consider the problem of finding the major QoS met- lated via stationary distribution as follows:
rics of the given multi-parametric CAC strategy – block-
ing (loss) probabilities of calls of each type and overall N

channels utilization. For simplicity of intermediate N :  kp  k  , (7)


k 1
mathematical transformations first we shall assume that
b=1. The case b > 1 is straightforward (see below). where p  k    p  n    nd  nv , k  , k  1, N , are mar-
By adopting an assumption for the type of distribution nS
laws governing the incoming traffics and their holding ginal probability mass functions.
times it becomes possible to describe the operation of an Stationary distribution is determined as a result of the
isolated cell by means of a two-dimensional Markov solution of an appropriate SGBE of the given 2-D MC.
chain (2-D MC), i.e. in a stationary regime the state of However, to solve the last problem one requires labori-
the cell at an arbitrary moment of time is described by a ous computation efforts for large values of N since the
2-D vector n=(nd, nv), where nd (respectively, nv) is the corresponding SGBE has no explicit solution. Very often
number of data (respectively, voice) calls in the channels. the solution of such problems is evident if the corre-
Then the state space of the corresponding Markov chain sponding 2-D MC has reversibility property [15] and
describing this call handling scheme is defined as hence there exists stationary distribution in a multiplica-
follows: tive form. Given the SGBE has a multiplicative solution
S : n : nd  0,1, , N 2 , nv  0,1, , N , nd  nv  N  . (1) only in a special case when N1 = N2 = N3 = N (even in this
case there are known computational difficulties). How-
Elements of generating matrix of this MC ever, by applying Kolmogorov criteria [15] it is easily
q(n,n'), n,n'  S are determined from the following verified that the given 2-D MC is not reversible. Indeed,
relations: according to the mentioned criteria the necessary re-
d if nd  nv  N1  1, n  n  e1 , versibility condition of 2-D MC consists in the fact that
 if the transition from state (i,j) into state (i,j) exists, then
 hd if N1  nd  nv  N 2  1, n  n  e1 ,
there must also be the reverse transition from state (i,j)
v if nd  nv  N 3  1, n  n  e2 , to state (i,j). However, for MC considered this condition

q  n,n   hv if N 3  nd  nv  N  1, n  n  e2 , is not fulfilled. So by the relations (2) in the given MC
n  if n  n  e1 , the transition (nd,nv)(nd -1,nv) exists with intensity ndd
 d d
nv v if n  n  e2 , where nd + nv  N2, but the inverse transition not existing.
 In [13], a recursive technique has been proposed as the
0 in other cases,
solution to the above-mentioned SGBE. It requires mul-
(2) tiple inversion calculations of certain matrices of suffi-
where d:= od + hd , v := ov + hv, e1 = (1,0), e2 = (0,1). ciently large dimensions that in itself is a complex cal-
State diagram of the model and the system of global culating procedure. To overcome the mentioned difficul-
balance equations (SGBE) for the steady state probabili- ties, a new, efficient and refined approximate method for
ties p(n), nS are shown in [13]. Existence of stationary the calculation of the stationary distribution of the given
regime is proved by the fact that all states of finite-di- model is suggested below. The proposed method, due to
mensional state space S are communicating. right selection of state space splitting of corresponding
Desired QoS metrics are determined via stationary 2-D MC allows one to reduce the solution of the problem
distribution of the initial model. Let Px denote the blo- considered to calculation by explicit formulae which
cking probability of the x-calls, xhv,ov,hd,od. Then contain the known (even tabulated) stationary distribu-
by using the PASTA theorem [14] we obtain: tions of classical queuing models.

Copyright © 2010 SciRes. WSN


J. H. Baek ET AL. 221

For correct application of phase merging algorithms  N3  k  i    N 3  k N  k  i 


1

(PMA) it is assumed below that v  d and v  d.  k (0)    v   v   hv  ,


This assumption is not extraordinary for an integrating where  i  0 i !   hv  i  N3  k 1 i ! 
 
voice/data CWN, since this is a regime that commonly  v : v / v , hv : hv / v .
occurs in multimedia networks, in which wideband
d-calls have both longer holding times and significantly Then, from (2) and (11) by means of PMA elements of
smaller arrival rates than narrowband v-calls, e.g. see [16, generating matrix of a merged model q   k ,  k '   ,
17]. Moreover, it is more important to note, that the final  k ,  k '  S are found:
results as shown below, are independent of traffic pa-
 N1  k 1 N 2  k 1
rameters, and are determined from their ratio, i.e. the d   k  i   hd   k  i 
developed approach can provide a refined approximation  i 0 i  N1 1
even when parameters of heterogeneous traffic are only if 0  k  N1  1, k   k  1,
moderately distinctive.  N  k 1
 2

hd   k  i 
The following splitting of state space (1) is examined:
N2
S   S k , S k  S k '  , k  k ' , (8) q   k ,  k '     i 0
(12)
 if N 
1  k  N 2  1, k  k  1,
k 0
k 
where S k : n  S : nd  k  .  d
Further state classes Sk combine into separate merged if k   k  1,
states <k> and the following merging function in state 0

space S is introduced: in other cases.
U (n)  k  if n  S k , k  0, N 2 . (9)
The latter formula allows determining the stationary
Function (9) determines the merged model which is a distribution of a merged model. It coincides with an ap-
one-dimensional Markov chain (1-D MC) with the state propriate distribution of state probabilities of a 1-D BDP,
 
space S :  k : k  0, N . Then, according to PMA,
2 for which transition intensities are determined in accor-
dance with (12). Consequently, stationary distribution of
the stationary distribution of the initial model approxi-
a merged model is determined as
mately equals:
  0  k
p(k , i )   k (i ) ( k ),  k , i   Sk , k  0, N 2 , (10)  (  k )   q   k  1 ,  k   , k  1, N 2 ,
k !  dk i 1
where   i  :  k , i   S 
k k is stationary distribution of a (13)
1

   k   : k  S  
N2
1 k
split model with state space Sk and where,  ( 0 )  1   k  
q  k  1 ,  k   
is stationary distribution of a merged model, respec-  k 1 k ! d i 1 
tively. Then by using (11) and (13) from (10) stationary dis-
By using (2) we conclude that the elements of gener- tribution of the initial 2-D MC can be found. So, summa-
ating matrix of this 1-D birth-death processes (BDP) rizing the above given and omitting the complex alge-
qk(i,j) are obtained as follows: braic transformations the following approximate formu-
lae for the calculation of QoS metrics (3)–(7) can be
v if i  N 3  k  1, j  i  1, suggested:
 if N 3  k  i  N , j  i  1,

qk  i, j    hv N2

i v if j  i  1, Phv      k    k  N  k  ; (14)
k 0
0 in other cases. N2 N k

So, stationary distribution within class Sk is the same Pov      k    k  i  ; (15)


k 0 i  N3  k
as that M/M/N  k/N  k queuing system where the ser-
N2 N k
vice rate of each channel is constant, v and arrival rates Phd      k  
are variable quantities. Hence k 0

i  N2  k
 k (i ) ; (16)

 vi
 k  0  if 1  i  N 3  k , N1 1 N k N2

 i!
 k (i )  
Pod     k  
k 0 i  N1  k
 k (i )      k   ; (17)
k  N1
N3  k
  v   hvi
k  0  if N 3  k  1  i  N  k , f N2  i 

   N
 hv  i! N   i     k    i  k  .
k (18)
(11) i 1 k 0

Copyright © 2010 SciRes. WSN


222 J. H. Baek ET AL.

 x if 1  x  k , Phd :  p ( n) (nd , R2 )   p  n   nd  nv , N  I  nd  R2  ,


Hereinafter f k  x    nS nS
k if k  i  N . (22)
Now we can develop the algorithm to calculate the
Pod :  p(n) I (nd  R1 )   p  n    n d  nv , N  I  nd  R1  .
QoS metrics of the investigated multi-parametric CAC nS nS
for the similar model with wide-band d-calls (due to the (23)
limited volume of work this algorithm does not present
here). Unlike the CAC based on the guard channel strategy,
it is easy to see that under this one there is no circulation
flow in the state diagram of the underlying 2-D MC, i.e.,
3. The CAC Based on Threshold Strategy reversible [15]. In other words, there is a general solution
to the system of local balance equations (SLBE) in this
Now we consider an alternative CAC in the integrated
chain. Therefore, by choosing any path between these
voice/data networks which is based on a threshold strat-
states in the state diagram, we can express any state
egy. A more detailed description of the given CAC, fol-
probability p(nd,nv) using the state probability p(0,0). So,
lows. As in the CAC based on guard channels, we as-
in case R2+R3  N we get the following multiplicative
sume that an arrived hv-call is accepted as long as at
solution for stationary distribution of the underlying 2-D
least one free channel is available; otherwise it is blocked.
MC:
For the purpose of definition of CAC based on a thresh-
old strategy for calls of other types, three parameters R1,  dnd  vnv
R2 and R3, where 1  R1  R2  R3  N are introduced.    p  0, 0  ,
Then the proposed CAC defines the following rules for  nd ! nv !
admission of heterogeneous calls: an od-call (respec- if nd  R1 , nv  R3 ,

tively, hd-call and ov-call) is accepted only if the number  dnd  hvnv   v  R3
of calls of the given type in progress is less than R1 (re-      p  0, 0  ,
spectively, R2 and R3) and a free channel is available;  nd ! nv !   hv 
otherwise it is blocked. if n  R , R  n  N ,
 d
p  nd , nv   
1 3 v
For the sake of simplicity we shall assume that b=1. R1 (24)
 hd  v   d 
nd nv

 n !  n !      p  0, 0  ,
The case b > 1 is straightforward (see Section 2). The
state of the system under the given CAC at any time is  d v  hd 
also described by 2-D vector n = (nd, nv), where nd (re- if R1  nd  R2 , nv  R3 ,
spectively, nv) is the number of data (respectively, voice)  R R
calls in the channels. Then state space of appropriate 2-D  hdnd  hvnv   d  1   v  3
MC is given by:        p  0, 0  ,
 nd ! nv !   hd    hv 
 
S : n : nd  0, R2 , nv  0, N ; nd  nv  N . (19) if R  n  R , R  n  N ,
 1 d 2 3 v

The elements of generating matrix of the appropriate where p(0,0) is determined from normalizing condition,
2-D MC in this case is determined as follows:   nd  nv    R3 R1
 dn  hvn
d
 
v

p (0, 0)    d  v   v  n   d 
d if nd  R1  1, n  n  e1 ,  nS1 nd ! nv !   hv  d ! nv !   hd 
  nS 2

 hd if R1  nd  R2  1, n  n  e1 , 1
 hdn  hvn 
R1 R3
 hdn  vn
d
   
v d v

v

if nv  R3  1, n  n  e2 ,    d   v 
nd ! nv   hd    hv 
  
nd ! nv ! 
q  n,n  hv 
nT3 nS 2
if R3  nv  N  1, n  n  e2 , (20)
n  if n  n  e1 , Here we use the following notations: d: =d/d, hd:
 d d
nv v if n  n  e2 , =hd/d;

0 in other cases. S1 : n  S : nd  R1 , nv  R3  ,
S 2 : n  S : nd  R1 , R3  1  nv  N  ,
Blocking probability of hv-calls and the mean number
of busy channels are defined similarly to (3) and (7), 
S 3 : n  S : R1  1  nd  R 2 , nv  R3 , 
respectively. The other QoS metrics are defined as the
S 4 : n  S : R1  1  nd  R2 , R3  1  nv  N  .
following marginal distributions of initial chain:
Pov :  p(n) I (nv  R3 ) , (21) In the case R2 + R3 > N stationary distribution has the
nS following form:

Copyright © 2010 SciRes. WSN


J. H. Baek ET AL. 223

 dnd  vnv v if i  R3  1, j  i  1,


   p  0, 0  , 
 nd ! nv !  if R3  i  N  1, j  i  1,
qk  i, j    hv
if 0  nd  R1 , 0  nv  R3 , i v if j  i  1,
 0
 hdnd  vnv   d  R2 in other cases.
     p  0, 0  ,
p  nd , nv    nd ! nv !   hd  (25) From the last formula we conclude that the stationary
if R  1  n  R , 0  n  N  n , distribution within class Sk is the same as that of the
 1 d 2 v d M/M/N  k/N  k queuing system with state-dependent
 nd  nv    R3 arrival rates and constant service rate of each channel, i.e.
 d  hv   v   p  0, 0  ,
 nd ! nv !   hv   vi
  k  0  if 1  i  R3 ,
if 0  nd  N  R3  1, R3  1  nv  N ,  i!
 k (i )   R3 (26)
  v   hv   0  if R  1  i  N  k ,
i
where
  nd  nv    R1    i ! k 3
 hv 
R3
 hdn  vn
d v
 
p  0, 0     d  v   d     v 
 nT1 nd ! nv !   hd  nd ! nv !   hv  1
 nT2
 R3  i    R3 N k
 hvi 
1 where  k (0)    v   v    .
 dn  hvn 
d v
 i  0 i !   hv  i! 

nT3
 ;
nd ! nv 
 i  R3 1

So, from (20) and (26) we conclude that elements of
T1 : n  S : 0  nd  R1 , 0  nv  R3  the generating matrix, of the merged model, are

T2 : n  S : R1  1  nd  R2 , 0  nv  N  nd  , d 1   k  N  k  

if 0  k  R1  1, k   k  1,
T3 : n  S : 0  nd  N  R3  1, R3  1  nv  N  
hd 1   k  N  k  
The exact method to determine the steady state 
probabilities, in terms of a multiplicative representation q   k ,  k '    if R1  k  R2  1, k   k  1, (27)
(25) (or (26)) for large values of N, encounters numerical k d
problems such as imprecision and overflow. These are 
related to the fact that with such a method the entire state if k   k  1,
0
space has to be generated, and large factorials and 
powers, close to zero, of the quantities (for low loads) or in other cases.
large values (for high loads) have to be calculated, i.e.
Distribution of the merged model is calculated by us-
there arises the problem of exponent overflow or
ing (27) and has the following form:
underflow. Hence we can use a developed approximate
method to determine the QoS metrics of the model,   0  k
under the use of the proposed CAC based on threshold  ( k  )   q   k  1 ,  k   , k  1, R2 ,
k ! dk i 1
strategy, even when state space (19) is large.
(28)
As in Section 2, we assume that v  d and v  d
1
and examine the following splitting of the state space  R2
1 k 
where,  ( 0 )   1   k  
q  k  1 ,  k    .
 k 1 k !  d i 1
R2

S   S k , S k  S k '  , k  k ' ,
k 0 Finally the following approximate formulae to
calculate the desired QoS metrics, under the use of the
where S k : n  S : nd  k  .
proposed CAC based on the threshold strategy, are
Next classes of states Sk are combined into individual obtained:
merged states <k> and in (19) the merged function with R2

range S :  k : k  0,1, , R2  which is similar to Phv      k    k  N  k  ; (29)


k 0
(27) is introduced. As in the exact algorithm, in order to R2 N k
find the stationary distribution within splitting classes Sk Pov      k     k  i  ; (30)
we will distinguish two cases: 1) R2+R3  N and 2) R2+R3 k 0 i  R3
> N. In the first case, the elements of the generating R2 1
matrix, of appropriate 1-D BDP, are the same for all Phd     R2        k   k  N  k  ; (31)
splitting models, i.e. k 0

Copyright © 2010 SciRes. WSN


224 J. H. Baek ET AL.

R2 R1 1
Pod      k        k    N  k  ;
k  R1 k 0
k (32)

N f R2  k 

N av   k    i   k  i . i (33)
k 1 i 0

In the second case (i.e. when R2 + R3 > N) distributions


for splitting models with state space Sk for k = 0,1,
 ,N  R3  1 are calculated by using relations (26) while
distributions for splitting models with state space Sk for k
= N  R3,  ,R2 coincides with distributions of model
M/M/N  k/N  k with loadv erl, see (22). And all stages
of the developed procedure, to calculate the QoS metrics, Figure 1. Blocking probability of v-calls versus N1: 1-Pov;
are the same as in the first case except the calculating of 2-Phv.
Pov. The last QoS metric in this case is calculated as fol-
lows:
N  R3 N k R2
Pov      k    i   
k 0 i  R3
k
k  N  R3 1
   k   k  N  k  .

(34)
4. Numerical Results
First briefly consider some results for the CAC based on
the guard channels strategy in the integrated voice/data
model with four classes of calls. The developed ap-
proximate formulas allow, without any computing diffi-
culties, to carry out the authentic analysis of the QoS Figure 2. Blocking probability of d-calls versus N1: 1-Pod;
metrics in any change of the values of the loading pa- 2-Phd.
rameters in the heterogeneous traffic, satisfying the as-
sumption concerning their ratio (i.e. when v  d and
v  d) and also at any number of channels in a cell.
Some results are shown in Figures 1-3 where N = 16, N3
= 14, N2 = 10, ov = 10, hv = 6, od = 4, hd = 3, v = 10,
d = 2. Behavior of the studied curves fully confirms all
theoretical expectations.
In the given model, at the fixed value of the total
number of channels (N), it is possible to change values of
three threshold parameters (N1, N2 and N3). In other
words, there is three degrees of freedom. Note, that the
increase in value of one of the parameters (in admissible
area) favorably influences the blocking of the probability Figure 3. Average number of busy channels versus N1: 1-N3
of calls of the corresponding type only (see Figures 1 = 15; 2-N3 = 11.
and 2). So, in these experiments, the increase in value of
the parameter N1 leads to a reduction of the blocking geneous traffic, the exact and approximate values (AV)
probability of od-calls, but other blocking probabilities almost completely coincide in all QoS metrics. Therefore
(i.e. Phv, Pov and Phd) increase. At the same time, the in- these comparisons are not shown here. At the same time,
crease in value of any parameter leads to an increase in it is obvious that finding the exact values of QoS metrics
the overall channels utilization (see Figure 3). on the basis of the solution of SGBE appears effective
Research in other directions consists of an estimation only for models with moderate dimension.
of the accuracy of the developed approximate formulas It is important to note the sufficiently high accuracy
to calculate the QoS metrics. Exact values (EV) of QoS of the suggested formulae even in the case where the
metrics are determined from SGBE. It is important to accepted assumption about the ratio of the traffic loads is
note, that under fulfilling the mentioned assumptions not fulfilled. To facilitate the computation efforts, as
related to the ratio of the loading parameters of hetero exact values of QoS metrics, we use their values calcu-

Copyright © 2010 SciRes. WSN


J. H. Baek ET AL. 225

lated from explicit formulas, see [21]. In mentioned work, R2, R3 (for CAC based on the threshold strategy). As
appropriate results are obtained in the special case b = 1 mentioned above, the behavior of the QoS metrics, with
and v = d. Let's note, that condition v = d contradicts respect to the indicated controllable parameters, in dif-
our assumption v  d. Highest accuracy of the devel- ferent CAC, are the same.
oped approximate formulas is observed at the calculation It is important to note that with the given number of
of the QoS metric for v-calls, since the maximal differ- channels, loads and QoS requirements in either of the
ence between exact and approximate values does not CAC strategies may or may not meet the requirements.
exceed 0.001. Small deviations take place in the calcula- For instance, in the model of mono-service CWN for the
tion of the QoS metrics for d-calls, but also thus in the given values of N = 100, o = 50 erl, h = 35 erl follow-
~
worst case scenario the absolute error of the proposed ing requirements Po  0.1, Ph  0.007 and N  80 are not
formulas does not exceed 0.09, that are quite compre- met with CAC based on guard channels irrespective of
hensible in an engineering practice. Similar results are the value of the parameter g (number of guard channels),
observed for an average number of occupied channels of whereas CAC based on individual pool only for h-calls
a cell. It is important to note, that numerous numerical (i.e. ro = 0) meets the requirements at rh = 40. However,
experiments have shown, that at all admissible loads, the for the same given initial data, requirements Po  0.3, Ph
accuracy of the proposed approximate formulas grows ~
 0.0001 and N  60 are only met by CAC based on the
with the increase in the value of the total number of guard channel scheme at g = 20, and never met by CAC
channels. It is clear that in terms of simplicity and effi- based on the individual pool strategy irrespective of the
ciency, the proposed approach is emphatically superior value of its parameter rh. Thus it is possible to find the
to the approach based on the use of balance equations to optimal strategy (in a given context) at the given loads
calculate the QoS metrics of the given CAC in the model without changing the number of channels.
with a non-identical channel occupancy time. Apparently, both strategies have the same implemen-
Also note, that high accuracy in the calculation of the tation complexity. That is why the selection of either of
QoS metrics for v-calls is observed even at those load- them, at each particular case, must be based on the an-
ings which do not satisfy any of the accepted assump- swer to the following question: does it meet the given
tions above concerning the ratio of intensities of hetero- QoS requirements? These issues are a subject to a sepa-
geneous traffic. So, for example, at the same values of rate investigation.
number of channels and parameters of strategy, at ov = 4,
hv = 3, od = 10, hd = 6, v = d = 2 (i.e. when assump- 5. Conclusions
tions v  d, v  d are not fulfilled) the absolute error
for the mentioned QoS metric does not exceed 0.002. In this paper, an effective and refined approximate
Similar results are observed for an average number of approach to the performance analysis of the un-buffered
occupied channels of a cell. However, the proposed ap- integrated voice/data CWN, under different multi-
proximate formulas show low accuracy for d-calls since parametric CAC, has been proposed. Note that many
for them the maximal absolute error exceeds 0.2. well-known results related to the mono-service CWN are
Numerical experiments with the CAC based on the special cases of such proposed ones. In almost all of the
threshold strategy are carried out also. Due to the limited available work on devoted mono-service CWN, the
volume of work these results are not presented here. As queuing model is investigated with assumption that both
in CAC based on guard channels, the increase in value of handover and original calls are identical in terms of
one of the parameters (in admissible area), favorably channel occupancy time. This assumption is rather li-
affect the blocking probability of calls of the corre- miting and unrealistic. Here, models of the un-buffered
sponding type only. So, the increase in value of parame- integrated voice/data CWN are explored with more
ter R1 leads to a reduction of the blocking probability of general parameter requirements. Performed numerical
od-calls but other blocking probabilities (i.e. Phv, Pov and results demonstrate high accuracy of the developed
Phd) increase. At the same time, the increase in the value approximate method.
of any parameter leads to an increase in the overall It is important to note that the proposed approach may
channels utilization. facilitate the solution of problems related to the selection
At the end of this section we conducted research on of the optimal (in given sense) values of parameters in
comparative analysis of QoS metrics of two schemes: the investigated multi-parametric CAC. These problems
CAC based on the guard channels scheme and the CAC are subjects to separate investigation.
based on the threshold strategy. Comparison was done in
the broad range of the number of channels and load pa- 6. Acknowledgements
rameters. In each access strategy the total number of
channels is fixed and controllable parameters are N1, N2, This research has been supported by Sangji University
N3 (for CAC based on the guard channels scheme) and R1, Research Fund 2009.

Copyright © 2010 SciRes. WSN


226 J. H. Baek ET AL.

7. References tion networks,” Kluwer Academic Publishers, Boston,


2002.
[1] S. Tekinay and B. Jabbari, “Handover policies and chan- [12] S. Nanda, “Teletraffic models for urban and suburban
nel assignment strategies in mobile cellular networks,” microcells: Cell sizes and hand-off rates,” IEEE Transac-
IEEE Communication Magazine, Vol. 29, No. 11, pp. tions on Vehicular Technology, Vol. 42, No. 4, pp. 673–
42–46, 1991. 682, 1993.
[2] I. Katzela and M. Naghshineh, “Channel assignment sch- [13] S. E. Ogbonmwan and L. Wei, “Multi-threshold band-
emes for cellular mobile telecommunication systems,” width reservation scheme of an integrated voice/data
IEEE Personal Communications, pp. 10–31, June 1996. wireless network,” Computer Communications, Vol. 29,
No. 9, pp. 1504–1515, 2006.
[3] S. DasBit and S. Mitra, “Challenges of computing in
mobile cellular environment—a survey,” Computer Com- [14] R. W. Wolff, “Poisson arrivals see time averages,” Op-
munications, Vol. 26, pp. 2090–2105, 2003. erations Research, Vol. 30, No. 2, pp. 223–231, 1992.
[4] R. J. Boucherie and M. Mandjes, “Estimation of per- [15] F. P. Kelly, “Reversibility and stochastic networks,” John
formance measures for product form cellular mobile Wiley & Sons, New York, 1979.
communications networks,” Telecommunication Systems, [16] V. Casares-Giner, “Integration of dispatch and intercon-
Vol. 10, pp. 321–354, 1998. nect traffic in a land mobile trunking system. Waiting
[5] R. J. Boucherie and N. M. Van Dijk, “On a queuing net- time distributions,” Telecommunication Systems, Vol. 16,
work model for cellular mobile telecommunications net- No. 3–4, pp. 539–554, 2001.
works,” Operation Research, Vol. 48, No. 1, pp. 38–49, [17] A. G. Greenberg, R. Srikant, and W. Whitt, “Resource
2000. sharing for book-ahead and instantaneous-request calls,”
[6] W. Li and X. Chao, “Modeling and performance evalua- IEEE/ACM Transactions on Networking, Vol. 7, No. 1,
tion of cellular mobile networks,” IEEE/ACM Transac- pp. 10–22, 1999.
tions on Networking, Vol. 12, No. 1, pp. 131–145, 2004. [18] A. Z. Melikov and A. T. Babayev, “Refined approxima-
[7] D. Hong and S. S. Rapoport, “Traffic model and per- tions for performance analysis and optimization of queu-
formance analysis of cellular mobile radio telephones ing model with guard channels for handovers in cellular
systems with prioritized and non-prioritized handoff pro- networks,” Computer Communications, Vol. 29, No. 9,
cedures,” IEEE Transactions on Vehicular Technology, pp. 1386–1392, 2006.
Vol. 35, No. 3, pp. 77–92, 1986. [19] R. L. Freeman, “Reference manual for telecommunica-
[8] G. Haring, R. Marie, R. Puigjaner, and K. Trivedi, “Loss tions engineering,” John Wiley & Sons, New York, 1994.
formulas and their application to optimization for cellular [20] A. Z. Melikov, M. I. Fattakhova, and A. T. Babayev,
networks,” IEEE Transactions on Vehicular Technology, “Investigation of cellular communication networks with
Vol. 50, No. 3, pp. 664–673, 2001. private channels for service of handover calls,” Auto-
[9] B. Gavish and S. Sridhar, “Threshold priority policy for matic Control and Computer Sciences, Vol. 39, No. 3, pp.
channel assignment in cellular networks,” IEEE Transac- 61– 69, 2005.
tions on Computers, Vol. 46, No. 3, pp. 367–370, 1997. [21] H. Chen, L. Huang, S. Kumar, an d C. C. Kuo, “Radio
[10] V. S. Korolyuk and V. V. Korolyuk, “Stochastic model of resource management for multimedia QoS supports in
systems,” Kluwer Academic Publishers, Boston, 1999. wireless networks,” Kluwer Academic Publishers, Boston,
[11] W. Yue and Y. Matsumoto, “Performance analysis of 2004.
multi-channel and multi-traffic on wireless communica-

Copyright © 2010 SciRes. WSN

You might also like