1,204 research outputs found

    STOCHASTIC MODELING AND TIME-TO-EVENT ANALYSIS OF VOIP TRAFFIC

    Get PDF
    Voice over IP (VoIP) systems are gaining increased popularity due to the cost effectiveness, ease of management, and enhanced features and capabilities. Both enterprises and carriers are deploying VoIP systems to replace their TDM-based legacy voice networks. However, the lack of engineering models for VoIP systems has been realized by many researchers, especially for large-scale networks. The purpose of traffic engineering is to minimize call blocking probability and maximize resource utilization. The current traffic engineering models are inherited from the legacy PSTN world, and these models fall short from capturing the characteristics of new traffic patterns. The objective of this research is to develop a traffic engineering model for modern VoIP networks. We studied the traffic on a large-scale VoIP network and collected several billions of call information. Our analysis shows that the traditional traffic engineering approach based on the Poisson call arrival process and exponential holding time fails to capture the modern telecommunication systems accurately. We developed a new framework for modeling call arrivals as a non-homogeneous Poisson process, and we further enhanced the model by providing a Gaussian approximation for the cases of heavy traffic condition on large-scale networks. In the second phase of the research, we followed a new time-to-event survival analysis approach to model call holding time as a generalized gamma distribution and we introduced a Call Cease Rate function to model the call durations. The modeling and statistical work of the Call Arrival model and the Call Holding Time model is constructed, verified and validated using hundreds of millions of real call information collected from an operational VoIP carrier network. The traffic data is a mixture of residential, business, and wireless traffic. Therefore, our proposed models can be applied to any modern telecommunication system. We also conducted sensitivity analysis of model parameters and performed statistical tests on the robustness of the models’ assumptions. We implemented the models in a new simulation-based traffic engineering system called VoIP Traffic Engineering Simulator (VSIM). Advanced statistical and stochastic techniques were used in building VSIM system. The core of VSIM is a simulation system that consists of two different simulation engines: the NHPP parametric simulation engine and the non-parametric simulation engine. In addition, VSIM provides several subsystems for traffic data collection, processing, statistical modeling, model parameter estimation, graph generation, and traffic prediction. VSIM is capable of extracting traffic data from a live VoIP network, processing and storing the extracted information, and then feeding it into one of the simulation engines which in turn provides resource optimization and quality of service reports

    Performance model for two-tier mobile wireless networks with macrocells and small cells

    Full text link
    [EN] A new analytical model is proposed to evaluate the performance of two-tier cellular networks composed of macrocells (MCs) and small cells (SCs), where terminals roam across the service area. Calls being serviced by MCs may retain their channel when entering a SC service area, if no free SC channels are available. Also, newly offered SC calls can overflow to the MC. However, in both situations channels may be repacked to vacate MC channels. The cardinality of the state space of the continuous-time Markov chain (CTMC) that models the system dynamics makes the exact system analysis unfeasible. We propose an approximation based on constructing an equivalent CTMC for which a product-form solution exist that can be obtained with very low computational complexity. We determine performance parameters such as the call blocking probabilities for the MC and SCs, the probability of forced termination, and the carried traffic. We validate the analytical model by simulation. Numerical results show that the proposed analytical model achieves very good precision in scenarios with diverse mobility rates and MCs and SCs loads, as well as when MCs overlay a large number of SCs.Authors would like to thank you the anonymous reviewers for the review comments provided to our work that have decisively contributed to improve the paper. Most of the contribution of V. Casares-Giner was done while visiting the Huazhong University of Science and Technolgy (HUST), Whuhan, China. This visit was supported by the European Commission, 7FP, S2EuNet project. The authors from the Universitat Politecnica de Valencia are partially supported by the Ministry of Economy and Competitiveness of Spain under grant TIN2013-47272-C2-1-R and TEC2015-71932-REDT. The research of Xiaohu Ge was supported by the National Natural Science Foundation of China (NSFC) grant 61210002, the Fundamental Research Funds for the Central Universities grant 2015XJGH011, and China International Joint Research Center of Green Communications and Networking grant 2015B01008.Casares-Giner, V.; Martínez Bauset, J.; Ge, X. (2018). Performance model for two-tier mobile wireless networks with macrocells and small cells. Wireless Networks. 24(4):1327-1342. https://doi.org/10.1007/s11276-016-1407-8S13271342244ABIresearch. (2016). In-building mobile data traffic forecast. ABIreseach, Technical Report.NGMN Alliance. (2015). Recommendations for small cell development and deployment. NGMN Alliance, Technical Report.Chandrasekhar, V., Andrews, J., & Gatherer, A. (2008). Femtocell networks: A survey. IEEE Communications Magazine, 46(9), 59–67.Yamamoto, T., & Konishi, S. (2013). Impact of small cell deployments on mobility performance in LTE-Advanced systems. In IEEE PIMRC workshops (pp. 189–193).Balakrishnan, R., & Akyildiz, I. (2016). Local anchor schemes for seamless and low-cost handover in coordinated small cells. IEEE Transactions on Mobile Computing, 15(5), 1182–1196.Zahir, T., Arshad, K., Nakata, A., & Moessner, K. (2013). Interference management in femtocells. IEEE Communications Surveys & Tutorials, 15(1), 293–311.Yassin, M., AboulHassan, M. A., Lahoud, S., Ibrahim, M., Mezher, D., Cousin, B., & Sourour, E. A. (2015). Survey of ICIC techniques in LTE networks under various mobile environment parameters. Wireless Networks, 1–16.Andrews, M., & Zhang, L. (2015). Utility optimization in heterogeneous networks via CSMA-based algorithms. Wireless Networks, 1–14.El-atty, S. M. A., & Gharsseldien, Z. M. (2016). Performance analysis of an advanced heterogeneous mobile network architecture with multiple small cell layers. Wireless Networks, 1–22.Huang, Q., Huang, Y.-C., Ko, K.-T., & Iversen, V. B. (2011). Loss performance modeling for hierarchical heterogeneous wireless networks with speed-sensitive call admission control. IEEE Transactions on Vehicular Technology, 60(5), 2209–2223.Bonald, T., & Roberts, J. W. (2003). Congestion at flow level and the impact of user behaviour. Computer Networks, 42, 521–536.Lee, Y. L., Chuah, T. C., Loo, J., & Vinel, A. (2014). Recent advances in radio resource management for heterogeneous LTE/LTE-A networks. IEEE Communications Surveys & Tutorials, 16(4), 2142–2180.Rappaport, S. S., & Hu, L.-R. (1994). Microcellular communication systems with hierarchical macrocell overlays: Traffic performance models and analysis. Proceedings of the IEEE, 82(9), 1383–1397.Ge, X., Han, T., Zhang, Y., Mao, G., Wang, C.-X., Zhang, J., et al. (2014). Spectrum and energy efficiency evaluation of two-tier femtocell networks with partially open channels. IEEE Transactions on Vehicular Technology, 63(3), 1306–1319.Song, W., Jiang, H., & Zhuang, W. (2007). Performance analysis of the WLAN-first scheme in cellular/WLAN interworking. IEEE Transactions on Wireless Communications, 6(5), 1932–1952.Ge, X., Martinez-Bauset, J., Gasares-Giner, V., Yang, B., Ye, J., & Chen, M. (2013). Modeling and performance analysis of different access schemes in two-tier wireless networks. In IEEE Globecom (pp. 4402–4407).Tsai, H.-M., Pang, A.-C., Lin, Y.-C., & Lin, Y.-B. (2005). Repacking on demand for hierarchical cellular networks. Wireless Networks, 11(6), 719–728.Maheshwari, K., & Kumar, A. (2000). Performance analysis of microcellization for supporting two mobility classes in cellular wireless networks. IEEE Transactions on Vehicular Technology, 49(2), 321–333.Whiting, P., & McMillan, D. (1990). Modeling for repacking in cellular radio. In 7th UK Teletraffic Symposium, IEE, Durham.Kelly, F. (1989). Fixed point models of loss networks. The Journal of the Australian Mathematical Society. Series B. Applied Mathematics, 31(02), 204–218.McMillan, D. (1991). Traffic modelling and analysis for cellular mobile networks. In A. Jensen & V. Iversen (Eds.), Proceedigs of ITC-13 (pp. 627–632). IAC. Copenhaguen: Elsevier Science.Fu, H.-L., Lin, P., & Lin, Y.-B. (2012). Reducing signaling overhead for femtocell/macrocell networks. IEEE Transactions on Mobile Computing, 12(8), 1587–1597.Eklundh, B. (1986). Channel utilization and blocking probability in a cellular mobile telephone system with directed retry. IEEE Transactions on Communications, 37, 329–337.Karlsson, J., & Eklundh, B. (1989). A cellular telephone system with load sharing—An enhancement of directed retry. IEEE Transactions on Communications, 37(5), 530–535.Nelson, R. (1995). Probability, stochastic processes and queueing theory. New York: Springer.Iversen, V.B. (Aug. 1987). The exact evaluation of multi-service loss systems with access control. In Proceedings of the Seventh Nordic Teletraffic Seminar (NTS-7) (Vol. 31, pp. 56–61) Lund, (Sweden).Ross, K. W. (1995). Multiservice loss models for broadband telecommunication networks. New York: Springer.Lin, Y.-B., & Mak, V. W. (1994). Eliminating the boundary effect of a large-scale personal communication service network simulation. ACM Transactions on Modeling and Computer Simulation (TOMACS), 4(2), 165–190.Karray, M.K. (2010). Evaluation of the blocking probability and the throughput in the uplink of wireless cellular networks. In IEEE ComNet (pp. 1–8)

    Mobile Networks

    Get PDF
    The growth in the use of mobile networks has come mainly with the third generation systems and voice traffic. With the current third generation and the arrival of the 4G, the number of mobile users in the world will exceed the number of landlines users. Audio and video streaming have had a significant increase, parallel to the requirements of bandwidth and quality of service demanded by those applications. Mobile networks require that the applications and protocols that have worked successfully in fixed networks can be used with the same level of quality in mobile scenarios. Until the third generation of mobile networks, the need to ensure reliable handovers was still an important issue. On the eve of a new generation of access networks (4G) and increased connectivity between networks of different characteristics commonly called hybrid (satellite, ad-hoc, sensors, wired, WIMAX, LAN, etc.), it is necessary to transfer mechanisms of mobility to future generations of networks. In order to achieve this, it is essential to carry out a comprehensive evaluation of the performance of current protocols and the diverse topologies to suit the new mobility conditions

    Modeling of Call Dropping in Well-Established Cellular Networks

    Get PDF
    The increasing offer of advanced services in cellular networks forces operators to provide stringent QoS guarantees. This objective can be achieved by applying several optimization procedures. One of the most important indexes for QoS monitoring is the drop-call probability that, till now, has not deeply studied in the context of a well-established cellular network. To bridge this gap, starting from an accurate statistical analysis of real data, in this paper an original analytical model of the call dropping phenomenon has been developed. Data analysis confirms that models already available in literature, considering handover failure as the main call dropping cause, give a minor contribution for service optimization in established networks. In fact, many other phenomena become more relevant in influencing the call dropping. The proposed model relates the drop-call probability with traffic parameters. Its effectiveness has been validated by experimental measures. Moreover, results show how each traffic parameter affects system performance

    Queueing Networks for Vertical Handover

    Get PDF
    PhDIt is widely expected that next-generation wireless communication systems will be heterogeneous, integrating a wide variety of wireless access networks. Of particular interest recently is a mix of cellular networks (GSM/GPRS and WCDMA) and wireless local area networks (WLANs) to provide complementary features in terms of coverage, capacity and mobility support. If cellular/ WLAN interworking is to be the basis for a heterogeneous network then the analysis of complex handover traffic rates in the system (especially vertical handover) is one of the most essential issues to be considered. This thesis describes the application of queueing-network theory to the modelling of this heterogeneous wireless overlay system. A network of queues (or queueing network) is a powerful mathematical tool in the performance evaluation of many large-scale engineering systems. It has been used in the modelling of hierarchically structured cellular wireless networks with much success, including queueing network modelling in the study of cellular/ WLAN interworking systems. In the process of queueing network modelling, obtaining the network topology of a system is usually the first step in the construction of a good model, but this topology analysis has never before been used in the handover traffic study in heterogeneous overlay wireless networks. In this thesis, a new topology scheme to facilitate the analysis of handover traffic is proposed. The structural similarity between hierarchical cellular structure and heterogeneous wireless overlay networks is also compared. By replacing the microcells with WLANs in a hierarchical structure, the interworking system is modelled as an open network of Erlang loss systems and with the new topology, the performance measures of blocking probabilities and dropping probabilities can be determined. Both homogeneous and non-homogeneous traffic have been considered, circuit switched and packet-switched. Example scenarios have been used to validate the models, the numerical results showing clear agreement with the known validation scenarios

    Teletraffic engineering and network planning

    Get PDF

    Mobility modeling and management for next generation wireless networks

    Get PDF
    Mobility modeling and management in wireless networks are the set of tasks performed in order to model motion patterns, predict trajectories, get information on mobiles\u27 whereabouts and to make use of this information in handoff, routing, location management, resource allocation and other functions. In the literature, the speed of mobile is often and misleadingly referred to as the level of mobility, such as high or low mobility. This dissertation presents an information theoretic approach to mobility modeling and management, in which mobility is considered as a measure of uncertainty in mobile\u27s trajectory, that is, the mobility is low if the trajectory of a mobile is highly predictable even if the mobile is moving with high speed. On the other hand, the mobility is high if the trajectory of the mobile is highly erratic. Based on this mobility modeling concept, we classify mobiles into predictable and non-predictable mobility classes and optimize network operations for each mobility class. The dynamic mobility classification technique is applied to various mobility related issues of the next generation wireless networks such as location management, location-based services, and energy efficient routing in multihop cellular networks

    Delay based approach to support low priority users in preemptive wireless networks

    Get PDF
    Title from PDF of title page, viewed on January 27, 2012Thesis advisor: Cory C. BeardVitaIncludes bibliographic references (p. 39)Thesis (M.S.)--School of Computing and Engineering. University of Missouri--Kansas City, 2011At times of serious disasters (natural or man-made), wireless networks are quickly congested due to the sheer volume and stress on network resources, and, preferential treatment is necessary for National Security/Emergency Preparedness (NS/EP) users to combat the disaster by responding effectively and potentially save many lives. Under such circumstances, with scarce resources, the new request for sessions are denied and worse even, active sessions are dropped for general public whilst they have come to rely on these resources and depend on them especially during distressed times. Prior research has been conducted to examine upper limit (UL) and preemptive approaches to support emergency users but the traditional approach of blocking the capacity for emergency users is, from one perspective, restrictive to the general public. In this thesis, we propose the delay-based soft preemptive approach to support the low priority users and provide an alternative to several preemptive policies by further examining them. We provide a queuing algorithm in the network that warns the low priority users with an active session of scarce resources thereby giving them an opportunity to complete their session prior to reducing the quality of service (QoS) of their session and moving their bandwidth to emergency users, if blocked. The emergency users in turn wait for the resources to become available and are on hold until resources become available. By creating a queuing modeling system for this algorithm, we present simulation model in C with results of our delay-based soft preemptive approach and examine other preemptive approaches to provide a comparative analysis. The results demonstrate that increasing the warning time also increases the number of sessions blocked for emergency users as well as general public due to further constraining the resources, however, this reduces the inconvenience of preemption caused to the low priority users.Introduction -- Related work -- Algorithm and simulations -- Analysis and results -- Conclusio
    • …
    corecore