35 research outputs found

    Call Blocking Probabilities of Multirate Elastic and Adaptive Traffic under the Threshold and Bandwidth Reservation Policies, Journal of Telecommunications and Information Technology, 2016, nr 1

    Get PDF
    This paper proposes multirate teletraffic loss models of a link that accommodates different service-classes of elastic and adaptive calls. Calls follow a Poisson process, can tolerate bandwidth compression and have an exponentially distributed service time. When bandwidth compression occurs, the service time of new and in-service elastic calls increases. Adaptive calls do not alter their service time. All calls compete for the available link bandwidth under the combination of the Threshold (TH) and the Bandwidth Reservation (BR) policies. The TH policy can provide different QoS among service-classes by limiting the number of calls of a service-class up to a predefined threshold, which can be different for each service-class. The BR policy reserves part of the available link bandwidth to benefit calls of high bandwidth requirements. The analysis of the proposed models is based on approximate but recursive formulas, whereby authors determine call blocking probabilities and link utilization. The accuracy of the proposed formulas is verified through simulation and found to be very satisfactory

    Journal of Telecommunications and Information Technology, 2018, nr 1

    Get PDF
    We consider a two-link system that accommodates Poisson arriving calls from different service-classes and propose a multirate teletraffic loss model for its analysis. Each link has two thresholds, which refer to the number of in-service calls in the link. The lowest threshold, named support threshold, defines up to which point the link can support calls offloaded from the other link. The highest threshold, named offloading threshold, defines the point where the link starts offloading calls to the other link. The adopted bandwidth sharing policy is the complete sharing policy, in which a call can be accepted in a link if there exist enough available bandwidth units. The model does not have a product form solution for the steady state probabilities. However, we propose approximate formulas, based on a convolution algorithm, for the calculation of call blocking probabilities. The accuracy of the formulas is verified through simulation and found to be quite satisfactory

    QoS Equalization in a W-CDMA Cell Supporting Calls of Innite or Finite Sources with Interference Cancelation, Journal of Telecommunications and Information Technology, 2014, nr 3

    Get PDF
    In this paper, a multirate loss model for the calculation of time and call congestion probabilities in a Wideband Code Division Multiple Access (W-CDMA) cell is considered. It utilizes the Bandwidth Reservation (BR) policy and supports calls generated by an innite or nite number of users. The BR policy achieves QoS equalization by equalizing congestion probabilities among calls of dierent service-classes. In the proposed models a multiple access interference is considered, and the notion of local blocking, user's activity and interference cancelation. Although the analysis of the proposed models reveals that the steady state probabilities do not have a product form solution, the authors show that the calculation of time and call congestion probabilities can be based on approximate but recursive formulas, whose accuracy is veried through simulation and found to be quite satisfactory

    Semi-grant-free non-orthogonal multiple access for tactile Internet of Things

    Get PDF
    Ultra-low latency connections for a massive number of devices are one of the main requirements of the next-generation tactile Internet-of-Things (TIoT). Grant-free non-orthogonal multiple access (GF-NOMA) is a novel paradigm that leverages the advantages of grant-free access and non-orthogonal transmissions, to deliver ultra-low latency connectivity. In this work, we present a joint channel assignment and power allocation solution for semi-GF-NOMA systems, which provides access to both grant-based (GB) and grant-free (GF) devices, maximizes the network throughput, and is capable of ensuring each device’s throughput requirements. In this direction, we provide the mathematical formulation of the aforementioned problem. After explaining that it is not convex, we propose a solution strategy based on the Lagrange multipliers and subgradient method. To evaluate the performance of our solution, we carry out system-level Monte Carlo simulations. The simulation results indicate that the proposed solution can optimize the total system throughput and achieve a high association rate, while taking into account the minimum throughput requirements of both GB and GF devices

    Probabilistic Retry and Threshold Multirate Loss Models for Impatient Calls

    No full text
    In this paper, a link of fixed capacity is considered that services calls from different service-classes. Calls arrive in the link according to a Poisson process, have an initial (peak) bandwidth requirement while their service time is exponentially distributed. We model this system as a multirate loss system and analyze two different multirate loss models. In the first model, named probabilistic retry loss model, if there is no available link bandwidth, a new call is blocked but retries with a lower bandwidth requirement and increased service time. To allow for the fact that a blocked call may be impatient, we assume that it retries with a probability. In the second model, named probabilistic threshold loss model, a call may reduce its bandwidth requirement (before blocking occurs) based on the occupied link bandwidth. To determine call blocking probabilities in both multirate loss models, we show that approximate but recursive formulas do exist that provide quite satisfactory results compared to simulation

    Efficient Multirate Teletraffic Loss Models Beyond Erlang

    No full text
    Efficient Multirate Teletraffic Loss Models Beyond Erlang is an easy-to-read book filled with numerous efficient teletraffic loss models. Presented in three sections—Teletraffic Models of Random Input, Teletraffic Models of Quasi-Random Input, and Teletraffic Models of Batched Poisson Input—it covers everything that a professional experienced with optimization and dimensioning of telecom networks could ever need to know. This unique book provides a detailed explanation on how efficient multirate teletraffic loss models are extracted and applied, and guides readers through almost all network technologies and services. Starting from the basics, it steadily increases in difficulty to keep the book self-contained and to provide a better understanding to those who might be new to the subject. It includes detailed explanations of the complex teletraffic models—many of which were developed by the authors. Tutorial examples, several backed by supplementary software, are accompanied by intermediate results and figures. Additionally, end-of-chapter applications describe the applicability of the models to modern network technologies, updating the incorporated teletraffic models of commercial packages/tools
    corecore