Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2011

Open Access 01.12.2011 | Research Article

An Efficient Method for Proportional Differentiated Admission Control Implementation

verfasst von: Vladimir Shakhov, Hyunseung Choo

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2011

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The admission control mechanism inspired in the framework of proportional differentiated services has been investigated. The mechanism provides a predictable and controllable network service for real-time traffic in terms of blocking probability. Implementation of proportional differentiated admission control is a complicated computational problem. Previously, asymptotic assumptions have been used to simplify the problem, but it is unpractical for real-world applications. We improve previous solutions of the problem and offer an efficient nonasymptotic method for implementation of proportional differentiated admission control.

1. Introduction

Efficient implementation of admission control mechanisms is a key point for next-generation wireless network development. Actually, over the last few years an interrelation between pricing and admission control in QoS-enabled networks has been intensively investigated. Call admission control can be utilized to derive optimal pricing for multiple service classes in wireless cellular networks [1]. Admission control policy inspired in the framework of proportional differentiated services [2] has been investigated in [3]. The proportional differentiated admission control (PDAC) provides a predictable and controllable network service for real-time traffic in terms of blocking probability. To define the mentioned service, proportional differentiated service equality has been considered and the PDAC problem has been formulated. The PDAC solution is defined by the inverse Erlang loss function. It requires complicated calculations. To reduce the complexity of the problem, an asymptotic approximation of the Erlang B formula [4] has been applied. However, even in this case, the simplified PDAC problem remains unsolved.
In this paper, we improve the previous results in [3] and withdraw the asymptotic assumptions of the used approximation. It means that for the desired accuracy of the approximate formula an offered load has to exceed a certain threshold. The concrete value of the threshold has been derived. Moreover, an explicit solution for the considered problem has been provided. Thus, we propose a method for practical implementation of the PDAC mechanism.
The rest of the paper is organized as follows. In the next section, we give the problem statement. In Section 3, we first present a nonasymptotic approximation of the Erlang B formula. We then use it for a proportional differentiated admission control implementation and consider some alternative problem statements for an admission control policy. In Section 4, we present the results of numerous experiments with the proposed method. Section 5 is a brief conclusion.

2. Problem Statement

Let us consider the concept of admission control inspired in the framework of proportional differentiated services. In the above paper [3], whose notation we follow, PDAC problem is defined as
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ1_HTML.gif
(1)
Here,
(i)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq1_HTML.gif : is a number of traffic classes. https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq2_HTML.gif ;
 
(ii)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq3_HTML.gif : is the weight of class https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq4_HTML.gif . This parameter reflects the traffic priority. By increasing the weight, we also increase the admittance priority of corresponding traffic class;
 
(iii)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq5_HTML.gif : is the offered load of class https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq6_HTML.gif traffic;
 
(iv)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq7_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq8_HTML.gif is an allotted partition of the link capacity, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq9_HTML.gif is a bandwidth requirement of class https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq10_HTML.gif connections, and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq11_HTML.gif is the largest integer not greater than https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq12_HTML.gif ;
 
(v)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq13_HTML.gif : is the Erlang loss function, that is, under the assumptions of exponential arrivals and general session holding times [5], it is the blocking probability for traffic of class https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq14_HTML.gif .
 
It needs to find https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq15_HTML.gif taking into account known https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq16_HTML.gif and the restriction imposed by given link capacity, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq17_HTML.gif :
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ2_HTML.gif
(2)
Let us remark that variations of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq18_HTML.gif imply a discrete changing of the function https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq19_HTML.gif . Hence, it is practicably impossible to provide the strict equality in (1). It is reasonable to replace (1) by an approximate equality as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ3_HTML.gif
(3)
But, even in this case, the above problem is difficult and complex combinatorial problem. For its simplification, the following asymptotic approximation has been used [3]. If the capacity of link and the offered loads are increased together:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ4_HTML.gif
(4)
and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq20_HTML.gif , then the Erlang loss function
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ5_HTML.gif
(5)
can be approximated by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ6_HTML.gif
(6)
Taking into account the PDAC problem, the authors of [3] consider the limiting regime when
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ7_HTML.gif
(7)
and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq21_HTML.gif . Under these conditions, the asymptotic approximation of the Erlang B formula has been used and (1) has been replaced by simplified equations as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ8_HTML.gif
(8)
In practice, the limited regime (7) is not appropriate. But the simplification (8) can be used without the conditions (7). Actually, the approximation (6) can be applied without the condition (4). We prove it below.

3. Offered Technique

3.1. Approximate Erlang B Formula

We assert that for the desired accuracy of the approximation (6) an offered load has to exceed a certain threshold. The concrete value of the threshold is given by the following theorem.
Theorem 1.
For any small https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq22_HTML.gif , if
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ9_HTML.gif
(9)
then
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ10_HTML.gif
(10)
Proof.
Here and below, we use the following designation:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ11_HTML.gif
(11)
Assume that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq23_HTML.gif . First, we rewrite the Erlang B formula
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ12_HTML.gif
(12)
Remark that
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ13_HTML.gif
(13)
Taking into account properties of geometrical progression, we have
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ14_HTML.gif
(14)
Hence
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ15_HTML.gif
(15)
To prove the second inequality of the theorem, we use the following upper bound of the Erlang loss function [6]:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ16_HTML.gif
(16)
Transform this as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ17_HTML.gif
(17)
It implies
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ18_HTML.gif
(18)
We have https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq24_HTML.gif . Hence,
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ19_HTML.gif
(19)
Thus, for any https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq25_HTML.gif such that
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ20_HTML.gif
(20)
it follows that
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ21_HTML.gif
(21)
From the inequality (20), we obtainthe condition (9).
The proof is completed.
Note that the approximate formula (6) can provide the required accuracy https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq26_HTML.gif in the case of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq27_HTML.gif . Actually, if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq28_HTML.gif , then the required accuracy is reached for https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq29_HTML.gif . Thus, the condition (9) is sufficient but not necessary. It guarantees the desired accuracy of the approximation for any small https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq30_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq31_HTML.gif .

3.2. PDAC Solution

Assume that the solution https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq32_HTML.gif of the PDAC problem satisfies inequalities https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq33_HTML.gif . Let us derive an analytical solution for the PDAC problem under the condition (8). Without reducing generality, assume that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq34_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq35_HTML.gif . Indeed, if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq36_HTML.gif , then we define new weights https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq37_HTML.gif . Thus, the condition (8) can be reformulated as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ22_HTML.gif
(22)
According to the transitivity property, any solution of the PDAC problem under condition (8) is also a solution of the PDAC problem under condition (22). Therefore,
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ23_HTML.gif
(23)
Using the equality (2), we get
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ24_HTML.gif
(24)
where
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ25_HTML.gif
(25)
Thus, the formulas (23)–(25) provide the implementation of proportional differentiated admission control.
It is clear that for some values https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq38_HTML.gif , we can obtain https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq39_HTML.gif in (24) or https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq40_HTML.gif in (23). Therefore, the problem is unsolvable and PDAC implementation is impossible for the given parameters.
More precisely, if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq41_HTML.gif , then we have from (24)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ26_HTML.gif
(26)
Using the following equality:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ27_HTML.gif
(27)
we derive
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ28_HTML.gif
(28)
From the inequality https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq42_HTML.gif , we can write
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ29_HTML.gif
(29)
Therefore,
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ30_HTML.gif
(30)
By substituting the expressions (24) for the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq43_HTML.gif into (30), we get after some manipulations the following inequality:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ31_HTML.gif
(31)
Note that the problem (22) has been formulated under the condition
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ32_HTML.gif
(32)
Actually, it implies
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ33_HTML.gif
(33)
Thus, the region of acceptability for PDAC problem (22) is defined by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ34_HTML.gif
(34)
It follows from the theorem that the approximation (6) is applicable even for https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq44_HTML.gif and any small https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq45_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq46_HTML.gif . In spite of this fact, the solution above cannot be useful for small values of the ratio https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq47_HTML.gif . In this case, the loss function https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq48_HTML.gif is sensitive to fractional part dropping under calculation https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq49_HTML.gif . For example, if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq50_HTML.gif  kb/s, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq51_HTML.gif , and we obtain https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq52_HTML.gif  kb/s, then the approximate value of the blocking probability is about 0.004. But https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq53_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq54_HTML.gif . Thus, the offered approximate formula is useful if the ratio https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq55_HTML.gif is relatively large.

3.3. Alternative Problem Statements

Let https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq56_HTML.gif be the number of channel assigned for class https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq57_HTML.gif traffic, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq58_HTML.gif . Each class https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq59_HTML.gif is characterized by a worst-case loss guarantee https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq60_HTML.gif [7, 8].
Consider the following optimization problem:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ35_HTML.gif
(35)
Assume that for all https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq61_HTML.gif . It is well known that the Erlang loss function https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq62_HTML.gif is a decreasing function of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq63_HTML.gif [9], that is, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq64_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq65_HTML.gif . Therefore, the optimal solution https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq66_HTML.gif of the problem (35) satisfies the mentioned condition
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ36_HTML.gif
(36)
If we designate https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq67_HTML.gif , then we get
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ37_HTML.gif
(37)
Thus, the optimization problem (35) is reduced to the problem (1).
Assume the approximation (6) is admissible. Therefore, the method from previous subsection is supposed to be used, but the optimal solution of the problem (35) can be computed by inverting the formula (36). Taking into account the approximation, we get
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ38_HTML.gif
(38)
Note that in practice the solution https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq68_HTML.gif is not usually integer; thus, it has to be as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ39_HTML.gif
(39)
We now consider the optimization of routing in a network through the maximization of the revenue generated by the network. The optimal routing problem is formulated as
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ40_HTML.gif
(40)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ41_HTML.gif
(41)
where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq69_HTML.gif is a fixed number of channels for class https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq70_HTML.gif traffic and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq71_HTML.gif is a revenue rate of class https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq72_HTML.gif traffic. Obviously, the Erlang loss function https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq73_HTML.gif is an increasing function of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq74_HTML.gif . Therefore, the optimal solution https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq75_HTML.gif of the problem (40), (41) satisfies the following condition:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ42_HTML.gif
(42)
Hence, the problem (40), (41) can be reduced to the problem (1) as well. Under the approximation, the optimal solution takes the form
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ43_HTML.gif
(43)
and the maximal total revenue is
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ44_HTML.gif
(44)

4. Performance Evaluation

Let us illustrate the approximation quality. The difference https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq76_HTML.gif is plotted as a function of offered load in Figure 1. If the number of channel https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq77_HTML.gif is relatively small then high accuracy of approximation is reached for heavy offered load. Let us remark that heavy offered load corresponds to high blocking probability. Generally, this situation is abnormal for general communication systems, but the blocking probability https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq78_HTML.gif decreases if the number of channels https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq79_HTML.gif increased relative accuracy https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq80_HTML.gif . Let us designate https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq81_HTML.gif . If the approximation (2) is admissible for https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq82_HTML.gif then it is also admissible for any https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq83_HTML.gif . In Figure 2, the behavior of losses function https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq84_HTML.gif according to different https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq85_HTML.gif is shown. Thus, the provided approximation is attractive for a performance measure of queuing systems with a large number of devices.
Next, we consider a numerical example to evaluate the quality of a PDAC implementation based on the proposed method. Assume that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq88_HTML.gif  Mb/s, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq89_HTML.gif  kb/s, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq90_HTML.gif . In average, there are 1000 channels per traffic class. Following the theorem above, we conclude that the blocking probability can be replaced by the approximation (6) with accuracy about 0.01. Using (23)–(25), find a solution of the simplified PDAC problem and calculate the blocking probability for the obtained values. The results are shown in the Table 1.
Table 1
Class
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq91_HTML.gif , kb/s
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq92_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq93_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq94_HTML.gif
1
130887
1022
0.0803
0.0803
2
129786
1013
0.0877
0.079
3
128409
1003
0.0961
0.0769
4
126639
989
0.108
0.0756
5
124279
970
0.1243
0.0746
Note that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq95_HTML.gif  Mb/s and three channels per 128 kb/s have not been used. We get
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ45_HTML.gif
(45)
It is easy to see that
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ46_HTML.gif
(46)
If https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_IEq96_HTML.gif , and other parameters are the same then
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F738386/MediaObjects/13638_2010_Article_2142_Equ47_HTML.gif
(47)
If an obtained accuracy is not enough, then the formulas (23)–(25) provide efficient first approximation for numerical methods.

5. Conclusion

In this paper, a simple nonasymptotic approximation for the Erlang B formula is considered. We find the sufficient condition when the approximation is relevant. The proposed result allows rejecting the previously used limited regime and considers the proportional differentiated admission control under finite network resources. Following this way, we get explicit formulas for PDAC problem. The proposed formulas deliver high-performance computing of network resources assignment under PDAC requirements. Thus, an efficient method for proportional differentiated admission control implementation has been provided.

Acknowledgments

This research was supported in part by MKE and MEST, Korean government, under ITRC NIPA-2010-(C1090-1021-0008), FTDP(2010-0020727), and PRCP(2010-0020210) through NRF, respectively. A preliminary version of this paper was presented at MACOM 2010, Spain (Barcelona) [10]. The present version includes additional mathematical and numerical results.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Yilmaz O, Chen IR: Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks. Computer Communications 2009, 32(2):317-323. 10.1016/j.comcom.2008.11.001CrossRef Yilmaz O, Chen IR: Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks. Computer Communications 2009, 32(2):317-323. 10.1016/j.comcom.2008.11.001CrossRef
2.
Zurück zum Zitat Dovrolis C, Stiliadis D, Ramanathan P: Proportional differentiated services: delay differentiation and packet scheduling. IEEE/ACM Transactions on Networking 2002, 10(1):12-26. 10.1109/90.986503CrossRef Dovrolis C, Stiliadis D, Ramanathan P: Proportional differentiated services: delay differentiation and packet scheduling. IEEE/ACM Transactions on Networking 2002, 10(1):12-26. 10.1109/90.986503CrossRef
3.
Zurück zum Zitat Salles RM, Barria JA: Proportional differentiated admission control. IEEE Communications Letters 2004, 8(5):320-322. 10.1109/LCOMM.2004.827384CrossRef Salles RM, Barria JA: Proportional differentiated admission control. IEEE Communications Letters 2004, 8(5):320-322. 10.1109/LCOMM.2004.827384CrossRef
5.
Zurück zum Zitat Bertsekas D, Gallager R: Data Networks. 2nd edition. Prentice Hall, Englewood Cliffs, NJ, USA; 1992.MATH Bertsekas D, Gallager R: Data Networks. 2nd edition. Prentice Hall, Englewood Cliffs, NJ, USA; 1992.MATH
6.
Zurück zum Zitat Harrel A: Sharp bounds and simple approximations for the Erlang delay and loss formulas. Management Sciences 1988, 34(8):959-972. 10.1287/mnsc.34.8.959CrossRef Harrel A: Sharp bounds and simple approximations for the Erlang delay and loss formulas. Management Sciences 1988, 34(8):959-972. 10.1287/mnsc.34.8.959CrossRef
7.
Zurück zum Zitat Christin N, Liebeherr J, Abdelzaher T: Enhancing class-based service architectures with adaptive rate allocation and dropping mechanisms. IEEE/ACM Transactions on Networking 2007, 15(3):669-682.CrossRef Christin N, Liebeherr J, Abdelzaher T: Enhancing class-based service architectures with adaptive rate allocation and dropping mechanisms. IEEE/ACM Transactions on Networking 2007, 15(3):669-682.CrossRef
8.
Zurück zum Zitat Koo J, Shakhov VV, Choo H: An Enhanced RED-Based Scheme for Differentiated Loss Guarantees, Lecture Notes in Computer Science. Volume 4238. Springer, New York, NY, USA; 2006. Koo J, Shakhov VV, Choo H: An Enhanced RED-Based Scheme for Differentiated Loss Guarantees, Lecture Notes in Computer Science. Volume 4238. Springer, New York, NY, USA; 2006.
9.
Zurück zum Zitat Haring G, Marie R, Puigjaner R, Trivedi K: Loss formulas and their application to optimization for cellular networks. IEEE Transactions on Vehicular Technology 2001, 50(3):664-673. 10.1109/25.933303CrossRef Haring G, Marie R, Puigjaner R, Trivedi K: Loss formulas and their application to optimization for cellular networks. IEEE Transactions on Vehicular Technology 2001, 50(3):664-673. 10.1109/25.933303CrossRef
10.
Zurück zum Zitat Shakhov VV: An efficient method for proportional differentiated admission control implementation. Proceedings of the 3rd International Workshop on Multiple Access Communications (MACOM '10), September 2010, Barcelona, Spain 91-97.CrossRef Shakhov VV: An efficient method for proportional differentiated admission control implementation. Proceedings of the 3rd International Workshop on Multiple Access Communications (MACOM '10), September 2010, Barcelona, Spain 91-97.CrossRef
Metadaten
Titel
An Efficient Method for Proportional Differentiated Admission Control Implementation
verfasst von
Vladimir Shakhov
Hyunseung Choo
Publikationsdatum
01.12.2011
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2011/738386

Weitere Artikel der Ausgabe 1/2011

EURASIP Journal on Wireless Communications and Networking 1/2011 Zur Ausgabe

Premium Partner