Skip to main content
Top
Published in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01-12-2011 | Research Article

Call Admission Control Jointly with Resource Reservation in Cellular Wireless Networks

Authors: Aytül Bozkurt, Rafet Akdeniz, Erdem Uçar

Published in: EURASIP Journal on Wireless Communications and Networking | Issue 1/2010

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To efficiently utilize the total resources and to serve mobile users demanding for different types of service, system resource utilization of these services should be considered, and efficient resource management techniques should be developed. In this paper, we propose a new call admission control (CAC) scheme jointly with resource management by considering the two service types: prioritized calls and nonprioritized calls. Proposed scheme limits the new and handoff prioritized and non-prioritized call arrivals according to call-level quality of service (QoS) requirements. By searching algorithm, admission parameters are obtained optimally and required QoS are guaranteed. Due to high priority of the prioritized calls, the admittance of non-prioritized calls into channel is restricted, while prioritized calls are admitted as long as there is sufficient bandwidth. To evaluate the performance of the proposed CAC scheme, we have compared the numerical results from the analytical model with those of New Call Bounding scheme. It is shown that the proposed CAC scheme uses the resources effectively and improves all the upper-bound QoS requirements with respect to the New Call Bounding scheme for prioritized and non-prioritized users.

1. Introduction

In cellular wireless networks, to integrate multiservice with desired QoS, efficient resource management techniques are needed, while specified level of QoS is guaranteed to users belonging to each service class [1]. In a wireless network, maximum packet delay for nondelay tolerant services, error-free transmission for delay-tolerant services must be guaranteed and maximum delay response must be provided for seamless image effect. Mobility, frequent handoffs and limited bandwidth are important constraints for QoS in wireless networks.
Service quality can be studied in three different levels as follows. (1) Packet level: in packet level, specified QoS parameters such as dropping probability, maximum packet delay and jitter must be guaranteed to users. (2) Call level: in call level, users expect that both blocking probability of new calls and dropping probability of handoff calls should be at minimum value. Handoff calls dropping is less desired than new calls blocking. For this reason, it is needed to decrease the probability of handoff calls at the expense of increasing the probability of new calls. (3) Class level: class level QoS is related to how bandwidth is shared by various classes of users. Common bandwidth sharing techniques are complete sharing (CS) complete partitioning (CP) and restricted access (RA) [2]. Any class of users can use the entire bandwidth as long as sufficient capacity exists in CS. Bandwidth is partitioned at the beginning as a default value among incoming class of users in CP.
Call Admission Control schemes are the most efficient techniques used in the resource management. CAC coupled with resource management provides both maximum utilization in given bandwidth and call-level QoS requirements [3]. When the total bandwidth is shared, higher priority is given to handoff calls to decrease the dropping probability. In the literature, CAC has been studied widely and several CAC schemes were proposed [412]. Priority-based CAC schemes have also been proposed to provide the handoff calls with lower dropping probability over the new calls [46]. Three call admission schemes known widely have been studied for different channel holding times of the new and handoff calls for only one service in [4] and a new approximation approach was proposed to reduce the computational complexity. In [5], exact product-form solution is studied to evaluate the symmetric CAC schemes such as New Call Bounding scheme in multiservice networks where different channel holding times of all the classes of calls are different. In [6], for multiple priorities, elastic-threshold-based CAC was designed and its performance was evaluated in terms of maximum reward obtainable with QoS satisfaction and threshold values were determined by sequentially adjusting the thresholds based on reward and reject rate.
CAC scheme proposed in [7] supports multiple admission priority classes. Proposed scheme adopts dynamic guard loading concept in which it adapts the threshold limits based on the current estimates of multiple handoff classes requests derived from current number of ongoing calls in neighboring radio cells and the mobility pattern. Another priority-based scheme is proposed and analyzed for integrated voice and data based on resource preemption [8]. Proposed scheme deploys RA bandwidth sharing technique in which high-priority prioritized calls can all bandwidth unrestrictive way when there is enough capacity. If there is unoccupied bandwidth by prioritized calls upon the arrival of a new or handoff data calls, arriving data calls use the remaining bandwidth from the prioritized calls. This leads to available bandwidth usage of the data calls and better system resource utilization and performance results. In [9, 10], optimal CAC is proposed by adopting the semi-Markov Decision Process (SMDP) to model the call admission scheme and bandwidth reallocation algorithm at the same time for time-varying multimedia traffic. A dynamic priority CAC is proposed in [11] to achieve better balance between CS and CP by computing the dynamic priority level based on predefined load partitions and the current carried load. In [12], two types of traffic are considered and partitioned to four priority classes; bandwidth reservation is made according to priority class. Although proposed scheme reserves different amounts of bandwidth for each prioritized class, bandwidth reservation thresholds are not optimal values.
In this paper, we propose a new call admission control scheme with adjusted capacity allocation to utilize the network resources efficiently. The main novelty in the proposed scheme is that maximum K(kbps) amount of adaptable bandwidth is allocated to nonprioritized calls and this value is determined optimally by considering https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq1_HTML.gif and BN 1 call level requirements to protect the nonprioritized calls from QoS degradation. Further, by searching algorithm, admission region is derived for prioritized and nonprioritized calls.
This paper is organized as follows. In Section 2, the system model that we considered is described. In Section 3, we propose a new CAC policy, present an analytical model by using Markov model and obtain the optimal admission values with developed algorithms. Section 4 compares performance results from analytical model with those of New Call Bounding scheme. Section 5 concludes the paper.

2. System Model

We considered that wireless cellular network has a number of base stations and the coverage of a base station is rounded by a cell. Network contains two traffic types: prioritized traffic calls and nonprioritized traffic calls. A mobile initiating a new prioritized or nonprioritized call when crossing the cell boundary towards the outside of the coverage, can still maintain seamless traffic transmission by handoff occurrence. It is assumed that system is in statistical equilibrium, where the mean rate of handoff arrival calls is equal to the mean rate of handoff departure calls in the cell and rounded six cells have the uniform traffic conditions. With these assumptions, single cell is referenced and system performance analysis is evaluated from single cell performance.
Arriving calls at the cell are new and handoff prioritized calls and nonprioritized calls. As nonprioritized calls (such as data) can tolerate delay, they use the same total bandwidth reserve and the equal priority is given to new and handoff nonprioritized calls. Prioritized calls (such as voice) cannot tolerate delay, to maintain the seamless transmission; differentiation between the new and handoff calls is required for prioritized traffic calls. As dropping an ongoing handoff prioritized call is less desired than blocking a new prioritized call arrival, an amount of capacity C is reserved as a guard channel for only handoff prioritized call arrivals. New and handoff call arrivals to cellular system are assumed to be Poisson arrival process. Prioritized and nonprioritized call duration and the cell residence time are assumed to be exponentially distributed with means https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq2_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq3_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq4_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq5_HTML.gif , respectively. The channel occupancy time of prioritized call https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq6_HTML.gif is also assumed to be exponentially distributed with mean https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq7_HTML.gif [13, 14]. Nonprioritized calls can adapt to varying bandwidth traffic conditions; here, call admission control scheme admit new and handoff nonprioritized calls without dropping bandwidth below the minimum pre-determined level. Call duration for nonprioritized calls, on the other hand, depends both on bandwidth left over to each nonprioritized call and nonprioritized call file size. Although nonprioritized calls file size is not distributed exponentially for tractability in the mathematical analysis [15, 16], it is assumed to be exponentially distributed with mean https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq8_HTML.gif . The channel occupancy time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq9_HTML.gif also is exponentially distributed with means https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq10_HTML.gif .

3. Call Admission Scheme

Proposed CAC policy uses (CS) access in which both prioritized and nonprioritized calls can use all the capacity according to the CAC policy limitations as shown in Figure 1. However, due to their lower priority, policy limits the admission of nonprioritized calls into the network and also limits the bandwidth that can be used by new and handoff nonprioritized calls. The number of nonprioritized calls that will be admitted to the network is determined optimally in accordance with CAC policy's QoS considerations on nonprioritized calls such as upper bound of mean call response time and blocking/dropping probability under varying traffic load conditions. New prioritized calls can use up to certain bandwidth at the system. Handoff prioritized calls can use the entire bandwidth over all the nonprioritized calls (new or handoff). Minimum https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq11_HTML.gif and maximum https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq12_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq13_HTML.gif is the number of new and handoff prioritized calls and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq14_HTML.gif is the number of new prioritized calls allowed, can be determined optimally by the CAC searching algorithm given in Algorithm 1.
Algorithm 1: Determining algorithm of optimal number of the prioritized and nonprioritized calls.
(1)   https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq15_HTML.gif ; % https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq16_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq17_HTML.gif are upper bounds.
(2)  while ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq18_HTML.gif )
(3)   https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq19_HTML.gif subject to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq20_HTML.gif
(4)   https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq21_HTML.gif
(5)  end
(6)  while ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq22_HTML.gif ) && ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq23_HTML.gif )
(7)   https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq24_HTML.gif
(8)  end
(9)     https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq25_HTML.gif
(10) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq26_HTML.gif
(11)for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq27_HTML.gif
(12)  for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq28_HTML.gif
(13)     https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq29_HTML.gif
(14)    for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq30_HTML.gif
(15)     https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq31_HTML.gif
(16)    end
(17)    https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq32_HTML.gif
(18)  end
(19) end
(20) while ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq33_HTML.gif
(21) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq34_HTML.gif
(22) end
(23) Output ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq35_HTML.gif )
Since prioritized calls cannot tolerate the delay, they require constant https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq36_HTML.gif amount of bandwidth to meet their QoS requirements. Whereas nonprioritized calls can tolerate the certain amount of delay, their required bandwidth amount can be adaptable to varying bandwidth. Proposed CAC scheme reserves at most optimal K (Mbps) bandwidth determined by searching algorithm in Algorithm 1 to nonprioritized calls when the total number of prioritized calls at the system is less than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq37_HTML.gif , where M is the optimal threshold number for nonprioritized calls and reserves remaining https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq38_HTML.gif (Mbps) bandwidth when the number of prioritized calls is more than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq39_HTML.gif . Actually, this admission scheme defines the New Call Bounding admission scheme which limits the new calls number (N 1 ) with a threshold https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq40_HTML.gif ; if the number of new calls does not exceed the threshold, it is admitted; otherwise, it is blocked, while handoff calls is rejected only when there is no bandwidth in the system. But this scheme assumes that all prioritized and nonprioritized calls require constant bandwidth and reserves constant bandwidth for the delay-tolerant calls, that is, nonprioritized calls. It leads to lack of capacity using for delay-tolerant calls in their upper bound of reserved bandwidth while there is no prioritized call at the system. Without any change in the optimalM threshold number, proposed CAC policy in conjunction with bandwidth reservation, changes the reserved area for the nonprioritized calls dynamically upon each new prioritized call arrival. Admission policy for proposed CAC is given in Algorithm 2.
Algorithm 2: Proposed CAC policy.
When a prioritized (new) call arrives
 if (the total number of prioritized calls https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq41_HTML.gif )
   admit the call
      else reject the call
When a prioritized (handoff) call arrives
 if (the total number of prioritized calls https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq42_HTML.gif
   admit the call
      else reject the call
When a non-prior. (new or handoff) call arrives
  if (the total number of prior. calls https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq43_HTML.gif )
 allocate the (K) bandwidth to the nonprioritized calls
    https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq44_HTML.gif
   compute https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq45_HTML.gif
 if ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq46_HTML.gif ) && ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq47_HTML.gif )
      admit the call
 else reject the call
  else if (the total number of prior. calls https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq48_HTML.gif
 allocate the (remaining) bandwidth
    https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq49_HTML.gif
   compute https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq50_HTML.gif
 if ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq51_HTML.gif ) && ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq52_HTML.gif )
      admit the call
 else reject the call
Optimal CAC parameters for prioritized and nonprioritized calls can be obtained as follows from Algorithm 1. Steps (1)–(3) determine the largest number of prioritized calls ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq53_HTML.gif ) that channel can accommodate with minimum bandwidth requirement of prioritized calls, if blocking probability is larger than required level, the algorithm stops due to insufficient channel capacity. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq54_HTML.gif is searched by increasing the N 2 in each searching step until prioritized calls blocking probability BN 2 is smaller than the required blocking probability. Maximum value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq55_HTML.gif cannot exceed the calls https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq56_HTML.gif . Steps (4)–(8) determine the maximum value of T 2 by equalizing T 2 to N 2 first and by decreasing T 2 in each searching step, until prioritized calls dropping probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq57_HTML.gif is smaller than the required dropping probability. Steps (9)-(10) first start from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq58_HTML.gif , computing M threshold number and steps (11)–(19) compute https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq59_HTML.gif reserved bandwidth for nonprioritized calls jointly with steady-state probability of prioritized calls, N 1 and M.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq60_HTML.gif is the blocking probability of the new prioritized calls and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq61_HTML.gif is the mean response time of nonprioritized calls. To determine the number of nonprioritized calls https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq62_HTML.gif , two restrictions ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq63_HTML.gif ) are considered under the control of optimal tradeoff consisting of an increase in nonprioritized calls response time and a decrease in the blocking probability of nonprioritized calls by increasing the number of admitted nonprioritized calls to the system. Steps (20)–(22) search the maximum N 1 and M in each search step, until two restrictions are satisfied, and step (23) outputs the obtained results.

3.1. New Call Bounding Scheme

This scheme limits the admission of nonprioritized calls into the system to provide the call-level QoS requirements for handoff prioritized calls while acceptable QoS requirement is still guaranteed to nonprioritized calls.M is the threshold number for the nonprioritized calls. If the number of nonprioritized calls exceeds M, they are blocked, otherwise admitted. K, when the number of prioritized calls is less than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq64_HTML.gif in the system, defines maximum bandwidth amount reserved for nonprioritized calls. New and handoff prioritized and nonprioritized call arrivals are assumed to be Poisson arrival process with mean rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq65_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq66_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq67_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq68_HTML.gif , respectively [4].
The offered prioritized and nonprioritized loads when prioritized and nonprioritized call users are in the system are given by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq69_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq70_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq71_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq72_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq73_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq74_HTML.gif are the total mean arrival rate of prioritized and nonprioritized calls. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq75_HTML.gif denotes the required capacity to maintain the QoS requirements for nonprioritized calls. When there are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq76_HTML.gif nonprioritized calls and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq77_HTML.gif prioritized calls in the system, the probability of these https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq78_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq79_HTML.gif nonprioritized and prioritized calls in the system is given by a product-form solution as follows
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ1_HTML.gif
(1)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ2_HTML.gif
(2)
The state space is defined as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq80_HTML.gif .
Thus, nonprioritized call blocking and prioritized call dropping probabilities can be obtained as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ3_HTML.gif
(3)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq81_HTML.gif represents the floor function that rounds its input to the nearest integer less than or equal to the value of input itself.
The mean nonprioritized calls response time is obtained by division of total mean number of nonprioritized calls https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq82_HTML.gif in the system to the mean call arrival rate H, which is known as Little's law [17]. In New Call Bounding scheme, capacity for the delay-tolerant calls, that is, for nonprioritized calls, is constant and does not change with the increase or decrease in the number of other types of calls in the system; hence, the purpose of this paper is to show the impacts of changeable capacity on system performance with the same number of users as those of New Call Bounding scheme. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq83_HTML.gif is defined as the mean nonprioritized calls response time and calculated as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ4_HTML.gif
(4)
Total channel utilization efficiency https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq84_HTML.gif is the ratio of used bandwidth and the total system bandwidth. From all the users' channel occupancy probabilities, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq85_HTML.gif is calculated as;
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ5_HTML.gif
(5)
Total mean throughput (calls/s) is the mean rate that all nonprioritized calls are served and calculated as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ6_HTML.gif
(6)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq86_HTML.gif is the mean file size for nonprioritized calls.

3.2. Proposed CAC Scheme

Proposed CAC scheme handles the nonprioritized and prioritized calls separately. Firstly, when the proposed CAC scheme admits both traffic types of calls into system behaves in the same admission policy with that of New Call Bounding scheme described in Section 3 except that Proposed CAC policy provides with adaptable bandwidth reservation instead of fixed bandwidth set in the system. Secondly, in the proposed CAC policy, each type of calls is analyzed by one-dimensional Markov chain model based on their service type. Since nonprioritized calls can use bandwidth amount determined by Algorithm 1, steady-state probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq87_HTML.gif , in which https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq88_HTML.gif calls are in the system, can be obtained by M/G/1/K-PS queue model [18]. Prioritized calls require certain capacity due to their nontolerant structure to delay; their steady-state probabilities https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq89_HTML.gif , in which https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq90_HTML.gif calls are in the system, can be obtained by M/M/K/K queue model.

3.2.1. Prioritized Calls Resource Allocation

Prioritized traffic load when the system is in state https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq91_HTML.gif is given by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq92_HTML.gif . Steady-state probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq93_HTML.gif can be obtained by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ7_HTML.gif
(7)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq94_HTML.gif is the fraction of the handoff prioritized traffic load, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq95_HTML.gif is the threshold constant for admitting the new prioritized calls when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq96_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq97_HTML.gif , is normalization constant given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ8_HTML.gif
(8)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ9_HTML.gif
(9)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ10_HTML.gif
(10)

3.2.2. Nonprioritized Calls Resource Allocation

Varying capacity for the nonprioritized calls is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ11_HTML.gif
(11)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq98_HTML.gif is the available capacity to nonprioritized traffic when the system is occupied by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq99_HTML.gif number of prioritized calls. Total shared bandwidth conditions between nonprioritized and prioritized calls are given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ12_HTML.gif
(12)
From the M/G/1/K-PS model, the mean nonprioritized call response time can be determined under nonprioritized traffic load by considering the variabilities in the service capabilities of nonprioritized calls. Nonprioritized traffic load when the system is in state https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq100_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ13_HTML.gif
(13)
Nonprioritized traffic load requires https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq101_HTML.gif so that system could be stable for the greater values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq102_HTML.gif , the system becomes unstable and the mean response time of nonprioritized calls presents a state out of its maximum value [19]. The mean offered traffic load of nonprioritized calls is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ14_HTML.gif
(14)
Threshold number https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq103_HTML.gif is calculated numerically from optimal number of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq104_HTML.gif .   https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq105_HTML.gif gets minimum and maximum capacity in the range of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq106_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq107_HTML.gif , respectively. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq108_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ15_HTML.gif
(15)
Steady-state probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq109_HTML.gif , in which https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq110_HTML.gif calls are in the system, can be obtained as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ16_HTML.gif
(16)
Nonprioritized calls blocking and dropping probabilities can be obtained as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ17_HTML.gif
(17)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ18_HTML.gif
(18)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq111_HTML.gif is the dropping probability of the handoff prioritized calls.
The mean response time of nonprioritized calls is calculated according to Little's law and given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ19_HTML.gif
(19)
According to scheme, to determine the bandwidth utilization efficiency, nonprioritized calls (new and handoff) use K (Mbps) bandwidth at most, and remaining bandwidth ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq112_HTML.gif ) (Mbps) is unoccupied with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq113_HTML.gif probability if any priority (new and handoff) call does not arrive to the system. On the other hand, if any nonprioritized call (new or handoff) does not arrive to the system, only unoccupied bandwidth corresponds to ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq114_HTML.gif (Mbps) with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq115_HTML.gif probability. Utilization efficiency is obtained as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ20_HTML.gif
(20)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq116_HTML.gif denotes https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq117_HTML.gif .
The mean total throughput can be obtained as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ21_HTML.gif
(21)
Overload probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq118_HTML.gif is defined as the probability that capacity used by a nonprioritized call user drops under a threshold https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq119_HTML.gif and obtained as,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ22_HTML.gif
(22)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ23_HTML.gif
(23)

3.3. Fixed Iterative Algorithm for Calculation of both Nonprioritized and Prioritized Handoff Calls Arrival Rate

To begin to compute steady-states probabilities, we should know the handoff call arrival rates for both types of service. Any handoff arrival rate for a call type must be equal to handoff departures rates in a cell. The mean handoff arrival rate can be determined as [20]
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ24_HTML.gif
(24)
We note that determination of handoff arrival rate depends on the steady-state probability which is unknown at the begining. By setting the initial values for handoff call arrival rates and using the iterative approach [21], we can determine the actual handoff arrival rates. Initial values for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq120_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq121_HTML.gif can be set as [22]
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ25_HTML.gif
(25)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq122_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq123_HTML.gif are handoff probability of prioritized and nonprioritized calls and given as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_Equ26_HTML.gif
(26)
With these initial values, we can use the following iterative algorithm.
Step 1.
Set the initial values for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq124_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq125_HTML.gif according to (25).
Step 2.
Calculate the steady-state probabilities; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq126_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq127_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq128_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq129_HTML.gif according to the (7), (16), (9), (10), (17), and (18).
Step 3.
Calculate the mean handoff arrival rates using (24).
Step 4.
Let ε (>0) be a predefined small value. If ε is smaller than the differentiation of ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq130_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq131_HTML.gif ), ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq132_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq133_HTML.gif ), algorithm (iteration) goes on, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq134_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq135_HTML.gif and go to Step 2.
Step 5.
Compute the performance measurements such as blocking and dropping probabilities, response time, throughput, and utilization efficiency according to (1) and (23).

4. Numerical Results

The performance of the proposed CAC scheme is evaluated from the analytical model. We have compared our proposed CAC scheme with New Call Bounding scheme and showed the comparison results in Figures 2, 3, 4, 5, 6, 7, and 8. Analysis parameters are set as follow: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq136_HTML.gif  calls/s, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq137_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq138_HTML.gif minutes = 0.00166 calls/s, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq139_HTML.gif minutes = 0.00555 calls/s, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq140_HTML.gif  calls/s, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq141_HTML.gif  seconds = 0.07 calls/s, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq142_HTML.gif  Kbps, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq143_HTML.gif  Kbps, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq144_HTML.gif  Kb, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq145_HTML.gif  calls/s, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq146_HTML.gif  s. Offered prioritized traffic load and fraction of the prioritized handoff traffic load are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq147_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq148_HTML.gif , respectively. By adjusting the prioritized call arrival rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq149_HTML.gif to different values (0.0578–0.5340), we obtained numerically allowed channels N 2 and T 2 . As the bandwidth reserved for the nonprioritized calls changes with the number of prioritized calls and the traffic load of the prioritized call, nonprioritized call traffic load https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq150_HTML.gif also changes with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq151_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq152_HTML.gif . We increased the number of nonprioritized calls allowed to system as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq153_HTML.gif in each adjusting interval. Figure 2 shows the mean nonprioritized call response time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq154_HTML.gif as a function of prioritized calls arrival rate. The mean nonprioritized response time decreases exponentially as prioritized traffic calls arrival rate increases. The reason for this decrease in response time is the varying capacity nature of the nonprioritized call because that more prioritized call load allows more increased reserved bandwidth probability for the nonprioritized calls when comparing the fixed capacity of the New Call Bounding scheme. We observed that nonprioritized calls response time takes its greatest value ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq155_HTML.gif  sec) with a certain value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq156_HTML.gif (i.e., the study case with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq157_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq158_HTML.gif calls/s).
Figure 3 shows dropping probability of prioritized calls as a function of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq159_HTML.gif . It is shown that dropping probability of prioritized calls has highly low rates in proposed scheme. Dropping probability can achieve upper bound (0.1%) with the increase of prioritized calls arrival rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq160_HTML.gif , whereas dropping probability of New Call Bounding scheme overestimates upper bound.
In proposed scheme, when prioritized calls are admitted to the system, upper-bound requirements of blocking and dropping probabilities are considered as policy limits. Prioritized (nonprioritized) calls number leading to exceed of restriction limit for blocking (dropping) probability is not allowed in the system. Hence, blocking (dropping) probability does not exceed the upper bound.
Figure 4 shows that blocking probability of prioritized calls https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq161_HTML.gif is under (1%) in all call arrival rate increases, while New Call Bounding scheme cannot meet the required QoS. In New Call Bounding Scheme, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq162_HTML.gif as it uses the scheme without any of the threshold for its handoff calls.
Figure 5 shows blocking probabilities of nonprioritized calls as a function of prioritized call arrival rate. Even if prioritized calls arrival rate increases, blocking probability of nonprioritized calls remains under the limits of upper bound of nonprioritized calls.
Figure 6 shows nonprioritized calls throughput (calls/s) as a function of prioritized call arrival rate.
Prioritized call arrival rate increases throughput γ increases exponentially. After call arrival rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq163_HTML.gif , the increase is faster as system cannot operate effectively in heavy prioritized load condition. It performs sufficiently high throughput in the offered call arrival rate ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq164_HTML.gif ) condition than that of New Call Bounding scheme. Throughput performance is the largest as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq165_HTML.gif .
The probability of unoccupied bandwidth depends on the probability of none of the prioritized calls existence, which gets the highly low values ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq166_HTML.gif ) and utilization efficiency performs better than that of New Call Bounding scheme (0.6968–0.8664).
Overload probability of nonprioritized calls is defined as the probability, in which required bandwidth for the nonprioritized calls is less than the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq167_HTML.gif . Figure 8 shows overload performance. Overload probability decreases (0.1659–0) with the increase of prioritized call arrival rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq168_HTML.gif because of the increase of the capacity reserved for nonprioritized calls.
After low values of call arrival rate ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq169_HTML.gif ), overload probability decreases to zero, which points that the required capacity for the nonprioritized calls is maintained. However, in New Call Bounding scheme, overload does not occur from the fact that capacity reserved for nonprioritized calls is fixed and it is not changed with traffic load variation. Set parameter for the nonprioritized calls is larger than the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq170_HTML.gif .

5. Conclusion

In this paper, we proposed a new call admission scheme with resource management for nonprioritized and prioritized calls in cellular network. New Call Bounding scheme is chosen for comparison because admission policy of the proposed CAC is taken from the New Call Bounding scheme. However, before settling on the proposed study, we studied on how we can improve the New Call Bounding scheme performance with proper and effective resource management without changing the number of each different service type user. We have developed two iterative algorithms one for obtaining the optimal number of prioritized and nonprioritized calls under different traffic load conditions, which dynamically searches the optimal number of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq171_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq172_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq173_HTML.gif , and threshold M value for each traffic load parameter in each searching interval optimally under QoS requirements of the policy such as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq174_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq175_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F740575/MediaObjects/13638_2010_Article_2012_IEq176_HTML.gif and the other for bandwidth allocation that works mutually with first algorithm. It is shown that the admission scheme can maintain all upper-bound QoS requirements in terms of throughput, nonprioritized calls response time, blocking and dropping probabilities and provide better system performance by sharing total bandwidth between prioritized and nonprioritized calls effectively.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literature
1.
go back to reference Maniatis SI, Nikolouzou EG, Venieris IS: QoS issues in the converged 3G wireless and wired networks. IEEE Communications Magazine 2002, 40(8):44-53. 10.1109/MCOM.2002.1024414CrossRef Maniatis SI, Nikolouzou EG, Venieris IS: QoS issues in the converged 3G wireless and wired networks. IEEE Communications Magazine 2002, 40(8):44-53. 10.1109/MCOM.2002.1024414CrossRef
2.
go back to reference Naghshineh M, Acampora AS: QOS provisioning in micro-cellular networks supporting multimedia traffic. Proceedings of the 14th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '95), April 1995, Boston, Mass, USA 3: 1075-1084. Naghshineh M, Acampora AS: QOS provisioning in micro-cellular networks supporting multimedia traffic. Proceedings of the 14th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '95), April 1995, Boston, Mass, USA 3: 1075-1084.
3.
go back to reference Nananukul S: Efficiency and reliability of call admission control schemes using call-level behavior. IEEE Transactions on Communications 2002, 50(10):1645-1651. 10.1109/TCOMM.2002.803984CrossRef Nananukul S: Efficiency and reliability of call admission control schemes using call-level behavior. IEEE Transactions on Communications 2002, 50(10):1645-1651. 10.1109/TCOMM.2002.803984CrossRef
4.
go back to reference Fang Y, Zhang Y: Call admission control schemes and performance analysis in wireless mobile networks. IEEE Transactions on Vehicular Technology 2002, 51(2):371-382. 10.1109/25.994812MathSciNetCrossRef Fang Y, Zhang Y: Call admission control schemes and performance analysis in wireless mobile networks. IEEE Transactions on Vehicular Technology 2002, 51(2):371-382. 10.1109/25.994812MathSciNetCrossRef
5.
go back to reference Yavuz EA, Leung VCM: Computationally efficient method to evaluate the performance of guard-channel-based call admission control in cellular networks. IEEE Transactions on Vehicular Technology 2006, 55(4):1412-1424. 10.1109/TVT.2006.877470CrossRef Yavuz EA, Leung VCM: Computationally efficient method to evaluate the performance of guard-channel-based call admission control in cellular networks. IEEE Transactions on Vehicular Technology 2006, 55(4):1412-1424. 10.1109/TVT.2006.877470CrossRef
6.
go back to reference Yılmaz O, Chen IR: Elastic threshold-based admission control for QoS satisfaction with reward optimization for servicing multiple priority classes in wireless networks. Information Processing Letters 2009, 109(15):868-875. 10.1016/j.ipl.2009.04.013MathSciNetCrossRefMATH Yılmaz O, Chen IR: Elastic threshold-based admission control for QoS satisfaction with reward optimization for servicing multiple priority classes in wireless networks. Information Processing Letters 2009, 109(15):868-875. 10.1016/j.ipl.2009.04.013MathSciNetCrossRefMATH
7.
go back to reference Yu O, Saric E, Li A: Adaptive prioritized admission over CDMA [cellular radio applications]. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '05), March 2005 2: 1260-1265. Yu O, Saric E, Li A: Adaptive prioritized admission over CDMA [cellular radio applications]. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '05), March 2005 2: 1260-1265.
8.
go back to reference Leong CW, Zhuang W, Cheng Y, Wang L: Optimal resource allocation and adaptive call admission control for voice/data integrated cellular networks. IEEE Transactions on Vehicular Technology 2006, 55(2):654-669. 10.1109/TVT.2005.858186CrossRef Leong CW, Zhuang W, Cheng Y, Wang L: Optimal resource allocation and adaptive call admission control for voice/data integrated cellular networks. IEEE Transactions on Vehicular Technology 2006, 55(2):654-669. 10.1109/TVT.2005.858186CrossRef
9.
go back to reference Xiao Y, Chen CLP, Wang Y: Optimal distributed call admission control for adaptive multimedia in wireless/mobile networks. Proceedings of IEEE International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '00), September 2000, San Francisco, Calif, USA 477-482. Xiao Y, Chen CLP, Wang Y: Optimal distributed call admission control for adaptive multimedia in wireless/mobile networks. Proceedings of IEEE International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '00), September 2000, San Francisco, Calif, USA 477-482.
10.
go back to reference Ni W, Li W, Alam M: Optimal CAC policy in multimedia wireless networks with reservation channel schemes. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08), December 2008 1443-1447. Ni W, Li W, Alam M: Optimal CAC policy in multimedia wireless networks with reservation channel schemes. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08), December 2008 1443-1447.
11.
go back to reference Alqahtani SA, Hassan Mahmoud AS, Alshanyour A: Performance evaluation and analytical modeling of novel dynamic call admission control scheme for 3G and beyond cellular wireless networks. Proceedings of the IEEE/ACS International Conference on Computer Systems and Applications (AICCSA '07), May 2007 631-638. Alqahtani SA, Hassan Mahmoud AS, Alshanyour A: Performance evaluation and analytical modeling of novel dynamic call admission control scheme for 3G and beyond cellular wireless networks. Proceedings of the IEEE/ACS International Conference on Computer Systems and Applications (AICCSA '07), May 2007 631-638.
12.
go back to reference Nasser N, Guizani S: Performance analysis of a cell-based call admission control scheme for QoS support in multimedia wireless networks. International Journal of Communication Systems 2010, 23(6-7):884-900. Nasser N, Guizani S: Performance analysis of a cell-based call admission control scheme for QoS support in multimedia wireless networks. International Journal of Communication Systems 2010, 23(6-7):884-900.
13.
go back to reference Ramjee R, Towsley D, Nagarajan R: On optimal call admission control in cellular networks. Wireless Networks 1997, 3(1):29-41. 10.1023/A:1019172226345CrossRef Ramjee R, Towsley D, Nagarajan R: On optimal call admission control in cellular networks. Wireless Networks 1997, 3(1):29-41. 10.1023/A:1019172226345CrossRef
14.
go back to reference Rappaport SS: The multiple-call hand-off problem in high-capacity cellular communications systems. Proceedings of the 40th IEEE Vehicular Technology Conference (VTC '90), May 1990 287-294.CrossRef Rappaport SS: The multiple-call hand-off problem in high-capacity cellular communications systems. Proceedings of the 40th IEEE Vehicular Technology Conference (VTC '90), May 1990 287-294.CrossRef
15.
go back to reference Epstein B, Schwartz M: Reservation strategies for multi-media traffic in a wireless environment. Proceedings of the 45th IEEE Vehicular Technology Conference (VTC '95), July 1995 165-169. Epstein B, Schwartz M: Reservation strategies for multi-media traffic in a wireless environment. Proceedings of the 45th IEEE Vehicular Technology Conference (VTC '95), July 1995 165-169.
16.
go back to reference Jeon WS, Jeong DG: Call admission control for mobile multimedia communications with traffic asymmetric between uplink and downlink. IEEE Transactions on Vehicular Technology 2001, 50(1):59-66. 10.1109/25.917873CrossRef Jeon WS, Jeong DG: Call admission control for mobile multimedia communications with traffic asymmetric between uplink and downlink. IEEE Transactions on Vehicular Technology 2001, 50(1):59-66. 10.1109/25.917873CrossRef
17.
go back to reference Ross K: Multiservice Loss Models for Broadband Telecommunication Networks. Springer, Berlin, Germany; 1995.CrossRefMATH Ross K: Multiservice Loss Models for Broadband Telecommunication Networks. Springer, Berlin, Germany; 1995.CrossRefMATH
18.
go back to reference Cao J, Anderssson M, Nyberg C, Kihl M: Web server performance modeling uing an M/G/1/K*PS Queue. Proceedings of the 10th International Conference on Telecommunications, March 2003 2: 1501-1506. Cao J, Anderssson M, Nyberg C, Kihl M: Web server performance modeling uing an M/G/1/K*PS Queue. Proceedings of the 10th International Conference on Telecommunications, March 2003 2: 1501-1506.
19.
go back to reference Litjens R, Boucherie RJ: Elastic calls in an integrated services network: the greater the call size variability the better the QoS. Performance Evaluation 2003, 52(4):193-220. 10.1016/S0166-5316(02)00191-8CrossRef Litjens R, Boucherie RJ: Elastic calls in an integrated services network: the greater the call size variability the better the QoS. Performance Evaluation 2003, 52(4):193-220. 10.1016/S0166-5316(02)00191-8CrossRef
20.
go back to reference Lai WK, Jin YJ, Chen HW, Pan CY: Channel assignment for initial and handoff calls to improve the call-completion probability. IEEE Transactions on Vehicular Technology 2003, 52(4):876-890. 10.1109/TVT.2002.807149CrossRef Lai WK, Jin YJ, Chen HW, Pan CY: Channel assignment for initial and handoff calls to improve the call-completion probability. IEEE Transactions on Vehicular Technology 2003, 52(4):876-890. 10.1109/TVT.2002.807149CrossRef
21.
go back to reference Haung YR, Lin YB, Ho JM: Performance analysis for voice/data integration on a finite-buffer mobile system. IEEE Transactions on Vehicular Technology 2000, 49(2):367-378. 10.1109/25.832967CrossRef Haung YR, Lin YB, Ho JM: Performance analysis for voice/data integration on a finite-buffer mobile system. IEEE Transactions on Vehicular Technology 2000, 49(2):367-378. 10.1109/25.832967CrossRef
22.
go back to reference Fang Y, Chlamtac I, Lin Y: A general formula for handoff rate in PCS network. Proceedings of the 9th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '98), September 1998, Boston, Mass, USA 1: 330-334.CrossRef Fang Y, Chlamtac I, Lin Y: A general formula for handoff rate in PCS network. Proceedings of the 9th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '98), September 1998, Boston, Mass, USA 1: 330-334.CrossRef
Metadata
Title
Call Admission Control Jointly with Resource Reservation in Cellular Wireless Networks
Authors
Aytül Bozkurt
Rafet Akdeniz
Erdem Uçar
Publication date
01-12-2011
Publisher
Springer International Publishing
DOI
https://doi.org/10.1155/2010/740575

Other articles of this Issue 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Go to the issue

Premium Partner