Upload
doantruc
View
214
Download
1
Embed Size (px)
Citation preview
Accepted Manuscript
Congestion Probabilities of Elastic and Adaptive Calls inErlang-Engset Multirate Loss Models under the Threshold andBandwidth Reservation Policies
Ioannis D. Moscholios, Michael D. Logothetis, John S. Vardakas,Anthony C. Boucouvalas
PII: S1389-1286(15)00320-5DOI: 10.1016/j.comnet.2015.09.010Reference: COMPNW 5683
To appear in: Computer Networks
Received date: 12 March 2015Revised date: 25 July 2015Accepted date: 14 September 2015
Please cite this article as: Ioannis D. Moscholios, Michael D. Logothetis, John S. Vardakas,Anthony C. Boucouvalas, Congestion Probabilities of Elastic and Adaptive Calls in Erlang-Engset Mul-tirate Loss Models under the Threshold and Bandwidth Reservation Policies, Computer Networks(2015), doi: 10.1016/j.comnet.2015.09.010
This is a PDF file of an unedited manuscript that has been accepted for publication. As a serviceto our customers we are providing this early version of the manuscript. The manuscript will undergocopyediting, typesetting, and review of the resulting proof before it is published in its final form. Pleasenote that during the production process errors may be discovered which could affect the content, andall legal disclaimers that apply to the journal pertain.
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Congestion Probabilities of Elastic and Adaptive Callsin Erlang-Engset Multirate Loss Models under theThreshold and Bandwidth Reservation Policies
Ioannis D. Moscholiosa, Michael D. Logothetisb, John S. Vardakasc,Anthony C. Boucouvalasa
aDept. of Informatics & Telecommunications, University of Peloponnese,221 00 Tripolis, Greece. E-mail: idm, [email protected]
bDept. of Electrical & Computer Engineering, University of Patras,265 04 Patras, Greece. E-mail: [email protected]
cIquadrat, Barcelona, Spain. E-mail: [email protected]
Abstract
In this paper, we consider a single link of fixed capacity that accommodates calls
of different service-classes with different bandwidth-per-call requirements. The
link behaves as a multirate loss system. Calls of each service-class arrive in the
link according to a Poisson (random) or a quasi-random process and have an ex-
ponentially distributed service time. Poisson or quasi-random arriving calls are
generated by an infinite or finite number of traffic sources, respectively. Service-
classes are also distinguished according to the behaviour of in-service calls, in
elastic and adaptive service-classes. Elastic calls can compress their bandwidth
by simultaneously increasing their service time. Adaptive calls tolerate band-
width compression without affecting their service time. All calls compete for
the available link bandwidth under the combination of the Threshold (TH) and
the Bandwidth Reservation (BR) policies. The TH policy can provide different
QoS among service-classes by limiting the number of calls of a service-class up
to a predefined threshold, which can be different for each service-class. The
BR policy reserves part of the available link bandwidth to benefit calls of high
bandwidth requirements. The proposed models, for random or quasi-random
traffic, do not have a product form solution for the determination of the steady
state probabilities. However, we approximate both models by reversible Markov
chains, and prove recursive formulas for the efficient calculation of the call-level
Preprint submitted to Computer Networks September 18, 2015
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
performance metrics, such as time and call congestion probabilities as well as
link utilization. The accuracy of the proposed formulas is verified through sim-
ulation and found to be quite satisfactory.
Keywords: Poisson process; quasi-random; elastic-adaptive calls; threshold
policy; reservation; Markov chain.
1. Introduction
Multirate loss models based on recursive formulas provide an efficient way
for the call-level QoS assessment in modern communication networks, which
accommodate elastic and adaptive traffic to a great extent. The term multirate
expresses the fact that the traffic of the modeled system can be distinguished
into several service-classes, according to the required bandwidth per call. Elastic
traffic refers to in-service calls whose bandwidth can be compressed, while at
the same time their service time increases (so that the product service time
by bandwidth remains constant). Adaptive traffic (e.g., adaptive video) refers
to in-service calls whose service time does not alter in the case of bandwidth
compression. The call-level analysis of a single link that behaves as a pure loss
system and accommodates elastic or adaptive calls of different service-classes is
based on the classical Erlang Multirate Loss Model (EMLM) ([1], [2]).
In the EMLM, a link of capacity C bandwidth units (b.u.) accommodates
Poisson arriving calls of K different service-classes. Calls of service-class k
(k=1,. . . ,K ) have a peak-bandwidth requirement of bk b.u. that is the maxi-
mum number of b.u. required by a call. New calls compete for the available link
b.u. under the Complete Sharing (CS) policy, whereby calls are blocked and
lost if their required b.u. are not available in the link. Accepted calls cannot
compress their bandwidth and remain in the link for an arbitrarily distributed
service time [1]. The steady-state probabilities in the EMLM have a Product
Form Solution (PFS). The latter leads to an accurate calculation of Call Block-
ing Probabilities (CBP) via the classical Kaufman-Roberts recursive formula
([1], [2]). The existence of this formula has led to numerous extensions of the
2
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
EMLM in wired (e.g., [3]-[18]), wireless (e.g., [19]-[27]) and optical networks
(e.g., [28]-[33]). Many studies (e.g., [34]-[36]) focus on the potential numeri-
cal stability problems that can appear by using the Kaufman-Roberts formula.
Since such problems can be well overcome by normalizations, as it is clearly
pointed out in [36], we adopt the Kaufman-Roberts formula as a springboard
to our analysis. If the call arrival is quasi-random, i.e., calls come from finite
sources [37], [38], then the EMLM is extended to the Engset Multirate Loss
Model (EnMLM) [4]. We name this extension EnMLM, since it provides the
same Time Congestion (TC) probabilities with the Engset formula when one
service-class is considered.
The incorporation of elastic and adaptive traffic in the EMLM and En-
MLM is proposed in [39] and [40], respectively. We name these models Elastic-
Adaptive EMLM (EA-EMLM) and Elastic-Adaptive (EA-EnMLM), respectively.
In both models, service-class k calls have peak and minimum bandwidth require-
ments of bk and b′k,min b.u., respectively. The latter is defined as a proportion of
bk, which is common for all service-classes. A new elastic/adaptive service-class
k call is accepted in the system with bk b.u. if they are available in the link.
Otherwise, the system accepts this call by compressing the peak-bandwidth re-
quirement bk together with the bandwidth of all in-service calls. Bandwidth
compression of a service-class k call is permitted down to b′k,min. Call blocking
occurs when the value of b′k,min of a new call is still higher than the available
bandwidth. Bandwidth expansion takes place when an in-service call, whose
bandwidth is compressed, departs from the system. In that case, the remaining
in-service calls expand their bandwidth in proportion to their peak-bandwidth.
In this paper, we initially consider a link that accommodates Poisson arriving
calls of elastic service-classes and modify the admission mechanism to include
the Threshold (TH) and the Bandwidth Reservation (BR) policies. We name
the proposed model E-EMLM/TH-BR. Furthermore, we study the impact of
both policies in the EA-EMLM and name the proposed model EA-EMLM/TH-
BR. Afterwards, we consider that the link accommodates quasi-random arriving
calls of elastic traffic and study the impact of both policies in the E-EnMLM
3
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
(E-EnMLM/TH-BR). Finally, we extend the proposed E-EnMLM/TH-BR to
include the case of adaptive traffic (EA-EnMLM/TH-BR).
In the TH policy, the number nk of in-service calls of service-class k should
not exceed a pre-defined threshold, after the acceptance of a new service-class
k call. Otherwise, the call is blocked and lost even if enough bandwidth is
available. The TH policy is significant in teletraffic engineering, since it an-
alyzes a multirate access tree network which accommodates K service-classes
[37] and may differentiate service-classes in terms of CBP or revenue rates by
a proper threshold selection (see e.g., [41], [42]). Applications of the TH pol-
icy are numerous (see e.g., [43]-[47]). In [43], [44], QoS differentiation between
new and handoff calls of the same service-class accommodated in the same cell is
achieved by applying the TH policy to new calls. In [45], the TH policy provides
service differentiation and, based on a proper pricing scheme, achieves revenue
optimization in a mobile cellular system. As it is stated, it is difficult in real
systems to compute the optimal call admission policy because of the “curse of
dimensionality”; therefore, admission policies of simple structure (e.g., the TH
policy) are necessary in practice. In [46], the TH policy is applied in the EMLM
(EMLM/TH) and a recursive formula that resembles the Kaufman-Roberts for-
mula is proposed for an accurate CBP calculation. Recently, in [47] the authors
extend the EMLM/TH in the case of quasi-random arrivals (EnMLM/TH) and
study the co-existence of the TH policy with the BR policy (EMLM/TH-BR
and EnMLM/TH-BR).
The BR policy is used to reserve bandwidth to benefit calls of high bandwidth
requirements and is mainly used when CBP equalization is required among calls
of different service-classes. The fact that the BR policy has been extensively
applied in wired (e.g., [48]-[56]), wireless (e.g., [57]-[62]) and optical networks
(e.g., [63]-[65]) evinces its importance in call admission control.
In the aforementioned papers ([41]-[65]), the bandwidth of in-service calls
cannot be altered. To the best of our knowledge, this is the first paper that con-
siders the combination of the TH and the BR policies in a system that accom-
modates elastic and/or adaptive calls either of random or quasi-random input.
4
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Note that the application of only the BR policy in the EA-EMLM and the EA-
EnMLM has been studied in [66] and [67], respectively. To model the system,
we use the Markov chain method. However, due to the existence of the compres-
sion/expansion mechanism, the reversibility of the Markov chains is destroyed,
and the steady state probabilities in the proposed models (E-EMLM/TH-BR,
EA-EMLM/TH-BR, E-EnMLM/TH-BR and EA-EnMLM/TH-BR) do not have
a PFS. Therefore, we resort to approximate Markov chains which provide re-
cursive formulas for the efficient determination of the link occupancy distribu-
tion and, consequently, CBP and link utilization. The accuracy of the pro-
posed formulas is verified through simulation and found to be quite satisfac-
tory. On the other hand, the comparison of the proposed models with existing
models (EA-EMLM, EA-EnMLM, EMLM/TH, EnMLM/TH, EMLM/TH-BR,
EnMLM/TH-BR) shows the new models’ necessity, and their consistency over
changes of their parameters (e.g., compression factor and offered traffic-load).
The remainder of this paper is as follows: Section 2, contains three sub-
sections: a) In Subsection 2.1, we present the basic assumptions of the E-
EMLM/TH and the call admission mechanism, i.e., we do not initially consider
the BR policy; the bandwidth compression/expansion mechanism is described
along with a tutorial example in Sub-subsection 2.1.1, b) In Subsection 2.2, we
show how to determine the steady state distribution of the number of calls in the
system, present the recursive formula for the link occupancy distribution and
provide formulas for the various performance measures. c) In Subsection 2.3,
we extend our model to include adaptive traffic (EA-EMLM/TH). In Section 3,
we extend the EA-EMLM/TH to include the BR policy (EA-EMLM/TH-BR).
In Section 4 and 5, we extend the models of Sections 2 and 3 to include the case
of quasi-random traffic (E-EnMLM/TH-BR and EA-EnMLM/TH-BR). In Sec-
tion 6, we provide numerical results whereby the new models are compared to
the EA-EMLM, EA-EnMLM, EMLM/TH, EnMLM/TH, EMLM/TH-BR and
EnMLM/TH-BR and evaluated through simulation results. We conclude in Sec-
tion 7. Appendices A, B and C include the proofs of the theorems provided in
Subsections 2.2, 2.3 and 4.2, respectively.
5
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
2. The proposed model for elastic random traffic (E-EMLM/TH)
2.1. The system model
Consider a link of capacity C b.u. that accommodates elastic calls of K
service-classes under the TH policy. Service-class k, (k= 1,...,K) calls follow a
Poisson process with arrival rate λk and request bk b.u. (peak-bandwidth re-
quirement). Bandwidth compression is introduced in the system by allowing the
occupied link bandwidth j to virtually exceed C up to T b.u., i.e., j=0, 1,. . ., T .
Let n =(n1,n2,. . . , nK) be the vector of all in-service calls and b=(b1,b2,. . . , bK)
the vector of peak-bandwidth requirements, then j =nb =∑Kk=1 nkbk.
The decision to accept a new service-class k call in the system is based on
the following constraints:
a) The number of in-service calls of service-class k, nk, together with the new
call, should not exceed a pre-defined threshold parameter, n∗k, i.e., nk + 1 ≤ n∗k.
Otherwise the call is blocked and lost. This constraint expresses the TH policy.
b) If constraint (a) is met then:
b1) if j+ bk ≤ C, the call is accepted in the system with its peak-bandwidth
requirement bk and remains in the system for an exponentially distributed ser-
vice time with mean µ−1k .
b2) if T ≥ j + bk > C the call is accepted in the system by compressing
its bk b.u. together with the assigned bandwidth of all in-service calls. After
compression, all calls share the C b.u. in proportion to their peak-bandwidth,
while the link operates at its full capacity C. This is the processor-sharing
discipline [68]. The compressed bandwidth of the new service-class k call is:
b′
k = rbk =C
j + bk
bk (1)
where, with an abuse of notation, r ≡ r(n+k b) = r(n) = C
nb+bk= C
j+bk. To
keep constant the product service time by bandwidth per call, the mean value
of the service time of the new service-class k call becomes:
1
µ′k
=bkb′k
1
µk=j + bkC
1
µk(2)
6
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
The compressed bandwidth of all in-service calls changes to b′i = C
j+bkbi for
i = 1, ...,K and∑Ki=1 nib
′i = C. Similarly, their remaining service-time increases
by a factor of: j+bkC . The minimum bandwidth given to a service-class k call is:
b′k,min = rminbk =
C
Tbk (3)
where rmin = C/T and is common for all service-classes.
A new service-class k call, with bk b.u., is blocked and lost if j + bk > T .
Note that increasing T decreases rmin and increases the delay of service-class
k calls (compared to the initial service time µ−1k ). Thus, T can be chosen so
that this delay remains within acceptable levels.
When an in-service call, with compressed bandwidth b′k, completes its service
and departs from the system, then the remaining in-service calls expand their
bandwidth to b”i (i = 1, . . . ,K) in proportion to bi, as follows:
b”i = min
(bi, b
′i +
bi∑Kk=1 nkbk
b′k
)(4)
2.1.1. Tutorial Example
The following tutorial example illustrates the compression/expansion mech-
anism. Let C = 4 b.u., T = 8 b.u., K = 2 service-classes, λ1 = λ2 = 1 calls/time
unit, b1 = 2 b.u., b2 = 4 b.u and µ−11 = µ−12 = 1 time unit. The TH parameters
are n∗1=3 and n∗2=1. This system has 7 states n = (n1, n2) presented in Ta-
ble 1 together with j = n1b1 + n2b2, before and after bandwidth compression.
Consider now the cases of a call arrival/departure.
• Call arrival. A new 2nd service-class call arrives in the system while the
current state is (n1, n2) = (2, 0) and j = C = 4 b.u. Since j′
= j+b2 = T = 8
b.u., the call is accepted in the system after bandwidth compression has been
applied to these three calls. The new state becomes (n1, n2) = (2, 1). In this
state, calls of both service-classes compress their bandwidth to:
b′1,min = r(2, 1)b1 = rminb1 =
4
8b1 = 1.0,
b′2,min = r(2, 1)b2 = rminb2 =
4
8b2 = 2.0
7
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
so that j = n1b′1,min + n2b
′2,min = 2 + 2 = 4 = C. Similarly, µ−11 , µ−12 become
µ−11
rmin=
µ−12
rmin= 2.0 so that b1µ
−11 and b2µ
−12 remain constant.
• Call departure. Let the system be in state (n1, n2) = (2, 1) when a 1st
service-class call departs from the system. Then, its assigned bandwidth
b′1,min = 1.0 is shared to the remaining two calls in proportion to their peak-
bandwidth. Thus, in the new state (n1, n2) = (1, 1) the 1st and 2nd service-
class calls expand their bandwidth to b′1 = 4
6b1 = 1.333 b.u. and b′2 = 4
6b2 =
2.667 b.u., respectively. Thus, j = C = 4 b.u. Furthermore, the service times
of both calls are decreased to 64µ−11 = 1.5 and 6
4µ−12 = 1.5 time units.
Figure 1 shows the state transition diagram of this example, together with
n∗1, n∗2. If we apply the Kolmogorov’ s criterion (flow clockwise = flow counter-
clockwise) [69] in the four adjacent states (n1, n2) = (1, 0), (1, 1), (2, 1) and (2, 0)
then this criterion does not hold, i.e., the Markov chain is not reversible.
To circumvent this problem, we use state-dependent factors per service-class
k, φk(n), which have a similar role with r(n) and lead to a reversible Markov
chain. The latter, facilitates the recursive calculation of the link occupancy
distribution (see section 2.2). To ensure reversibility, φk(n)’s have the form:
φk (n) =
1 when nb ≤ C and n in Ωx(n−k )
x(n ) whenC < nb ≤ T and n in Ω
0 otherwise
(5)
where Ω is the system’s state space denoted by
Ω =n : 0 ≤ nb ≤ T , nk ≤ n∗k, k = 1, ...,K, nb =∑Kk=1 nkbk,
n = (n1, ..., nk−1, nk, nk+1, ..., nK) and n−k = (n1, ..., nk−1, nk−1, nk+1, ..., nK).
In (5), x(n) is a state multiplier. To ensure that∑Kk=1 nkbkφ k(n) = C,
whenever T ≥ nb > C, x(n) is defined as:
x (n) =
1 when nb ≤ C, n in Ω
1C
∑Kk=1 nkbkx(n−k ) when C < nb ≤ T, n in Ω
0 otherwise
(6)
8
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Note that φk(n)’s are used to model state dependencies of transition rates
and create reversible Markov chains (see e.g., [15]-[17], [19], [39]-[40]).
Figure 2 shows the modified state transition diagram due to φk(n)’s. By
considering again the states (n1, n2) = (1, 0), (1, 1), (2, 1) and (2, 0) we see
that the Kolmogorov’s criterion holds, since:
λ2λ1µ2φ2(2, 1)2µ1 = λ1λ22µ1φ1(2, 1)µ2φ2(1, 1)⇒φ2(2, 1) = φ1(2, 1)φ2(1, 1)⇒ x(2, 0) = x(1, 0) = 1
.
In Table 2 we present the values of r(n) (common for both service-classes),
φ1(n) and φ2(n). We see that in state (n1, n2) = (2, 1) the factors φ1(2, 1),
φ2(2, 1) are different from r(2, 1), a fact that leads to different values for the
compressed bandwidth of calls (a 1st and a 2nd service-class call occupies φ1(2, 1)b1
=1.2 b.u. and φ2(2, 1)b2 = 1.6 b.u., respectively).
2.2. The analytical model (E-EMLM/TH)
The following theorem provides a recursive formula for the calculation of the
un-normalized values of the link occupancy distribution G(j), in the proposed
E-EMLM/TH.
Theorem 1
The un-normalized values of the link occupancy distribution, G(j) are de-
termined by the following recursive formula:
G(j)=
1, for j = 0
1min(C,j)
K∑k=1
akbk[G(j−bk)−Tk(j−bk)], for j=1, ... T
0, otherwise
(7)
The proof of Theorem 1 is provided in Appendix A.
The computational complexity of (7) is in the order of O(KmT ), where
m = max dT/n∗kbke : k=1,...,K. If the bandwidth compression mechanism
is ignored, then we have the Tsang – Ross recursion (see A.6, in Appendix
A) whose computational complexity is in the order of O(KmC), where m =
max dC/n∗kbke : k=1,...,K[46].
9
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Having determined G(j)’s we calculate the CBP of service-class k, Bk, as
follows:
Bk =
T∑
j=T−bk+1
G−1G(j) +
T−bk∑
j=n∗kbk
G−1Tk(j) (8)
where G =∑Tj=0G(j) is the normalization constant.
Another important performance measure is the link utilization, U , given by:
U =C∑
j=1
jG−1G(j) +T∑
j=C+1
CG−1G(j) (9)
In (7) and (8), the knowledge of Tk(j) is required. According to (A.7) of
Appendix A, Tk(j) should be determined when j = n∗kbk, ..., T−bk. We consider
two subsets: 1) n∗kbk ≤ j ≤ C (where no bandwidth compression takes place)
and 2) C + 1 ≤ j ≤ T − bk (where bandwidth compression exists).
For subset (1), consider a system of capacity Fk =C−n∗kbk that accommo-
dates all service-classes but service-class k and define rk(j), j=0, ..., Fk, as:
rk(j)=
1, for j = 0
1j
K∑i=1, i 6=k
aibi [rk(j−bi)−Ti(j−bi)] , for j = 1, ..., Fk
0, otherwise
(10)
We compute the un-normalized values of Tk(j) as:
Tk(j) =an∗kk
n∗k!rk(j − n∗kbk) , n∗kbk ≤ j ≤ C (11)
In (11), the term an∗kk /n∗k! is expected, since for n∗kbk ≤ j ≤ C the number of
in-service calls of service-class k is n∗k.
For subset (2), Tk(j) is given by a similar to (A.4) formula (Appendix A):
Tk(j) =an∗kk
n∗k!
∑
n∈Ω′j
x(n)
K∏
i=1, i 6=k
anii
ni!(12)
where:
Ω′j =
n ∈ Ω : n∗kbk +
K∑
i=1, i 6=knibi = j, C < j ≤ T − bk
.
10
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
In (12), Tk(j) is calculated only for a subset of Ω, defined by C< j≤T−bkand only under the assumption that nk =n∗k. This means that enumeration
of the subset of Ω is needed for those states n = (n1, n2,...,nk = n∗k, ...,nK)
where C < nb ≤ T −bk. Assuming that T should not be chosen to be much
higher than C (otherwise the increase of delay for elastic may be unacceptable
for some applications) the subset of Ω will not become large. In general, the
computational complexity of (24) grows exponentially with K− 1 (since for
service-class k we know that nk= n∗k) and can be in the order of O((T −bk−C)(K−1)). Assuming the existence of the CS policy and ignoring the bandwidth
compression mechanism, the computational complexity becomes O(CK) [1].
2.3. Extension of the E-EMLM/TH to include adaptive random traffic (EA-
EMLM/TH)
Adaptive traffic is a variant of elastic traffic, since adaptive calls can tolerate
bandwidth compression without altering their service time. To include adaptive
traffic in the E-EMLM/TH, we assume that Ke and Ka are the number of
elastic and adaptive service-classes, respectively. The single link accommodates
K service-classes of Poisson arriving calls, where K = |Ke|+ |Ka|.Consider again the tutorial example of section 2 and let calls of the 2nd
service-class be adaptive. The state space and the occupied link bandwidth
remain the same (see Table 1). Figure 3 shows the new state transition diagram.
Compared to Fig. 1, the differences are in the values of µ2 which do not alter. If
we consider the states (n1,n2): (1,0),(1,1),(2,1), (2, 0), we see that Kolmogorov’
s criterion does not hold and therefore the Markov chain is not reversible.
Theorem 2 A reversible Markov chain is obtained by using the state-
dependent factors per service-class k, φk(n), of (5) where x(n) is given by:
x(n)=
1 if nb ≤ C, n∈Ω
1C
(∑k∈Ke
nkbkx(n−k )+r(n)∑k∈Ka
nkbkx(n−k )
), if C<n≤T, n∈Ω
0 otherwise
(13)
11
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
where r(n) = C/nb.
The proof of Theorem 2 is provided in Appendix B.
In Table 3 we present r(n), φ1(n) and φ2(n). Compared to Table 2, we see
that adaptive traffic modifies φ1(n) and φ2(n).
Based on (13) and (B.1)-(B.3) (of Appendix B) and following the analysis
of section 2, it can be proved that G(j )’s are given by the following formula:
G(j) =
1, for j = 0
1min(C,j)
∑k∈Ke
akbk [G(j − bk)− Tk(j − bk)] +
1j
∑k∈Ka
akbk [G(j − bk)− Tk(j − bk)] , for j = 1, ..., T
0, otherwise
(14)
In (14), the knowledge of Tk(j) is required for j = n∗kbk, . . . , T − bk. We
consider two subsets: 1) n∗kbk ≤ j ≤ C and 2) C + 1 ≤ j ≤ T − bk. For subset
(1), we use (10) and (11), while for subset (2) we use (12) where the values of
x (n) are given by (13). In both subsets, K = |Ke|+ |Ka|.Having determined G(j) we calculate the CBP of service-class k, Bk and the
link utilization, U , via (8) and (9), respectively.
3. The proposed EA-EMLM/TH including the BR policy
(EA-EMLM/TH-BR)
Consider again a link of capacity C b.u. that accommodates K service-
classes, where K= |Ke|+|Ka| and Ke,Ka are the number of elastic and adaptive
service-classes, respectively. A new service-class k (k=1,. . .,K) call has a peak-
bandwidth requirement of bk b.u. and a BR parameter tk that expresses the
reserved b.u. used to benefit calls of all other service-classes except from service-
class k. If j+bk≤T−tk and the number of in-service calls of service-class k in
the steady state, nk, plus the new call, does not exceed n∗k, i.e., nk+1 ≤ n∗k then
the call is accepted in the link. Otherwise the call is blocked and lost.
12
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
To determine G(j) in the EA-EMLM/TH-BR we propose the following ap-
proximate but recursive formula:
G(j)=
1, for j = 0
1min(C,j)
∑k∈Ke
akDk(j − bk) [G(j − bk)− Tk(j − bk)] +
1j
∑k∈Ka
akDk(j − bk) [G(j − bk)− Tk(j − bk)] , for j = 1, ..., T
0, otherwise
(15)
where:
Dk(j − bk) =
bk for j ≤ T − tk0 for j > T − tk
(16)
A basic characteristic of the BR policy is that it ensures CBP equalization
among different service-classes by a proper selection of the BR parameters. If,
for example, CBP equalization is required between calls of two service-classes
with b1=1, b2=10, respectively, then t1=9 b.u, t2=0 b.u. so that b1+t1=b2+t2.
The application of the BR policy in the EA-EMLM/TH-BR is based on
the assumption (approximation) that the population of service-class k calls is
negligible in states j > T − tk and is incorporated in (15) by the variable
Dk(j−bk) given in (16). The states j > T−tk belong to the so-called reservation
space. Note that the population of calls of service-class k in the reservation space
may not be negligible. In [49], [50] a complex procedure is implemented that
takes into account this population in the EMLM and Engset multirate state-
dependent loss models, respectively. However, according to [50] this procedure
may not increase the accuracy of the CBP results compared to simulation.
Note at this point that the approximations introduced in the models by
the φk(n)’s and the Dk(j − bk)’s factors are different in nature. The first
approximation arises because of the necessity to analyze a model which has
a reversible Markov chain, while the second approximation arises due to the
introduction of the BR policy in a model.
If the link accommodates only elastic service-classes (E-EMLM/TH-BR)
13
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
then (15) becomes:
G(j)=
1, for j = 0
1min(C,j)
K∑k=1
akDk(j−bk) [G(j−bk)−Tk(j−bk)] , for j = 1, ..., T
0, otherwise
(17)
Similarly to the EA-EMLM/TH, we determine the CBP of service-class k,
Bk, based on two groups of states: i) those states where the available link
bandwidth is less than bk + tk b.u. when the new call arrives in the system; this
happens when T − bk − tk + 1 ≤ j ≤ T and ii) those states where the available
link bandwidth is enough to accept the new call, i.e. j ≤ T − bk − tk, but the
number of in-service calls of service-class k equals to n∗k; the latter implies that
n∗kbk ≤ j ≤ T − bk − tk. Thus, the values of Bk are calculated by:
Bk =T∑
j=T−bk−tk+1
G−1G(j) +
T−bk−tk∑
j=n∗kbk
G−1Tk(j) (18)
where G =∑Cj=0G(j) is the normalization constant.
As far as the link utilization is concerned, it can be determined by (9).
In (15), (17) and (18) the knowledge of Tk(j) is required for n∗kbk ≤ j ≤T − bk − tk. We consider again two subsets: 1) n∗kbk ≤ j ≤ C and 2) C + 1 ≤j ≤ T−bk−tk. For subset (1), we use (10) and (11) where Fk = T−bk−tk−n∗kbk,
while for subset (2) we use (12) where the values of x (n) are given by (13) and
Ω′j =
n ∈ Ω : n∗kbk +
∑Ki=1,i6=k nibi = j, C < j ≤ T − bk − tk
.
4. The proposed model for elastic quasi-random traffic
(E-EnMLM/TH)
4.1. The system model
Consider a link of capacity C b.u. that accommodates elastic calls of K
service-classes. Service- class k (k = 1, ...,K) calls come from a finite source
population Nk and have a peak-bandwidth requirement of bk b.u. The mean
arrival rate of service-class k idle sources is λk = (Nk − nk)vk, where nk is the
14
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
number of in-service calls and vk is the arrival rate per idle source. The offered
traffic-load per idle service-class k source is ak,fin = vk/µk (in erl), where µ−1k
is the mean value of the exponentially distributed service time of a service-class
k call. This is the quasi-random process [38]. If Nk → ∞ for k = 1, ...,K and
the total offered traffic-load remains constant, then a Poisson process arises.
The introduction of bandwidth compression in the system and the call admis-
sion mechanism are similar to the E-EMLM/TH (see Subsection 2.1) and thus
their description is omitted. As far as the tutorial example of Sub-subsection
2.1.1 is concerned the only difference is in the arrival process which is now quasi-
random. Thus, Figs. 1 and 2 take now the form of Figs. 4 and 5, respectively. In
addition, the values of φk(n)’s and x(n)’s are given by (5) and (6), respectively.
4.2. The analytical model
The following theorem provides a recursive formula for the calculation of
Gfin(j)’s in the proposed E-EnMLM/TH.
Theorem 3
The un-normalized values of the link occupancy distribution, Gfin(j), satisfy
the recursive formula:
Gfin(j)=
1, for j = 0
1min(C,j)
K∑k=1
(Nk−nk+1)ak,finbk[Gfin(j−bk)−Tk,fin(j−bk)],
for j = 1, ..., T
0, otherwise
(19)
The proof of Theorem 3 is provided in Appendix C.
Having determined Gfin(j)’s we calculate the TC probabilities of service-
class k, Pbk , as:
Pbk =
T∑
j=T−bk+1
G−1Gfin(j) +
T−bk∑
j=n∗kbk
G−1Tk,fin(j) (20)
where G =∑Tj=0Gfin(j) is the normalization constant.
Similarly, to determine the Call Congestion (CC) probabilities of service-
class k, Bk, we use (20), where Gfin(j)’s and Tk,fin(j)’s are calculated for a
15
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
system with Nk−1 sources. TC probabilities refer to the proportion of time the
system is congested while CC probabilities refer to CBP. In a Poisson arrival
process, TC and CC probabilities coincide (PASTA property [38]).
To determine the link utilization, U , we can use the formula:
U =
C∑
j=1
jG−1Gfin(j) +
T∑
j=C+1
CG−1Gfin(j) (21)
To calculate Tk,fin(j), in (19) and (20) we consider two subsets: 1) n∗kbk ≤j ≤ C and 2) C + 1 ≤ j ≤ T − bk.
For subset (1), we consider a system, of capacity Fk = C − n∗kbk, that
accommodates all service-classes but k and define rk,fin(j), j = 0, ..., Fk, as:
rk,fin(j)=
1, for j = 0
1j
K∑i=1, i 6=k
(Ni−ni+1)ai,finbi [rk,fin(j−bi)−Ti,fin(j−bi)] ,
for j = 1, ..., Fk
0, otherwise
(22)
Next, we compute the un-normalized values of Tk,fin(j) as:
Tk,fin(j) =
Nk
n∗k
a
n∗kk,finrk,fin(j − n∗kbk) , n∗kbk ≤ j ≤ C (23)
In (23), the term
Nk
n∗k
a
n∗kk,fin is expected, since for n∗kbk ≤ j ≤ C the
number of in-service calls of service-class k is n∗k.
For subset (2), Tk,fin(j) is given by a similar to (C.4) formula (Appendix C):
Tk,fin(j) =
Nk
n∗k
a
n∗kk,fin
∑
n∈Ω′
x(n)K∏
i=1, i 6=k
Ni
ni
ani
i,fin (24)
where:
Ω′j =
n ∈ Ω : n∗kbk +
K∑
i=1, i 6=knibi = j, C < j ≤ T − bk
.
To calculate Gfin(j)’s and rk,fin(j)’s via (19) and (22), respectively, the
knowledge of nk in each state j, nk(j), is required. We approximate nk(j) by
16
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
the mean number of service-class k calls in state j, yk(j), when calls follow a
Poisson process, i.e., nk(j) ≈ yk(j). This means that the values of yk(j) will
be determined via the E-EMLM/TH. Such approximations are common in the
literature and induce little error (e.g., [11], [40], [47], [71]). Thus, to determine
Gfin(j)’s and rk,fin(j)’s we propose the formulas:
Gfin(j)=
1, for j = 0
1min(C,j)
K∑k=1
(Nk−yk(j−bk))ak,finbk [Gfin(j−bk)−Tk,fin(j−bk)] ,
for j=1, ..., T
0, otherwise
(25)
where:
yk(j)G(j) = 1min(C,j)akbk [G(j − bk)− Tk(j − bk)] (yk(j − bk) + 1)
+ 1min(C,j)
K∑i=1, i 6=k
aibi [G(j − bi)− Ti(j − bi)] yk(j − bi)(26)
rk,fin(j)=
1, for j = 0
1j
K∑i=1, i 6=k
(Ni−yi,k(j−bi))ai,finbi [rk,fin(j−bi)−Ti,fin(j−bi)] ,
for j = 1, ..., Fk
0, otherwise
(27)
where:
yi,k(j)rk(j) = 1min(C,j)aibi [rk(j−bi)−Ti(j−bi)] (yi,k(j−bi) + 1)
+ 1min(C,j)
K∑x=1, x 6=i, k
axbx [rk(j−bx)− Tx(j−bx)] yi,k(j−bx)(28)
The proof of (26) and (28) is similar to that of Theorem 2 in [39] and thus
is omitted.
The following algorithm summarizes the procedure for the calculation of TC
probabilities, CC probabilities and link utilization in the E-EnMLM/TH:
1) Determine G(j)’s, rk(j)’s and Tk(j)’s of the corresponding Poisson model
(E-EMLM/TH) via (7), (10) and (11)-(12), respectively.
2) Determine yk(j) of the E-EMLM/TH via (26).
17
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
3) Determine Tk,fin(j)’s of the E-EnMLM/TH, via (23) when n∗kbk ≤ j ≤ Cand via (24) when C + 1 ≤ j ≤ T − bk.
4) Determine Gfin(j)’s and rk,fin(j)’s of the E-EnMLM/TH, via (25), (27),
respectively.
5) Determine TC and CC probabilities via (20). Note that the calculation
of CC probabilities of service-class k calls, requires Nk − 1 sources.
6) Determine U (in b.u.) via (21).
4.3. Extension of the E-EnMLM/TH to include adaptive quasi-random traffic
(EA-EnMLM/TH)
To include adaptive traffic in the E-EnMLM/TH, let K = |Ke|+ |Ka|, where
Ke and Ka are the number of elastic and adaptive service-classes, respectively.
Consider again the tutorial example of Subsection 4.1 but now 2nd service-
class calls are adaptive. Compared to Fig. 4, we see that in the new state
transition diagram (that includes r(n)’s) of Fig. 6, the values of µ2 do not
alter. As far as the modified state transition diagram (that includes φk(n)’s) is
concerned, it is similar to Fig. 5.
Following the analysis of Subsection 2.3, the values of x (n)’s and φk(n)’s
are given by (13) and (5), respectively while Gfin(j)’s can be determined by:
Gfin(j)=
1, for j = 0
1min(C,j)
∑k∈Ke
(Nk−nk+1)ak,finbk [Gfin(j−bk)−Tk,fin(j−bk)]
+ 1j
∑k∈Ka
(Nk−nk+1)ak,finbk [Gfin(j−bk)−Tk,fin(j−bk)] ,
for j = 1, ..., T
0, otherwise
(29)
To calculate Tk,fin(j) in (29) we consider two subsets: 1) n∗kbk ≤ j ≤ C and
2) C + 1 ≤ j ≤ T − bk.
For subset (1), we consider a system, of capacity Fk=C−n∗kbk, that accom-
modates all service-classes but service-class k and define rk,fin(j), j = 0, ..., Fk,
18
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
as follows:
rk,fin(j)=
1, for j = 0
1j
∑i∈K\k
(Ni−ni+1)ai,finbi [rk,fin(j−bi)−Ti,fin(j−bi)] ,
for j=1, ..., Fk
0, otherwise
(30)
Having determined rk,fin(j), we compute the un-normalized values of Tk,fin(j)’s
via (23) when n∗kbk ≤ j ≤ C and via (24) when C + 1 ≤ j ≤ T − bk.
To calculate Gfin(j)’s and rk,fin(j)’s via (29) and (30), respectively, the
knowledge of nk in each state j, nk(j), is required. We approximate nk(j) by
the mean number of service-class k calls in state j, yk(j), when calls follow
a Poisson process, i.e., nk(j) ≈ yk(j). This means that the values of yk(j)
will be determined via the EA-EMLM/TH. Thus, to determine Gfin(j)’s and
rk,fin(j)’s we propose the formulas (31) and (34), respectively:
Gfin(j)=
1, for j = 0
1min(C,j)
∑k∈Ke
(Nk−yk(j−bk))ak,finbk[Gfin(j−bk)−Tk,fin(j−bk)]
+ 1j
∑k∈Ka
(Nk−yk(j−bk))ak,finbk [Gfin(j−bk)−Tk,fin(j−bk)] ,
for j = 1, ..., T
0, otherwise
(31)
where the values of yk(j)’s for elastic traffic are given by (32) while those for
adaptive traffic are given by (33):
yk(j)G(j) = 1min(C,j)akbk [G(j − bk)− Tk(j − bk)] (yk(j − bk) + 1)+
+ 1min(C,j)
∑i∈Ke, i 6=k
aibi [G(j − bi)− Ti(j − bi)] yk(j − bi)
+ 1j
∑i∈Ka
aibi [G(j − bi)− Ti(j − bi)] yk(j − bi)(32)
yk(j)G(j) = 1j akbk [G(j − bk)− Tk(j − bk)] (yk(j − bk) + 1)+
+ 1j
∑i∈Ka, i 6=k
aibi [G(j − bi)− Ti(j − bi)] yk(j − bi)
+ 1min(C,j)
∑i∈Ke
aibi [G(j − bi)− Ti(j − bi)] yk(j − bi)(33)
19
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
rk,fin(j)=
1, for j = 0
1j
∑i∈K\k
(Ni−yi,k(j−bi))ai,finbi [rk,fin(j−bi)− Ti,fin(j−bi)] ,
for j = 1, ..., Fk
0, otherwise
(34)
where yi,k(j) is determined by (28).
The proof of (32) and (33) is similar to that of Theorem 2 in [39] and thus is
omitted. As far as the TC probabilities and the link utilization are concerned,
they can be determined by (20) and (21), respectively.
The following algorithm summarizes the procedure for the calculation of TC
probabilities, CC probabilities and link utilization in the EA-EnMLM/TH:
1) Determine G(j)’s, rk(j)’s and Tk(j)’s of the corresponding Poisson model
(EA-EMLM/TH) via (14), (10) and (11)-(12), respectively.
2) Determine yk(j) of the EA-EMLM/TH via (32) and (33) for elastic and
adaptive service-classes, respectively.
3) Determine Tk,fin(j)’s of the EA-EnMLM/TH, via (23) when n∗kbk ≤ j ≤C and via (24) when C + 1 ≤ j ≤ T − bk.
4) Determine Gfin(j)’s and rk,fin(j)’s of the EA-EnMLM/TH, via (31),
(32), respectively.
5) Determine TC and CC probabilities via (20). Note that the calculation
of CC probabilities of service-class k calls, requires Nk − 1 sources.
6) Determine U (in b.u.) via (21).
5. The proposed EA-EnMLM/TH including the BR policy
(EA-EnMLM/TH-BR)
Consider again a single link of capacity C b.u. that accommodates K(K =
|Ke| + |Ka|) service-classes of quasi-random arriving calls. A new service-class
k (k = 1, . . . ,K) call has a peak-bandwidth requirement of bk b.u. and a BR
parameter tk. If j + bk ≤ T − tk and nk + 1 ≤ n∗k, then the call is accepted in
the link. Otherwise the call is blocked and lost.
20
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
To determine G(j )’s in the EA-EnMLM/TH-BR we propose the formula:
Gfin(j)=
1, for j = 0
1min(C,j)
∑k∈Ke
(Nk−nk+1)ak,finDk(j−bk)[Gfin(j−bk)−Tk,fin(j−bk)]
+ 1j
∑k∈Ka
(Nk−nk+1)ak,finDk(j−bk) [Gfin(j−bk)−Tk,fin(j−bk)] ,
for j = 1, ..., T
0, otherwise
(35)
where the values of Dk(j − bk) are given by (16). If the link accommodates
only elastic service-classes (E-EnMLM/TH-BR) then only the first summation
of (35) should be used.
Similar to the EA-EMLM/TH-BR (Section 3), we determine the TC prob-
abilities of service-class k, Pbk , based on two groups of states as in (18):
Pbk =
T∑
j=T−bk−tk+1G−1Gfin(j) +
T−bk−tk∑
j=n∗kbk
G−1Tk,fin(j) (36)
where G =∑Cj=0Gfin(j) is the normalization constant.
The CC probabilities of service-class k calls can be given by (36) assuming
Nk − 1 sources while the link utilization can be determined by (21).
In (35), (36) the knowledge of Tk,fin(j) is required for n∗kbk ≤ j ≤ T−bk−tk.
We consider again two subsets: 1) n∗kbk ≤ j ≤ C and 2) C+1 ≤ j ≤ T −bk− tk.
For subset (1), we can use (30) and (23) where Fk = T − bk − tk − n∗kbk, while
for subset (2) we can use (24) where the values of x (n) are given by (13) and
Ω′j =
n ∈ Ω : n∗kbk +
∑Ki=1, i 6=k nibi = j, C + 1 ≤ j ≤ T − bk − tk
.
To calculate Gfin(j)’s via (35) we approximate nk(j) by the mean number
of service-class k calls in state j, yk(j), when calls follow a Poisson process, i.e.,
nk(j) ≈ yk(j). This means that the values of yk(j) will be determined via the
21
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
EA-EMLM/TH-BR. Thus, to determine Gfin(j)’s we propose the formula:
Gfin(j)=
1, for j = 0
1min(C,j)
Ke∑k=1
(Nk−yk(j−bk))ak,finDk(j−bk)[Gfin(j−bk)−Tk,fin(j−bk)]
+ 1j
Ka∑k=1
(Nk−yk(j−bk))ak,finDk(j−bk)[Gfin(j−bk)−Tk,fin(j−bk)] ,
for j = 1, ..., T
0, otherwise
(37)
where the values of Dk(j−bk) are given by (16) while the values of yk(j)’s for
elastic and adaptive traffic are given by (38), (39), respectively:
yk(j)G(j)= 1min(C,j)akDk(j−bk) [G(j−bk)−Tk(j−bk)] (yk(j−bk)+1)
+ 1min(C,j)
Ke∑i=1, i 6=k
aiDi(j−bi) [G(j−bi)−Ti(j−bi)] yk(j−bi)
+ 1j
Ka∑i=1
aiDi(j−bi) [G(j−bi)−Ti(j−bi)] yk(j−bi)
(38)
yk(j)G(j)= 1j akDk(j−bk) [G(j−bk)−Tk(j−bk)] (yk(j−bk)+1)
+ 1j
Ka∑i=1, i 6=k
aiDi(j − bi) [G(j − bi)− Ti(j − bi)] yk(j − bi)
+ 1min(C,j)
Ke∑i=1
aiDi(j−bi) [G(j−bi)−Ti(j−bi)] yk(j−bi)
(39)
The proof of (38) and (39) is similar to that of Theorem 2 in [36] and thus is
omitted.
6. Numerical results - Evaluation
In this section, we present numerical results for the proposed models (E-
EMLM/TH-BR, EA-EMLM/TH-BR, E-EnMLM/TH-BR and EA-EnMLM/TH-
BR) and the models of [39], [40], [46] (EA-EMLM, EA-EnMLM, EMLM/TH, re-
spectively) and [47] (EnMLM/TH, EMLM/TH-BR, EnMLM/TH-BR). Through
the proposed models we obtain analytical TC probabilities and link utilization
results, and compare them with the corresponding simulation results, in order
to reveal the accuracy of the proposed models. The analytical and simulation
22
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
results of CC probabilities are of similar accuracy to those given for TC prob-
abilities and therefore are not presented. The simulation model is based on
the bandwidth compression/expansion mechanism described by r(n)’s. On the
other hand, the proposed analytical models are based on φk(n)’s. Simulation
results are mean values of 7 runs. Each run is based on the generation of four
million calls. To account for a warm-up period, the blocking events of the first
5% of these generated calls are not considered in the results. Due to the fact
that the confidence intervals are very small, they are not presented in the figures
that follow. The simulation language used is Simscript III [72].
As an application example, we consider a link of capacity C= 70 b.u. and
three values of T : 1) T = C = 70 b.u., 2) T = 75b.u. with rmin = C/T = 70/75
and 3) T = 80b.u. with rmin = C/T = 70/80. The link accommodates calls of
three service-classes, with the following traffic characteristics:
1st class : a1 =5.0 erl, N1 =30 sources, a1,fin=a1/N1 erl, b1 =2 b.u., n∗1 =25
2nd class : a2 =1.5 erl, N2 =30 sources, a2,fin=a2/N2 erl, b2 =5 b.u., n∗2 =11
3rd class : a3 =1.0 erl, N3 =30 sources, a3,fin=a3/N3 erl, b3 =9 b.u., n∗3 =6
The BR parameters for the three service-classes are the following: t1 = 7,
t2 = 4 and t3 = 0 b.u. Note that in the E-EnMLM/TH and the E-EnMLM/TH-
BR all service-classes are elastic while in the EA-EnMLM/TH and the EA-
EnMLM/TH-BR the first service-class is elastic and the other two are adaptive.
In the x-axis of all figures, traffic loads a1, a2 and a3 increase in steps of 1,
0.5 and 0.25 erl, respectively. So, Point 1 represents the vector (a1, a2, a3) =
(5.0, 1.5, 1.0), while Point 7 is (a1, a2, a3) = (11.0, 4.5, 2.5).
In Figs. 7-9, we consider the proposed E-EnMLM/TH and present the an-
alytical and simulation TC probabilities results of the three service-classes, re-
spectively, for all values of T . For comparison, we present the corresponding
analytical results of the EMLM/TH and the EnMLM/TH (when T =C = 70).
According to Figs. 7-9, we deduce that:
(i) the results obtained by the proposed formulas are very close to the sim-
ulation results.
23
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
(ii) The bandwidth compression mechanism reduces TC probabilities of all
service-classes as expected (higher reduction is achieved for T=80 b.u.). This
fact shows the consistency of the proposed model.
(iii) The analytical TC probabilities results obtained by the EMLM/TH and
EnMLM/TH fail to approximate the simulation TC probabilities results of the
E-EnMLM/TH. This fact reveals the necessity of the proposed model.
In Figs. 10-11, we consider the proposed E-EMLM/TH-BR, E-EnMLM/TH-
BR and present the analytical and simulation TC probabilities results of the 1st
and 3rd service-classes, respectively, for all values of T . The results obtained for
the 2nd service-class are of similar accuracy and therefore are omitted. For com-
parison, we present the corresponding analytical results of the EMLM/TH-BR
and the EnMLM/TH-BR (when T =C=70). According to Figs. 10-11, our con-
clusions are similar to (i)-(iii). In addition, the application of the BR policy in
the proposed models results in the CBP increase of the 1st and 2nd service-classes
and the CBP decrease of the 3rd service-class. This behavior is expected since
the BR parameters favor 3rd service-class calls. Similar conclusions between the
analytical and simulation results are obtained in the EA-EMLM/TH-BR and
EA-EnMLM/TH-BR, and thus these results are omitted.
In Figs. 12-13, we present the link utilization results (in b.u.), with (Fig.
13) or without (Fig. 12) the BR policy. Again, the analytical results are very
close to simulation, while the existing EMLM/TH, EnMLM/TH, EMLM/TH-
BR and the EnMLM/TH-BR fail to approximate the results obtained by the
corresponding proposed models.
In Figs. 14-15, we consider the E-EnMLM/TH and EA-EnMLM/TH to-
gether with the existing EnMLM/TH and present the analytical TC probabili-
ties results of the 1st and 3rd service-classes, respectively, for T = 75 b.u. The
simulation results of the EA-EnMLM/TH are very close to the corresponding
analytical results and therefore are not presented. To show the necessity of
the proposed models, we consider two values of n∗3 = 4, 5 calls. The existing
EnMLM/TH fails to approximate the results obtained by the proposed mod-
els, when n∗3 = 4, 5. The fact that the EA-EnMLM/TH gives slightly better
24
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
results compared to the E-EnMLM/TH is explained by the fact that in the
EA-EnMLM/TH calls of the 2nd and the 3rd service-class are adaptive and thus
spend less service time in the system compared to the case of the E-EnMLM/TH.
In addition, the increase of n∗3 from 4 to 5 calls, results in the increase of TC
probabilities for the 1st (Fig. 14) and 2nd service-classes and the decrease of
TC probabilities for the 3rd service-class (Fig. 15). All these results show the
consistency of the proposed models.
Similar behavior appears in Figs. 16-17, whereby we consider the proposed
EA-EnMLM/TH together with the existing EA-EMLM and EA-EnMLM and
present the analytical TC probabilities results of the 1st and 3rd service-classes,
respectively, for T =75 b.u. and T =80 b.u. and n∗3 = 4, 5 calls. It is apparent
that the EA-EMLM and EA-EnMLM fail to approximate the proposed models.
As a final comment, the results obtained by the proposed formulas are very
close to the simulation results even for quite large values of T compared to C
(e.g., T = 140 b.u.). However, increasing T results in a delay increase of elastic
calls, which may be unacceptable for some applications. Thus, T should be
chosen so that this delay remains within acceptable levels.
7. Conclusion
In this paper we propose multirate loss models where Poisson or quasi-
random arriving calls of different service-classes compete for the available link
bandwidth under the threshold and the bandwidth reservation policies. Calls
can be elastic or adaptive. Both types can tolerate bandwidth compression,
but only elastic calls should increase their service-time when their bandwidth
is compressed. The analysis of the proposed models leads to approximate but
recursive formulas for the calculation of the steady-state probabilities and con-
sequently TC probabilities, CC probabilities and link utilization. Simulation
results verify the accuracy of the proposed models. In addition, numerical re-
sults show the necessity of the proposed models, since existing models fail to
approximate the results obtained by the proposed models, and their consistency.
25
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Acknowledgment
The authors would like to thank the anonymous reviewers for their careful
reading of our manuscript and their valuable comments and suggestions.
References
[1] J. Kaufman. “Blocking in a shared resource environment”, IEEE Trans.
Commun., vol. 29, no. 10, 1981, pp. 1474-1481.
[2] J. Roberts, “A service system with heterogeneous user requirements”, in
Pujolle, G. (Ed.): Performance of Data Communications systems and their
applications, North Holland, Amsterdam, 1981, pp.423-431.
[3] M. Pioro, J. Lubacz and U. Korner, “Traffic engineering problems in multi-
service circuit switched networks”, Computer Networks and ISDN Systems,
vol. 20, issue 1-5, Dec. 1990, pp. 127-136.
[4] G. Stamatelos and J. Hayes, “Admission control techniques with applica-
tion to broadband networks”, Computer Communications, vol. 17, issue
9, Sept. 1994, pp. 663-673.
[5] I. Matta and A. Shankar, “Fast time-dependent evaluation of multi-service
networks”, Computer Networks and ISDN Systems, vol. 29, issues 17-18,
Feb. 1998, pp. 1999-2019.
[6] S. Kalyanasundaram, E. Chong and N. Shroff, “Admission control schemes
to provide class-level QoS in multiservice networks”, Computer Networks,
vol. 35, issues 2-3, Feb. 2001, pp. 307-326.
[7] I. Moscholios, M. Logothetis and G. Kokkinakis, “Connection Dependent
Threshold Model: A Generalization of the Erlang Multiple Rate Loss
Model”, Performance Evaluation, vol. 48, issues 1-4, May 2002, pp. 177-
200.
26
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
[8] I. Moscholios, P. Nikolaropoulos and M. Logothetis, “Call level blocking of
ON-OFF traffic sources with retrials under the complete sharing policy”,
Proc. 18th ITC, Berlin, Germany, Sept. 2003, pp. 811-820.
[9] T. Bonald and J. Virtamo, “A recursive formula for multirate systems with
elastic traffic”, IEEE Commun. Letters, vol. 9, no. 8, Aug. 2005, pp. 753-
755.
[10] G. Poo and H. Wang, “Multi-path routing versus tree routing for VPN
bandwidth provisioning in the hose model”, Computer Networks, vol. 51,
issue 6, Apr. 2007, pp. 1725-1743.
[11] I. Moscholios, M. Logothetis and M. Koukias, “An ON-OFF multi-rate loss
model of finite sources”, IEICE Trans. Commun., vol. E90-B, no. 7, Jul.
2007, pp. 1608-1619.
[12] M. Glabowski, K. Kubasik and M. Stasiak, “Modeling of systems with
overflow multi-rate traffic”, Telecommunication Systems, vol. 37, issues
1-3, Mar. 2008, pp. 85-96.
[13] M. Glabowski, A. Kaliszan and M. Stasiak, “Modelling product-form state-
dependent systems with BPP traffic”, Performance Evaluation, vol. 67,
issue 3, Mar. 2010, pp. 174-197.
[14] N. Izady and D. Warthington, “Approximate analysis of non-stationary loss
queues and networks of loss queues with general service time distributions”,
European J. Operational Research, vol. 213, issue 3, Sept. 2011, pp. 498-508.
[15] I. Moscholios, J. Vardakas, M. Logothetis and A. Boucouvalas, “QoS Guar-
antee in a Batched Poisson Multirate Loss Model Supporting Elastic and
Adaptive Traffic”, Proc. of IEEE ICC, Ottawa, Canada, Jun. 2012.
[16] I. Moscholios, J. Vardakas, M. Logothetis and A. Boucouvalas, “Congestion
probabilities in a Batched Poisson multirate loss model supporting elastic
and adaptive traffic”, Annals of Telecommunications, vol. 68, issue 5, Jun.
2013, pp. 327-344.
27
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
[17] S. Hanczewski, M. Stasiak and J.Weissenberg, “A queueing model of a
multi-service system with state-dependent distribution of resources for each
class of calls”, IEICE Trans. Commun., vol. E97-B, no. 8, Aug. 2014, pp.
1592-1605.
[18] M. Glabowski and M. Stasiak, “Modelling of multiservice switching net-
works with overflow links for any traffic class”, IET Circuits, Devices &
Systems, vol. 8, issue 5, Sept. 2014, pp. 358-366.
[19] G. Stamatelos and V. Koukoulidis, “Reservation based bandwidth alloca-
tion in a radio ATM network”, IEEE/ACM Trans. Netw., vol. 5, issue 3,
Jun. 1997, pp. 420-428.
[20] V. Iversen, V. Benetis, N. Ha and S. Stepanov, “Evaluation of multi-
service CDMA networks with soft blocking”, Proc. ITC Specialist Seminar,
Antwerp, Belgium, Aug./Sept. 2004.
[21] L. Popova and W. Koch, “Analytical performance evaluation of mixed ser-
vices with variable data rates for the uplink of UMTS”, Proc. ISWCS,
Valencia, Spain, Sept. 2006.
[22] V. Vassilakis, G. Kallos, I. Moscholios and M. Logothetis, “Call-Level anal-
ysis of W-CDMA networks supporting elastic services of finite population”,
Proc. IEEE ICC, Beijing, China, May 2008.
[23] I. Widjaja and H. Roche, “Sizing X2 bandwidth for Inter-connected eNBs”,
Proc. IEEE VTC Fall, Anchorage, Alaska, USA, Sept. 2009.
[24] M. Stasiak, P. Zwierzykowski and D. Parniewicz, “Modelling of the
WCDMA Interface in the UMTS Network with Soft Handoff Mechanism”,
Proc. IEEE Globecom, Honolulu, Hawaii, Nov. 2009.
[25] M. Glabowski, M. Stasiak, A. Wisniewski and P. Zwierzykowski, “Blocking
Probability Calculation for Cellular Systems with WCDMA Radio Interface
Servicing PCT1 and PCT2 Multirate Traffic”, IEICE Trans. Commun.,
E92-B, (4), April 2009, pp.1156-1165.
28
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
[26] D. Parniewicz, M. Stasiak and P. Zwierzykowski, “Analytical model of the
multi-service cellular network servicing multicast connections”, Telecom-
munication Systems, vol. 52, issue 2, Feb. 2013, pp. 1091-1100.
[27] I. Moscholios, G. Kallos, V. Vassilakis and M. Logothetis, “Congestion
Probabilities in CDMA-Based Networks Supporting Batched Poisson Input
Traffic”, Wireless Personal Communications, vol. 79, issue 2, Nov. 2014,
pp. 1163-1186.
[28] K. Kuppuswamy and D. Lee, “An analytic approach to efficiently comput-
ing call blocking probabilities for multiclass WDM networks”, IEEE/ACM
Trans. Netw., vol. 17, issue 2, Apr. 2009, pp. 658-670.
[29] J. Vardakas, I. Moscholios, M. Logothetis and V. Stylianakis, “An Analyt-
ical Approach for Dynamic Wavelength Allocation in WDM-TDMA PONs
Servicing ON-OFF Traffic”, IEEE/OSA J. Opt. Commun. Netw., vol. 3,
no. 4, Apr. 2011, pp. 347-358.
[30] Y. Deng and P. Prucnal, “Performance analysis of heterogeneous op-
tical CDMA networks with bursty traffic and variable power control”,
IEEE/OSA J. Opt. Commun. Netw., vol. 3, no. 6, Jun. 2011, pp. 487-492.
[31] J. Vardakas, I. Moscholios, M. Logothetis and V. Stylianakis, “Blocking
Performance of Multi-rate OCDMA PONs with QoS Guarantee”, Int. J.
on Advances in Telecommunications, vol. 5, no. 3&4, Dec. 2012, pp. 120-
130.
[32] N. Jara and A. Beghelli, “Blocking probability evaluation of end-to-end
dynamic WDM networks”, Photonic Network Communications, vol. 24,
issue 1, Aug. 2012, pp. 29-38.
[33] J. Vardakas, I. Moscholios, M. Logothetis and V. Stylianakis, “Performance
Analysis of OCDMA PONs Supporting Multi-Rate Bursty Traffic”, IEEE
Trans. Commun., vol. 61, no. 8, Aug. 2013, pp. 3374-3384.
29
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
[34] A. Nilsson and M. Perry, “Multirate blocking probabilities: numerically
stable computations”, Proc. 15th ITC, 1997, pp. 1359-1368.
[35] A. Nilsson, M. Perry, A. Gersht and V. Iversen, “On multi-rate Erlang-B
computations”, Proc. 16th ITC, 1999, pp. 1051-1060.
[36] S. Berezner and A. Krzesinski, “An efficient stable recursion to compute
multiservice blocking probabilities”, Performance Evaluation, vol. 43, is-
sues 2-3, Feb. 2001, pp. 151-164.
[37] K. Ross, Multiservice Loss Models for Broadband Telecommunication Net-
works, Springer, 1995.
[38] H. Akimaru and K. Kawashima, Teletraffic – Theory and Applications, 2nd
ed., Springer, Berlin, 1999.
[39] S. Racz, B. Gero and G. Fodor, “Flow level performance analysis of a
multi-service system supporting elastic and adaptive services”, Perfor-
mance Evaluation, vol. 49, issues 1-4, Sept. 2002, pp. 451-469.
[40] I. Moscholios, J. Vardakas, M. Logothetis and M. Koukias, “A Quasi-
random multirate loss model supporting elastic and adaptive traffic”, Proc.
EMERGING, Barcelona, Spain, Sept. 2012.
[41] J. Ni, D. Tsang, S. Tatikonda and B. Bensaou, “Threshold and Reservation
Based Call Admission Control Policies for Multiservice Resource-Sharing
Systems”, Proc. IEEE INFOCOM, Miami, USA, Mar. 2005.
[42] J. Ni, D. Tsang, S. Tatikonda and B. Bensaou, “Optimal and Structured
Call Admission Control Policies for Resource-Sharing Systems”, IEEE
Trans. Commun., vol. 55, issue 1, Jan. 2007, pp. 158-170.
[43] T. Kwon, S. Kim, Y. Choi and M. Naghshineh, “Threshold-type Call Ad-
mission Control in Wireless/Mobile Multimedia Networks Using Prioritised
Adaptive Framework”, IEE Electronics Letters, vol. 36, issue 9, Apr. 2000,
pp. 852-854.
30
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
[44] N. Nasser and H. Hassanein, “Connection-level Performance Analysis for
Adaptive Bandwidth Allocation in Multimedia Wireless Cellular Net-
works”, Proc. IEEE PCCC, Phoenix, Arizona, Apr. 2004.
[45] J. Ni and S. Tatikonda, “Revenue optimization via call admission control
and pricing for mobile cellular systems”, Proc. IEEE ICC, Seoul, Korea,
May 2005.
[46] D. Tsang and K. Ross, “Algorithms to Determine Exact Blocking Prob-
abilities for Multirate Tree Networks”, IEEE Trans. Commun., vol. 38,
issue 8, Aug. 1990, pp. 1266-1271.
[47] I. Moscholios, M. Logothetis, J. Vardakas and A. Boucouvalas, “Perfor-
mance metrics of a multirate resource sharing teletraffic model with finite
sources under the threshold and bandwidth reservation policies”, IET Net-
works, vol. 4, issue 3, May 2015, pp. 195-208.
[48] J. Roberts, “Teletraffic models for the Telecom 1 Integrated Services Net-
work”, Proc. 10th Int. Teletraffic Congress, Montreal, Canada, 1983.
[49] M. Stasiak, M. Glabowski, “A simple approximation of the link model with
reservation by a one-dimensional Markov chain”, Performance Evaluation,
vol. 41, issues 2-3, Jul. 2000, pp. 195-208.
[50] I. Moscholios and M. Logothetis, “Engset Multirate State-Dependent Loss
Models with QoS Guarantee”, Int. Journal of Commun. Systems, vol. 19,
issue 1, Feb. 2006, pp. 67-93.
[51] G. Raskutti, A. Zalesky, E. Wong and M. Zukerman, “Enhanced blocking
probability evaluation method for circuit-switched trunk reservation net-
works”, IEEE Commun. Letters, vol. 11, no. 6, Jun. 2007, pp. 543-545.
[52] M. Glabowski, A. Kaliszan and M. Stasiak, “Asymmetric convolution al-
gorithm for blocking probability calculation in full-availability group with
bandwidth reservation”, IET Circuits, Devices & Systems, vol. 2, issue 1,
Feb. 2008, pp. 87-94.
31
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
[53] R. Bolla, R. Bruschi, F. Davoli and M. Repetto, “Hybrid optimization for
QoS control in IP virtual private networks”, Computer Networks, vol. 52,
issue 3, Feb. 2008, pp. 563-580.
[54] I. Moscholios and M. Logothetis, “The Erlang multirate loss model with
Batched Poisson arrival processes under the bandwidth reservation policy”,
Computer Communications, vol. 33, no. 1, Nov. 2010, pp. S167-S179.
[55] M. Glabowski, M. Sobieraj and M. Stasiak, “Modelling Limited-availability
Systems with Multi-service Sources and Bandwidth Reservation”, Proc.
8th AICT, Stuttgart, Germany, 27 May - 1 Jun. 2012.
[56] V. Vassilakis, I. Moscholios and M. Logothetis, “The Extended Connection-
Dependent Threshold Model for Call-level Performance Analysis of Multi-
rate Loss Systems under the Bandwidth Reservation Policy”, Int. Journal
of Communication Systems, vol. 25, issue 7, Jul. 2012, pp. 849-873.
[57] K. Lee and S. Kim, “Optimization for adaptive bandwidth reservation in
wireless multimedia networks”, Computer Networks, vol. 38, issue 5, April
2002, pp. 631-643.
[58] F. Cruz-Perez, J. Vazquez-Avila and L. Ortigoza-Guerrero, “Recurrent
formulas for the multiple fractional channel reservation strategy in multi-
service mobile cellular networks”, IEEE Commun. Letters, vol. 8, no. 10,
Oct. 2004, pp. 629-631.
[59] M. Glabowski, M.Sobieraj and M. Stasiak, “Blocking probability calcula-
tion in UMTS networks with bandwidth reservation, handoff mechanism
and finite source population”, Proc. 7th ISCIT, Sydney, Australia, Oct.
2007.
[60] M. Stasiak and S. Hanczewski, “A model of WCDMA radio interface with
reservation”, Proc. ISITA, Auckland, New Zealand, Dec. 2008.
32
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
[61] A. Al Daoud, M. Alanyali and D. Starobinski, “Reservation policies for
revenue optimization from secondary spectrum access in cellular networks”,
Computer Networks, vol. 55, issue 1, Jan. 2011, pp. 214-224.
[62] I. Moscholios, G. Kallos, M. Katsiva, V. Vassilakis and M. Logothetis, “Call
Blocking Probabilities in a W-CDMA cell with interference cancellation
and bandwidth reservation”, Proc. of IEICE ICTF, Poznan, Poland, May
2014.
[63] M. Alam, S. Alsharif and P. Panati, “Performance Evaluation of Through-
put in Optical Burst Switching”, Int. Journal of Communication Systems,
vol. 24, issue 3, Mar. 2011, pp. 398-414.
[64] J. Vardakas, I. Moscholios, M. Logothetis and V. Stylianakis, “On Code
reservation in Multi-rate OCDMA Passive Optical Networks”, Proc. of 8th
CSNDSP, Poznan, Poland, Jul. 2012.
[65] J. Vardakas, I. Moscholios, M. Logothetis and V. Stylianakis, “Blocking
Performance of Multi-rate OCDMA PONs with QoS Guarantee”, Int. J.
Advances in Telecommunications, vol. 5, no. 3 & 4, Dec. 2012, pp. 120-130.
[66] I. Moscholios, V. Vassilakis, M. Logothetis, J. Vardakas, “Bandwidth Reser-
vation in the Erlang Multirate Loss Model for Elastic and Adaptive Traffic”,
Proc. 9th AICT, Rome, Italy, June 2013.
[67] I. Moscholios, J. Vardakas, M. Logothetis and M. Koukias, “A Quasi-
random Multirate Loss Model supporting Elastic and Adaptive Traffic
under the Bandwidth Reservation Policy”, Int. Journal on Advances in
Networks and Services, vol. 6, No. 3 & 4, Dec. 2013, pp. 163-174.
[68] S. Yashkov and A. Yashkova, “Processor sharing: a survey of the mathe-
matical theory”, Automation and Remote Control, vol. 68, issue 9, Sept.
2007, pp. 1662-1731.
[69] M. Stasiak, M. Glabowski, A.Wisniewski, and P. Zwierzykowski, Modeling
and Dimensioning of Mobile Networks, Wiley & Sons, 2011.
33
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
[70] ] I. Moscholios, M. Logothetis and P. Nikolaropoulos, “Engset Multi-Rate
State-Dependent Loss Models”, Performance Evaluation, vol. 59, issues
2-3, Feb. 2005, pp. 247-277.
[71] M. Glabowski, and M. Stasiak, “An approximate model of the full-
availability group with multi-rate traffic and a finite source population”,
Proc. MMB&PGTS, Dresden, Germany, Sept. 2004.
[72] Simscript III, http://www.simscript.com
34
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Table 1: State space and occupied link bandwidth.
n1 n2
j
(before bandwidth
compression)
0 ≤ j ≤ T
j
(after bandwidth
compression)
0 ≤ j ≤ C
0 0 0 0
0 1 4 4
1 0 2 2
1 1 6 4
2 0 4 4
2 1 8 4
3 0 6 4
Table 2: Values of state dependent factors (elastic traffic).
n1 n2 r(n) φ1(n) φ2(n)
0 0 1.000 1.000 1.000
0 1 1.000 1.000 1.000
1 0 1.000 1.000 1.000
1 1 0.667 0.667 0.667
2 0 1.000 1.000 1.000
2 1 0.500 0.600 0.400
3 0 0.667 0.667 1.000
35
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Table 3: Values of state dependent factors (elastic and adaptive traffic).
n1 n2 r(n) φ1(n) φ2(n)
0 0 1.000 1.000 1.000
0 1 1.000 1.000 1.000
1 0 1.000 1.000 1.000
1 1 0.667 0.857 0.857
2 0 1.000 1.000 1.000
2 1 0.500 0.700 0.600
3 0 0.667 0.667 1.000
36
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Figure 1: State transition diagram of the tutorial example for elastic random traffic with
r(n)’s.
Figure 2: Modified state transition diagram of the tutorial example for elastic random traffic
with φk(n)’s.
37
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Figure 3: State transition diagram of the tutorial example for elastic and adaptive random
traffic with r(n)’s.
Figure 4: State transition diagram of the tutorial example for elastic quasi-random traffic
with r(n)’s.
38
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Figure 5: Modified state transition diagram of the tutorial example for elastic quasi-random
traffic with φk(n)’s.
Figure 6: State transition diagram of the tutorial example for elastic and adaptive quasi-
random traffic with r(n)’s.
39
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Figure 7: TC probabilities of the 1st service-class, when n∗3 = 6 (under the TH policy only).
40
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Figure 8: TC probabilities of the 2nd service-class, when n∗3 = 6 (under the TH policy only).
41
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Figure 9: TC probabilities of the 3rd service-class, when n∗3 = 6 (under the TH policy only).
42
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Figure 10: TC probabilities of the 1st service-class, when n∗3 = 6 (under both policies).
43
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Figure 11: TC probabilities of the 3rd service-class, when n∗3 = 6 (under both policies).
44
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Figure 12: Link Utilization, when n∗3 = 6 (under the TH policy only).
45
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Figure 13: Link Utilization, when n∗3 = 6 (under both policies).
46
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
TFigure 14: TC probabilities of the 1st service-class, when n∗
3 = 4, 5 and T = 75 (EnMLM/TH
vs E-EnMLM/TH vs EA-EnMLM/TH).
47
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Figure 15: TC probabilities of the 3rd service-class, when n∗3 = 4, 5 and T = 75 (EnMLM/TH
vs E-EnMLM/TH vs EA-EnMLM/TH).
48
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
TFigure 16: TC probabilities of the 1st service-class, when n∗
3 = 4, 5 and T = 75, 80 (EA-EMLM
vs EA-EnMLM vs EA-EnMLM/TH).
49
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
TFigure 17: TC probabilities of the 3rd service-class, when n∗
3 = 4, 5 and T = 75, 80 (EA-EMLM
vs EA-EnMLM vs EA-EnMLM/TH).
50
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Figure 18: State transition diagram of the E-EMLM/TH.
Figure 19: State transition diagram of the E-EnMLM/TH.
51
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Appendix A. Proof of Theorem 1
The steady state transition rates of the E-EMLM/TH are shown in Fig. 18,
whereby the global balance equation for state n = (n1, ..., nk−1, nk, nk+1, ..., nK),
expressed as rate into state n = rate out of state n , is:
K∑k=1
λkδ−k (n)P (n−k ) +
K∑k=1
(nk + 1)µkδ+k (n)φk(n+
k )P (n+k ) =
K∑k=1
λkδ+k (n)P (n) +
K∑k=1
nkµkδ−k (n)φk(n)P (n)
(A.1)
where:
n+k = (n1, ..., nk−1, nk+1, nk+1, ..., nK),n−k = (n1, ..., nk−1, nk−1, nk+1, ..., nK)
δ+k (n) =
1 if n+k ∈ Ω
0 otherwise, δ−k (n) =
1 if n−k ∈ Ω
0 otherwise, and P (n), P (n−k ),
P (n+k ) are the probability distributions of states n , n−k , n
+k , respectively.
Assume now, the existence of Local Balance (LB) between adjacent states.
Equations (A.2) and (A.3) are the detailed LB equations which exist because
the Markov chain of the modified model is reversible. Then, based on Fig. 18,
the following LB equations (rate up = rate down) are extracted:
λkδ−k (n)P (n−k ) = nkµkδ
−k (n)φk(n)P (n) (A.2)
λkδ+k (n)P (n) = (nk + 1)µkδ
+k (n)φk(n+
k )P (n+k ) (A.3)
for k = 1, ...,K and n ∈ Ω.
Based on the LB assumption, the probability distribution P (n) has the
solution:
P (n) = G−1(x(n)
K∏
k=1
ank
k
nk!
)(A.4)
where ak = λk/µk is the offered traffic-load (in erl) of service-class k, G is
the normalization constant given by G≡G(Ω) =∑n∈Ω
(x(n)
K∏k=1
ankk
nk!
)and Ω =
n : 0 ≤ nb ≤ T , nk ≤ n∗k, k = 1, ...,K. Note that although the Markov chain
52
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
becomes reversible, the probability distribution P(n) does not have a PFS due
to the summation of (6) needed for x (n).
We now define G(j), as:
G(j) =∑
n∈Ωj
P (n) (A.5)
where Ωj is the set of states whereby exactly j b.u. are occupied, i.e., Ωj =
n ∈ Ω : nb = j.Consider now two sets: 1) 0 ≤ j ≤ C and 2) C < j ≤ T . For set (1), we
have the EMLM/TH [43]. In that case, no bandwidth compression takes place
and G(j) is determined by the following exact recursive formula [46]:
G(j) =
1, for j = 0
1j
K∑k=1
akbk [G(j − bk)− Tk(j − bk)] , for j = 1, ..., C
0, otherwise
(A.6)
where Tk(x) is the un-normalized probability that x b.u. are occupied while the
number of service-class k calls is n∗k, or:
Tk(x) := Pr(j = x, nk = n∗k) (A.7)
In (A.7) the fact that nk = n∗k implies that:
1. j ≥ n∗kbk and therefore Tk(x) = 0 for x = 0, 1, ..., n∗kbk − 1, and
2. Tk(x) is a blocking probability factor for service-class k calls.
For set (2), i.e., when C < j ≤ T , we substitute (5) in (A.2) to have:
akx(n)P (n−k ) = nkx(n−k )P (n) (A.8)
where δ−k (n) = 1, since the TH policy is a coordinate convex policy [37].
Note: The basic characteristic of a coordinate convex policy is that if n ∈ Ω
and nk ≥ 1 then the state n−k = (n1, ..., nk−1, nk − 1, nk+1, ..., nK) is also an
admissible state.
Multiplying both sides of (A.8) by bk and summing over k, we obtain:
x(n)K∑
k=1
akbkP (n−k ) = P (n)K∑
k=1
nkbkx(n−k ) (A.9)
53
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Equation (A.9), due to (6) is written as:
P (n) =1
C
K∑
k=1
akbkP (n−k ) (A.10)
Summing both sides of (A.10) over Ωj = n ∈ Ω : nb = j and based on (A.5),
we obtain:
G(j)C =
K∑
k=1
akbk∑
n∈Ωj
P (n−k ) (A.11)
Since the number of in-service calls of service-class k should not exceed n∗k the
term∑
n∈ΩjP (n−k ) = G(j − bk)− Pr [x = j − bk, nk = n∗k]. Thus, (A.11) can
be written as:
G(j) =1
C
K∑
k=1
akbk [G(j − bk)− Tk(j − bk)] (A.12)
where Tk(x) is given by (A.7).
The combination of (A.6) and (A.12) results in (7). End of Proof.
Appendix B. Proof of Theorem 2
The graphical representation of the modified state transition diagram is sim-
ilar to Fig. 2. The derivation of (13) is based on the following assumptions:
a) The bandwidth of all in-service calls of service-class k, 1 ≤ k ≤ K (elastic
or adaptive) is compressed by a factor φk(n), in state C < nb ≤ T , so that:
∑
k∈Ke
nkb′k +
∑
k∈Ka
nkb′k = C (B.1)
b) The product service time by bandwidth per call of service-class k calls,
k ∈ K, remains the same in state n either of the irreversible or the reversible
Markov chain. In other words:
For elastic service−classes :bkr(n)
µkr(n)=
b′k
µkφk(n)⇒ b
′k = bkφk(n) (B.2)
For adaptive service−classes :bkr(n)
µk=
b′k
µkφk(n)⇒ b
′k = bkφk(n)r(n) (B.3)
Under these assumptions, we can derive (13) by substituting (B.2), (B.3) and
(5) into (B.1). End of Proof.
54
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Appendix C. Proof of Theorem 3
The steady state transition rates of the E-EnMLM/TH are shown in Fig. 19,
whereby the global balance equation for state n = (n1, ..., nk−1, nk, nk+1, ..., nK),
expressed as rate into state n = rate out of state n , is:
K∑k=1
(Nk−nk+ 1)vkδ−k (n)Pfin(n−k ) +
K∑k=1
(nk+1)µkδ+k (n)φk(n+
k )Pfin(n+k ) =
K∑k=1
(Nk−nk)vkδ+k (n)Pfin(n) +
K∑k=1
nkµkδ−k (n)φk(n)Pfin(n)
(C.1)
where:
n+k = (n1, ..., nk−1, nk+1, nk+1, ..., nK),n−k = (n1, ..., nk−1, nk−1, nk+1, ..., nK)
while Pfin(n), Pfin(n−k ), Pfin(n+k ) are the probability distributions of states
n , n−k , n+k , in the finite source model, respectively.
Based on Fig. 19, the following LB equations are extracted:
(Nk − nk + 1)vkδ−k (n)Pfin(n−k ) = nkµkδ
−k (n)φk(n)Pfin(n) (C.2)
(Nk − nk)vkδ+k (n)Pfin(n) = (nk + 1)µkδ
+k (n)φk(n+
k )Pfin(n+k ) (C.3)
for k = 1, ...,K and n ∈ Ω.
Based on the LB assumption, Pfin(n) has the solution:
Pfin(n) = G−1
x(n)
K∏
k=1
Nk
nk
ank
k,fin
(C.4)
where ak,fin = vk/µk is the offered traffic-load (in erl) per idle service-class k
source, G ≡ G(Ω) =∑n∈Ω
x(n)
K∏k=1
Nk
nk
ank
k,fin
, x(n) is given by (6)
and Ω = n : 0 ≤ nb ≤ T , nk ≤ n∗k ≤ Nk, k = 1, ...,K.We now define Gfin(j) as:
Gfin(j) =∑
n∈Ωj
Pfin(n) (C.5)
where Ωj = n ∈ Ω : nb = j.
55
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Consider now two sets: (1) 0 ≤ j ≤ C, and (2) C < j ≤ T . For set (1), we
have the EnMLM/TH [47]. In that case, Gfin(j) is determined by an accurate
and recursive formula [47]:
Gfin(j)=
1, for j = 0
1j
K∑k=1
(Nk−nk+1)ak,finbk[Gfin(j−bk)−Tk,fin(j−bk)],
for j = 1, ..., C
0, otherwise
(C.6)
where Tk,fin(x) is given by:
Tk,fin(x) := Pr(j = x, nk = n∗k) (C.7)
For set (2), i.e., when C < j ≤ T , we substitute (5) in (C.2) to have:
(Nk − nk + 1)ak,finx(n)Pfin(n−k ) = nkx(n−k )Pfin(n) (C.8)
where δ−k (n) = 1 since the TH policy is a coordinate convex policy.
Multiplying both sides of (C.8) by bk and summing over k, we obtain:
x(n)
K∑
k=1
(Nk − nk + 1)ak,finbkPfin(n−k ) = Pfin(n)
K∑
k=1
nkbkx(n−k ) (C.9)
Equation (C.9), due to (6) is written as:
Pfin(n) =1
C
K∑
k=1
(Nk − nk + 1)ak,finbkPfin(n−k ) (C.10)
Summing both sides of (C.10) over Ωj = n ∈ Ω : nb=j, and based on (C.5),
we get:
Gfin(j)C =K∑
k=1
bkak,fin∑
n∈Ωj
(Nk − nk + 1)Pfin(n−k ) (C.11)
The term∑
n∈Ωj(Nk−nk+1)Pfin(n−k ) in (C.11) is written as:
∑
n∈Ωj
(Nk−nk+1)Pfin(n−k )=Nk∑
n∈Ωj
Pfin(n−k )−∑
n∈Ωj
(nk−1)Pfin(n−k ) (C.12)
Since nk ≤ n∗k, the term∑
n∈ΩjPfin(n−k )=Gfin(j−bk)−Pr [x = j −bk, nk= n∗k].
Thus, the first term of the right hand side of (C.12) becomes:
Nk∑
n∈Ωj
Pfin(n−k ) = Nk [Gfin(j − bk)− Pr [x = j − bk, nk = n∗k]] (C.13)
56
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
The second term of the right hand side of (C.13) becomes:
∑
n∈Ωj
(nk−1)Pfin(n−k )=yk,fin(j−bk) [Gfin(j−bk)−Pr [x=j−bk, nk=n∗k]] (C.14)
where yk,fin(j− bk) is the average number of service-class k calls in state j− bk.
Based on (C.13) and (C.14), (C.12) becomes:
∑
n∈Ωj
(Nk−nk+1)Pfin(n−k )=(Nk−yk,fin(j−bk)) [Gfin(j−bk)−Tk,fin(j−bk)] (C.15)
where: Tk,fin(j − bk) = Pr (x = j − bk, nk = n∗k).
Equation (C.11) due to (C.15) is written as:
Gfin(j)=1
C
K∑
k=1
ak,finbk(Nk−yk,fin(j−bk)) [Gfin(j−bk)−Tk,fin(j−bk)] (C.16)
In order to determine yk,fin(j−bk)’s in (C.16) we use a transformation al-
ready proposed in a lemma of [4] for the case of the EnMLM. According to
[4], two stochastic systems with: a) the same traffic description parameters
(K,Nk, ak,fin), k= 1, ...,K and b) exactly the same set of states are equivalent
in the sense that they result in the same CBP. The bandwidth requirements and
the capacity C of the equivalent stochastic system can be chosen in such a way
so that conditions (a) and (b) are valid. No other restriction is necessary. This
means, that we have the freedom to choose bk’s and C in a way that they result
in an equivalent stochastic system whereby each state in Ω has a unique occu-
pancy j. In that case, each state j of the equivalent stochastic system is reached
only by the previous state j−bk and therefore we have yk,fin(j−bk)=nk−1 and
yk,fin(j) =nk. The interested reader may resort to subsection 2.1.1 of [70] for
a detailed example of such a transformation in the case of the EnMLM. Based
on the above, (C.16) becomes:
Gfin(j) =1
C
K∑
k=1
(Nk−nk+1)ak,finbk [Gfin(j−bk)− Tk,fin(j−bk)] (C.17)
The combination of (C.6) and (C.17) results in (19). End of Proof.
57
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
Ioannis D. Moscholios was born in Athens, Greece, in 1976. He received the Dipl.-Eng. degree in
Electrical & Computer Engineering from the University of Patras, Patras, Greece, in 1999, the M.Sc.
degree in Spacecraft Technology & Satellite Communications from the University College London,
UK, in 2000 and the Ph.D. degree in Electrical & Computer Engineering from the University of Patras,
in 2005. From 2005 to 2009 he was a Research Associate at the Wire Communications Laboratory,
Dept. of Electrical & Computer Engineering, University of Patras. From 2009 to 2013 he was a
Lecturer in the Dept. of Telecommunications Science and Technology, University of Peloponnese,
Tripolis, Greece. From 2013, he is an Assistant Professor in the Dept. of Informatics &
Telecommunications, University of Peloponnese, Tripolis, Greece. His research interests include
teletraffic engineering, simulation and performance analysis of communication networks. He has
published over 100 papers in international journals/ conferences. He has served as a Guest Editor in
IET Networks and as an Associate Editor in IEICE Transactions on Communications. He is a member
of the Technical Chamber of Greece (TEE).
Email address: [email protected]
Michael D. Logothetis was born in Stenies, Andros, Greece, in 1959. He received his Dipl.-Eng.
degree and Doctorate in Electrical Engineering, both from the University of Patras, Patras, Greece, in
1981 and 1990, respectively. From 1982 to 1990, he was a Teaching and Research Assistant at the
Laboratory of Wire Communications, University of Patras, and participated in many national and EU
research programmes, dealing with telecommunication networks, as well as with office automation.
From 1991 to 1992 he was Research Associate in NTT’s Telecommunication Networks Laboratories,
Tokyo, Japan. Afterwards, he was a Lecturer in the Dept. of Electrical & Computer Engineering of the
University of Patras, and recently he has been elected Professor in the same Department. His research
interests include teletraffic theory and engineering, traffic/network control, simulation and performance
optimization of telecommunications networks. He has published over 180 conference/journal papers
and has over 530 third-part citations. He has published a teletraffic book in Greek. He has organised the
5th International Conference on Communications Systems, Networks and Digital Signal Processing,
CSNDSP 2006. He served/is serving on the Technical Program Committee of several international
conferences while he organizes and chairs several technical sessions. He has become a Guest Editor in
five journals: a) Mediterranean Journal of Electronics and Communications, b) Mediterranean Journal
of Computers and Networks, c) IET Circuits, Devices & Systems, d) IET Networks, and e) Ubiquitous
Computing and Communication Journal. He is a member of the IARIA (Fellow), IEEE (Senior),
IEICE, FITCE and the Technical Chamber of Greece (TEE).
Email address: [email protected]
John S. Vardakas received the Dipl.-Eng. degree in electrical and computer engineering from
Democritus University of Thrace, Komotini, Greece, in 2004 and the Ph.D. degree from the University
of Patras, Patras, Greece. He is currently a Senior Researcher with Iquadrat Informatica, Barcelona,
Spain. His research interests include performance analysis and simulation of communication networks
and smart grids. Dr. Vardakas is a member of the IEEE, the Optical Society of America, and the
Technical Chamber of Greece (TEE).
Email address: [email protected]
Anthony C. Boucouvalas received the B.Sc. degree in Electrical and Electronic Engineering from
Newcastle upon Tyne University, U.K., in 1978, the M.Sc. and D.I.C. degrees in Communications
Engineering from Imperial College, University of London, U.K., in 1979, and the Ph.D. degree in fiber
optics from Imperial College, in 1982. Subsequently, he joined the GEC Hirst Research Center
working on fiber-optic components, measurements, and sensors until 1987, when he joined Hewlett
Packard Laboratories (HP) as a Project Manager. At HP, he worked in the areas of optical
communication systems, optical networks, and instrumentation, until 1994, when he joined
Bournemouth University, Bournemouth, U.K. In 1996, he became a Professor in Multimedia
Communications, and in 1999 he became Director of the Microelectronics and Multimedia research
Center. Currently, he is a Professor in the Dept. of Informatics & Telecommunications, University of
Peloponnese, Greece. His current research interests span the fields of wireless communications, optical
fiber communications and components and multimedia communications where he has published over
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIP
T
300 papers. He has contributed to the formation of IrDA as an industry standard and he is now a
member of the IrDA Architectures Council contributing on new IrDA standards. Prof. Boucouvalas is a
Fellow of the Royal Society for the encouragement of Arts, Manufacturers and Commerce, Fellow of
IEE and Fellow of IEEE, for contributions to optical fiber components and optical wireless
communications. He is an Editor of the IEEE Wireless Communications Magazine, IEEE Transactions
on Wireless Networks, Associate Editorial Member for the Wireless Communications and Mobile
Computing Journal and Vice Chairman of the IEEE UK&RI Communications Chapter.
Email address: [email protected]