International Journal of Stochastic Analysis

International Journal of Stochastic Analysis / 2008 / Article

Research Article | Open Access

Volume 2008 |Article ID 415692 |

John A. Morrison, Charles Knessl, "Asymptotic Analysis of a Loss Model with Trunk Reservation I: Trunks Reserved for Fast Traffic", International Journal of Stochastic Analysis, vol. 2008, Article ID 415692, 34 pages, 2008.

Asymptotic Analysis of a Loss Model with Trunk Reservation I: Trunks Reserved for Fast Traffic

Academic Editor: Benjamin Melamed
Received16 Jan 2007
Accepted21 Nov 2007
Published25 Feb 2008


We consider a model for a single link in a circuit-switched network. The link has ?? circuits, and the input consists of offered calls of two types, that we call primary and secondary traffic. Of the ?? links, ?? are reserved for primary traffic. We assume that both traffic types arrive as Poisson arrival streams. Assuming that ?? is large and ??=??(1), the arrival rate of primary traffic is ??(??), while that of secondary traffic is smaller, of the order v??(??). The holding times of the primary calls are assumed to be exponentially distributed with unit mean. Those of the secondary calls are exponentially distributed with a large mean, that is, v??(??). Thus, the primary calls have fast arrivals and fast service, compared to the secondary calls. The loads for both traffic types are comparable (??(??)), and we assume that the system is โ€œcritically loadedโ€; that is, the system's capacity is approximately equal to the total load. We analyze asymptotically the steady state probability that ??1 (resp., ??2) circuits are occupied by primary (resp., secondary) calls. In particular, we obtain two-term asymptotic approximations to the blocking probabilities for both traffic types.

1. Introduction

A classic model in teletraffic is the Erlang loss model. Here, we have ?? servers (or circuits), and customers (telephone calls) arrive as a Poisson process with rate parameter ??. The arriving customer takes one of the circuits if one is available, and if they are all occupied then the call is blocked and lost. When occupying a circuit, the customer has an exponentially distributed holding time whose mean we take as the unit of time. It is well known that the steady state probability that ?? circuits are occupied is the truncated Poisson distribution, that is, ????????-??/??!, 0=??=??, with ?1/??=????=0??????-??/??!. This model dates back to circa 1918 [1]. When ??=??, we obtain the steady state blocking probability. The transient probability distribution is much more complicated, but it can be computed in terms of special functions (see [2]).

Over the years, many generalizations of the basic model have been analyzed, including networks of such loss models (see [3, 4]). One important extension is that of trunk reservation, which is fundamental in the analysis of circuit-switched communication networks. Here, we consider a model with ?? circuits that are used by the two types of customers (or offered calls). We refer to these as primary (or high-priority) calls and secondary (or low-priority) calls. They arrive as Poisson arrival streams with respective rates ?? and ??. Of the ?? circuits, ?? are reserved for primary calls. Thus, if a high-priority call arrives, it is blocked if all ?? circuits are busy, while a low-priority call is blocked if at least ??-?? circuits are busy. All calls are assumed to have independent and exponentially distributed holding times, with respective means 1 and 1/??. The total load on the system is ??+??/??. If this exceeds ??, then typically all the circuits are busy (an overloaded link), while if ??+??/??<??, typically some circuits are free (an underloaded link). An interesting situation is when ?? is large and ??+??/??หœ??; we refer to this as โ€œcritical loading.โ€

Previous work on this and related models includes Mitra and Gibbens [5] who considered the asymptotic regime ??,???8 with v??=??-??(??), v??=??(??), and v??=??(??) (thus, secondary calls are less frequent than primary calls). We thus have v??/??=1+??(1/??); so this is an example of critical loading. They analyzed a single link and used their results to obtain approximations for more complicated loss networks with a distributed, state-dependent, dynamic routing strategy. Related work appears in [6, 7], and optimization and control policies for such problems were analyzed by Hunt and Laws [8].

Of fundamental importance in this model is the probability ??1 (resp., ??2) that a primary (resp., secondary) call is blocked and lost in the steady state. Roberts [9, 10] obtained approximations to these blocking probabilities, which are based on a certain recursion which is exact for special cases of the model parameters, but not for all cases. Morrison [11] investigated this model for v??=??(??) and ??=??(1), and obtained the blocking probabilities as asymptotic series in powers of v1/??. This led to a better understanding of the asymptotic validity of Roberts' approximation(s). However, the coefficients in the asymptotic series in [11] were not explicit, as their calculation still involves recursively solving an infinite system of differential equations. But, if it is further assumed that v??=??/?? is small, the blocking probabilities were obtained more explicitly in terms of parabolic cylinder functions. Also, if ??=??(1) rather than v??=??(??), explicit results are obtained without the small ?? assumption.

In [12], we analyzed the case ??=??(1), with ??=??(1), and with the arrival rates ?? and ?? both ??(??). Expressions for the blocking probabilities were obtained for the overloaded and underloaded cases. In the first case, both blocking probabilities remain ??(1) as ???8, while in the second case they are exponentially small. In this paper, we investigate the case of critical loading, where again ??,???8 but now with ??+??/??~??. We will also assume that v??=??(??) (secondary calls are less frequent than primary ones) but now with v??=??(1/??); that is, secondary calls have large holding times. Thus, primary calls have faster arrivals and faster service. Note that the loads due to the primary and secondary calls remain asymptotically comparable with this scaling. In this asymptotic regime, we are able to obtain explicit analytic expressions for the first two terms in the expansions in powers of v1/?? for the blocking probabilities, which involve readily evaluated definite integrals.

We are currently investigating situations where the secondary calls are the ones with fast arrivals and service [13]. Here, the asymptotic structure of the problem turns out to be quite different.

We comment that the basic problem to be solved is a two-dimensional difference equation (cf. (2.1)), with discontinuities of the coefficient functions at various boundaries and an interface. Such a problem appears to be very difficult or impossible to solve exactly. From a numerical point of view, the problem corresponds to solving roughly ??=??2/2 linear equations. A good general method such as Gaussian elimination has computational complexity ??(??3) or ??(??6). Some methods that use the sparseness of the system and some iteration procedures may improve this to ??(??2) or ??(??4). The purpose of our asymptotic analysis is to obtain reasonable approximations whose numerical evaluation has computational complexity that is independent of ??, and also to obtain explicit formulas that show the dependence of the stationary distribution and blocking probabilities on the model parameters (i.e., ??, ??, and the arrival and service rates).

The paper is organized as follows. In Section 2, the problem is stated more precisely and the basic equations are obtained. Here, we summarize our main results, which are derived in detail in Sections 3 and 5. In Section 3, we obtain the leading terms for the blocking probabilities. In Section 4, we relate the present results to the ones in [11, 12] using asymptotic matching. The first-order correction terms to the blocking probabilities are derived in Section 5, while in Section 6 we present some numerical studies to assess the accuracy of the asymptotics.

2. Statement of the Problem and Summary of Results

We denote by ??1(??) the number of servers serving high-priority customers, and by ??2(??) the number of servers serving low-priority ones. The total number of servers (circuits) is ?? of which ?? are reserved for the high-priority customers. Thus, if ??1+??2=??, a newly arriving high-priority customer (call) is lost; if ??1+??2=??-??, then a newly arriving low-priority call is lost. The high- and low-priority customers arrive as independent Poisson processes, with respective rates ?? and ??. The service times are exponentially distributed with respective means 1 and 1/??. Thus, the unit of time is taken as the service rate of the high-priority customers.

We denote the steady state joint distribution of the numbers of servers used by the two priority classes by ??(??1,??2)=lim???8????[??1(??)=??1,??2(??)=??2]. We let ??{??} be the indicator function on the event ??. Then, from the description of the model, we obtain the following balance equation:

????????1+??2????+1=??+????1+??2?+1=??-??+??1+????2??????1,??2????=????1??????=11-1,??2????+????1+??2??????=??-??2??????=11,??2????-1+??1+??2??+1=????1??????+11+1,??2????+????1+??2??????+1=??2??+1=??-????2??????+11,??2?.+1(2.1) This applies over the domain ???1=0,0=??2=??-??,??1+??2?=??.(2.2) Thus, we may view the problem as solving a second-order difference equation in two variables, over the triangle {(??1,??2):0=??1+??2=??-??} and the oblique strip {(??1,??2):??-??=??1+??2=??,0=??2=??-??}, with the two subdomains separated by the โ€œinterfaceโ€ {(??1,??2):??1+??2=??-??}. There are also boundary conditions inherent in (2.1), along ??2=0, ??1=0, ??1+??2=??(??2=??-??), and ??2=??-??(??1=??). The normalization condition is

??-?????2=0??-??2???1=0?????1,??2?=1.(2.3) Of particular interest are the blocking probabilities for the high-priority customers, defined by ??1=?????1=???????1,??-??1?,(2.4) and for the low-priority ones, defined by ??2=???l=0??-??+l???1=l?????1,??-??+l-??1?.(2.5) Note that we clearly have 0<??1<??2<1.

We analyze the problem in the asymptotic limit where

???8,??=??(1).(2.6) We furthermore assume that the arrival rate ?? of high-priority customers is large, of the same magnitude as ??, and then scale the other rate parameters as

v??=??????,??=v?????,??-??=1+???v??-????.(2.7) Thus, the arrival rate of low-priority customers is large, but only of the order v??(??). The service times of these customers however are also large, and the total load due to low-priority customers is ??/??=????/??. Also, we have ??+??/??~?? so that the total load due to all customers is roughly equal to the capacity of the system. Hence, this asymptotic limit may certainly be considered as โ€œheavy trafficโ€ or โ€œcritical loading.โ€

Once we input the model parameters ??, ??, ??, ??, and ??, we can compute ??, ??, and ?? from (2.7). For some of our numerical studies, it is desirable to fix ??, ??, ??, ??, and ?? and then vary the original rate parameters, which are computed by inverting (2.7) using

?v??=??+??2?+4(1+??/??)(??-??)24(1+??/??)2,(2.8) and ?? and ?? are obtained from (2.7) once ?? is known.

We next scale ??1 and ??2 as

??1v=??+????,??1+??2=??-??+l(2.9) with ?????1,??2?=1????l(??)(2.10) and ?? and l are taken as ??(1). We consider the scaled state space with (??,??)=??-1(??1,??2). Then, since ?? is large and ?? is ??(1), the domain in the (??,??) plane is the triangle 0=??+??=1; ??,??=0. The scaling (2.9) corresponds to a small neighborhood of the point

????=????+??,??=.??+??(2.11) However, this is where most of the probability mass accumulates in this asymptotic limit, and the analysis of this range is sufficient to obtain the blocking probabilities ????. We will obtain these as asymptotic series in powers of v1/??.

Using (2.9) and (2.10) in (2.1), we obtain

?????{l=??-1}+1+v????{l=-1}+??+??v??-????(??+??)+??l??3/2???l(??)=??l-1?1??-v???+??v????{l=0}??l-1???(??)+??{l=??-1}1+v??+1?????l+1?1??+v??????+??{l=??-1}v??-????(??+??)+??(l+1)??3/2???l+1(??),l=??.(2.12) Note that in this asymptotic scaling, the indicator functions ??{??1=1}, ??{??2=1}, and ??{??2+1=??-??} may be replaced by one, since these correspond to boundaries that are far from the point in (2.11). However, the interface ??1+??2=??-?? and the boundary ??1+??2=?? are evident in (2.12) and will play a large part in the analysis. In Section 3, we will analyze (2.12), and then also consider a second scale where l is large and negative. This second scale will lead to a diffusion equation in two variables.

The main results are as follows. For l=??1+??2-(??-??)=??(1) and ??1v=??+????, we obtain the approximation ??(??1,??2)=??-1??l(??), with

??l(??)=??01(??)+v????l(1)???(??)+??-1?,l=??,(2.13) where ??0(??)=??-??2/2??0?-??exp2??(??+??)2???8-????-??2/2???????=??-??2/2??0??(??),(2.14)0-1=?8-8?-??exp2??(??+??)2???8-????-??2/2???????+1????.(2.15) The correction term in (2.13) takes the form ??l(1)(??)=??1(??)-l[????0(??)+???0(??)] for l=0 and the form ??l(1)(??)=??1(??)-l[(??+??)??0(??)+???0(??)] for 0=l=??, where ??1(??)=??(1)(??,0). For the latter function, we have ??(1)(??,??)=??(1)(??,??+??), where ??(1) is given by (5.5) in terms of ??0 and ??1. Then, ??1 is given by (5.66)โ€“(5.68) (with ?(??) and ??(??) defined in (5.6) and (5.56)), and the constant ??1 in (5.66) can be obtained by using (5.78) in (5.83).

On the (??,??) scale, where ??=(??1v-??)/?? and ??=(??-??-??1-??2v)/??, we find that

?????1,??2?=1?????(0)1(??,??)+v????(1)???(??,??)+??-1??,(2.16) where ??(0)(??,??)=??-??2/2??0(??+??) and ??(1) is as above.

The analysis of these two scales leads to two-term approximations to the blocking probabilities in (2.4) and (2.5). To leading order, these are

???1??2?~1v????8-8??0??1?,(??)??????+1(2.17) where the integral is evaluated using (2.14) and (2.15) (see also (3.49)). The ??(??-1) correction terms follow from (5.80) and (5.81), using also (5.74).

We note that the numerical evaluation of the leading order asymptotic results involves only the integrals in (2.15) and (2.17). The correction terms involve numerically evaluating some double or triple integrals (cf. (5.78)), but the computational complexity of evaluating the asymptotic results is independent of ?? (or ??).

3. Asymptotic Analysis: Leading Terms

We consider (2.12) and assume that for ???8 the probabilities have the expansion

??l(??)=??l(0)1(??)+v????l(1)1(??)+????l(2)???(??)+??-3/2?.(3.1) In this section, we focus on the leading term, but its calculation will necessitate that we also analyze the problem for ??l(1)(??). This correction term is calculated completely in Section 5. We will also need to couple the analysis of the scale l=??(1) to that where l is large and negative, with v-l=??(??).

Using (3.1) in (2.12) and equating coefficients of powers of v1/??, we obtain to leading order

??????{l=??-1}+1l(0)(??)=??(0)l-1(??)+??{l=??-1}??(0)l+1(??),(3.2) and this applies for all l=??. This is a simple difference equation with a boundary condition at l=??. Its most general solution is

??l(0)(??)=??0(??),l=??,(3.3) where ??0(??) is to be determined.

For 1=l=??, we obtain from (3.1), (3.3), and (2.12) the problem

??????{l=??-1}+1l(1)(??)+(??+??)??0(??)=??(1)l-1(??)-??'0???(??)+??{l=??-1}(1)l+1(??)+??'0(??)+(??+??)??0?(??)(3.4) whose solution is ??l(1)(??)=??1?(??)-l(??+??)??0(??)+??'0?(??),0=l=??.(3.5) Here, ??1(??) is not yet determined. For l=-1, the v??(1/??) terms in (2.12) yield

2??l(1)(??)+(??+2??)??0(??)=??(1)l-1(??)-??'0(??)+????0(??)+??(1)l+1(??)+??'0(??)+(??+??)??0(??),l=-1,(3.6) which simplifies to 2??l(1)(??)=??(1)l-1(??)+??(1)l+1(??) and hence

??l(1)(??)=??1(??)+l??1(??),l=0.(3.7) Here, we imposed continuity between (3.5) and (3.7) along l=0, and ??1(??) is another function not yet determined. By setting l=0 in (2.12) and comparing terms of order v??(1/??), we obtain

??????{??=1}+10(1)(??)+(??+??)??0(??)=??(1)-1(??)-???0(??)+????0???(??)+??{??=1}1(1)(??)+???0(??)+(??+??)??0?.(??)(3.8) Using (3.7) to compute ??(1)-1 and (3.5) for ??1(1) and ??0(1), we obtain

??1(??)=-????0(??)-???0(??)(3.9) so that (3.7) becomes ??l(1)(??)=??1?(??)-l????0(??)+???0?(??)],l=0.(3.10) We next consider the problem (2.12) for l?-8, with the scaling

??1v=??+????,??1+??2v=??-??-????.(3.11) Note that this still corresponds to a local approximation near the point in (2.11). In terms of (??,??), we let

??l(??)=??(??,??),-8<??<8,??>0,(3.12) and (2.12), upon multiplying by ??, becomes

?v2??+??1??(??+2??)-??(??+??+??)??(??,??)=??????-v??1,??+v???v+???1??????,??+v???v+(??+???1??+1)????+v??1,??-v???+???v????-??(??+??+??)+v??????1??,??-v???.(3.13) We note that lยฑ1 corresponds to v??ยฑ1/??, and that for ??>0 the indicator functions in (2.12) can all be replaced by one.

We assume that ?? has an expansion in the form

??(??,??)=??(0)1(??,??)+v????(1)1(??,??)+????(2)???(??,??)+??-3/2?.(3.14) Using (3.14) in (3.13), we obtain to leading order the PDE ??(0)????-2??(0)????+??(0)???????+????(0)-????(0)?+??(0)=0.(3.15) This is a parabolic PDE whose solution is facilitated by the change of variables ??=??,??+??=??,??(0)(??,??)=??(0)(??,??).(3.16) Using (3.16), (3.15) becomes ??(0)????+??????(0)+??(0)=0,-8<??<8,??>??.(3.17) The most general solution, that decays exponentially as ???ยฑ8, is

??(0)(??,??)=??-??2/2??0(??),(3.18) and hence ??(0)(??,??)=??-??2/2??0(??+??).(3.19) We will determine ??0 shortly.

We observe that on the l scale, with v??=-l/??, expansion (3.14) becomes

???l??,-v???=??(0)1(??,0)+v?????(1)(??,0)-l????(0)?+1(??,0)?????(2)(??,0)-l????(1)1(??,0)+2l2??(0)????????(??,0)+??-3/2?.(3.20) Comparing this to (3.1), for l<0 we conclude from (3.3) that

??(0)(??,0)=??l(0)(??)=??0(??)=??-??2/2??0(??)(3.21) and, from (3.10) that ??(1)(??,0)=??1(??),????(0)(??,0)=????0(??)+???0(??).(3.22) It follows that ????(0)(??,0)=????(0)(??,0)+????(0)(??,0)(3.23) which is a boundary condition for the PDE (3.15) along ??=0. In terms of (??,??), this becomes ????(0)(??,??)+????(0)(??,??)=0, but this holds automatically (for any ??0) in view of (3.18). To determine ??0, we must analyze the correction term in (3.14).

From (3.13) and (3.14), we find that the first correction term ??(1) satisfies the PDE

??(1)????-2??(1)????+??(1)???????+????(1)-????(1)?+??(1)???=-2???(0)????-2??(0)????+??(0)?????+????(0)????+????(0)-????(0)+??(??+??+??)????(0)+????(0)?.(3.24) Switching to the (??,??) variables and then using (3.18), we get

??(1)????+??????(1)+??(1)=???????????(1)+????(1)????=-2??(0)????+????(0)????+????(0)+??(??+??)????(0)+????(0)?1=-2????(0)????-????(0)-??-??2/2?????0(??)+??(??+??)???0(??)+????0???.(??)(3.25) Integrating (3.25) with respect to ?? yields

????(1)+????(1)1=-2???????(0)+??(0)?-??8-????-??2/2??????????0??(??)+??(??+??)???0(??)+????0?(??).(3.26) Setting ??=??=?? in (3.26), we obtain

????(1)(??,0)+????(1)(??,0)-????(1)(??,0)=???1(??)+????1(??)-????(1)1(??,0)=-2?1-??2???-??2/2??0-??(??)8-????-??2/2??????????0??(??)+??(??+??)???0(??)+????0?.(??)(3.27) We will show that (3.27) leads to a differential equation for ??0(??). But, we must first consider ????(1)(??,0). In view of (3.20), this term arises as a part of the ??(1/??) term in the expansion on the l scale. We therefore return to (3.1) and (2.12).

For 1=l=??, we obtain from (2.12) and (3.1), at order ??(1/??), the equation

??????{l=??-1}+1l(2)(??)+(??+??)??l(1)(??)-??(??+??)??l(0)(??)=??(2)l-1??(??)-??????(1)l-11(??)+2??2????2??(0)l-1???(??)+??{l=??-1}(2)l+1??(??)+??????(1)l+11(??)+2??2????2??(0)l+1(??)+????(1)l+1??(??)+????????(0)l+1(??)+??(0)l+1(??)+????(1)l+1(??)-??(??+??)??(0)l+1?.(??)(3.28) Using (3.3) and (3.5), we find that (3.28) has a solution in the form ??l(2)(??)=??2(??)+l??2(??)+l2??2(??),0=l=??,(3.29) where 2??2?(??)=(??+??)2???+10(??)+(2??+3??)???0(??)+??0????(??),(3.30)2(??)+(2??-1)??2???(??)=??0??(??)+2(??+??)???0?(??)+(??+??)2???+10?+????(??)??(??+??)-10(??)-(??+??)???01(??)-2??0??(??)-(??+??)??1(??)-???1(??).(3.31) It follows that ??2(??)+??21(??)=2??0??????(??)+??+(2-??)???0+?(??)(??+??)2???+??(??+??)0(??)-(??+??)??1(??)-???1(??).(3.32) We note that ??0(2)(??)=??2(??) and

??1(2)(??)=??2(??)-(??+??)??1(??)-???1+1(??)2??0??????(??)+??+(2-??)???0+?(??)(??+??)2???+??(??+??)0(??).(3.33) For l=-1, the ??(1/??) terms in (2.12), with (3.1), yield

2??l(2)(??)+(??+2??)??l(1)(??)-??(??+??)??l(0)(??)=??(2)l-1??(??)-??????(1)l-11(??)+2??2????2??(0)l-1(??)+????(1)l-1(??)+??(2)l+1??(??)+??????(1)l+11(??)+2??2????2??(0)l+1(??)+????(1)l+1??(??)+????????(0)l+1(??)+??(0)l+1(??)+????(1)l+1(??)-??(??+??)??(0)l+1(??).(3.34) Using (3.3) and (3.10), we find after some calculation that (3.34) simplifies to 2??l(2)(??)-??(2)l-1(??)-??(2)l+1???(??)=-0??(??)+2?????0???(??)+2???+10?,(??)(3.35) and hence ??l(2)(??)=??2(??)+l??2+1(??)2l2???0??(??)+2?????0???(??)+2???+10?(??),l=0.(3.36) Setting l=0 in (2.12), we obtain at order ??(1/??) the interface relation

????1+??{??=1}0(2)(??)+(??+??)??0(1)(??)-??(??+??)??0(0)(??)=??(2)-1??(??)-??????(1)-11(??)+2??2????2??(0)-1(??)+????(1)-1???(??)+??{??=1}1(2)??(??)+??????1(1)1(??)+2??2????2??1(0)(??)+????1(1)??(??)+????????1(0)(??)+??1(0)(??)+????1(1)(??)-??(??+??)??1(0)?.(??)(3.37) Using (3.36), with l=0 and l=-1, and (3.33), we obtain from (3.37) after some calculation

??2???(??)=-?1(??)+????1?+1(??)2???2???+10(??)-???????0???(??)+???0(??)+????0?(??)+??(??+??)??0(??).(3.38) Now, comparing the -l/?? terms in (3.20) and (3.1) with (3.36), we conclude that

-????(1)(??,0)=??2(??).(3.39) But then ???1(??)+????1(??)-????(1)(??,0) (cf. (3.27)) involves ???0(??) only, and since ??0 and ??0 are related via (3.21), we obtain from (3.27) the following ODE for ??0(??):

??-??2/2??????0(??)+??(??+??)??0???(??)-???????????-??2/2??0?+??(??)8-????-??2/2??????????0??(??)+??(??+??)???0(??)+????0?(??)=0.(3.40) This equation may be written as a perfect derivative as ????????8-????-??2/2??????????0(??)+??(??+??)??0?(??)-??????-??2/2??0?(??)=0.(3.41) Integrating once and requiring ??0 to vanish as ???8 yield

??'0(??)??0??(??)=-??(??+??)+????-??2/2?8-????-??2/2,????(3.42) and hence ??0(??)=??0?-??exp2??(??+??)2???8-????-??2/2???????,(3.43) where ??0 is a constant, which will be fixed by normalization.

We use (2.10) and (3.12) in the normalization sum (2.3), and then use the Euler-MacLaurin formula to approximate sums by integrals. To leading order, this yields

??-?????2=0??-??2???1=0?????1,??2?~?80?8-8??(0)(??,??)????????=1.(3.44) We use (3.19) and (3.43) and evaluate one of the two integrals in (3.44) using integration by parts, with the result ??0=??8-8?-??exp2??(??+??)2???8-????-??2/2???????+1?????-1.(3.45) To summarize the calculation, we have shown that on the (??,??) scale in (3.11) we have

?????1,??2?~??0????-??2/2?-??exp2??(??+??+??)2???8-??-????-??2/2???????(3.46) with ??0 given by (3.45). Note that ??(??1,??2) is ??(1/??), but the probabilities are spread out over an v??(v??)ร—??(??) range near the point (????,????) given by (2.11). On the (??,l) scale in (2.9), we have obtained

?????1,??2?~??0????-??2/2?-??exp2??(??+??)2???8-????-??2/2???????,(3.47) which applies for -8<l=?? and is independent of l. To calculate correction terms to (3.46) and (3.47), we would need to find ??1(??) in (3.5) and (3.10), and solve (3.24) for ??(1)(??,??). This ultimately involves calculating the ??(1/??) and ??(1/??3/2) terms in (3.1) and the ??(1/??) term in (3.14); this is done in Section 5.

We next calculate the blocking probabilities in (2.4) and (2.5). Evaluating these sums requires the expansion on the (??,l) scale. Again, approximating sums by integrals and using the scaling (2.9), we obtain

??1~1v???8-8????(0)1(??)????=v???8-8??0??(??)????,2~1v???8??-8?l=0??l(0)(??)????~??+1v???8-8??0(??)????(3.48) as ??l(0)(??)=??0(??). From (3.21), (3.43), and (3.45), we then obtain

?8-8??0?(??)????=8-8??-??2/2?exp-(??/2??)(??+??)2???8-????-??2/2????????????8-8?exp-(??/2??)(??+??)2???8-????-??2/2???????+1.????(3.49) The numerical accuracy of (3.48) is investigated in Section 6. This completes the analysis of the leading terms.

4. Consistency with Previous Results

In [11], Morrison studied the current model with the scaling v??=??-??(??) and ?? being either v??(??) or ??(1). For the latter case, we define ?? from v??-??=??-???? (see [11, equations (7.16)โ€“(7.18)]) and then

???1??2?~1v???1?1??+1??0,(??+??/??)(4.1) where ??0?(??)=80??-??2/2??-????????.(4.2) We show that (4.1) matches asymptotically to (3.48), in the limit where ???8. When ???8, we can simplify the integrals in both the numerator and denominator in (3.49), as the factor exp[-??(??+??)2/2??] has the effect of freezing the remaining integrands at ??=-??. Thus, by the Laplace method, we obtain

?8-8??0??(??)????~-??2/2?8????-??2/2.????(4.3) But, in view of (2.7), v??-??=??+??(??/??-??) so that ??=??-??/??. Since ??0(??)=????2/2?8????-??2/2????, (4.1) agrees with (3.48)-(3.49) and (4.3).

In [12], Knessl and Morrison analyzed the model in the limit ???8 with ??=(??-??)??=??(??) and ??-??=????/??=??(??). The total load is thus ??+??/??=????/?? and the cases ??<?? (resp., ??>??) correspond to an underloaded (resp., overloaded) link. The case of critical loading was not considered in [12].

We consider first the asymptotic matching of (3.48)-(3.49) to the underloaded case in [12]. We note that the parameters ?? and ?? are related to the current ones by

??=??+??v??-??????,??=??+??v????,??=v??.(4.4) For the matching, we must thus let ???-8 with v|??|ยซ??, and ??/???1. The results in [12] for ??1 and ??2 were as follows:

???1??2?~?????2??????(??-??)??/????????????/?????????????1-??+1???????1-,(4.5) where ??=????(1+??-??)<1.(4.6) In view of (4.4), we have, in the matching region, ??~??, ??~1, ??/??~??/(??+??), and

??1-??~-????v(??+??)??.(4.7) Hence, ??????????-??+??log????~-????22(??+??)(4.8) and (4.5) becomes ???1??2?~????-2????(??+??)exp????2??1?.2(??+??)??+1(4.9) We show that (4.9) agrees with (3.48)-(3.49) when the latter is expanded for ???-8. In (3.49), the main contribution to the integral in the denominator comes from ??=-??=|??|, and in the numerator from ??=??|??|/(??+??), where (??/????)[??2/2+(??/2??)(??+??)2]=0. Thus, we can approximate ?8-????-??2/2???? by v2?? everywhere, and obtain

?8-8??01(??)????~v?2??8-8??-??2/2?exp-(??/(2??))(??+??)2??????8-8?exp-(??/(2??))(??+??)2?=????????-2??(??+??)exp????2?.2(??+??)(4.10) With (4.10), (3.48) agrees with (4.9).

Next, we consider the overloaded case in [12], for which we obtained

???1??2?~?1+??-11-????+1?1-??-1????????1-????+1????1-??,(4.11) where 1??=??+??-????,??=1+??-????+??-????>??,(4.12) and ?? is the solution of

???1+??-11-????+1?=11-??+??-11-????.1-??(4.13) We note that by using (4.12) in (4.13), ?? is a particular root of a polynomial. For the matching, we will take ??/???1 in (4.11) and ???+8 in (3.48)-(3.49). As ??/???1, we will have ???1 and this will allow us to simplify (4.11). Let us set

????=1-v??(4.14) with which ??-1v=??+??-????=1+(??-??)/??+??(??-??)/??, and thus

??=1+??-??v??+1???(??-??)2????+??(??-??)+??-3/2?.(4.15) Furthermore, ?????=(1+??-??)??=1+v???????=1+v??+1?????????(??-??)+??(??-??)+??-3/2?.(4.16) Using (4.14)โ€“(4.16) in (4.13), we find after some calculation that ??~????(??+1)??+??(4.17) and then (4.11), for ??/???1, simplify to

???1??2?~??v???1?.??+1(4.18) We expand (3.49) for ???+8. Scaling ??=????, we obtain

?8-8??0?(??)????=8-8?-???exp2??/2??2+(??/??)(??-1)2????8??????-??2/2????????????8-8?-???exp2???/(2??)(??-1)2???8??????-??2/2???????+1.????(4.19) For ??>0, we use the asymptotic approximation

?8??????-??2/21????~??????-??2??2/2,???8,(4.20) and conclude that both integrals in (4.19) have their major contribution from where ?????????(??+1)22+??2??(??-1)2?=0???=??*=??.(??+1)??+??(4.21) But then by the Laplace method, we have ?8-8??0(??)????~????*~??,(4.22) and (3.48) agrees with (4.18).

This completes the matching verifications.

5. Correction Terms

We will compute the v??(1/??) terms in expansions (3.1) and (3.14), and then obtain ??(1/??) corrections to the blocking probabilities.

We first consider (3.13). Using the relations v??(??,??ยฑ1/v??)=??(??,??ยฑ1/??) and v??(??ยฑ1/v??,??ยฑ1/v??)=??(??ยฑ1/??,??), we rewrite (3.13) in terms of (??,??). Defining

??(??,??)=??(??,??)=??(0)1(??,??)+v????(1)1(??,??)+????(2)???(??,??)+??3/2?,(5.1) we obtain from (3.13) ??????+(????)??+1v???12????????+????+????????+??(??+??)?????+1+???????1??12????????+16??????????+12??????-12??(??+??)??????-??????????=??-3/2?(5.2) so that ??(2) satisfies

??(2)????+??????(2)+??(2)=-L1??(1)-L2??(0),(5.3) where L?? are the operators

L1=12????2??+????+????2??+??(??+??)????L+??,2=1??124??+16????3??+12??2??-12??(??+??)??2??-??????.(5.4) Before analyzing (5.3), we obtain a more complete description of ??(1). We recall that ??(0) is known completely, in view of (3.18), (3.43), and (3.45). But, we computed ??(1) only partially as the combination ????(1)+????(1) in (3.26). We integrate (3.26) to get

??(1)(??,??)=??-??2/2?16?????2???-30(??)+??1?(??)+??-??2/2??(??)????0??(??)+??(??+??)???0(??)+????0?(??),(5.5) where ??(??)=0-??????2/2?8????-??2/2?????????=80??-??2/21-????????????.(5.6) We observe that ?(??) satisfies

???(??)-????(??)=-1(5.7) and ??(??) decays as ???-8. We also have

?????????-??2/2???(??)=??-??2/2.(5.8) The function ??1 will be determined shortly (actually, not very shortly, but only after a lengthy calculation).

We evaluate the right side of (5.3) more explicitly. Some terms are expressible as derivatives with respect to ??, while the ones involving derivatives in ?? may be evaluated using (3.18) and (5.5). Then, (5.3) becomes

?????(2)+????(2)????1=-2???????(1)+??(1)?+1??12(0)??????+??6??(0)????+13????(0)???-??-??2/2?????1??(??)+??(??+??)???1(??)+????1?(??)-??-??2/216?????2-3??????0??(??)+??(??+??)???0(??)+????0?(??)-??-??2/2??(??)????2??+??(??+??)?????+??2??0(??)+??-??2/2?12??(??+??)??0??(??)+?????0?.(??)(5.9) From (3.18), we have 1??12(0)??????+16????(0)????+13????(0)=1???123???-3??-??2/2??0(??)(5.10) and by direct calculation ?????????+1???3???-3??-??2/2?=-??-??2/2???5-7??3?,?+6??????????+1??-??2/2???(??)=-??8-????-??2/2???????-2???-1-??2/2??(??),????????+1??-??2/2?=-??-??2/2???2?.-1(5.11) With the above, we integrate (5.9) to get ????(2)+????(2)=??-??2/2?1???125-8??3???+9??0+1(??)2???2???-111(??)+2???2??1-1?(??)+3?????0?-??(??)??-8??-??2/2????(??)????2??0??(??)+8-????-??2/2?ยท???????2????0(??)-????1?1(??)+??2(??+??)??0??(??)+???0,(??)??(5.12) where ??=????2??+??(??+??)????+??.(5.13) We will show that the calculation of ??1 will require only that we evaluate (5.12) along ??=??. However, we must first reconsider the scale l=??(1) and analyze at least partly the term ??l(3)(??) in (3.1) (i.e., the coefficient of ??-3/2 in the series).

Returning to (2.12) with the expansion (3.1), we find that for 1=l=??, ??l(3) satisfies

??????{l=??-1}+1l(3)(??)+(??+??)??l(2)(??)-??(??+??)??l(1)(??)+??l??l(0)(??)=??(3)l-1??(??)-??????(2)l-11(??)+2??2????2??(1)l-11(??)-6??3????3??(0)l-1???(??)+??{l=??-1}(3)l+1??(??)+??????(2)l+11(??)+2??2????2??(1)l+11(??)+6??3????3??(0)l+1??(??)+??{l=??-1}????(2)l+1??(??)+????????(1)l+11(??)+2????2????2??(0)l+1(??)+??(1)l+1+??(??)??????(0)l+1(??)+????(2)l+1(??)-??(??+??)??(1)l+1(??)+??(l+1)??(0)l+1?.(??)(5.14) We recall that for 0=l=??, ??l(0) is given by (3.3), ??l(1) by (3.5), and ??l(2) by (3.29). Let us write

??l(1)(??)=??1(??)+l??1(??),??1(??)=-(??+??)??0(??)-??'0(??),0=l=??.(5.15) We then rewrite (5.14) as ??l(3)(??)-??(3)l-1???(??)-??{l=??-1}(3)l+1(??)-??l(3)??(??)=??{l=??-1}(??+??)??(2)l+1(??)-??(??+??)??(1)l+1(??)+????(0)l+1?-?(??)(??+??)??l(2)(??)-??(??+??)??l(1)(??)+??l??l(0)?-1(??)6??0???1(??)+2???1??(??)+(l-1)??1???(??)-???2(??)-(l-1)???2