Research Article | Open Access

# Analysis of the M/M/N/N Queue with Two Types of Arrival Process: Applications to Future Mobile Radio Systems

**Academic Editor:**Yuri Sotskov

#### Abstract

The queueing system considered is essentially a M/M/N/N queue where two types of users compete for the resources. The users may have different arrival and service rates and are denoted as primary or secondary users. The primary users have priority access to the resources, and three levels of priority are considered: perfect priority, partial priority, and no priority. This system models the recently developed cognitive radio concept, a methodology that has been proposed for future mobile radio systems. In this context, the primary users have certain rights to use the resources, whereas the secondary users must make opportunistic use of the resources without impacting too much on the performance of the primary users. For all priority settings, the mean number of primary and secondary users is derived as are the blocking probabilities for both users. When no priority is given to the primary user, the system collapses to a truncated form of two independent M/M/∞ queues. The product form solution for this special case is known, and, here, these results are given in a novel, compact form. In the case of nonzero priority, the dropping probability for the secondary users is also derived.

#### 1. Introduction

The M/M/N/N queue or Erlang loss system [1] and its variations have a long history in queueing theory and communications applications [2]. In this paper, we focus on an M/M/N/N queue with two types of arrival process, one with a higher priority than the other and the ability to displace a lower priority item from service and replace it with a higher priority item. Although previous work on priority issues [3–6] and multiple arrival streams [7] have appeared, this variation does not appear to be available.

The motivation for this problem arises from the concept of cognitive radio (CR), a potential radio architecture that is receiving enormous interest in the communications literature as a possible direction for future mobile radio systems [8]. In this context, an arrival process is a sequence of demands from users to access a wireless radio channel, and a service period is the length of the call made by the user. In CR, one set of users are the so-called primary users (PUs), and they have certain rights to use the radio channel. For example, they might be cell-phone users using a service operator that has purchased the cell-phone spectrum. In contrast, the second set of users are called secondary users (SUs), and they do not have rights to use the channel. They must access the channel only when they do not impair the performance of the PUs beyond some allowed limit. In order to evaluate the possible coexistence of PUs and SUs, we consider the following performance metrics for both users: the mean number of users, blocking probabilities, and dropping probabilities. Although the paper is motivated by the CR example, it has applications to other queueing problems with the same type of competition between two sets of users.

Many applications of queueing theory have appeared in the CR literature. For example, the performance analysis of SUs in CR systems has been widely studied [9–16]. In [9], Simeone et al. perform SU-throughput analysis for a system with single SU and PU pairs, while [10] considers the general case with multiple secondary users, deriving throughput and transmission delay. In [11], Tang and Mark model the CR system by a multidimensional Markov process and derive the SU blocking probabilities and wait times in a system with a SU preemption queue. Preemptive priority queueing is also considered by [13], where system dwelling time, blocking, and forced termination probabilities are derived. In [14], the authors analyse the distribution of the SU queue length in a CR system with multiple PUs employing slotted transmission and myopic SU sensing. Primary user spectrum occupancy has been analysed in [17], where queueing theory is used to obtain a model of the occupancy of subbands, with wireless channel measurements used to derive model parameters.

Finally, queueing analysis has also been utilised in developing scheduling policies and optimum resource allocation for CR systems, for example, [18, 19]. In [18], the authors propose an opportunistic scheduling which maximizes the SU throughput subject to maximum collision constraints with the PUs. In [19], the authors consider the problem of scheduling the sensing activities in a CR network.

The novel contributions of this work are as follows. By considering a two-dimensional M/M/N/N queue to model a CR system with resources, we derive the mean number of PUs and SUs, their respective blocking probabilities, and the SU dropping probability. Unlike [13], which also investigates the latter two metrics, we consider a model where all resources are accessible to the PUs as opposed to each being assigned (licensed) to a specific PU. We believe this to be more representative of typical communication system models, such as a cellular system. Furthermore, in contrast to previous work in [11, 13], we consider varying levels of access priority. In addition to the case of instantaneous PU priority, we also investigate the performance for equal and imperfect access priority. This models the scenario of imperfect PU detection by SUs, or of SUs operating outside the rules. We show that, in the case of an equal priority mode, the system simplifies to a known, truncated form of two independent queues. We derive new, closed form expressions for the steady-state probabilities, and thus the mean number of users and their blocking probabilities. All analytical results are verified via Monte Carlo simulations.

#### 2. Cognitive Radio: A Future Mobile Radio System

Consider a mobile radio system with resources. Traditionally, these resources might be frequency channels, but they could also be codes, antennas, and so forth, [20]. We assume that the PUs have priority access to these resources. In the context of CR systems [8], these users belong to a system which may have purchased the rights to use this part of the radio spectrum. In contrast, the SUs are allowed to make some kind of opportunistic use of the resources when they are not allocated to PUs. In the absence of any SUs, the PUs are assumed to occupy resources following the classical Erlang loss model or M/M/N/N queue [1]. This model assumes that the PUs instigate calls with an independent and identically distributed (iid) exponential length which arrive in a Poisson process at the base station (BS). It also assumes that only calls can be handled concurrently, and blocked calls are cleared. For the PUs, we assume a call arrival rate of and a mean call length of . This gives a traffic level of . The SUs also arrive as a Poisson process with rate have iid exponential call lengths of mean and a traffic level of . There are three modes of operation considered here for the SUs.

##### 2.1. Secondary Users Cleared (SUC)

In this mode, a SU call is immediately dropped if all resources are in use, at least one resource is taken by a SU and a PU call arrives. Here, PU calls are given instantaneous priority. This corresponds to the most likely implementation of a CR system where SUs are not allowed access to a resource whenever the PU is using it.

##### 2.2. Secondary User Equality (SUE)

In this mode, the PU and SU calls have equal priority. Once a resource is taken by either a PU or a SU, then the resource is kept until the completion of the call. This may model a CR system where the SU arrival rate is low enough to be accepted into the system with an allowable loss of performance to the PUs. Alternatively, it can model the worst case scenario where the SUs are supposed to make room for PUs but fail to do so, either because they fail to recognize the arrival of the PU or because they are operating outside the rules. In this scenario, it is straight forward to identify the queue as a truncated form of two independent M/M/ queues. Hence, a simple product form solution exists.

##### 2.3. Secondary Users Partially Cleared (SUPC)

In this mode, a SU call is dropped with some probability if all resources are in use; at least, one resource is taken by a SU and a PU call arrives. This is the intermediate scenario between SUC and SUE, where PU calls are given imperfect priority. We assume that the SUs are supposed to make room for PUs but fail to do so, either because they fail to recognize the arrival of the PU or because they are operating outside the rules. The first possibility is of more interest, since the SUs must monitor the wireless channel to recognize the arrival of a PU. If the channel is poor, the PU may not be recognized. Hence, there is some probability that a SU will not detect the PU call.

The range of models, from SUC to SUE, correspond to a variety of actual implementations. SUC models the “perfect case” where a SU never uses a resource if the PU is already using it. Here, there is instantaneous communication between PU and SU. In SUE mode, we have the opposite case where there is no communication, or the SU does not obey the rules. The intermediate SUPC cases model imperfect communication or imperfect spectrum sensing by the SU. Any real implementation or protocol will fall somewhere in this range.

#### 3. State Space Model and Performance Metrics

To cater for the two types of user in the system described in Section 2, the state space of the traditional M/M/N/N queue, given by , is enlarged to [7]. State means that resources are used by the SU, and the PU is using resources. This two-dimensional queue is illustrated in Figure 1. The main features of the queue are described below.

In Figure 1, horizontal flows to the right and left represent departures of PUs and arrivals of Pus, respectively. Vertical flows up and down represent the arrival and departure of SUs, respectively. The important region of the queue is in the upper diagonal, the states, which represents a full system. It is the behaviour of these states that models the relationship between the SUs and the PUs. In particular, consider what happens when a PU arrives and the system is in state , . In SUC mode, the arrival of the PU will result in the dropping of a SU call, and state moves to state at rate . Hence, . In SUE mode, the SUs always fail to relinquish their resources, and the PU is blocked. Here, . Intermediate cases (SUPC mode) where the SU has imperfect ability to drop the resource are handled by setting in the region . We propose the flow rate for this scenario. This models the situation where the SUs all have probability of failing to recognize the PU arrival, and all SUs operate independently. Although this model is used in the numerical results shown in Section 5, the analysis is general and holds for any . The general case is defined by , where represents the probability that all SUs fail to relinquish a resource. Note that all three modes of operation can be defined in terms of the value of . In SUC mode, for . In SUE mode, for and in SUPC mode, for .

##### 3.1. The Steady-State Probabilities

The queue in Figure 1 can be solved in the usual way by solving the flow balance equations [1]. Let denote the steady-state probability of state . The analysis proceeds by solving “flow in = flow out” for each of the states. Although there are states, there are only seven types of flow balance equation. These are identified directly from the state space diagram in Figure 1 and are enumerated below.

For state , the flow balance equation is For states , where , the flow balance equations are For state , the flow balance equation is For states , where and , the flow balance equations are For states , where , the flow balance equations are For states , where , the flow balance equations are For state , the flow balance equation is The steady-state probabilities sum to unity so that we also have

The flow balance equations in (3.1)–(3.7) and the normalization equation, (3.8), are all conveniently written in vector form. For example, (3.1) can be written as Combining all these vector equations, except (3.7), the result can be given as where is a vector given as , represents transpose, is a vector of state probabilities, and is a matrix, where the rows contain the coefficients of the steady-state probabilities in (3.8) and (3.1)–(3.6). Note that the first row contains the coefficients from (3.8). The steady-state probabilities can now be computed using (3.10) as

Using the result in (3.11), the desired performance metrics can be calculated as below.

##### 3.2. Mean Numbers of Users

The mean number of PU calls, , in the system can be calculated as where is the number of PU calls in the system if the system is in the state . The mean number of SU calls, , in the system can be given as where is the number of SU calls in the system if the system is in state .

##### 3.3. Blocking Probabilities

A single expression for the probability of blocking for a PU is given by In SUC mode, for , so the blocking probability is as a PU is only blocked when PUs are already present. In SUE mode, for , so the blocking probability is , as a PU is blocked whenever the system is full. Finally, in SUPC mode, the blocking probability is given by (3.14) since blocking occurs when PUs are present or when the system is full and all the SUs in operation fail to sense the PU arrival.

For a SU, blocking always occurs when the system is full. Hence,

##### 3.4. Dropping Probabilities

A PU call is never dropped, but a SU call can be dropped in SUC or SUPC modes if the system is full, at least one SU is in operation and a PU call arrives. The probability that a SU call will be dropped can be calculated as

##### 3.5. Model Issues and Extensions

The state-space model in Section 3 employs exponential call lengths and interarrival times for both SU and PU. Of course, there are real systems where these assumptions will not lead to accurate models. However, measured data from an urban cellular network, collected by the authors in 2010, suggests that these simple models are surprisingly accurate when the PU is a cellular system. In addition, many more complicated traffic models result in simulation studies and do not allow analytic solutions. Furthermore, such complex models will often lose generality and potential application in other areas. Although data can be measured for existing systems, superimposing SUs on such a system still requires a SU traffic model since this data is not currently available. Hence, modeling PU-SU coexistence is an important issue.

The models used in Section 3 can be extended in many ways. Two important extensions for the future concern resource sharing and varying call types. In resource sharing, SUs and PUs may occasionally be able to use the same resource without causing interference. For example, the PU and SU may be separated by a building or a hill which blocks the interference. This can be modeled by an extra dimension in the state-space model. Hence, instead of state denoting SUs, we would have , where is the number of SUs using unused resources and SUs are sharing a resource with the PU. Similarly, varying call types can be handled by increasing the system dimension. If both PU and SU use two types of call, type A and type B, then state can be generalized to the six-dimensional state . Such extensions are beyond the scope of the current paper.

#### 4. Closed form Analysis for the SUE Mode

A closed-form expression for (3.11) is difficult to obtain for SUC and SUPC. Hence, for these cases, the performance metrics are computed numerically by solving (3.11) and substituting the steady-state probabilities in (3.12)–(3.16). However, in SUE mode, a closed form expression for the steady-state probabilities is well known and is a direct application of Theorem 6.1 in [7, page 152]. The system in SUE mode behaves like two independent M/M/ queues truncated so that the total number of calls does not exceed . For an M/M/ queue, the steady-state probability is for , where is the traffic level. Hence, in SUE mode, applying the product form solution gives where . Simplifying (4.1) gives where

The state space probabilities in (4.2) can be simplified further by rewriting in (4.3) as using the change of index, and . Rewriting (4.4) gives where and is the upper incomplete gamma function also defined by the series expansion [21, page 899, equation 8.352] for integer values of . Now, using this simpler expression for , the average number of PU and SU calls in the system and the blocking probabilities of the PUs and the SUs can also be expressed in a compact closed form.

The mean number of PU calls, , is given by Using the same change of indices as in (4.4), and , the numerator of (4.6) can be rewritten as so that (4.6) becomes Similarly, the mean number of SU calls, , is given by Again, the numerator of (4.9) can be rewritten using a change of indices as so that (4.9) can be simplified to give

In SUE mode, a PU or a SU will be blocked from the system if the user arrives when the system is full, that is, when the system is in one of the states for . In this case, the blocking probabilities of the PUs and the SUs are equal and can be calculated as Finally, we recall that in SUE mode the system will not drop any SU calls and .

#### 5. Results

In this section, the results produced in this paper are verified, and the impact of the system parameters on the performance metrics is explored. For all the results given here, we use , and . Note that we deliberately use in the results which represents a very high loading by the PU. With , we have , and so the PU arrival rate, , is equal to the total service rate, . The results, therefore, represent a PU system that is already heavily utilized and this is a good test of the ability of the SUs to coexist with the PUs. Figure 2 gives the expected number of users in the system operating in SUC mode when . The expected number of PU calls remains fixed as expected since the SU calls do not effect the PU performance. As the arrival rate of the SUs increases, the system tends to become full, and becomes close to . Figure 2 also shows that the simulations are in good agreement with the theoretical results obtained using (3.12) and (3.13).

Figure 3 gives the dropping and blocking probabilities of the SU and PU users in SUC mode when . The figure shows that all the simulations are in good agreement with the theoretical results obtained using (3.14)–(3.16). The blocking probability of the PU remains fixed since, as in Figure 2, the SU calls do not affect the PU performance. The figure also shows the expected increase in blocking and dropping of the SU calls as the arrival rate of the SU increases. Also shown for comparison is the same system with giving a 2% blocking probability for the PU. This is a standard value considered in the telecommunications industry, and the reduced PU traffic has the effect of lowering the SU blocking and dropping rates. Also, the SU dropping probability overlaps the blocking probability. This is a general trend, and as the SU performance improves, the dropping probability drops faster than the blocking probability until it is smaller over a wide range of values.

Next, we consider the SUE mode and verify the results obtained in Section 4. Figure 4 gives the expected number of calls/users in the system when . As expected, the number of SU calls in the system increases, and the number of PU users decreases as the arrival rate of the SU calls increases. The figure also shows that the simulations are in good agreement with the theoretical results, thus, validating the closed form expressions in (4.8) and (4.11). Figure 5 gives the blocking probabilities for the SU and PU users when . The figure shows that both blocking and dropping probabilities increase with the arrival rate of the SU as expected. Comparing the PU blocking probabilities with Figure 3, we see that increasing from zero in Figure 3 to 0.3 and 0.7 in Figure 5 has a relatively small effect. Hence, the PU may be able to accept SUs with only limited ability to relinquish a resource, say only 70% of the time (). The effect on the SU dropping rate is more marked, with smaller values of boosting the dropping rate. The SU blocking probability in Figure 5 is identical to the equivalent curve in Figure 3 for SUC mode. This equivalence is due to the special case of the parameter values which satisfy . For this scenario, SU blocking is the same for SUC, SUE, and SUPC since time to completion of any call in a () state is statistically identical as . Hence, is independent of , and there is only one curve for both and . Figure 5 suggests that the PU may be able to accept the presence of SUs but the SUs themselves suffer a large performance degradation as increases.

#### 6. Conclusions

This paper has considered the M/M/N/N queue with two types of arrivals process and various levels of priority. For all priority settings, we have derived the mean number of primary and secondary users and the blocking probabilities for both users. When no priority is given to the primary user, results for the steady-state probabilities are available. These were simplified and given in a novel, compact form which also leads to simple results for the performance metrics. To the best of our knowledge, these results are new. In the case where priority is given to the primary users, then the secondary user can be forced to drop a resource and the dropping probability was also derived. These results have important applications to CR systems, an architecture that has been proposed for future mobile radio systems. For these radio systems, the primary user will only accept a certain performance degradation due to the presence of the secondary users. This work allows this degradation to be assessed in terms of the mean number of primary users and their blocking probability. It also evaluates the performance of the secondary users. The closed form results for the no-priority case are of interest in their own right and also act as a lower bound to the primary user performance in the presence of CRs.

#### References

- D. Gross and C. M. Harris,
*Fundamentals of Queueing Theory*, Wiley Series in Probability and Statistics: Texts and References Section, John Wiley & Sons, New York, NY, USA, 3rd edition, 1998. View at: Zentralblatt MATH - A. K. Erlang, “Solution of some problems in the theory of probabilities of significance in automatic telephone exchanges,”
*The Post Office Electrical Engineers' Journal*, vol. 10, pp. 189–197, 1918. View at: Google Scholar - A. Cobham, “Priority assignment in waiting line problems,”
*Journal of the Operations Research Society of America*, vol. 2, no. 1, pp. 70–76, 1954. View at: Publisher Site | Google Scholar - H. R. Gail, S. L. Hantler, and B. A. Taylor, “Analysis of a nonpreemptive priority multiserver queue,”
*Advances in Applied Probability*, vol. 20, no. 4, pp. 852–879, 1988. View at: Publisher Site | Google Scholar - D. McMillan, “Delay analysis of a cellular mobile priority queueing system,”
*IEEE/ACM Transactions on Networking*, vol. 3, no. 3, pp. 310–319, 1995. View at: Publisher Site | Google Scholar - P. Zhu, J. Li, and X. Wang, “Scheduling model for cognitive radio,” in
*Proceedings of the 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom '08)*, Singapore, May 2008. View at: Publisher Site | Google Scholar - J. H. Dshalalow, Ed.,
*Frontiers in Queueing: Models and Applications in Science and Engineering*, Probability and Stochastics Series, CRC Press, Boca Raton, Fla, USA, 1st edition, 1997. - S. Haykin, “Cognitive radio: brain-empowered wireless communications,”
*IEEE Journal on Selected Areas in Communications*, vol. 23, no. 2, pp. 201–220, 2005. View at: Publisher Site | Google Scholar - O. Simeone, Y. Bar-Ness, and U. Spagnolini, “Stable throughput of cognitive radios with and without relaying capability,”
*IEEE Transactions on Communications*, vol. 55, no. 12, pp. 2351–2360, 2007. View at: Publisher Site | Google Scholar - F. Borgonovo, M. Cesana, and L. Fratta, “Throughput and delay bounds for cognitive transmissions,” in
*IFIP International Federation for Information Processing*, vol. 265 of*Advances in Ad Hoc Networking*, pp. 179–190, 2008. View at: Publisher Site | Google Scholar - S. Tang and B. L. Mark, “Analysis of opportunistic spectrum sharing with markovian arrivals and phase-type service,”
*IEEE Transactions on Wireless Communications*, vol. 8, no. 6, Article ID 5089995, pp. 3142–3150, 2009. View at: Publisher Site | Google Scholar - H. P. Shiang and M. van der Schaar, “Queuing-based dynamic channel selection for heterogeneous multimedia applications over cognitive radio networks,”
*IEEE Transactions on Multimedia*, vol. 10, no. 5, Article ID 4542759, pp. 896–909, 2008. View at: Publisher Site | Google Scholar - J. Heo, J. Shin, J. Nam, Y. Lee, J. Park, and H. S. Cho, “Mathematical analysis of secondary user traffic in cognitive radio system,” in
*Proceedings of the 68th IEEE Vehicular Technology Conference (VTC '08-Fall)*, pp. 1–5, Calgary, Canada, September 2008. View at: Publisher Site | Google Scholar - A. Laourine, S. Chen, and L. Tong, “Queuing analysis in multichannel cognitive spectrum access: a large deviation approach,” in
*Proceedings of the IEEE International Conference on Computer Communications (INFOCOM '10)*, pp. 1–9, San Diego, Calif, USA, March 2010. View at: Publisher Site | Google Scholar - M. M. Rashid, M. J. Hossain, E. Hossain, and V. K. Bhargava, “Opportunistic spectrum access in cognitive radio networks: a queueing analytic model and admission controller design,” in
*Proceedings of the 50th IEEE Global Telecommunications Conference (GLOBECOM '07)*, pp. 4647–4652, Washington, DC, USA, November 2007. View at: Publisher Site | Google Scholar - M. M. Rashid, M. J. Hossain, E. Hossain, and V. K. Bhargava, “Opportunistic spectrum scheduling for multiuser cognitive radio: a queueing analysis,”
*IEEE Transactions on Wireless Communications*, vol. 8, no. 10, Article ID 5288960, pp. 5259–5269, 2009. View at: Publisher Site | Google Scholar - C. Ghosh, S. Pagadarai, D. P. Agrawal, and A. M. Wyglinski, “Queueing theory representation and modeling of spectrum occupancy employing radio frequency measurements,” in
*Proceedings of the IEEE 70th Vehicular Technology Conference Fall (VTC '09)*, pp. 1–5, Anchorage, Alaska, USA, September 2009. View at: Publisher Site | Google Scholar - R. Urgaonkar and M. J. Neely, “Opportunistic scheduling with reliability guarantees in cognitive radio networks,”
*IEEE Transactions on Mobile Computing*, vol. 8, no. 6, Article ID 4782965, pp. 766–777, 2009. View at: Publisher Site | Google Scholar - A. T. Hoang and Y. C. Liang, “Adaptive scheduling of spectrum sensing periods in cognitive radio networks,” in
*Proceedings of the 50th IEEE Global Telecommunications Conference (GLOBECOM '07)*, pp. 3128–3132, Washington, DC, USA, November 2007. View at: Publisher Site | Google Scholar - A. Goldsmith,
*Wireless Communications*, Cambridge University Press, 2005. - I. S. Gradshteyn and I. M. Ryzhik,
*Table of Integrals, Series, and Products*, Academic Press, San Diego, Calif, USA, 7th edition, 2007.

#### Copyright

Copyright © 2012 Peter J. Smith et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.