Research Article | Open Access
HyungMan Kim, Agassi Melikov, Mehriban Fattakhova, CheSoong Kim, "An Analytical Approach to the Analysis of Guard-Channel-Based Call Admission Control in Wireless Cellular Networks", Journal of Applied Mathematics, vol. 2012, Article ID 676582, 14 pages, 2012. https://doi.org/10.1155/2012/676582
An Analytical Approach to the Analysis of Guard-Channel-Based Call Admission Control in Wireless Cellular Networks
We develop an analytical approach to the performance analysis and optimization of wireless cellular networks for which different types of calls are prioritized based on a channel reservation scheme. We assume that the channel occupancy time differs for new and handover calls. We obtain simple formulas for calculating quality of service (QoS) metrics and solve some problems related to finding the optimal values of guard channels as well as present the results of numerical experiments.
In wireless cellular networks, when a subscriber crosses the boundary of a cell (while on a call), the subscriber releases this cell’s channel and requests an empty channel in a neighboring cell. This process is called a handover. If a neighboring cell has at least one empty channel, then such a handover call (h-call) is delivered continuously and almost transparently to the subscriber; otherwise, the call is dropped. Usually, dropping an ongoing call from a different cell is less desirable than blocking new attempts originating within the cell (o-calls). Thus, h-calls are considered to be more important (have a higher priority) than o-calls.
There are various prioritization schemes for h-calls in wireless networks. Efficient methods for minimizing the rate of dropped h-calls include reserving a number of channels (guard channels) specifically for h-calls, imposing a threshold for o-calls, and queuing h-calls. A detailed review of papers investigating these methods can be found in [1–3].
In this paper, we consider a model with call admission control (CAC) based on guard channels schemes (GC schemes) and without queuing of h-calls. In almost all existing papers, it has been assumed that h-calls and o-calls have identical channel occupancy times. Due to this assumption, the function of a cell is described by a one-dimensional Markov chain, and the authors managed to find simple recursive formulas for calculating the probabilities of dropping h-calls and of blocking o-calls. The classical guard channels (CGC) reservation scheme , as well as a generalized reservation scheme called fractional guard channels (FGC) and its own special case, that is, uniform fractional guard channels (UFGC) , was considered. However, the identity channel occupancy times assumption for calls of different types is rather limiting and unrealistic [6–8]. Therefore, one-dimensional Markov chains do not adequately describe such networks, and further research on multidimensional models is required. However, when using multidimensional models, we face the famous “curse of dimensionality”. To address this problem, a few papers have suggested various approximation schemes. A detailed review of approximate methods can be found in .
In this paper, we develop an analytical approach to the calculation of models without h-call queues, in which o- and h-calls are not assumed to have identical channel occupancy times. First, we briefly review the results of well-known papers that study such models. One of the first works to investigate such models was . This paper examined models featuring various reservation strategies for h-calls or establishing thresholds for o-calls. For the latter type of model, simple formulas are easily developed for calculating the loss probability of h-calls as well as the blocking probability of o-calls. The development of simple formulas is possible because there is an explicit solution to an appropriate set of global equilibrium equations (SGEE) for the state probabilities. However, there is no closed form solution to the corresponding equations for models with CAC based on the GC scheme; therefore, the authors suggested approximation formulas for QoS calculations based on some heuristic considerations. The accuracy of the suggested formulas was determined by simulation. The authors also suggested another approximation scheme, which they dubbed traditional and in which different occupancy times are replaced by a single time by following a defined procedure. It was shown that the traditional scheme gives a rough approximation, especially as the true occupancy times of different calls differ substantially. The common idea underlying both approximation methods is the unification of the channel occupancy times of polytypic calls with appropriate schemes. A similar approximation approach based on this idea is proposed in , and another approach is suggested in paper , which offers high accuracy in models for which the parameters for different call types differ substantially. For models with identical parameters, however, its results are less accurate.
In this paper, we develop an analytical approach for calculating models of a wireless network with nonidentical channel occupancy times for h- and o-calls in which the CAC are based on CGC, FGC, and UFGC schemes. We prove that the formulas suggested in [6, 7] are not merely approximations but are exact if the model satisfies a local balance condition (for more information about this condition, see ); otherwise, these formulas are approximations. We use these formulas to find the optimal number of guard channels for CAC based on CGC scheme.
Even though we consider a monoservice network for the sake of simplifying both our models and any intermediate calculations, the results that we achieve can be easily adapted for multiservice networks.
This paper is organized as follows. In Section 2, well-known QoS calculation algorithms are given for the CGC scheme. In Section 3, a new analytical approach is developed for the study of models with the FGC scheme, and, as a particular case, we obtain results for the CGC scheme. Section 4 contains the results of selecting the optimal number of guard channels for the CAC based on CGC scheme. In Section 5, we provide some concluding remarks. Finally, in an appendix, we provide proofs of all required facts.
2. Approximate Methods for CAC Based on the CGC Scheme
First, we will analyze the model of a cell belonging to a homogeneous wireless network with a CAC based on the CGC scheme. Henceforth, a homogeneous network is defined as one for which the traffic parameters of all cells within the network are statistically identical; that is, we can study the function of a representative cell in isolation. This assumption is true for practically all networks with small cells (e.g., networks with microcells).
The representative cell contains channels, , which are used by Poisson flows of o- and h-calls. The intensity of an -call is denoted by , where . If at least one free channel exists upon the arrival of an h-call, then the call seizes one of the free channels; otherwise, the call is dropped. A new arriving call is accepted only when the number of busy channels is less than m, for some fixed satisfying (in the case where , there are no restrictions on new calls); otherwise, the new call is blocked.
The distribution functions corresponding to the channel occupancy times of both types of calls are exponential, but their parameters differ by the intensity of handling of n- and h-calls, which are given by and , respectively. Generally speaking, .
Remark 2.1. The abovementioned channel occupancy times are defined not only in terms of required service times for different call types but also in terms of the subscriber mobility within cells. In all existing works, it has been assumed that the required service times of x-calls and the time spent by subscribers within the cell have exponential distributions with parameters and , , respectively. Thus, the channel occupancy time of x-calls is defined as the minimum of two exponentially distributed stochastic variables; that is, for an x-call, it has an exponential form with parameter , . Based on practical considerations, the residence duration may differ greatly between different types of calls; hence, the channel occupancy times will also differ.
Cell functionality is described by a two-dimensional Markov chain (MC); that is, the state of the given system at an arbitrary moment in time is described by a two-dimensional vector , where indicates the number of n-calls (h-calls) in the cell. Thus, the state space of the corresponding MC is determined as follows:
Let us denote the stationary probability of state as . Stationary probabilities are found from the appropriate SGEE and then used to calculate all the required QoS metrics of the model. The primary QoS metrics are the loss probability of h-calls () and the blocking probability of o-calls (). They are defined as follows when using the above-mentioned CGC admission control:
Henceforth, let denote the indicator function of event . From Formulas (2.2), we obtain when .
We should note that for practical networks, this SGEE has large dimension, which explains why its exact solution is computationally difficult. In , for the case , the following algorithm for approximating the values of the QoS metrics from (2.2) is developed based on strict mathematical justifications.
Step 1. Calculate the following parameters: where , where , , .
Step 2. Calculate the approximate values of the QoS metrics in (2.2): where is the Erlang B-formula, that is, .
In the above algorithm, the following notation is used: , . The results achieved with this algorithm nearly coincide with those from exact calculations under the indicated above conditions: , . Under these conditions, the exact values of the QoS metrics for a model of moderate dimensions are calculated with SGEE.
The authors in  also introduced an approximation algorithm for solving this problem, which was based on the following heuristic considerations. Because the QoS metrics and increase in proportion to the incoming traffic load and , a one-dimensional birth and death process is used as a research model. The different channel occupation times are replaced with their averages, and the traffic intensities are replaced by their loads; that is, the following approximations are made: , , . The authors in  proposed the following formulas for approximating the QoS metrics in (2.2): where
The authors noted that it is impossible to measure the accuracy of their proposed formulas analytically; therefore, they demonstrated the high accuracy of these formulas with simulations.
Another way of transforming a two-dimensional model to an approximate one-dimensional model proceeds by replacing different average channel occupation times with the weighted average , where . Such an approach to the problem solution is called traditional . In this case, QoS parameter calculations require the use of formulas (2.7); however, in formulas (2.8), parameters and are defined as follows: , .
The authors in  also proved the low accuracy of this traditional approach, especially when and vary greatly. As was expected, the results of the last two approaches coincide at .
Tables 1, 2, and 3 contain the results of numerical experiments for the above three methods. Comparison of these methods shows that the results contained in , do not differ significantly, even when the condition , does not hold (see Tables 2 and 3).
3. An Analytical Method for CAC Based on FGC and UFGC Schemes
In this method, as in the CGC scheme, an h-call is accepted if there is at least one free channel upon its arrival; otherwise, the call is dropped. An arriving o-call is accepted with probability if upon its arrival the number of busy channels equals , ; thus, the call is blocked with probability . Obviously, the CGC scheme is a special case of this scheme. Indeed, by setting for all and for all in the FGC scheme, we obtain the CAC based on the CGC scheme; by setting for all , the FGC scheme reduces to the UFGC scheme with admission probability .
The stationary distribution of state probabilities is defined by solving the appropriate SGEE. The solution of an SGEE again presents problems with exact calculation for high-dimensional state spaces (2.1). To overcome this problem, the authors in  applied the above-mentioned heuristic assumption and proposed the following algorithm for the approximate calculation of QoS metrics: where
Here, we offer strict analysis of these formulas; moreover, we will prove that the formulas are exact if the system satisfies the local balance condition.
In the FGC scheme, as in the CGC scheme, the cell state at any time is described by a bidimensional vector , where denotes the number of n-calls (h-calls) occupying channels. Additionally, the state space of the model is defined by (2.1). The intensities , , of transitions between states of this two-dimensional MC are defined as follows: where , .
Because the loss probability of an h-call and the blocking probability of an o-call are determined by the number of busy channels (see Formulas (2.2)), consider the following partition of the state space (2.1): where .
Let us denote the probability of the merged state by , that is,
Then, the initial QoS metrics from (2.2) are defined via the stationary probabilities of the merged states as follows:
Hence, to calculate the QoS metrics in (2.2), it is sufficient to find the merged state probabilities rather than calculating the probabilities of all states .
Proposition 3.1. If the system satisfies the local balance condition, then the merged state probabilities are defined as follows: where .
The proof is provided in the appendix.
By applying these formulas to the special cases, we obtain exact formulas for the QoS metrics (2.2) when using the CAC based on both the CGC scheme and the UFGC scheme. Thus, for the CGC scheme we have that where For the UFGC scheme, the following formulas are obtained: where , .
Note that closed-form solutions (3.9)–(22) might be considered refined approximations for the similar model that features identical channel occupancy times for heterogeneous calls , that is, when . Indeed, formulas (3.11) completely coincide with the exact results given in  in the case that the admission probability is equal to 1; small deviations arise when is close to 1.
4. Selection of Optimal Values for the Parameters of CAC Based on the CGC Scheme
The problem of how to provide a given level of handling quality for different call types is scientifically and practically very interesting. The solution of such problems requires some regulated parameters. Thus, in some networks, for which the distribution of channels between cells is fixed, only call admission control parameters can be regulated because controlling loads present a difficult task and one that is sometimes practically impossible.
It is extremely difficult to develop a method for finding the optimal parameter values for the FGC scheme, as this strategy contains a large number (exactly ) of controlled parameters (i.e., , ). However, even if it was possible to calculate the optimal values of , , the practical realization of the resulting randomized call admission strategies would still include methodological difficulties. Thus, we address several problems arising from trying to find optimal parameter values for the CGC scheme to meet the required QoS level. The following scheme has only one controlled parameter ().
First, we will study the problem of organizing the fair handling of different call types. As stated above, as increases, the probability of h-call loss increases, whereas the probability of o-call blocking decreases; thus, at , we obtain an equilibrium of . In other words, at , we have absolutely fair handling.
However, in real life, absolutely fair handling is not required, and so we may choose to introduce the concept of -fair handling, which denotes handling at which , for a given number . Thus, the problem of finding -fair handling can be defined mathematically as follows:
Considering that and assuming the monotonicity of and , we can apply the dichotomy method to solve the equation in (4.1). We now describe the general algorithm. The initial uncertainty interval  is split in half; that is, we set , where is the integer part of . If condition (4.1) is satisfied at this point, then we next consider the interval ; otherwise, we consider the interval . The algorithm correctly terminates by locating an interval of unitary length whose right limit satisfies condition (4.1) but whose left limit does not. As a result, this right limit will be the required value of . This algorithm has a finite number of steps because by the condition that , condition (4.1) is satisfied in the worst case when . The results of solving (4.1) are given in Table 4.
Now let the QoS for different call types be measured by the limit values of the loss and blocking probabilities; that is, the limitations for their upper bounds are set as follows: where and are given parameters.
Then, the optimization problem is formulated as follows: find the extreme values of the parameter satisfying (4.2). Let us first consider the following problem:
Given the monotonicity of and , we propose the following algorithm for solving problem (4.3).
Step 1. If or , then there is no solution.
Step 2. If and , then .
Step 3. If and , then solve the following problem: .
Step 4. If , then there is no solution; otherwise the solution is given by .
Note that the dichotomy method can be used to solve the problem in Step 3 due to the monotonicity of .
A similar method is developed for solving the following problem:
Combining the solutions of problems (4.3) and (4.5), we obtain a range of values for the parameter meeting conditions (4.2). The results of the solutions of these problems are given in Table 5, where the symbol indicates no solution.
It is possible to pose other similar QoS optimization problems; however, due to space limitations, they are not considered here.
We have provided exact and simple formulas for the calculation and optimization of QoS metrics for traditional wireless network models, assuming that the two fundamentally different types of calls (new and handover) do not have identical channel occupancy times. It is important to note that the adaptation of the proposed approach for next generation networks is straightforward.
To prove the above-mentioned proposition, we must first prove the following lemmas.
Lemma A.1. If the system satisfies the local balance condition, then the following equations hold: where denotes conditional mathematical expectation.
Lemma A.2. If the system satisfies the local balance condition, then the following equations hold:
Proof of Lemma A.1. We use a technique proposed in , and we begin with proving the first equation. From (3.3), we conclude that the set of local equilibrium equations (SLEE) for the states , has the form Summing both parts of (A.4) for all possible , we obtain From (3.5), we conclude that Let us rearrange the right hand side of (A.5) as follows: From the definition of conditional probability, we obtain that Then, in light of (A.8), we deduce the following from (A.7): Finally, using (A.6) and (A.9), we obtain The second equation is proved similarly.
Proof of Lemma A.2. Summing over the parts of the equation in Lemma A.1, we obtain
Thus, Lemma A.2 also follows.
Consequently, from Lemma A.2, taking into account the normalization condition in (3.6), we conclude that the proposition holds.
Now let us suppose that the system does not satisfy the local balance condition; one can use the following approach. Taking into account the relations in (3.3), we conclude that the SGEE for the states has the following form:
For notational simplicity, we assume that the states , , , appearing in (A.12) are in the state space (2.1); otherwise, the corresponding terms are zeroed. Summing both sides of (A.12) over all possible , after collecting similar terms and accounting for (3.5), one obtains
Now, various schemes may be used for the unification of channel occupancy times. If we use the heuristic from , that is, we set and , then from (A.13), we obtain
By using the proof schemes from our lemmas, we conclude that right side of (A.14) is equal to ; that is, we obtain equation from Lemma A.2.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (Grant no. 2010-0003269).
- C. W. Leong and W. Zhuang, “Call admission control for wireless personal communications,” Computer Communications, vol. 26, no. 6, pp. 522–541, 2003.
- S. DasBit and S. Mitra, “Challenges of computing in mobile cellular environment—a survey,” Computer Communications, vol. 26, no. 18, pp. 2090–2105, 2003.
- M. H. Ahmed and H. Yanikomeroglu, “Call admission control in wireless networks,” IEEE Communications Surveys, vol. 7, no. 1, pp. 50–69, 2005.
- G. Haring, R. Marie, R. Puigjaner, and K. Trivedi, “Loss formulas and their application to optimization for cellular networks,” IEEE Transactions on Vehicular Technology, vol. 50, no. 3, pp. 664–673, 2001.
- J. L. Vazquez-Avilla, F. A. Cruz-Perez, and L. Ortigoza-Guerrero, “Performance analysis of fractional guard channel policies in mobile cellular networks,” IEEE Transactions on Wireless Communications, vol. 5, no. 2, pp. 301–305, 2006.
- Y. Fang and Y. Zhang, “Call admission control schemes and performance analysis in wireless mobile networks,” IEEE Transactions on Vehicular Technology, vol. 51, no. 2, pp. 371–382, 2002.
- E. A. Yavuz and V. C. M. Leung, “Computationally efficient method to evaluate the performance of guard-channel-based call admission control in cellular networks,” IEEE Transactions on Vehicular Technology, vol. 55, no. 4, pp. 1412–1424, 2006.
- A. Z. Melikov and A. T. Babayev, “Refined approximations for performance analysis and optimization of queueing model with guard channels for handovers in cellular networks,” Computer Communications, vol. 29, no. 9, pp. 1386–1392, 2006.
- F. A. Cruz-Perez, R. Toledo-Marin, and G. Hernandez-Valdez, “Approximated mathematical analysis methods of guard-channel-based call admission control in cellular networks,” in Cellular Networks-Positioning, Performance Analysis, Reliability, A. Melikov, Ed., Intech, 2011.
- F. Kelly, Reversibility and Stochastic Networks, John Wiley & Sons Ltd., Chichester, UK, 1979, Wiley Series in Probability and Mathematical Statistic.
- J. S. Kaufman, “Blocking in shared resource environment,” IEEE Transactions on Communications, vol. 29, no. 10, pp. 1474–1481, 1981.
Copyright © 2012 HyungMan Kim et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.