Research Article

An Analytical Approach to the Analysis of Guard-Channel-Based Call Admission Control in Wireless Cellular Networks

Table 2

Comparison of different algorithms for the case 𝑁 = 1 0 , 𝜆 𝑜 = 5 , 𝜆 = 1 , 𝜇 𝑜 = 5 , 𝜇 = 1 .

𝑚 𝑃 𝑜 𝑃
[8][6]Traditional[8][6]Traditional

10.731058600.774600300.7035873 3 . 4 6 7 6 𝐸 0 7 1 . 2 4 2 2 8 𝐸 0 7 8 . 2 9 9 8 9 𝐸 1 2
20.462117140.489198870.42770452 1 . 1 1 2 8 𝐸 0 6 1 . 8 7 6 8 4 𝐸 0 7 3 . 2 0 4 9 8 𝐸 1 1
30.251653240.258847990.22508059 3 . 1 0 8 9 𝐸 0 6 3 . 2 6 7 8 7 𝐸 0 7 1 . 5 6 2 3 𝐸 1 0
40.116367570.115354370.10127703 7 . 2 4 1 5 𝐸 0 6 6 . 1 5 8 7 7 𝐸 0 7 8 . 5 8 2 6 8 𝐸 1 0
50.045359090.043500370.03875433 1 . 3 8 1 5 𝐸 0 5 1 . 2 0 4 9 6 𝐸 0 6 4 . 9 8 3 3 𝐸 0 9
60.014975870.014025520.01267733 2 . 1 7 3 8 𝐸 0 5 2 . 3 9 3 0 3 𝐸 0 6 2 . 9 5 8 3 9 𝐸 0 8
70.004244580.003921640.00358918 2 . 8 9 9 4 𝐸 0 5 4 . 7 7 6 6 7 𝐸 0 6 1 . 7 6 9 7 3 𝐸 0 7
80.001047410.000964420.00089234 3 . 4 1 0 4 𝐸 0 5 9 . 5 4 8 7 3 𝐸 0 6 1 . 0 6 1 0 5 𝐸 0 6
90.000224890.000210050.00019732 3 . 6 9 2 8 𝐸 0 5 1 . 9 0 9 5 4 𝐸 0 5 6 . 3 6 5 2 3 𝐸 0 6