Research Article

An Analytical Approach to the Analysis of Guard-Channel-Based Call Admission Control in Wireless Cellular Networks

Table 3

Comparison of different algorithms for the case 𝑁 = 1 0 , 𝜆 𝑜 = 𝜆 = 5 , 𝜇 𝑜 = 𝜇 = 5 .

𝑚 𝑃 𝑜 𝑃
[8][6]Traditional[8][6]Traditional

10.731058600.774600300.7746003 3 . 4 6 7 6 𝐸 0 7 1 . 2 4 2 2 8 𝐸 0 7 1 . 2 4 2 2 8 𝐸 0 7
20.462117140.489198870.48919887 1 . 1 1 2 8 𝐸 0 6 1 . 8 7 6 8 4 𝐸 0 7 1 . 8 7 6 8 4 𝐸 0 7
30.251653240.258847990.25884799 3 . 1 0 8 9 𝐸 0 6 3 . 2 6 7 8 7 𝐸 0 7 3 . 2 6 7 8 7 𝐸 0 7
40.116367570.115354370.11535437 7 . 2 4 1 5 𝐸 0 6 6 . 1 5 8 7 7 𝐸 0 7 6 . 1 5 8 7 7 𝐸 0 7
50.045359090.043500370.04350037 1 . 3 8 1 5 𝐸 0 5 1 . 2 0 4 9 6 𝐸 0 6 1 . 2 0 4 9 6 𝐸 0 6
60.014975870.014025520.01402552 2 . 1 7 3 8 𝐸 0 5 2 . 3 9 3 0 3 𝐸 0 6 2 . 3 9 3 0 3 𝐸 0 6
70.004244580.003921640.00392164 2 . 8 9 9 4 𝐸 0 5 4 . 7 7 6 6 7 𝐸 0 6 4 . 7 7 6 6 7 𝐸 0 6
80.001047410.000964420.00096442 3 . 4 1 0 4 𝐸 0 5 9 . 5 4 8 7 3 𝐸 0 6 9 . 5 4 8 7 3 𝐸 0 6
90.000224890.000210050.00021005 3 . 6 9 2 8 𝐸 0 5 1 . 9 0 9 5 4 𝐸 0 5 1 . 9 0 9 5 4 𝐸 0 5