In wireless network, call completion probability accounts for users' satisfaction since the admitted ongoing call may be interrupted during hand-off process or even stay in the same cell when dynamically allocatin...In wireless network, call completion probability accounts for users' satisfaction since the admitted ongoing call may be interrupted during hand-off process or even stay in the same cell when dynamically allocating resource to calls because of the loss of resource. We focus on the relationship between call's completion probability and these interruptions and develop an analytical relationship model for homogeneous cellular networks based on probability analysis. Then assuming call's data source is modeled by on-off traffic model, a two dimensional Markov process is established to compute these blocking and dropping probabilities for call's completion probability. The impacts of different new call arrival rate, call's traffic characteristic, user's mobility, call's holding time and call's admission threshold on call's completion are evaluated and compared through numerical examples. These results show that call's completion reaches its maximum value if making no difference between hand-off call and new call in the case of light traffic load. But some resource should be reserved for the hand-off call in high traffic scenario. The analytical model provides a basis for helping to set the call admission threshold. Key words on-off traffic source - call completion probability - call admission control - wireless networks CLC number TN 919. 72 Foundation item: Supported by the National Natural Science Foundation of China (60172077)Biography: XUAN Xiao-ying (1972-), female, Ph. D candidate, research direction: radio resource management and scheduling in wireless networks.展开更多
In general, we describe three different methods to select an appropriatedistribution form: histogram, probability plots, and hypothesis test. The life distribution isrecognized by a neural network method. The relation...In general, we describe three different methods to select an appropriatedistribution form: histogram, probability plots, and hypothesis test. The life distribution isrecognized by a neural network method. The relationship among life distribution with life data isdescribed through threshold and weight of neural networks. The method is convenient to use. Anexample is presented to validate this method, and the results are satisfactory.展开更多
An analytical framework for the performance of different protection switching restoration mechanisms with different protection policies in Multi-Protocol Label Switching (MPLS) networks is developed, where the protect...An analytical framework for the performance of different protection switching restoration mechanisms with different protection policies in Multi-Protocol Label Switching (MPLS) networks is developed, where the protection policy may be 1 + 1, 1:1, n:1 or n:m. As a general rule, it aims at the MPLS networks with the protection paths created in advance of fault occurrence without resources reserved, and it reroutes the protected traffic in the event of link or router failures while trying to maintain quality of service (QoS) requirements. Based on the proposed protocol for processing faults, an analytical model and an evaluating model are created, and the benefits and penalties of different mechanisms with different protection policies are evaluated. In particular, an improvement on the proposed protocol is presented to overcome the drawbacks of n:m protection policy in which m > 1 and n > 1.展开更多
文摘In wireless network, call completion probability accounts for users' satisfaction since the admitted ongoing call may be interrupted during hand-off process or even stay in the same cell when dynamically allocating resource to calls because of the loss of resource. We focus on the relationship between call's completion probability and these interruptions and develop an analytical relationship model for homogeneous cellular networks based on probability analysis. Then assuming call's data source is modeled by on-off traffic model, a two dimensional Markov process is established to compute these blocking and dropping probabilities for call's completion probability. The impacts of different new call arrival rate, call's traffic characteristic, user's mobility, call's holding time and call's admission threshold on call's completion are evaluated and compared through numerical examples. These results show that call's completion reaches its maximum value if making no difference between hand-off call and new call in the case of light traffic load. But some resource should be reserved for the hand-off call in high traffic scenario. The analytical model provides a basis for helping to set the call admission threshold. Key words on-off traffic source - call completion probability - call admission control - wireless networks CLC number TN 919. 72 Foundation item: Supported by the National Natural Science Foundation of China (60172077)Biography: XUAN Xiao-ying (1972-), female, Ph. D candidate, research direction: radio resource management and scheduling in wireless networks.
文摘In general, we describe three different methods to select an appropriatedistribution form: histogram, probability plots, and hypothesis test. The life distribution isrecognized by a neural network method. The relationship among life distribution with life data isdescribed through threshold and weight of neural networks. The method is convenient to use. Anexample is presented to validate this method, and the results are satisfactory.
基金国家自然科学基金,the Project of Research Institute of Australia
文摘An analytical framework for the performance of different protection switching restoration mechanisms with different protection policies in Multi-Protocol Label Switching (MPLS) networks is developed, where the protection policy may be 1 + 1, 1:1, n:1 or n:m. As a general rule, it aims at the MPLS networks with the protection paths created in advance of fault occurrence without resources reserved, and it reroutes the protected traffic in the event of link or router failures while trying to maintain quality of service (QoS) requirements. Based on the proposed protocol for processing faults, an analytical model and an evaluating model are created, and the benefits and penalties of different mechanisms with different protection policies are evaluated. In particular, an improvement on the proposed protocol is presented to overcome the drawbacks of n:m protection policy in which m > 1 and n > 1.