SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
DOI: 10.5121/ijcnc.2021.13406 85
PERFORMANCE ANALYSIS IN CELLULAR
NETWORKS CONSIDERING THE QOS BY RETRIAL
QUEUEING MODEL WITH THE FRACTIONAL GUARD
CHANNELS POLICIES
Dang ThanhChuong1
, Hoa Ly Cuong1
,
Pham Trung Duc1
and Duong Duc Hung2
1
Faculty of Information Technology, University of Sciences, Hue University, Viet Nam
2
Hue University, Viet Nam
ABSTRACT
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
KEYWORDS
Cellular Mobile Networks, Retrial, FGC, QoS.
1. INTRODUCTION
In the present, with the aid of the rapid development of wireless and mobile networks, many
queueing models, especially retrial queues, have been proposed to evaluate the actual
performances of these network systems. In cellular networks, it is important to design network
models that the handover calls are more prior than the fresh calls properly. The concerns are
limited resources, for example, a number of channels, sharings, and competitions in a certain cell
(the collisions between the handover calls and the fresh calls), which can lead to the call
interruptions when a user frequently moves among cells in the network as cell edges. Therefore,
it is necessary that the appropriate policy admitting and processing the arrival calls minimize
congestion risks of the system, including the handover and fresh calls. The call admission
controls have been proposed to fulfillQoS requirements [1].
The research [1] and [2] first introduced the application of the retrial queueing models on
evaluating cellular mobile networks involving the fractional guard channel policy to minimize the
handover probability. Then [3] constructed the novel model and obtained some important results
but that model bases only one probability 𝜃. In later years [4] and [5] reapplied and renovated [3]
by considering the additional probability of the fresh calls 𝜃′. [6] used the fractional guard
channel without retrial customers. [7] improved [3] by using the fractional guard channel, but it
considered only one probability 𝜃. The fractional guard channel policy allocates resources in the
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
86
cellular mobile network to reserve for the handover calls. This policy is considered the general
form of the guard channel ones. When the system has available resources, the fresh call
requirements are accepted by a certain probability, depending on the cell states (a number of the
busy channels).
Ramjee [8] first proposed the fractional guard channel policy with the accepted probability of the
fresh calls 𝛽𝑖 (0 ≤ 𝛽𝑖 ≤ 1, 𝑖 = 0, 𝑐, where 𝑐 is the number of the channels), and it depends on the
number of the operating channels. The problem is that the optimal probability 𝛽𝑖 is chosen by the
fractional guard channel policy. The limited fractional guard channel LFGC, the uniform
fractional guard channel UFGC, the limited average fractional guard channel LAFGC and the
quasi-uniform fractional guard channel QUFGC policies have been initiated based on the features
of different network systems.
To generalize the above results, the research can be examined the retrial queueing model whose
form is 𝑀/𝑀/𝑐/(𝑐 + 𝐿) in combination with the fractional guard channel policies and the
characteristic parameters, such as the probability that a fresh call first arrives and then it enters
the orbit and the impatient customer probability that a call resumes to enter the servers. In
contrast, it is unsuccessful and eternally departs and the additional features are the probability 𝜃
(0 < 𝜃 ≤ 1) that a call first enters the orbit when failing and the probability 𝜃′ (0 < 𝜃′ ≤ 1)
which can be considered as a call next enters the orbit when failing, whereas [7] has only one
fixed probability 𝜃 for all calls entering the orbit. The main aim of our model is to lessen
possibilities of being blocked with retrial and handover calls, significant factors to accomplish
QoS, with the additional measure which is a novel attribute in comparison with the
aforementioned works.
The organization of the article is as follows, In Section 2, the detailed problems with the
parameters and the models are described. The analysis results will be presented evaluated the
model performances in Section 3.
2. ANALYSIS MODEL
2.1. Performance Analysis of Fractional Guard Channel
The model that we use in this study is some what like the models in [3], [4], [5] and [7] by
considering the retrial customers for the fresh and handover calls. The salient point is that we
implement the fractional guard channel with the two probabilities of the fresh calls (Figure 1). In
the guard channel model, the guard channels reserve for the handover calls. It means that a fresh
call arrives in the system and is accepted with the probability 𝛽𝑖 (0 ≤ 𝛽𝑖 ≤ 1, 𝑖 = 0, 𝑐, where 𝑐 is
the number of the channels) and the system has at least a vacant channel, otherwise it will be
rejected. A handover call is denied when all channels of the system are busy. Also in this model,
the fairness is considered in the resource stores for all calls, including the fresh and handover
calls. The innovations are that implement the fractional guard channels (Definition 2.1) with the
limited capacity of the orbit.
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
87
F
⋮
Call admission
control
i=𝛽i F+ H
H
Orbit
1-𝜃
𝜃
1-𝜃’
𝜃’
⋮
c channels
Figure 1.The retrial queueing model in the cellular mobile network.
Definition 2.1 [7]: A fresh or retrial call is admitted by the system in accordance with the
fractional guard channel policy. The handover calls are accepted if the system exists a certainly
available channel, and the fresh calls only are served with the probabilities 𝛽𝑖(0 ≤ 𝛽𝑖 ≤ 1)
depending on the system state.
As the aforementioned issue, we consider the fractional guard channel policies, such as LFGC,
UFGC, LAFGC, and QUFGC. In addition, we assume that the system consists of 𝑐 the operation
channels, 𝑔 the permission channels, the accepted probability of the fresh calls 𝑝(0 ≤ 𝑝 ≤ 1),
and the average value 𝑟(𝑟 ∈ ℝ, 0 ≤ 𝑟 ≤ 𝑐).
 LFGC: 𝛽𝑖 = 1 (0 ≤ 𝑖 ≤ 𝑔 − 1), 𝛽𝑔 = 𝑝, 𝛽𝑖 = 0 (𝑔 + 1 ≤ 𝑖 < 𝑐).
 LAFGC: 𝛽𝑖 = 1 (0 ≤ 𝑖 ≤ 𝑐 − ⌊𝑟⌋ − 2), 𝛽𝑐−⌊𝑟⌋−1 = 1 − 𝑟 + ⌊𝑟⌋, 𝛽𝑖 = 0 (𝑐 − ⌊𝑟⌋ ≤ 𝑖 < 𝑐).
 UFGC: 𝛽𝑖 = 𝑝 (0 ≤ 𝑖 < 𝑐).
 QUFGC: 𝛽𝑖 = 1 (0 ≤ 𝑖 ≤ 𝑔 − 1), 𝛽𝑖 = 𝑝 (𝑔 ≤ 𝑖 < 𝑐).
Obviously, we have𝛽𝑐 = 0.
2.2. The Parameters
Considering a certain cell in the cellular mobile network, the system is modeled in Figure 1. The
arrival calls will be admitted by the call admission control with the fractional guard channel
policies. The interarrival times for fresh and handover calls follow the exponential distribution
with the rate 𝐹 and 𝐻, respectively. Let is defined as the interarrival time between
consecutively incoming calls regardless of fresh and handover calls, thus we have = 𝐹 + 𝐻.
Also, the served time follows the exponential distribution with the rate .
A call first arriving the system is blocked due to lacking or allocating the resources. Now it is:
 Permanently depart the system with the probability1 − 𝜃(0 < 𝜃 ≤ 1).
 or enter the orbit with the probability 𝜃.
In this model, the orbit is considered a queue (capacity𝐿) to store the blocked calls (or the fresh
calls).Similarly, when the retrial calls are unsuccessful, they will:
 Permanently depart the system with the probability1 − 𝜃′ (0 < 𝜃′ ≤ 1).
 or continue entering the orbit with the probability 𝜃′.
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
88
In addition, the retrial rate for the fresh calls from the orbit to the system is .
The fresh or retrial calls enter the system with the probability 𝛽𝑖 in accordance with the state
system. A handover call is served immediately if the system exists at least one vacant channel. In
contrast, it will permanently depart and does not enter orbit.
2.3. Modelling
The system is illustrated by the two-dimensional continuous-time Markov chains 𝑋 =
{(𝐼(𝑡), 𝐽(𝑡)), 𝑡 ≥ 0}, where 𝐼(𝑡)(0 ≤ 𝐼(𝑡) ≤ 𝑐)are the numbers ofthecustomers being served by
the system, and 𝐽(𝑡)(0 ≤ 𝐽(𝑡) ≤ 𝐿)are the numbers of the customerswaiting to enter the system
at the time 𝑡. The state space of the above chains is depicted by Figure 2, where (𝑖, 𝑗)are the
states that the numbers of the occupied channels at the time 𝑡are𝑖(𝑖 = 0, 1, 2, … , 𝑐 − 𝑔, 𝑐 − 𝑔 +
1, … , 𝑐), and the numbers of the customers in the orbit at the time 𝑡are𝑗(𝑗 = 0, 1, 2, … , 𝐿).
1,0
0,0
1,1
0,1 ...
... 1,L-1
0,L-1
1,L
0,L
l0 m
l1 2m
b0a
c,0 c,1 c,L-1 c,L
...
lc-1 cm
(1-q’)a
lFq
cm cm cm
l1 2m l1 2m l1 2m
l0 m l0 m l0 m
L(1-q’)a
lc-1 lc-1 lc-1
c-1,0 c-1,1 ... c-1,
L-1
c-1,L
lc-2 (c-1)m
lF(1- b0)q
lF(1- b1)q
lF(1- bc-1)q
lc-2 lc-2 lc-2
lF(1- b0)q
lF(1- b1)q
lF(1- bc-1)q
lFq
b1a
bc-2a
bc-1a
Lb0a
Lb1a
Lbc-2a
Lbc-1a
(1- bc-1)(1-q’)a
(1- b1)(1-q’)a
(1- b0)(1-q’)a L(1- b0)(1-q’)a
L(1- b1)(1-q’)a
L(1- bc-1)(1-q’)a
2b0a
2(1-q’)a
lFq
lF(1- b0)q
lF(1- b1)q
lF(1- bc-1)q
2b1a
2bc-2a
2bc-1a
2(1- bc-1)(1-q’)a
2(1- b1)(1-q’)a
2(1- b0)(1-q’)a
(L-1)b0a
(L-1)(1-q’)a
lFq
lF(1- b0)q
lF(1- b1)q
lF(1- bc-1)q
(L-1)b1a
(L-1)bc-2a
(L-1)bc-1a
(L-1)(1- bc-1)(1-q’)a
(L-1)(1- b1)(1-q’)a
(L-1)(1- b0)(1-q’)a
(c-1)m (c-1)m (c-1)m
Figure 2. State transition diagram of the model
Let 𝜋𝑖,𝑗 = lim
𝑡→∞
𝑃(𝐼(𝑡) = 𝑖, 𝐽(𝑡) = 𝑗), where 𝜋𝑖,𝑗 are the steady-state probabilities for the state
(𝑖, 𝑗). When the chains 𝑋 = {𝐼(𝑡), 𝐽(𝑡); 𝑡 ≥ 0}are represented through the state transition
matrixes 𝐴𝑗, 𝐵𝑗, 𝐶𝑗 (with theirdimension(𝑐 + 1) × (𝑐 + 1)) [9-13]:
 𝐴𝑗(𝑖, 𝑘) are the state transition matrixes for the states from (𝑖, 𝑗) to (𝑘, 𝑗)(0 ≤ 𝑖, 𝑘 ≤
𝑐, 0 ≤ 𝑗 ≤ 𝐿). They express an successful call, which is a fresh or handover call, or a call
having been completed and departing. 𝐴𝑗 has the entries 𝐴𝑗(𝑖, 𝑖 − 1) = 𝑖 (𝑖 = 1, 𝑐) and
𝐴𝑗(𝑖, 𝑖 + 1) = 𝑖 = 𝛽𝑖 𝐹 + 𝐻(𝑖 = 0, 𝑐 − 1) and the rest 0.
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
89
𝐴𝑗 = 𝐴 =
(
0 0 0 ⋯ 0 0 0
0 1 ⋯ 0 0 0
⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮
0 0 0 ⋯ (𝑐 − 1) 0 𝑐−1
0 0 0 ⋯ 0 𝑐 0 )
, (𝑗 ≥ 0) (1)
 𝐵𝑗(𝑖, 𝑘)are the state transition matrixes for the states from (𝑖, 𝑗) to (𝑘, 𝑗 + 1)(0 ≤ 𝑖, 𝑘 ≤
𝑐, 0 ≤ 𝑗 ≤ 𝐿 − 1). They express a fresh call first arriving the system and entering the
orbit with the probability 𝜃. 𝐵𝑗 has the entries 𝐵𝑗(𝑖, 𝑖) = (1 − 𝛽𝑖)𝜃 𝐹(𝑖 = 0, 𝑐) (note
𝐵𝑗(𝑐, 𝑐) = 𝜃 𝐹 due to 𝛽𝑐 = 0) and the rest 0.
𝐵𝑗 = 𝐵 =
(
𝜎0 ⋯ 0 0
0 ⋯ 0 0
⋮ ⋮ ⋮ ⋮
0 ⋯ 𝜎𝑐−1 0
0 ⋯ 0 𝜎𝑐)
, (𝑗 ≥ 0) (2)
Where 𝜎𝑖 = (1 − 𝛽𝑖)𝜃 𝐹, (0 ≤ 𝑖 ≤ 𝑐).
 𝐶𝑗(𝑖, 𝑘)are the state transition matrixes for the states from (𝑖, 𝑗) to (𝑘, 𝑗 − 1)(0 ≤
𝑖, 𝑘 ≤ 𝑐, 1 ≤ 𝑗 ≤ 𝐿). They express a retrial call returning the system. Then it is
served or permanently departs due to its impatience and all channels that are busy.
𝐶𝑗 has the entries 𝐶𝑗(𝑖, 𝑖 + 1) = 𝛽𝑖𝑗 (𝑖 = 0, 𝑐 − 1) and 𝐶𝑗(𝑖, 𝑖) = (1 − 𝛽𝑖)(1 −
𝜃′)𝑗 (𝑖 = 0, 𝑐) (note 𝐶𝑗(𝑐, 𝑐) = (1 − 𝜃′)𝑗 due to 𝛽𝑐 = 0) and the rest 0.
𝐶𝑗 =
(
𝜎0,𝑗 𝛽0𝑗 0 ⋯ 0 0
0 𝜎1,𝑗 𝛽1𝑗 ⋯ 0 0
⋮ ⋮ ⋮ ⋮ ⋮ ⋮
0 0 0 ⋯ 𝜎𝑐−1,𝑗 𝛽𝑐−1𝑗
0 0 0 ⋯ 0 𝜎𝑐,𝑗 )
, (𝑗 ≥ 1) (3)
Where 𝜎𝑖,𝑗 = (1 − 𝛽𝑖)(1 − 𝜃′)𝑗 (0 ≤ 𝑖 ≤ 𝑐, 1 ≤ 𝑗 ≤ 𝐿).
We have the generator matrix 𝑄:
𝑄 =
(
𝑄1
(0)
𝑄2
(0)
𝟎 𝟎 𝟎
𝑄0
(1)
𝑄1
(1)
⋱ 𝟎 𝟎
𝟎 ⋱ ⋱ 𝑄2
(𝐿−2)
𝟎
𝟎 𝟎 𝑄0
(𝐿−1)
𝑄1
(𝐿−1)
𝑄2
(𝐿−1)
𝟎 𝟎 𝟎 𝑄0
(𝐿)
𝑄1
(𝐿)
)
(4)
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
90
Where:
{
𝑄1
(0)
= 𝐴 − 𝐷𝐴
− 𝐷𝐵
𝑄1
(𝑗)
= 𝐴 − 𝐷𝐴
− 𝐷𝐵
− 𝐷𝐶𝑗(1 ≤ 𝑗 ≤ 𝐿 − 1)
𝑄𝐿
(0)
= 𝐴 − 𝐷𝐴
− 𝐷𝐶𝐿
𝑄0
(𝑗)
= 𝐶𝑗(1 ≤ 𝑗 ≤ 𝐿)
𝑄2
(𝑗)
= 𝐵 (0 ≤ 𝑗 ≤ 𝐿 − 1)
Where 𝐷𝑋(𝑋 = 𝐴, 𝐵, 𝐶𝑗) are the diagonal matrixes with the entries on the main diagonal that are
the sum of the entries on respective row of the matrix 𝑋. We have:
𝑣𝑄 = (0,0, … ,0)
⏟
(𝑐+1)×(𝑐+1)
(5)
Where 𝑣 = (𝑣0,𝑣1, … , 𝑣𝐿).
Let the probabilities (𝑖, 𝑗) are defined by 𝑝𝑖,𝑗 = lim
𝑡→+∞
𝑃(𝐼(𝑡) = 𝑖, 𝐽(𝑡) = 𝑗), and the level
probabilities vectors 𝑣𝑗 = (𝑝0,𝑗, 𝑝1,𝑗, … , 𝑝𝑐,𝑗)(1 ≤ 𝑗 ≤ 𝐿). The balance equations of the system
are:
𝑣0𝑄1
(0)
+ 𝑣1𝑄0
(1)
= (0,0, … ,0)
⏟
𝑐+1
(6)
𝑣𝑗−1𝑄2
(𝑗−1)
+ 𝑣𝑗𝑄1
(𝑗)
+ 𝑣𝑗+1𝑄1
(𝑗+1)
= (0,0, … ,0)
⏟
𝑐+1
(1 ≤ 𝑗 ≤ 𝐿 − 1) (7)
𝑣𝐿−1𝑄2
(𝐿−1)
+ 𝑣𝐿𝑄1
(𝐿)
= (0,0, … ,0)
⏟
𝑐+1
(8)
∑ 𝑣𝑗
𝐿
𝑗=0
× (
1
1
⋮
1
)
⏟
𝑐+1
= 1 (9)
From (5) and (9), we calculate 𝑣:
𝑣 = 𝑒(𝑄 + 𝐸)−1 (10)
Where 𝑒 is the row vector (1 × (𝑐 + 1)) and 𝐸 is the matrix ((𝑐 + 1) × (𝑐 + 1)) all of whose
elements are the constants 1.
2.4. The Performance Measures of the System
The probability of the fresh calls 𝑃𝐵𝐹 firstly arrives the system and find all busy channels at the
time or is rejected with the probability (1 − 𝛽𝑖).
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
91
𝑃𝐵𝐹 = ∑ ∑ 𝑝𝑖,𝑗(1 − 𝛽𝑖)
𝑐
𝑖=0
𝐿
𝑗=0
(11)
The probability of the retrial calls 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 then arrives the system from the orbit and find all
busy channels at the time is rejected with the probability (1 − 𝜃′).
𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 =
(1 − 𝜃′)
𝜃 𝐹
∑ ∑ 𝑗𝑝𝑖,𝑗
𝑐
𝑖=0
𝐿
𝑗=1
(12)
The probability of the handover calls 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 clearly arrives the system and find all busy
channels at the time.
𝑃𝐵𝐻 = ∑ 𝑝𝑐,𝑗
𝐿
𝑗=0
(13)
3. RESULTS
The efficiency of the performance as the change of the parameters of the system is firstly
considered with the fresh and handover calls. When the blocks occur, the fresh calls reattempt to
connect in the intervals of the stochastic distribution. We assume the base station of the cell that
can process 𝑐 the connection simultaneously. Table 1 enumerates the parameters to analyze
results. The Mathematica program of Wolfram Research denoted [14] is a power tool to compute
and simulate for network models and is utilized in the proposed model of the paper.
Table 1. The parameters of the model.
The parameters Values Describe the parameters
𝑐 10 Number of the channels in the cell
𝑔 1 to 7 Number of the accepted channels
𝑝 0.1 to 1 Probability that a fresh call is served
𝐿 1 to 10 Number of the customers in the orbit
𝐻 0.002 to 2 Arrival rate for the handover calls
𝐹 0.018 to 0.2 Arrival rate for the fresh calls
0.2 Service rate
0.4 Retrial rate
𝜃 0.1 to 1 Probability that a fresh call first enters the orbit
𝜃′ 0.1 to 1 Retrial probability that a fresh call re-enters the orbit
3.1. Analysing and Comparing the Blocking Probabilities with Values 𝝆
First, we compare the blocking probabilities 𝑃𝐵 (𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 or 𝑃𝐵𝑅, 𝑃𝐵𝐻) according to a
variety of the fractional guard channel policies with the fluctuations in values 𝜌. It can be seen in
Figure 3, the value 𝜌, the traffic load, is definited by the expression 𝜌 = 𝑐
⁄ . We have 𝑔 = 7,
𝑝 = 0.5, 𝑟 = 2.3 (for the LAFGC policy), 𝐿 = 8, 𝜃 = 0.5, 𝜃′ = 0.5, 𝐹 = 2 𝐻, 𝜌 ranging from
0.3 to 1.9. We find that the blocking probabilities for the LFGC and LAFGC policies are better
than the blocking probabilities for the UFGC and QUFGC policies.
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
92
Figure 3. The blocking probability of 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 and 𝑃𝐵𝐻by 𝜌.
This may partly explain that the UFGC and QUFGC policies permit the fresh calls with 𝛽𝑖 = 1 or
𝛽𝑖 = 𝑝(0 ≤ 𝑖 < 𝑐). As a result, the fresh calls are easier to enter the system, and the handover
calls are significantly restricted. In the meanwhile, the LFGC and LAFGC policies control the
fresh calls with 𝛽𝑖 = 0 (0 < 𝐿 ≤ 𝑖 < 𝑐, 𝐿: a particular parameter) at some of the last states with
𝑖 ≥ 𝐿.
3.2. Analysing and comparing the blocking probabilities with values𝒈
With 𝜌 = 0.7, 𝑝 = 0.5, 𝐿 = 8, 𝜃 = 0.5, 𝜃′
= 0.5, 𝐹 = 2 𝐻, 𝑔 ranging from 1 to 7, we obtain
the results as presented in Figure 4.
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.3 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9
PB
r
UFGC
PB_F
PB_R
PB_H
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
0.3 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9
PB
r
LFGC
PB_F
PB_R
PB_H
0
0.1
0.2
0.3
0.4
0.5
0.6
1 2 3 4 5 6 7
PB
g
UFGC
PB_F
PB_R
PB_H
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.3 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9
PB
r
QUFGC
PB_F
PB_R
PB_H
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
0.3 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9
PB
r
LAFGC
PB_F
PB_R
PB_H
0
0.1
0.2
0.3
0.4
0.5
0.6
1 2 3 4 5 6 7
PB
g
QUFGC
PB_F
PB_R
PB_H
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
93
Figure 4. The blocking probability of 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 , and 𝑃𝐵𝐻by 𝑔.
When we change values 𝑔, the probabilities 𝑃𝐵𝐹 and 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 for the QUFGC policy decrease
inversely proportional to values 𝑔, and the probabilities 𝑃𝐵𝐻 for the QUFGC, UFGC, LFGC and
LAFGC policies remain steady and thus we need to choose an appropriate value 𝑔 for the low
blocking probabilities 𝑃𝐵𝐻. The UFGC policy has the probabilities 𝑃𝐵𝐹 and 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 which
maintain stable due to 𝛽𝑖 = 𝑝(0 ≤ 𝑖 < 𝑐). Similar to the QUFGC policy, the probabilities 𝑃𝐵𝐹
and 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 for the LFGC and LAFGC policies significantly decline because the numbers of
the accepted channels for the fresh and retrial calls gradually increase.
3.2. Analysing and Comparing the Blocking Probabilities with Values 𝑳
With 𝜌 = 0.7, 𝑔 = 7, 𝑝 = 0.5, 𝑟 = 2.3 (for the LAFGC policy), 𝜃 = 0.5, 𝜃′ = 0.5, 𝐹 = 2 𝐻, 𝐿
ranging from 1 to 8, we obtain the results presented in Figure 5.
Figure 5. The blocking probability of 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 , and 𝑃𝐵𝐻by 𝐿.
The blocking probabilities 𝑃𝐵𝐹 and 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 are influenced by the number of the maximum
customers in the orbit 𝐿 when 𝐿 < 4 as Figure 5. When 𝐿 ≥ 4 these probalities are almost
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
1 2 3 4 5 6 7
PB
g
LFGC
PB_F
PB_R
PB_H
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
1 2 3 4 5 6 7 8
PB
L
LFGC
PB_F
PB_R
PB_H
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
1 2 3 4 5 6 7
PB
g
LAFGC
PB_F
PB_R
PB_H
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
1 2 3 4 5 6 7 8
PB
L
LAFGC
PB_F
PB_R
PB_H
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
94
steady. While the blocking probabilities 𝑃𝐵𝐻 are not affected regardless of the value 𝐿. This can
be explained that the number of the servers is fixed, the more the customers in the orbit are, the
more blocked the system is. For this reason, we can approximate to the infinite model with 𝐿 →
+∞.
3.3. Analysing and comparing the blocking probabilities with values 𝒑
With 𝜌 = 0.7, 𝑔 = 7, 𝑝 = 0.5, 𝐿 = 8, 𝑟 = 2.3 (for the LAFGC policy), 𝜃 = 0.5, 𝜃′ = 0.5, 𝐹 =
2 𝐻, 𝑝 ranging from 0.1 to 1, we obtain the results as listed in Figure 6.
Figure 6. The blocking probability of 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 , and 𝑃𝐵𝐻by 𝑝.
We found/find that the accepted probabilities of the fresh calls 𝑝 influence on how the
congestions of the fresh and retrial calls are. In these analyses, the blocking probabilities of the
fresh calls for the UFGC and QUFGC policies are better than the ones for the LFGC and LAFGC
policies due to the fact that the the probabilities 𝛽𝑖(0 ≤ 𝑖 ≤ 𝑐) for the LFGC and LAFGC
policies have more the values 𝑝 than the ones for the UFGC and QUFGC policies. As a result, the
fresh and retrial calls ease to enters the system for the LFGC and LAFGC policies.
3.4. Analysing and comparing the blocking probabilities with values 𝝀𝑯 𝝀𝑭
⁄
With 𝜌 = 0.7, 𝑔 = 7, 𝐿 = 8, 𝑝 = 0.5, 𝜃 = 0.5, 𝜃′ = 0.5, 𝐻 𝐹
⁄ ranging from 1 5
⁄ to 5, we
obtain the results as shown in Figure 7.
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
PB
p
UFGC
PB_F
PB_R
PB_H
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
PB
p
LFGC
PB_F
PB_R
PB_H
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
PB
p
QUFGC
PB_F
PB_R
PB_H
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
PB
p
LAFGC
PB_F
PB_R
PB_H
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
95
Figure 7. The blocking probability of 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 , and 𝑃𝐵𝐻by 𝐻 𝐹
⁄ .
We find that if the ratio 𝐻 𝐹
⁄ < 1/3, the probabilities 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟 and 𝑃𝐵𝐻 are changed, but if
the ratio 𝐻 𝐹
⁄ ≥ 1/3, the probabilities 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟 and 𝑃𝐵𝐻 remain almost unchanged.
Therefore, we choose the ratio 𝐻 𝐹
⁄ ≥ 1/3 to maintain the stability of the system.
3.5. Analysing and comparing the blocking probabilities with values 𝜽
With 𝜌 = 0.7, 𝑔 = 7, 𝐿 = 8, 𝑝 = 0.5, 𝑟 = 2.3 (for the LAFGC policy), 𝜃′ = 0.5, 𝐹 = 2 𝐻, 𝜃
ranging from 0.1 to 1, we gain the results as presented in Figure 8.
0
0.1
0.2
0.3
0.4
0.5
0.6
1/5 1/4 1/3 1/2 1 2 3 4 5
PB
H/ F
UFGC
PB_F
PB_R
PB_H
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
1/5 1/4 1/3 1/2 1 2 3 4 5
PB
H/ F
LFGC
PB_F
PB_R
PB_H
0
0.1
0.2
0.3
0.4
0.5
0.6
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
PB
q
UFGC
PB_F
PB_R
PB_H
0
0.05
0.1
0.15
0.2
0.25
0.3
1/5 1/4 1/3 1/2 1 2 3 4 5
PB
H/ F
QUFGC
PB_F
PB_R
PB_H
0
0.05
0.1
0.15
0.2
0.25
0.3
1/5 1/4 1/3 1/2 1 2 3 4 5
PB
H/ F
LAFGC
PB_F
PB_R
PB_H
0
0.05
0.1
0.15
0.2
0.25
0.3
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
PB
q
QUFGC
PB_F
PB_R
PB_H
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
96
Figure 8. The blocking probability of 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 , and 𝑃𝐵𝐻by 𝜃.
The parameter 𝜃 gives the influence on the blocking probabilities of the retrial calls rather than
the ones of the fresh calls. This can be explained that the probabilities that a fresh call first enters
the orbit increase resulting in a numerous number of the customers in the the orbit, and the
blocking probabilities of the retrial calls will raise. In the meantime, the probabilities of the
handover calls remain almost unchanged. In these analyses, we find that the parameters ∈
(0.2 − 𝜀, 0.2 + 𝜀), with 𝜀 ≥ 0 is a arbitrarily small real. The system performances are optimized
by the given parameters.
3.6. Analysing and comparing the blocking probabilities with values𝜽′
With 𝜌 = 0.7, 𝑔 = 7, 𝐿 = 8, 𝑝 = 0.5, 𝑟 = 2.3 (for the LAFGC policy), 𝜃 = 0.5, 𝐹 = 2 𝐻, 𝜃′
ranging from 0.1 to 1, we obtain the results as presented Figure 9.
Figure 9. The blocking probability of 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 , and 𝑃𝐵𝐻by 𝜃′.
When taking into account the increase in the retrial probabilities 𝜃′(0.1 ≤ 𝜃′ ≤ 0.9), the
blocking probabilities 𝑃𝐵𝐹,𝑟 are declined. Then the retrial calls re-enter the orbit to attempt the
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
PB
q
LFGC
PB_F
PB_R
PB_H
0
0.1
0.2
0.3
0.4
0.5
0.6
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB
q'
UFGC
PB_F
PB_R
PB_H
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB
q'
LFGC
PB_F
PB_R
PB_H
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
PB
q
LAFGC
PB_F
PB_R
PB_H
0
0.05
0.1
0.15
0.2
0.25
0.3
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB
q'
QUFGC
PB_F
PB_R
PB_H
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB
q'
LAFGC
PB_F
PB_R
PB_H
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
97
next occasions. On the contrary, the blocking probabilities 𝑃𝐵𝐹 and 𝑃𝐵𝐻 are slightly affected. As
the results ofinFigure 9, when the parameter 𝜃′ tends to the asymptotic value of 1, the blocking
probabilities 𝑃𝐵𝐹,𝑟 almost optimize the certain performances.
(a)
(b)
Figure 10. The blocking probability of 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 (a) and 𝑃𝐵𝐻(b) among LAFGC, LFGC, QUFGC and
UFGC
We find that the blocking probabilities 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 and 𝑃𝐵𝐻 of LAFGC and LFGC are almost
equivalent (Figure 10). Also, the blocking probabilities 𝑃𝐵𝐻 of QUFGC and UFGC are
approximately equal, yet the blocking probabilities 𝑃𝐵𝐹,𝑟 of QUFGC are better than those of
UFGC. This is explained that the accepted probabilities 𝛽𝑖 of QUFGC are 1 at some initial states.
0
0,1
0,2
0,3
0,4
0,5
0,6
0,7
0,8
0,9
1
0,3 0,5 0,7 0,9 1,1 1,3 1,5 1,7 1,9
PB
F,retrial
r
LAFGC
LFGC
QUFGC
UFGC
0
0,05
0,1
0,15
0,2
0,25
0,3
0,35
0,4
0,45
0,3 0,5 0,7 0,9 1,1 1,3 1,5 1,7 1,9
PB
H
r
LAFGC
LFGC
QUFGC
UFGC
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
98
Figure 11. The blocking probability of 𝑃𝐵𝐹 between in [7] and the article.
According to figures extracted from [7] (of Do Van Tien) with 𝐿 = 𝑐 − 1, 𝛽 = 0, 𝑐 = 15, =
1
120
, = 20 , 𝐹 = 24 𝐻, we ascertain that the probabilties of 𝑃𝐵𝐹 in the article are superior to
those of [7]. The disparity is that the further value 𝜃′
can be varied, depending on users’s
adjustments and playing a signal role in reducing the possibilities of obstructing the fresh calls.
4. CONCLUSIONS
We have introduced the retrial queueing model in the cellular mobile network using the fractional
guard channel policy with impatient customers according to the probabilities θ and θ'. The
advantage of the model is the significant decrease of the blocking probabilities for the fresh and
retrial calls as well as the support of the network operation to maintain the stability of QoS under
the influences on the network traffic and additional factors. The generality in the model is
weighed by choosing the retrial queueing model in combination with the fractional guard channel
policies. The analysis results are simple and guarantee the low blocking probabilities of the
handover calls for the fractional guard channel policy in compassion to the blocking probabilities
of the guard channel policy. In addition, the retrial queueing model with the fractional guard
channel policy in the cellular mobile network can be used for the criteria of the different network
traffics to measure the performances. The corollaries elucidate that the model is appropriate and
precise. Besides, the research considers a variety of the fractional guard channel policies,
including the UFGC, QUFGC, LFGC, and LAFGC policies, to fall the blocking probabilities of
the fresh calls, but they still guarantee the handover calls protected with the call admission
control.
CONFLICTS OF INTEREST
The authors declare no conflict of interest.
0
0,02
0,04
0,06
0,08
0,1
0,12
0,14
0,16
0,18
0,2
0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB
F
r
LFGC
Do V Tien
This article
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
99
REFERENCES
[1] Mandles M. and Tutschku K., (1996). Efficient Call Handling Procedures in Cellular Mobile
Networks.Forschungsbericht, Preprint-Reihe 144, Institut fur Informatik, Universitat Wurzburg,
Germany.
[2] Tran-Gia P. and Mandles M., (1997). Modeling of Customer Retrial Phenomenon in Cellular Mobile
Networks.IEEE Journal on Selected Areas in Communications, 15(8), pp. 1406-1414.
[3] Do T. V. (2010). A new computational algorithm for retrial queues to cellular mobile systems with
guard channels. Computers & Industrial Engineering, 59(4), pp. 865–872.
[4] Linda A. C. and Ani C. I. (2014). A Reservation and Retrial Queue Analysis for Cellular
Networks.International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181,
Vol. 3 Issue 2, February – 2014
[5] Bhargava A., Bhagat A. and Singh J., (2016). Modelling and Performance Analysis of Cellular
Mobile Networks.Indian Journal of Science and Technology, Vol 9 (48), December 2016.
[6] Vazquez-Avila J., Cruz-Pérez F.A. and Ortigoza-Guerrero L., (2006). Performance Analysis of
Fractional Guard Channel Policies in Mobile Cellular Networks.IEEE Transactions on Wireless
Communications, 5 (2006), pp. 301-305.
[7] Do T. V. (2011). Solution for A Retrial Queueing Problem in Cellular Networks with the Fractional
Guard Channel Policy.Mathematical and Computer Modelling, 53(11–12), pp. 2058-2065.
[8] Ramjee R., Towsley D. and Nagarajan R., (1997). On Optimal Call Admission Control in Cellular
Networks.Wireless Network, 3(1), March 1997.
[9] Neuts M.F. (1981). Matrix Geometric Solutions in Stochastic Model, Johns Hopkins University
Press, Baltimore.
[10] Tien Van Do, Ram Chakka, An efficient method to compute the rate matrix for retrial queues with
large number of servers, Applied Mathematics Letters 23, (2010) 638-643.
[11] Tien, D.V. (2013). An Enhanced Algorithm to Solve Multiserver Retrial Queueing Systems with
Impatient Customer. Computers & Industrial Engineering, Vol 65, No 4, pp. 719-728.
[12] Kulshrestha R, Agarwal A, Shruti (2019). An adaptive fractional guard channel based CAC scheme
for heterogeneous traffic in wireless cellular networks. In: Proceedings of IEEE 6th international
conference in computing for sustainable global development, Delhi, India, pp 1066–1070.
[13] Do T.V. (2010). An Efficient Computation Algorithm for A Multiserver Feedback retrial Queue With
A Large Queueing Capacity, Applied Mathematical Modelling, 34(8), pp. 2272-2278.
[14] https://www.wolfram.com/mathematica/
International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021
100
AUTHORS
Dang Thanh Chuong obtained his doctorate in Mathematical Foundation for
Computers and Computing Systems in 2014 from the Institute of Information
Technology, Vietnam Academy of Science and Technology (VAST). He has published
over 20 research papers. His research interests are in the fields of all-optical networks
with emphasis on packet/burst-based switching, Contention Resolution, and Quality of
Service; Queueing Theory and Retrial Queue. Email: dtchuong@hueuni.edu.vn.
Hoa Ly Cuong procuring MSc in Computer Science in 2017 from the Hue University
of Science, Hue University. The areas he has engaged in comprise Queueing Theory
and Wireless Networks.
Email: hlcuong90@gmail.com.
Pham TrungDuc In 2010, he graduated with a Bachelor of Information Technology
from University of Sciences, Hue University. In 2012, he received a Master's degree in
Computer Science from Hue University of Sciences. Currently, he is a PhD student at
Hue University of Sciences, Hue University (from December 2016 to the present).
Research fields: OBS network, QoS differentiation, scheduling admission control, QoS
improvement, QoS provisioning. Email: phamtrungduc@hueuni.edu.vn
Duong Duc Hung is a Technical Editor at the HU Journal of Science, Hue University,
Vietnam. His main research topics are Computer Networks and Communications; Text
Mining.
Email: ddhung@hueuni.edu.vn

Contenu connexe

Tendances

A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
ijngnjournal
 
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
IJCNCJournal
 

Tendances (17)

GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
 
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
Hybrid Cluster Based Congestion Aware (HCBCA) Approaches in Wireless Sensor N...
Hybrid Cluster Based Congestion Aware (HCBCA) Approaches in Wireless Sensor N...Hybrid Cluster Based Congestion Aware (HCBCA) Approaches in Wireless Sensor N...
Hybrid Cluster Based Congestion Aware (HCBCA) Approaches in Wireless Sensor N...
 
21 9149 simulation analysis for consistent path identification edit septian
21 9149 simulation analysis for consistent path identification edit septian21 9149 simulation analysis for consistent path identification edit septian
21 9149 simulation analysis for consistent path identification edit septian
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
 
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
IRJET- Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
IRJET-  	  Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANETIRJET-  	  Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
IRJET- Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 

Similaire à PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEUEING MODEL WITH THE FRACTIONAL GUARD CHANNELS POLICIES

Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
IJCNCJournal
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
IJCNCJournal
 
Design of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesDesign of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codes
IAEME Publication
 

Similaire à PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEUEING MODEL WITH THE FRACTIONAL GUARD CHANNELS POLICIES (20)

Comparative analysis of congestion
Comparative analysis of congestionComparative analysis of congestion
Comparative analysis of congestion
 
PERFORMANCE ENHANCEMENT OF DYNAMIC CHANNEL ALLOCATION IN CELLULAR MOBILE NETW...
PERFORMANCE ENHANCEMENT OF DYNAMIC CHANNEL ALLOCATION IN CELLULAR MOBILE NETW...PERFORMANCE ENHANCEMENT OF DYNAMIC CHANNEL ALLOCATION IN CELLULAR MOBILE NETW...
PERFORMANCE ENHANCEMENT OF DYNAMIC CHANNEL ALLOCATION IN CELLULAR MOBILE NETW...
 
B041120710
B041120710B041120710
B041120710
 
An efficient recovery mechanism
An efficient recovery mechanismAn efficient recovery mechanism
An efficient recovery mechanism
 
Adaptive Shared Channel Assignment Scheme for Cellular Network to Improve the...
Adaptive Shared Channel Assignment Scheme for Cellular Network to Improve the...Adaptive Shared Channel Assignment Scheme for Cellular Network to Improve the...
Adaptive Shared Channel Assignment Scheme for Cellular Network to Improve the...
 
I017156167
I017156167I017156167
I017156167
 
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...
 
An efficient model for reducing soft blocking probability in wireless cellula...
An efficient model for reducing soft blocking probability in wireless cellula...An efficient model for reducing soft blocking probability in wireless cellula...
An efficient model for reducing soft blocking probability in wireless cellula...
 
J0215357
J0215357J0215357
J0215357
 
IRJET- Reliable Transmission of Packets using Multiple Channels
IRJET- Reliable Transmission of Packets using Multiple ChannelsIRJET- Reliable Transmission of Packets using Multiple Channels
IRJET- Reliable Transmission of Packets using Multiple Channels
 
Reduce the probability of blocking for handoff and calls in cellular systems ...
Reduce the probability of blocking for handoff and calls in cellular systems ...Reduce the probability of blocking for handoff and calls in cellular systems ...
Reduce the probability of blocking for handoff and calls in cellular systems ...
 
Performance comparison of blind adaptive multiuser
Performance comparison of blind adaptive multiuserPerformance comparison of blind adaptive multiuser
Performance comparison of blind adaptive multiuser
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
 
I1102014953
I1102014953I1102014953
I1102014953
 
Channel quality
Channel qualityChannel quality
Channel quality
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...
 
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
 
Bd4103341345
Bd4103341345Bd4103341345
Bd4103341345
 
Design of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesDesign of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codes
 

Plus de IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
IJCNCJournal
 

Plus de IJCNCJournal (20)

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 

Dernier

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Dernier (20)

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 

PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEUEING MODEL WITH THE FRACTIONAL GUARD CHANNELS POLICIES

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 DOI: 10.5121/ijcnc.2021.13406 85 PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEUEING MODEL WITH THE FRACTIONAL GUARD CHANNELS POLICIES Dang ThanhChuong1 , Hoa Ly Cuong1 , Pham Trung Duc1 and Duong Duc Hung2 1 Faculty of Information Technology, University of Sciences, Hue University, Viet Nam 2 Hue University, Viet Nam ABSTRACT In this article, a retrial queueing model will be considered with persevering customers for wireless cellular networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC (QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important effectiveness measures pertained to the standard of services undergone by users with the probability that a fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call arrives the system from the orbit and find all busy channels at the time and the probability that a handover call arrives the system and find all busy channels at the time. Comparison between four types of the FGC policy can befound to evaluate the performance of the system. KEYWORDS Cellular Mobile Networks, Retrial, FGC, QoS. 1. INTRODUCTION In the present, with the aid of the rapid development of wireless and mobile networks, many queueing models, especially retrial queues, have been proposed to evaluate the actual performances of these network systems. In cellular networks, it is important to design network models that the handover calls are more prior than the fresh calls properly. The concerns are limited resources, for example, a number of channels, sharings, and competitions in a certain cell (the collisions between the handover calls and the fresh calls), which can lead to the call interruptions when a user frequently moves among cells in the network as cell edges. Therefore, it is necessary that the appropriate policy admitting and processing the arrival calls minimize congestion risks of the system, including the handover and fresh calls. The call admission controls have been proposed to fulfillQoS requirements [1]. The research [1] and [2] first introduced the application of the retrial queueing models on evaluating cellular mobile networks involving the fractional guard channel policy to minimize the handover probability. Then [3] constructed the novel model and obtained some important results but that model bases only one probability 𝜃. In later years [4] and [5] reapplied and renovated [3] by considering the additional probability of the fresh calls 𝜃′. [6] used the fractional guard channel without retrial customers. [7] improved [3] by using the fractional guard channel, but it considered only one probability 𝜃. The fractional guard channel policy allocates resources in the
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 86 cellular mobile network to reserve for the handover calls. This policy is considered the general form of the guard channel ones. When the system has available resources, the fresh call requirements are accepted by a certain probability, depending on the cell states (a number of the busy channels). Ramjee [8] first proposed the fractional guard channel policy with the accepted probability of the fresh calls 𝛽𝑖 (0 ≤ 𝛽𝑖 ≤ 1, 𝑖 = 0, 𝑐, where 𝑐 is the number of the channels), and it depends on the number of the operating channels. The problem is that the optimal probability 𝛽𝑖 is chosen by the fractional guard channel policy. The limited fractional guard channel LFGC, the uniform fractional guard channel UFGC, the limited average fractional guard channel LAFGC and the quasi-uniform fractional guard channel QUFGC policies have been initiated based on the features of different network systems. To generalize the above results, the research can be examined the retrial queueing model whose form is 𝑀/𝑀/𝑐/(𝑐 + 𝐿) in combination with the fractional guard channel policies and the characteristic parameters, such as the probability that a fresh call first arrives and then it enters the orbit and the impatient customer probability that a call resumes to enter the servers. In contrast, it is unsuccessful and eternally departs and the additional features are the probability 𝜃 (0 < 𝜃 ≤ 1) that a call first enters the orbit when failing and the probability 𝜃′ (0 < 𝜃′ ≤ 1) which can be considered as a call next enters the orbit when failing, whereas [7] has only one fixed probability 𝜃 for all calls entering the orbit. The main aim of our model is to lessen possibilities of being blocked with retrial and handover calls, significant factors to accomplish QoS, with the additional measure which is a novel attribute in comparison with the aforementioned works. The organization of the article is as follows, In Section 2, the detailed problems with the parameters and the models are described. The analysis results will be presented evaluated the model performances in Section 3. 2. ANALYSIS MODEL 2.1. Performance Analysis of Fractional Guard Channel The model that we use in this study is some what like the models in [3], [4], [5] and [7] by considering the retrial customers for the fresh and handover calls. The salient point is that we implement the fractional guard channel with the two probabilities of the fresh calls (Figure 1). In the guard channel model, the guard channels reserve for the handover calls. It means that a fresh call arrives in the system and is accepted with the probability 𝛽𝑖 (0 ≤ 𝛽𝑖 ≤ 1, 𝑖 = 0, 𝑐, where 𝑐 is the number of the channels) and the system has at least a vacant channel, otherwise it will be rejected. A handover call is denied when all channels of the system are busy. Also in this model, the fairness is considered in the resource stores for all calls, including the fresh and handover calls. The innovations are that implement the fractional guard channels (Definition 2.1) with the limited capacity of the orbit.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 87 F ⋮ Call admission control i=𝛽i F+ H H Orbit 1-𝜃 𝜃 1-𝜃’ 𝜃’ ⋮ c channels Figure 1.The retrial queueing model in the cellular mobile network. Definition 2.1 [7]: A fresh or retrial call is admitted by the system in accordance with the fractional guard channel policy. The handover calls are accepted if the system exists a certainly available channel, and the fresh calls only are served with the probabilities 𝛽𝑖(0 ≤ 𝛽𝑖 ≤ 1) depending on the system state. As the aforementioned issue, we consider the fractional guard channel policies, such as LFGC, UFGC, LAFGC, and QUFGC. In addition, we assume that the system consists of 𝑐 the operation channels, 𝑔 the permission channels, the accepted probability of the fresh calls 𝑝(0 ≤ 𝑝 ≤ 1), and the average value 𝑟(𝑟 ∈ ℝ, 0 ≤ 𝑟 ≤ 𝑐).  LFGC: 𝛽𝑖 = 1 (0 ≤ 𝑖 ≤ 𝑔 − 1), 𝛽𝑔 = 𝑝, 𝛽𝑖 = 0 (𝑔 + 1 ≤ 𝑖 < 𝑐).  LAFGC: 𝛽𝑖 = 1 (0 ≤ 𝑖 ≤ 𝑐 − ⌊𝑟⌋ − 2), 𝛽𝑐−⌊𝑟⌋−1 = 1 − 𝑟 + ⌊𝑟⌋, 𝛽𝑖 = 0 (𝑐 − ⌊𝑟⌋ ≤ 𝑖 < 𝑐).  UFGC: 𝛽𝑖 = 𝑝 (0 ≤ 𝑖 < 𝑐).  QUFGC: 𝛽𝑖 = 1 (0 ≤ 𝑖 ≤ 𝑔 − 1), 𝛽𝑖 = 𝑝 (𝑔 ≤ 𝑖 < 𝑐). Obviously, we have𝛽𝑐 = 0. 2.2. The Parameters Considering a certain cell in the cellular mobile network, the system is modeled in Figure 1. The arrival calls will be admitted by the call admission control with the fractional guard channel policies. The interarrival times for fresh and handover calls follow the exponential distribution with the rate 𝐹 and 𝐻, respectively. Let is defined as the interarrival time between consecutively incoming calls regardless of fresh and handover calls, thus we have = 𝐹 + 𝐻. Also, the served time follows the exponential distribution with the rate . A call first arriving the system is blocked due to lacking or allocating the resources. Now it is:  Permanently depart the system with the probability1 − 𝜃(0 < 𝜃 ≤ 1).  or enter the orbit with the probability 𝜃. In this model, the orbit is considered a queue (capacity𝐿) to store the blocked calls (or the fresh calls).Similarly, when the retrial calls are unsuccessful, they will:  Permanently depart the system with the probability1 − 𝜃′ (0 < 𝜃′ ≤ 1).  or continue entering the orbit with the probability 𝜃′.
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 88 In addition, the retrial rate for the fresh calls from the orbit to the system is . The fresh or retrial calls enter the system with the probability 𝛽𝑖 in accordance with the state system. A handover call is served immediately if the system exists at least one vacant channel. In contrast, it will permanently depart and does not enter orbit. 2.3. Modelling The system is illustrated by the two-dimensional continuous-time Markov chains 𝑋 = {(𝐼(𝑡), 𝐽(𝑡)), 𝑡 ≥ 0}, where 𝐼(𝑡)(0 ≤ 𝐼(𝑡) ≤ 𝑐)are the numbers ofthecustomers being served by the system, and 𝐽(𝑡)(0 ≤ 𝐽(𝑡) ≤ 𝐿)are the numbers of the customerswaiting to enter the system at the time 𝑡. The state space of the above chains is depicted by Figure 2, where (𝑖, 𝑗)are the states that the numbers of the occupied channels at the time 𝑡are𝑖(𝑖 = 0, 1, 2, … , 𝑐 − 𝑔, 𝑐 − 𝑔 + 1, … , 𝑐), and the numbers of the customers in the orbit at the time 𝑡are𝑗(𝑗 = 0, 1, 2, … , 𝐿). 1,0 0,0 1,1 0,1 ... ... 1,L-1 0,L-1 1,L 0,L l0 m l1 2m b0a c,0 c,1 c,L-1 c,L ... lc-1 cm (1-q’)a lFq cm cm cm l1 2m l1 2m l1 2m l0 m l0 m l0 m L(1-q’)a lc-1 lc-1 lc-1 c-1,0 c-1,1 ... c-1, L-1 c-1,L lc-2 (c-1)m lF(1- b0)q lF(1- b1)q lF(1- bc-1)q lc-2 lc-2 lc-2 lF(1- b0)q lF(1- b1)q lF(1- bc-1)q lFq b1a bc-2a bc-1a Lb0a Lb1a Lbc-2a Lbc-1a (1- bc-1)(1-q’)a (1- b1)(1-q’)a (1- b0)(1-q’)a L(1- b0)(1-q’)a L(1- b1)(1-q’)a L(1- bc-1)(1-q’)a 2b0a 2(1-q’)a lFq lF(1- b0)q lF(1- b1)q lF(1- bc-1)q 2b1a 2bc-2a 2bc-1a 2(1- bc-1)(1-q’)a 2(1- b1)(1-q’)a 2(1- b0)(1-q’)a (L-1)b0a (L-1)(1-q’)a lFq lF(1- b0)q lF(1- b1)q lF(1- bc-1)q (L-1)b1a (L-1)bc-2a (L-1)bc-1a (L-1)(1- bc-1)(1-q’)a (L-1)(1- b1)(1-q’)a (L-1)(1- b0)(1-q’)a (c-1)m (c-1)m (c-1)m Figure 2. State transition diagram of the model Let 𝜋𝑖,𝑗 = lim 𝑡→∞ 𝑃(𝐼(𝑡) = 𝑖, 𝐽(𝑡) = 𝑗), where 𝜋𝑖,𝑗 are the steady-state probabilities for the state (𝑖, 𝑗). When the chains 𝑋 = {𝐼(𝑡), 𝐽(𝑡); 𝑡 ≥ 0}are represented through the state transition matrixes 𝐴𝑗, 𝐵𝑗, 𝐶𝑗 (with theirdimension(𝑐 + 1) × (𝑐 + 1)) [9-13]:  𝐴𝑗(𝑖, 𝑘) are the state transition matrixes for the states from (𝑖, 𝑗) to (𝑘, 𝑗)(0 ≤ 𝑖, 𝑘 ≤ 𝑐, 0 ≤ 𝑗 ≤ 𝐿). They express an successful call, which is a fresh or handover call, or a call having been completed and departing. 𝐴𝑗 has the entries 𝐴𝑗(𝑖, 𝑖 − 1) = 𝑖 (𝑖 = 1, 𝑐) and 𝐴𝑗(𝑖, 𝑖 + 1) = 𝑖 = 𝛽𝑖 𝐹 + 𝐻(𝑖 = 0, 𝑐 − 1) and the rest 0.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 89 𝐴𝑗 = 𝐴 = ( 0 0 0 ⋯ 0 0 0 0 1 ⋯ 0 0 0 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ 0 0 0 ⋯ (𝑐 − 1) 0 𝑐−1 0 0 0 ⋯ 0 𝑐 0 ) , (𝑗 ≥ 0) (1)  𝐵𝑗(𝑖, 𝑘)are the state transition matrixes for the states from (𝑖, 𝑗) to (𝑘, 𝑗 + 1)(0 ≤ 𝑖, 𝑘 ≤ 𝑐, 0 ≤ 𝑗 ≤ 𝐿 − 1). They express a fresh call first arriving the system and entering the orbit with the probability 𝜃. 𝐵𝑗 has the entries 𝐵𝑗(𝑖, 𝑖) = (1 − 𝛽𝑖)𝜃 𝐹(𝑖 = 0, 𝑐) (note 𝐵𝑗(𝑐, 𝑐) = 𝜃 𝐹 due to 𝛽𝑐 = 0) and the rest 0. 𝐵𝑗 = 𝐵 = ( 𝜎0 ⋯ 0 0 0 ⋯ 0 0 ⋮ ⋮ ⋮ ⋮ 0 ⋯ 𝜎𝑐−1 0 0 ⋯ 0 𝜎𝑐) , (𝑗 ≥ 0) (2) Where 𝜎𝑖 = (1 − 𝛽𝑖)𝜃 𝐹, (0 ≤ 𝑖 ≤ 𝑐).  𝐶𝑗(𝑖, 𝑘)are the state transition matrixes for the states from (𝑖, 𝑗) to (𝑘, 𝑗 − 1)(0 ≤ 𝑖, 𝑘 ≤ 𝑐, 1 ≤ 𝑗 ≤ 𝐿). They express a retrial call returning the system. Then it is served or permanently departs due to its impatience and all channels that are busy. 𝐶𝑗 has the entries 𝐶𝑗(𝑖, 𝑖 + 1) = 𝛽𝑖𝑗 (𝑖 = 0, 𝑐 − 1) and 𝐶𝑗(𝑖, 𝑖) = (1 − 𝛽𝑖)(1 − 𝜃′)𝑗 (𝑖 = 0, 𝑐) (note 𝐶𝑗(𝑐, 𝑐) = (1 − 𝜃′)𝑗 due to 𝛽𝑐 = 0) and the rest 0. 𝐶𝑗 = ( 𝜎0,𝑗 𝛽0𝑗 0 ⋯ 0 0 0 𝜎1,𝑗 𝛽1𝑗 ⋯ 0 0 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ 0 0 0 ⋯ 𝜎𝑐−1,𝑗 𝛽𝑐−1𝑗 0 0 0 ⋯ 0 𝜎𝑐,𝑗 ) , (𝑗 ≥ 1) (3) Where 𝜎𝑖,𝑗 = (1 − 𝛽𝑖)(1 − 𝜃′)𝑗 (0 ≤ 𝑖 ≤ 𝑐, 1 ≤ 𝑗 ≤ 𝐿). We have the generator matrix 𝑄: 𝑄 = ( 𝑄1 (0) 𝑄2 (0) 𝟎 𝟎 𝟎 𝑄0 (1) 𝑄1 (1) ⋱ 𝟎 𝟎 𝟎 ⋱ ⋱ 𝑄2 (𝐿−2) 𝟎 𝟎 𝟎 𝑄0 (𝐿−1) 𝑄1 (𝐿−1) 𝑄2 (𝐿−1) 𝟎 𝟎 𝟎 𝑄0 (𝐿) 𝑄1 (𝐿) ) (4)
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 90 Where: { 𝑄1 (0) = 𝐴 − 𝐷𝐴 − 𝐷𝐵 𝑄1 (𝑗) = 𝐴 − 𝐷𝐴 − 𝐷𝐵 − 𝐷𝐶𝑗(1 ≤ 𝑗 ≤ 𝐿 − 1) 𝑄𝐿 (0) = 𝐴 − 𝐷𝐴 − 𝐷𝐶𝐿 𝑄0 (𝑗) = 𝐶𝑗(1 ≤ 𝑗 ≤ 𝐿) 𝑄2 (𝑗) = 𝐵 (0 ≤ 𝑗 ≤ 𝐿 − 1) Where 𝐷𝑋(𝑋 = 𝐴, 𝐵, 𝐶𝑗) are the diagonal matrixes with the entries on the main diagonal that are the sum of the entries on respective row of the matrix 𝑋. We have: 𝑣𝑄 = (0,0, … ,0) ⏟ (𝑐+1)×(𝑐+1) (5) Where 𝑣 = (𝑣0,𝑣1, … , 𝑣𝐿). Let the probabilities (𝑖, 𝑗) are defined by 𝑝𝑖,𝑗 = lim 𝑡→+∞ 𝑃(𝐼(𝑡) = 𝑖, 𝐽(𝑡) = 𝑗), and the level probabilities vectors 𝑣𝑗 = (𝑝0,𝑗, 𝑝1,𝑗, … , 𝑝𝑐,𝑗)(1 ≤ 𝑗 ≤ 𝐿). The balance equations of the system are: 𝑣0𝑄1 (0) + 𝑣1𝑄0 (1) = (0,0, … ,0) ⏟ 𝑐+1 (6) 𝑣𝑗−1𝑄2 (𝑗−1) + 𝑣𝑗𝑄1 (𝑗) + 𝑣𝑗+1𝑄1 (𝑗+1) = (0,0, … ,0) ⏟ 𝑐+1 (1 ≤ 𝑗 ≤ 𝐿 − 1) (7) 𝑣𝐿−1𝑄2 (𝐿−1) + 𝑣𝐿𝑄1 (𝐿) = (0,0, … ,0) ⏟ 𝑐+1 (8) ∑ 𝑣𝑗 𝐿 𝑗=0 × ( 1 1 ⋮ 1 ) ⏟ 𝑐+1 = 1 (9) From (5) and (9), we calculate 𝑣: 𝑣 = 𝑒(𝑄 + 𝐸)−1 (10) Where 𝑒 is the row vector (1 × (𝑐 + 1)) and 𝐸 is the matrix ((𝑐 + 1) × (𝑐 + 1)) all of whose elements are the constants 1. 2.4. The Performance Measures of the System The probability of the fresh calls 𝑃𝐵𝐹 firstly arrives the system and find all busy channels at the time or is rejected with the probability (1 − 𝛽𝑖).
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 91 𝑃𝐵𝐹 = ∑ ∑ 𝑝𝑖,𝑗(1 − 𝛽𝑖) 𝑐 𝑖=0 𝐿 𝑗=0 (11) The probability of the retrial calls 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 then arrives the system from the orbit and find all busy channels at the time is rejected with the probability (1 − 𝜃′). 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 = (1 − 𝜃′) 𝜃 𝐹 ∑ ∑ 𝑗𝑝𝑖,𝑗 𝑐 𝑖=0 𝐿 𝑗=1 (12) The probability of the handover calls 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 clearly arrives the system and find all busy channels at the time. 𝑃𝐵𝐻 = ∑ 𝑝𝑐,𝑗 𝐿 𝑗=0 (13) 3. RESULTS The efficiency of the performance as the change of the parameters of the system is firstly considered with the fresh and handover calls. When the blocks occur, the fresh calls reattempt to connect in the intervals of the stochastic distribution. We assume the base station of the cell that can process 𝑐 the connection simultaneously. Table 1 enumerates the parameters to analyze results. The Mathematica program of Wolfram Research denoted [14] is a power tool to compute and simulate for network models and is utilized in the proposed model of the paper. Table 1. The parameters of the model. The parameters Values Describe the parameters 𝑐 10 Number of the channels in the cell 𝑔 1 to 7 Number of the accepted channels 𝑝 0.1 to 1 Probability that a fresh call is served 𝐿 1 to 10 Number of the customers in the orbit 𝐻 0.002 to 2 Arrival rate for the handover calls 𝐹 0.018 to 0.2 Arrival rate for the fresh calls 0.2 Service rate 0.4 Retrial rate 𝜃 0.1 to 1 Probability that a fresh call first enters the orbit 𝜃′ 0.1 to 1 Retrial probability that a fresh call re-enters the orbit 3.1. Analysing and Comparing the Blocking Probabilities with Values 𝝆 First, we compare the blocking probabilities 𝑃𝐵 (𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 or 𝑃𝐵𝑅, 𝑃𝐵𝐻) according to a variety of the fractional guard channel policies with the fluctuations in values 𝜌. It can be seen in Figure 3, the value 𝜌, the traffic load, is definited by the expression 𝜌 = 𝑐 ⁄ . We have 𝑔 = 7, 𝑝 = 0.5, 𝑟 = 2.3 (for the LAFGC policy), 𝐿 = 8, 𝜃 = 0.5, 𝜃′ = 0.5, 𝐹 = 2 𝐻, 𝜌 ranging from 0.3 to 1.9. We find that the blocking probabilities for the LFGC and LAFGC policies are better than the blocking probabilities for the UFGC and QUFGC policies.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 92 Figure 3. The blocking probability of 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 and 𝑃𝐵𝐻by 𝜌. This may partly explain that the UFGC and QUFGC policies permit the fresh calls with 𝛽𝑖 = 1 or 𝛽𝑖 = 𝑝(0 ≤ 𝑖 < 𝑐). As a result, the fresh calls are easier to enter the system, and the handover calls are significantly restricted. In the meanwhile, the LFGC and LAFGC policies control the fresh calls with 𝛽𝑖 = 0 (0 < 𝐿 ≤ 𝑖 < 𝑐, 𝐿: a particular parameter) at some of the last states with 𝑖 ≥ 𝐿. 3.2. Analysing and comparing the blocking probabilities with values𝒈 With 𝜌 = 0.7, 𝑝 = 0.5, 𝐿 = 8, 𝜃 = 0.5, 𝜃′ = 0.5, 𝐹 = 2 𝐻, 𝑔 ranging from 1 to 7, we obtain the results as presented in Figure 4. 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.3 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9 PB r UFGC PB_F PB_R PB_H 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 0.3 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9 PB r LFGC PB_F PB_R PB_H 0 0.1 0.2 0.3 0.4 0.5 0.6 1 2 3 4 5 6 7 PB g UFGC PB_F PB_R PB_H 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.3 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9 PB r QUFGC PB_F PB_R PB_H 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 0.3 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9 PB r LAFGC PB_F PB_R PB_H 0 0.1 0.2 0.3 0.4 0.5 0.6 1 2 3 4 5 6 7 PB g QUFGC PB_F PB_R PB_H
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 93 Figure 4. The blocking probability of 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 , and 𝑃𝐵𝐻by 𝑔. When we change values 𝑔, the probabilities 𝑃𝐵𝐹 and 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 for the QUFGC policy decrease inversely proportional to values 𝑔, and the probabilities 𝑃𝐵𝐻 for the QUFGC, UFGC, LFGC and LAFGC policies remain steady and thus we need to choose an appropriate value 𝑔 for the low blocking probabilities 𝑃𝐵𝐻. The UFGC policy has the probabilities 𝑃𝐵𝐹 and 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 which maintain stable due to 𝛽𝑖 = 𝑝(0 ≤ 𝑖 < 𝑐). Similar to the QUFGC policy, the probabilities 𝑃𝐵𝐹 and 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 for the LFGC and LAFGC policies significantly decline because the numbers of the accepted channels for the fresh and retrial calls gradually increase. 3.2. Analysing and Comparing the Blocking Probabilities with Values 𝑳 With 𝜌 = 0.7, 𝑔 = 7, 𝑝 = 0.5, 𝑟 = 2.3 (for the LAFGC policy), 𝜃 = 0.5, 𝜃′ = 0.5, 𝐹 = 2 𝐻, 𝐿 ranging from 1 to 8, we obtain the results presented in Figure 5. Figure 5. The blocking probability of 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 , and 𝑃𝐵𝐻by 𝐿. The blocking probabilities 𝑃𝐵𝐹 and 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 are influenced by the number of the maximum customers in the orbit 𝐿 when 𝐿 < 4 as Figure 5. When 𝐿 ≥ 4 these probalities are almost 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 1 2 3 4 5 6 7 PB g LFGC PB_F PB_R PB_H 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 1 2 3 4 5 6 7 8 PB L LFGC PB_F PB_R PB_H 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 1 2 3 4 5 6 7 PB g LAFGC PB_F PB_R PB_H 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 1 2 3 4 5 6 7 8 PB L LAFGC PB_F PB_R PB_H
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 94 steady. While the blocking probabilities 𝑃𝐵𝐻 are not affected regardless of the value 𝐿. This can be explained that the number of the servers is fixed, the more the customers in the orbit are, the more blocked the system is. For this reason, we can approximate to the infinite model with 𝐿 → +∞. 3.3. Analysing and comparing the blocking probabilities with values 𝒑 With 𝜌 = 0.7, 𝑔 = 7, 𝑝 = 0.5, 𝐿 = 8, 𝑟 = 2.3 (for the LAFGC policy), 𝜃 = 0.5, 𝜃′ = 0.5, 𝐹 = 2 𝐻, 𝑝 ranging from 0.1 to 1, we obtain the results as listed in Figure 6. Figure 6. The blocking probability of 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 , and 𝑃𝐵𝐻by 𝑝. We found/find that the accepted probabilities of the fresh calls 𝑝 influence on how the congestions of the fresh and retrial calls are. In these analyses, the blocking probabilities of the fresh calls for the UFGC and QUFGC policies are better than the ones for the LFGC and LAFGC policies due to the fact that the the probabilities 𝛽𝑖(0 ≤ 𝑖 ≤ 𝑐) for the LFGC and LAFGC policies have more the values 𝑝 than the ones for the UFGC and QUFGC policies. As a result, the fresh and retrial calls ease to enters the system for the LFGC and LAFGC policies. 3.4. Analysing and comparing the blocking probabilities with values 𝝀𝑯 𝝀𝑭 ⁄ With 𝜌 = 0.7, 𝑔 = 7, 𝐿 = 8, 𝑝 = 0.5, 𝜃 = 0.5, 𝜃′ = 0.5, 𝐻 𝐹 ⁄ ranging from 1 5 ⁄ to 5, we obtain the results as shown in Figure 7. 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 PB p UFGC PB_F PB_R PB_H 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 PB p LFGC PB_F PB_R PB_H 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 PB p QUFGC PB_F PB_R PB_H 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 PB p LAFGC PB_F PB_R PB_H
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 95 Figure 7. The blocking probability of 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 , and 𝑃𝐵𝐻by 𝐻 𝐹 ⁄ . We find that if the ratio 𝐻 𝐹 ⁄ < 1/3, the probabilities 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟 and 𝑃𝐵𝐻 are changed, but if the ratio 𝐻 𝐹 ⁄ ≥ 1/3, the probabilities 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟 and 𝑃𝐵𝐻 remain almost unchanged. Therefore, we choose the ratio 𝐻 𝐹 ⁄ ≥ 1/3 to maintain the stability of the system. 3.5. Analysing and comparing the blocking probabilities with values 𝜽 With 𝜌 = 0.7, 𝑔 = 7, 𝐿 = 8, 𝑝 = 0.5, 𝑟 = 2.3 (for the LAFGC policy), 𝜃′ = 0.5, 𝐹 = 2 𝐻, 𝜃 ranging from 0.1 to 1, we gain the results as presented in Figure 8. 0 0.1 0.2 0.3 0.4 0.5 0.6 1/5 1/4 1/3 1/2 1 2 3 4 5 PB H/ F UFGC PB_F PB_R PB_H 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 1/5 1/4 1/3 1/2 1 2 3 4 5 PB H/ F LFGC PB_F PB_R PB_H 0 0.1 0.2 0.3 0.4 0.5 0.6 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 PB q UFGC PB_F PB_R PB_H 0 0.05 0.1 0.15 0.2 0.25 0.3 1/5 1/4 1/3 1/2 1 2 3 4 5 PB H/ F QUFGC PB_F PB_R PB_H 0 0.05 0.1 0.15 0.2 0.25 0.3 1/5 1/4 1/3 1/2 1 2 3 4 5 PB H/ F LAFGC PB_F PB_R PB_H 0 0.05 0.1 0.15 0.2 0.25 0.3 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 PB q QUFGC PB_F PB_R PB_H
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 96 Figure 8. The blocking probability of 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 , and 𝑃𝐵𝐻by 𝜃. The parameter 𝜃 gives the influence on the blocking probabilities of the retrial calls rather than the ones of the fresh calls. This can be explained that the probabilities that a fresh call first enters the orbit increase resulting in a numerous number of the customers in the the orbit, and the blocking probabilities of the retrial calls will raise. In the meantime, the probabilities of the handover calls remain almost unchanged. In these analyses, we find that the parameters ∈ (0.2 − 𝜀, 0.2 + 𝜀), with 𝜀 ≥ 0 is a arbitrarily small real. The system performances are optimized by the given parameters. 3.6. Analysing and comparing the blocking probabilities with values𝜽′ With 𝜌 = 0.7, 𝑔 = 7, 𝐿 = 8, 𝑝 = 0.5, 𝑟 = 2.3 (for the LAFGC policy), 𝜃 = 0.5, 𝐹 = 2 𝐻, 𝜃′ ranging from 0.1 to 1, we obtain the results as presented Figure 9. Figure 9. The blocking probability of 𝑃𝐵𝐹, 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 , and 𝑃𝐵𝐻by 𝜃′. When taking into account the increase in the retrial probabilities 𝜃′(0.1 ≤ 𝜃′ ≤ 0.9), the blocking probabilities 𝑃𝐵𝐹,𝑟 are declined. Then the retrial calls re-enter the orbit to attempt the 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 PB q LFGC PB_F PB_R PB_H 0 0.1 0.2 0.3 0.4 0.5 0.6 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 PB q' UFGC PB_F PB_R PB_H 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 PB q' LFGC PB_F PB_R PB_H 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 PB q LAFGC PB_F PB_R PB_H 0 0.05 0.1 0.15 0.2 0.25 0.3 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 PB q' QUFGC PB_F PB_R PB_H 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 PB q' LAFGC PB_F PB_R PB_H
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 97 next occasions. On the contrary, the blocking probabilities 𝑃𝐵𝐹 and 𝑃𝐵𝐻 are slightly affected. As the results ofinFigure 9, when the parameter 𝜃′ tends to the asymptotic value of 1, the blocking probabilities 𝑃𝐵𝐹,𝑟 almost optimize the certain performances. (a) (b) Figure 10. The blocking probability of 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 (a) and 𝑃𝐵𝐻(b) among LAFGC, LFGC, QUFGC and UFGC We find that the blocking probabilities 𝑃𝐵𝐹,𝑟𝑒𝑡𝑟𝑖𝑎𝑙 and 𝑃𝐵𝐻 of LAFGC and LFGC are almost equivalent (Figure 10). Also, the blocking probabilities 𝑃𝐵𝐻 of QUFGC and UFGC are approximately equal, yet the blocking probabilities 𝑃𝐵𝐹,𝑟 of QUFGC are better than those of UFGC. This is explained that the accepted probabilities 𝛽𝑖 of QUFGC are 1 at some initial states. 0 0,1 0,2 0,3 0,4 0,5 0,6 0,7 0,8 0,9 1 0,3 0,5 0,7 0,9 1,1 1,3 1,5 1,7 1,9 PB F,retrial r LAFGC LFGC QUFGC UFGC 0 0,05 0,1 0,15 0,2 0,25 0,3 0,35 0,4 0,45 0,3 0,5 0,7 0,9 1,1 1,3 1,5 1,7 1,9 PB H r LAFGC LFGC QUFGC UFGC
  • 14. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 98 Figure 11. The blocking probability of 𝑃𝐵𝐹 between in [7] and the article. According to figures extracted from [7] (of Do Van Tien) with 𝐿 = 𝑐 − 1, 𝛽 = 0, 𝑐 = 15, = 1 120 , = 20 , 𝐹 = 24 𝐻, we ascertain that the probabilties of 𝑃𝐵𝐹 in the article are superior to those of [7]. The disparity is that the further value 𝜃′ can be varied, depending on users’s adjustments and playing a signal role in reducing the possibilities of obstructing the fresh calls. 4. CONCLUSIONS We have introduced the retrial queueing model in the cellular mobile network using the fractional guard channel policy with impatient customers according to the probabilities θ and θ'. The advantage of the model is the significant decrease of the blocking probabilities for the fresh and retrial calls as well as the support of the network operation to maintain the stability of QoS under the influences on the network traffic and additional factors. The generality in the model is weighed by choosing the retrial queueing model in combination with the fractional guard channel policies. The analysis results are simple and guarantee the low blocking probabilities of the handover calls for the fractional guard channel policy in compassion to the blocking probabilities of the guard channel policy. In addition, the retrial queueing model with the fractional guard channel policy in the cellular mobile network can be used for the criteria of the different network traffics to measure the performances. The corollaries elucidate that the model is appropriate and precise. Besides, the research considers a variety of the fractional guard channel policies, including the UFGC, QUFGC, LFGC, and LAFGC policies, to fall the blocking probabilities of the fresh calls, but they still guarantee the handover calls protected with the call admission control. CONFLICTS OF INTEREST The authors declare no conflict of interest. 0 0,02 0,04 0,06 0,08 0,1 0,12 0,14 0,16 0,18 0,2 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 PB F r LFGC Do V Tien This article
  • 15. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 99 REFERENCES [1] Mandles M. and Tutschku K., (1996). Efficient Call Handling Procedures in Cellular Mobile Networks.Forschungsbericht, Preprint-Reihe 144, Institut fur Informatik, Universitat Wurzburg, Germany. [2] Tran-Gia P. and Mandles M., (1997). Modeling of Customer Retrial Phenomenon in Cellular Mobile Networks.IEEE Journal on Selected Areas in Communications, 15(8), pp. 1406-1414. [3] Do T. V. (2010). A new computational algorithm for retrial queues to cellular mobile systems with guard channels. Computers & Industrial Engineering, 59(4), pp. 865–872. [4] Linda A. C. and Ani C. I. (2014). A Reservation and Retrial Queue Analysis for Cellular Networks.International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 3 Issue 2, February – 2014 [5] Bhargava A., Bhagat A. and Singh J., (2016). Modelling and Performance Analysis of Cellular Mobile Networks.Indian Journal of Science and Technology, Vol 9 (48), December 2016. [6] Vazquez-Avila J., Cruz-Pérez F.A. and Ortigoza-Guerrero L., (2006). Performance Analysis of Fractional Guard Channel Policies in Mobile Cellular Networks.IEEE Transactions on Wireless Communications, 5 (2006), pp. 301-305. [7] Do T. V. (2011). Solution for A Retrial Queueing Problem in Cellular Networks with the Fractional Guard Channel Policy.Mathematical and Computer Modelling, 53(11–12), pp. 2058-2065. [8] Ramjee R., Towsley D. and Nagarajan R., (1997). On Optimal Call Admission Control in Cellular Networks.Wireless Network, 3(1), March 1997. [9] Neuts M.F. (1981). Matrix Geometric Solutions in Stochastic Model, Johns Hopkins University Press, Baltimore. [10] Tien Van Do, Ram Chakka, An efficient method to compute the rate matrix for retrial queues with large number of servers, Applied Mathematics Letters 23, (2010) 638-643. [11] Tien, D.V. (2013). An Enhanced Algorithm to Solve Multiserver Retrial Queueing Systems with Impatient Customer. Computers & Industrial Engineering, Vol 65, No 4, pp. 719-728. [12] Kulshrestha R, Agarwal A, Shruti (2019). An adaptive fractional guard channel based CAC scheme for heterogeneous traffic in wireless cellular networks. In: Proceedings of IEEE 6th international conference in computing for sustainable global development, Delhi, India, pp 1066–1070. [13] Do T.V. (2010). An Efficient Computation Algorithm for A Multiserver Feedback retrial Queue With A Large Queueing Capacity, Applied Mathematical Modelling, 34(8), pp. 2272-2278. [14] https://www.wolfram.com/mathematica/
  • 16. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.4, July 2021 100 AUTHORS Dang Thanh Chuong obtained his doctorate in Mathematical Foundation for Computers and Computing Systems in 2014 from the Institute of Information Technology, Vietnam Academy of Science and Technology (VAST). He has published over 20 research papers. His research interests are in the fields of all-optical networks with emphasis on packet/burst-based switching, Contention Resolution, and Quality of Service; Queueing Theory and Retrial Queue. Email: dtchuong@hueuni.edu.vn. Hoa Ly Cuong procuring MSc in Computer Science in 2017 from the Hue University of Science, Hue University. The areas he has engaged in comprise Queueing Theory and Wireless Networks. Email: hlcuong90@gmail.com. Pham TrungDuc In 2010, he graduated with a Bachelor of Information Technology from University of Sciences, Hue University. In 2012, he received a Master's degree in Computer Science from Hue University of Sciences. Currently, he is a PhD student at Hue University of Sciences, Hue University (from December 2016 to the present). Research fields: OBS network, QoS differentiation, scheduling admission control, QoS improvement, QoS provisioning. Email: phamtrungduc@hueuni.edu.vn Duong Duc Hung is a Technical Editor at the HU Journal of Science, Hue University, Vietnam. His main research topics are Computer Networks and Communications; Text Mining. Email: ddhung@hueuni.edu.vn