1 Introduction

Networks with diverse access technologies which can deliver a service using a cellular access network and capable of keeping the service when switching to another WiFi access network is called a wireless access networks [40]. The rapid increase in the use of wireless devices results in numerous challenges for wireless access networks design and implementation. Also, the various types of network applications produce different traffic types. Each application generates traffic with different characteristics which leads to different types of traffic in the network. Some applications generate traffic with fixed rate like voice calls; others like video streaming and web browsing generate traffic with variable rate. Applications like files transferring generate traffic with different burst size. These challenges should be considered in the design of the new generation of wireless access networks due to the constraints on the delay and bandwidth requirements for different network applications [7, 11, 13, 30]. The third Generation Partnership Project (3GPP) presented the LTE characteristics [29], the novel optimized architecture for the radio access and the core networks. Many solutions have been proposed to handle these demands such as, offloading to other access networks like macrocell, microcell, picocell, femtocell and Wi-Fi hotspot. Using complementary access technologies for delivering data to mobile users in cellular network is called offloading. Offloading reduces the time of a user to be served by cellular technology and hence frees band to other users and reduces the cost of downloading data. The most significant solution is offloading to WiFi access points due to their spreading in most smartphones and deployment in wide locations. Also WiFi networks have a lower cost for both users and operators [7, 18, 37]. Through this paper we evaluate the influence of offloading to WiFi access networks under different types of application characteristics on the efficiency of the wireless access networks. The rest of paper is organized as follows. In Sect. 2, we present the related studies to this research problem. Section 3 shows the simulation model for the integration of multiple wireless access networks. Section 4 presents the analytical performance model for wireless access networks. Through section 5 we present the discrete event simulation results of the presented model. Section 6 concludes our results.

2 Related Work

The rapid increase in the use of wireless devices leads to a large variation of the network application demands [7]. The target of building the fifth generation access network is to support heterogeneity with multi radio access technology and various options to the users [14] and [37]. Gerhard et al. [41] investigated the performance of the physical and MAC layers of LTE cellular networks with a large class of scheduling policies. They presented a formula for user transmission rate as a function of channel conditions. Also they assumed that each user has an input queue with unlimited buffer size at the MAC layer. Using independent Poisson arrival processes they introduced an approach to get the upper bounds on all polynomial moments of the queue backlog and exponential tail bounds on the tail probability. Hussam et al. [2] introduced a resource allocation scheme for downlink LTE cellular network using queuing theory based on the channel quality information. They considered the channel quality information reporting modes in LTE where the subscriber only report the indices of their best sub bands and an actual channel quality information corresponding to the best sub bands. In Richard et al. [8] studied the problem of self-organized relays in a cellular network. They derived an optimal static closed form solution for resource sharing between base stations, relay stations links and users using Markov decision process. The influence of key system parameters has been investigated, showing the importance of relaying gain. The resources are allocated dynamically considering the stability for infinite buffers and blocking rate, also file transfer time in the presence of admission control. Wang et al. [16] introduced a scheduling scheme for the LTE cellular networks which allocates resources to users based on the queue length and the overflow probability. The model can be used for inelastic traffic and is compatible with 3GPP LTE systems. They used a discrete-time Markov-modulated Poisson process to model each user flow arrival at the queue input. They adjust the allocated bandwidth adaptively according to the average queue length and buffer overflow probabilities. Narcisse et al. [27] introduced a model with process sharing queue model for cellular LTE networks with Poisson arrival process and a round robin scheduling discipline. They studied the performance of LTE networks with different transmission zones that takes into account mobility of users between zones. Their model is based on a multiclass process sharing queue which captures mobility of users between zones through the distribution of the sojourn time a user physically stays in each zone. They assumed round robin scheduler, so resources are shared equally among active users regardless of the user’s location. Kehindeet al. [28] introduced an analytical model for estimating the LTE-based public safety network capacity for voice communications. They used a Markov birth and death process to model the network. They calculated the minimum number of channels required for different levels of users priority to achieve the grade of service. Dima et al. [9] introduced a traffic model for LTE cellular networks which considers different realistic parameters that can be used for LTE network planning and optimization. They generate the traffic profile of each eNodeB in LTE cellular network as a function of a variety of metrics such as signaling, bandwidth, busy hour session attempts and number of bearers, then they planned the LTE cellular network using 15 eNodeB. Konstantin et al. introduced in [32] a multiple servers queuing systems to analyze the subscribers blocking probability in LTE cellular network with a limited amount of resources. They derived a mathematical model for resources allocation in LTE-A cellular networks, evaluated blocking probability and average amount of occupied resources. They assumed that the subscribers arrive according to the Poisson process with rate \(\lambda\) and stay in server an amount of time independent of their arriving process and are exponentially distributed with rate \(\mu .\) In [6] Naila et al. studied the behavior of the LTE cellular network MAC scheduler and evaluate its performance using discrete time Markov chains. The authors considered two types of traffic according to soap project, the first one is real time traffic like voice and video and the other is non-real time like FTP and HTTP applications. They used lognormal and exponential distributions for the video applications, also they model voice traffic using ON/OFF traffic model with exponential distribution for the silence and active periods with deterministic packet size and inter-arrival time. Spaey et al. [33] introduced an analytical model to study LTE cellular network time varying capacity and its influence on the admission control algorithm with no quality of service differentiation. Tony in [39] addresses the dilemma of the resource sharing by introducing a scheduling algorithm using Markov decision approach and quality of service aware. The algorithm is two-level scheduling to optimize the resource allocation and estate the amount of data sent by the traffic source. Richard et al. [25] studied the performance of the MAC performance of the LTE cellular network using cross-layer algorithm for resource optimization. The algorithm is based on queueing theory and its parameters are transmission rate, packets waiting time in the queue and the size of the queue at the MAC layer. The authors presented a closed form of the previous metrics to evaluate the performance of the algorithm by calculating the bandwidth utility. Also they use ON/OFF traffic source to generate voice data. Xi Li et al. [42] developed a model to assess the performance of the LTE cellular networks. The authors presented a mathematical model for resource scheduling in LTE networks based on a Markov chain. Each state in the Markov chain represents the total number of subscribers associated to one MCS (Modulation and Coding Scheme). They studied the behavior of the network using two different scenarios. In the first scenario they assumed a single service class and no quality of service. In the second class they considered one quality of service class and two non-guaranteed service classes. They validated the model using fixed file size and calculated the completion time for file download under different scenarios. Li et al. [22] introduced a model for bandwidth dimensioning in LTE cellular network for S1-U interface. The authors presented the model for the elastic traffic and they used the M/G/R-PS process sharing queueing model to analyze the behavior of the system. Their main targets were the bandwidth and network delay. In [21] authors used the same previous model [22] to measure the bandwidth of the eNB required to be handled by the inbound and outbound interfaces to carry elastic traffic given the amount of traffic and the number of users in the cell. The process sharing model M/G/R-PS was discussed in [23]; where it is used for dimensioning cellular networks as well as ADSL networks. A selection mechanism called common radio resource management was presented in [36, 38] to select the used technology based on subscriber needs and the available resources between the sets of available technologies. Most of the previous studies didn’t consider the network status to get the decision of the handover, they only depend on the received signal strength. The enormous data traffic in mobile networks forces the operators and users to use WiFi offloading to handle this huge traffic. The offloading techniques in previous studies were divided into two strategies, the first one lets the users free to choose the suitable technology for them. In the second strategy, the function of choosing the network technology is selected based on the operator point of view. In [1, 18, and 29], they introduced the 3GPP release11 to assist user in choosing the best WiFi network. The authors in [20] demonstrated by measurements that the WiFi offloading reduces the cellular network congestion. The author in [35] conducted a survey to estimate the mean user time spent in waiting YouTube stream and downloading a file, they found out that the user can stays ”10” minutes for YouTube streaming and three to five hours waiting to download a file for the half of the set used in their study. Many studies as in [3, 10, 15, 31] have been conducted to evaluate the impact of offloading to WiFi access point from the cost side by decreasing the volume of data used by mobile network and its efficiency related to using femto cell. Also some studies [19, 20, 35] have considered the offloading to WiFi network for only decreasing the usage of mobile networks without taking into account the quality, needs and traffic types. In our proposed study we consider the needs of users through the received throughput and we also take into consideration the application traffic types. We study the behavior of the diverse wireless access networks with three types of application traffic, contentious (fixed size) and sporadic (exponential and Pareto). Also we consider the throughput metric when offloading to different traffic types.

3 Wireless Access Networks Architecture

An access wireless network which offers switching from one access network to another is named a wireless heterogeneous access network [17, 40]. The main architecture of the heterogeneous access network is assumed as shown in Fig. 1 where the topology of the network consists of five zones. All zones are fully covered by LTE cellular network technology. Each zone is also partially covered by WiFi technology. The subscribers connected to WiFi access points start their requests using WiFi technology because of their low cost. During the subscriber downloading sojourn time through WiFi network, he can move to LTE technology if the WiFi technology do not satisfy his needs. As illustrated in the flow chart in Fig. 2 which shows the activities of the user from the start of data request until the request completes. In both cases the subscribers start connecting with the strongest signal. For WiFi technology, the user connects to the closest access point and for LTE technology, he connects to the cell which have the best RSRP (Reference Signal Received Power) [4]. The handover between the cells in LTE technology is performed based on RSRQ (Reference Signal Received Quality) as in Fig. 3 where the handover can occur according to the available throughput. The parameter setting of each technology and traffic characteristics are presented in Tables 1, 2 and 3. The five zones are covered by five evolved nodesB (eNB). We trigger the traffic requests in the middle cell by a heavy traffic while the edge cells are triggered by normal load to study the impact of handover among the LTE cells. The users are uniformly distributed over the five zones. We assess the performance metrics (accumulative throughput, aggregated cell throughput, end to end delay, loss and Jitter) to evaluate the whole network behavior.

Fig. 1
figure 1

Heterogeneous access network topology consisting of five zones

Fig. 2
figure 2

User activities from the start of data request until the request completes

Fig. 3
figure 3

Handover based throughput flow chart

Table 1 LTE Parameters Setting
Table 2 WiFi Parameters Setting
Table 3 General Parameters Setting

4 The Analytical Performance Model

Most of the mobile internet traffic comes from transferring web pages, video and audio streaming, downloading video and audio files; each of them needs a different duration to reach its destination according to the status of the network congestion and the available resources. Most of the traffic inside the mobile network can be considered as a sequence of requests that can be modeled as a flow of bursts. The request rate of each user is highly depends on the network technology type, channel conditions and the set of active users competing for the network resources. In the WiFi technology, the downloading rate of a user decreases exponentially as the number of users in the network increases and also depends on the channel quality and user distance from the access point. We consider the stream of requests as a flow of a constant or sporadic bursts through the mobile network. We use the Processor-Sharing Queue (PSQ) model where all resources shared by the set of active users equally likely as the basis of the analytical model of the wireless access network [23, 26]. We consider the continuous and sporadic arrivals as inputs for the PSQ model and finally derive an estimate of the delay and request loss probability for any general matrix exponential distribution. In all cases, we assume that all available transmitting resources have a maximum capacity of ”R” bit/s.

4.1 Continuous Arrival

In the first case, we consider the continuous arrival requests with \(\lambda\) as the average requests arrival rate and ”S” as the mean request size. The total request size by each subscriber can be given by \(S_{t} = \lambda S\) in packets, and the network load utilization is ”U” \(= S_{t}/R\). Using process sharing queue model where all users equally share the available network resources so that each user can download with a rate depends on the number of active users. This rate can be obtained by dividing the total capacity by the average number of active users ”R/x”. Assume that ”x” is the number of active wireless devices each one requests data from an access point or eNB. The size of data is exponentially distributed and we assume that the service time is exponentially distributed. So, the overall system network can be modeled as M/M/1 processor sharing queue. So the stationary distribution probability of the simultaneous users can be obtained from the following equation [24]:

$$\begin{aligned} \pi (x)=\pi (0)U^{x}, \quad For \quad x=0,1,2..... \end{aligned}$$
(1)

where \(\pi (x)\) is the probability that there are ”x” simultaneous active devices in the network. And the average number of simultaneous users can be calculated by:

$$\begin{aligned} {\bar{x}}=\frac{U}{1-U}. \quad \end{aligned}$$
(2)

where ”U” is the load utilization of the network.

In case that there is no restriction on the number of simultaneous users as in WiFi technology the average delay is well known and can be derived from Little’s Law as in [24]:

$$\begin{aligned} MPD=\frac{{\bar{x}}}{\lambda *S}=\frac{1}{(R(1-U))}. \end{aligned}$$
(3)

where \({\bar{x}}\) come from equation 2, \(\lambda\) is the user arrival rate, S is the total size of requests.

If the number of simultaneous users is restricted as in LTE technology to some value ”M” greater than 1, the states of stationary distribution will be limited to ”M”. The average delay can be obtained as follows [24]:

$$\begin{aligned} MPD=\frac{x}{\lambda (1-P_{B})s}=\frac{1-(M+1)P_{B}}{(R(1-U))}. \end{aligned}$$
(4)

where \(P_{B}\) is the blockage probability, ”M” is the number of users that can be served simultaneously. The blockage probability can be obtained as follow [24]:

$$\begin{aligned} P_{B}=\frac{U^{M}}{1+U+U^{2}+....+U^{M}}. \end{aligned}$$
(5)

where ”U” is the load utilization of the network.

4.2 Sporadic Arrival

In the sporadic arrival case, we consider first the traffic that can be modeled by the exponential distribution for both the active and inactive periods. Consider ”N” as the number of active users. Each user is active for a random period of time then quite in the next time period for a random duration. During the active period the user requests a flow where the flow size is independent, exponentially distributed with mean ”S” inactive period durations are independent, exponentially distributed with mean 1/OFF. Then the total traffic load of a single subscriber can be calculated as \(S_{T}= OFF*S\). So the load per subscriber can be given as \(\alpha\) =\(S_{T}\)/R, and the utilization of the network by \(U = N\alpha\). Now assume we have one access point or one eNB and a constant number of connected wireless devices. The resources are equally shared among the devices and this can be modeled by process sharing queueing model. Each device requests a file to download then goes to the inactive state waiting. The inactive state can be modeled as \(./M/\infty\) queue. The network can be modeled as a closed queuing network that consists of two queues, an ./M/1 processor-sharing queue and an \(./M/\infty\) queue, with N customer as in Fig. 4. Then the states of stationary probability becomes [24]:

$$\begin{aligned} \pi (x)=\pi (0)\frac{N!}{(N-x)!} \alpha ^{x} \quad .....=0,1....N. \end{aligned}$$
(6)

where \(\pi (x)\) is the stationary distribution probability of exiting x users in the system and ”N” is the total number of active users in the network. For \(\lambda\) the arrival rate is given by:

$$\begin{aligned} \lambda = \frac{R}{S} (1-\pi (0)). \end{aligned}$$
(7)

where R is the capacity of the network and S is the mean request size. In case of no restriction on the number of simultaneous users as in the WiFi technology the average delay can be derived from little’s law [24]:

$$\begin{aligned} MPD=\frac{{\bar{x}}}{\lambda S}=\left(\frac{1}{R}\right) \frac{\sum _{x=1}^{x=N} x\frac{N!}{(N-x)!} \alpha ^{x}}{\sum _{x=1}^{x=N} \frac{N!}{(N-x)!} \alpha ^{x}}. \end{aligned}$$
(8)

where \({\bar{x}}\) come from equation 2, S is the mean request size, \(\alpha\) is the load for each wireless device and N is the number of wireless devices.

Fig. 4
figure 4

The Process Sharing Queueing (PSQ) model

In case of restricted number of simultaneous users as in LTE technology to some constant ”M” lesser than ”N” in each eNB then the average delay will be [24]:

$$\begin{aligned} MPD=\frac{{\bar{x}}}{\lambda S}=\left(\frac{1}{R}\right) \frac{\sum _{x=1}^{x=M} x\frac{N!}{(N-x)!} \alpha ^{x}}{\sum _{x=1}^{x=M} \frac{N!}{(N-x)!} \alpha ^{x}}. \end{aligned}$$
(9)

where ”M” is the number of users that can be served simultaneously.

\(P_{B}\) is the blockage probability and can be derived from as follow [24] :

$$\begin{aligned} P_{B}=\frac{\frac{(K-1)!}{(K-1-M)!} \alpha ^{M}}{1+U+U^{2}+....+\frac{(K-1)!}{(K-1-M)!} \alpha ^{M}}. \end{aligned}$$
(10)

where U is load utilization of the network and N is the total number of connected wireless devices.

In the above equations, we modeled the network performance metrics for specific cases of sporadic arrival, the contentious case (the burst degree is zero) and the exponentially ON/OFF case (as a well behaved traffic). Now we modify the model to accept any general sporadic traffic arrival distribution using the matrix exponential distribution approach as in Fig. 5. Therefore, we introduce the ME representation of the Truncated Power tail (TPT) distribution by ME function representation. In this approach, each distribution can be represented by two matrices P and B [24]. The reliability function of TPT distributions is:

$$\begin{aligned} R(x):= \frac{1-\theta }{ 1-\theta ^ T} \sum _{j=0}^{T-1} \theta ^j \exp {\frac{ -\mu x}{\lambda ^j}} \end{aligned}$$
(11)

The variable \(\theta\) can be chosen from the rang \(0<\theta <1\). For larger values of \(\theta\), more phases (T) are necessary to obtain the same heavy tailed characteristics as for lower \(\theta\). By controlling The truncation phase parameter ”T”, we can control the traffic type, for example when ”T=1”, it represents the exponential distribution and as ”T” increases the tail increases (Pareto distribution) and the traffic will be heavy tailed. By using ME approach, the arrival process can be modeled as a network of states (called phases) with exponentially distributed interevent times. Any distribution can be approximated closely by using this approach [24]. Then the representation of arrival process can be defined by two matrices. As in [34] the generator matrix \(Q_{N}\) and the rate matrix \(L_{N}\) for any number of wireless devices N are defined as follows:

$$\begin{aligned} Q_{N}= \left[ \begin{array}{ccccc} z_{0} &{} x_{0} &{} &{} &{} \\ y_{1} &{} z_{1} &{} x_{1} &{} &{} \\ .. &{} .. &{} .. &{} .. &{} .. \\ &{} &{} Y_{n-1} &{} z_{N-1} &{} x_{N-1}\\ &{} &{} &{} y_{N} &{} z_{N} \end{array} \right] \end{aligned}$$
(12)
  • where \(X_{i}= \mu (i) I^{\oplus i} \otimes P\).

  • \(where \quad i=1 ...N-1\)

  • \(y_{i}= (B \epsilon )^{\oplus i}\).

  • \(where \quad i=1,...N\)

  • \(z_{i}= (-B)^{\oplus i} - \mu (i) I^{\oplus i}\).

  • \(where \quad i=1,...N\)

where B an P are the matrix exponential representation of the active period distribution, \(\mu\) is the request rate, I is the identity matrix and \(\epsilon\) is unity vector. The request rate \(\mu\) is not a constant but it depends on the number of active users. Note that the main diagonal blocks \(Z_{i}\) of \(Q_{N}\) are quadratic but with growing dimension for the i active sources. Consequently the other two diagonals contain non-quadratic matrices \(X_{i}\) and \(Y_{i}\). The rate matrix L is: \(L_{N}=\left[ \begin{array}{ccccc} 0 &{} &{} &{} &{} \\ &{} R_{p}I &{} &{} &{} \\ &{} &{} 2R_{p}I^{\oplus 2} &{} &{} \\ &{} &{} &{} &{} \\ &{} &{} &{} &{} NR_{p}I^{\oplus N} \end{array} \right]\) where \(R_{p}\) is the peak transmission rate during active period and I is the identity matrix. The stationary distribution vector \(\pi\) can be partitioned in N+1 sub vectors according to the blocks in \(Q_{N}\):

\(\pi ={\pi _{0}, \pi _{1}, .....\pi _{N} }\)

Fig. 5
figure 5

The N-burst Traffic Model

That can be computed by the following iterative approach.

$$\begin{aligned}&\pi _{0} = \left[ {\varSigma }_{i=0}^{N}\frac{(\mu (i){\bar{x}})^{i}}{i!}\right] ^{-1}. \end{aligned}$$
(13)
$$\begin{aligned}&\pi _{i} = \mu (i-1)(\pi _{i-1} \otimes P)(B^{\oplus i})^{-1}. i=1.....N \end{aligned}$$
(14)

Then we can treat the system as SM/M/1 queue. the SM/M/1 queue is considered as a Quasi-Birth-Death Process. By calculating the matrix R using the cyclic reduction algorithm [34]. The number of iterations is determined by the speed of convergence of \(R_{K} \rightarrow 0\), if the eigenvalues of R are close to 1 then the case for heavy-tailed N-burst approaches the blow-up region.

\(A_{0} + RA_{1} +R^{2}A_{2}=0\) where: \(A_{0}= L ,\quad A_{1}=-(B+vI) \quad , A_{2}=vI \quad and \quad B=Q+L;\)

Then we can calculate the average delay.

$$\begin{aligned} MPD= \frac{1}{A_{T}}R{(I-R)^{-1}} {\overline{\epsilon }} \quad \end{aligned}$$
(15)

Also we can get the blockage probability in case of M queue size as follows [24]:

$$\begin{aligned} P_{B}= \frac{1}{A_{T}\pi {(R^{M}}L){\bar{\epsilon }}}. \quad \end{aligned}$$
(16)

4.3 Hybrid Network Model with Handover

In this model, we consider the two technologies LTE and WiFi. Assuming that the bandwidth of each technology is equally shared between the active wireless devices. In both technologies the single user gets the full bandwidth of the network if he is alone in the network. Thus we can split our network to different areas according to the available resources in each region. A user in a specific area will get the full bandwidth, if he is alone in the coverage area. Each new user request has a probability ”P” to be initially downloading from one of the two technologies and ”1-P” probability to download from the other technology. We express the total time spent in a specific technology before handover to another neighboring one by \(\theta _{i}\) where i represents the technology. Also for the static user, the user can be handovered to another radio technology if the current one is not satisfying his needs (the throughput is less than threshold). The user request can complete in the initially downloading technology or some of the data is going to downloaded from a neighbor technology (handover). Users currently downloading from technology ”i” have a probability \(P_{i}\) to download from the other technology i+1. The sum of all neighbors’ handover probabilities is equal to one. Every user requests a burst of traffic to be downloaded from the access point or base station. The total amount of data downloaded from a particular technology per specific user depends on the spending time in each technology which depends on the service time of the technology and its status. We assume that the time spent in each technology is exponentially distributed random variable. The whole network can be seen as multi-class Processor Sharing queue (PSQ) model as Fig. 6. Each class in the model represents the available technology. Customers of each technology arrive to the queue according to sporadic arrival model explained earlier. We can consider the arrival request in each technology as the arrival to this technology in addition to the handover requests from the other technologies. Note that \(A_{wl}\) and \(A_{lw}\) are the average number of users handovered to the LTE technology and the average number of users handovered to WiFi technology respectively to complete their download (without finishing request). So the arrival rate of each technology can be given as:

$$\begin{aligned} \lambda _{w}=A_{w}+ A_{lw},\quad \lambda _{l}=A_{l}+ A_{wl}. \end{aligned}$$
(17)

where \(\lambda _{w}\) is the arrival rate at WiFi technology, \(\lambda _{l}\) is the arrival rate at LTE technology, \(A_{wl}\) and \(A_{lw}\) are the average number of users handover to the LTE technology and the average number of users handover to WiFi technology respectively. The service time in each technology can be assumed as above by dividing the total capacity over the total data handled by the technology:

$$\begin{aligned} \mu _{w}=R_{w} /D_{w} ,\quad \mu _{l}=R_{l}/D_{l}. \end{aligned}$$
(18)

where \(D_{w}\) and \(D_{l}\) are the total amount of data transferred by the active users in each WiFi and LTE technologies respectively, \(\mu\) and R are the service time and data rate of each technology respectively.

Fig. 6
figure 6

The Multi-class Process Sharing Queueing Model

Also we can compute the average number of arrival due to handover as follow:

$$\begin{aligned} A_{lw}=\lambda _{l}h_{w},\quad A_{wl}=\lambda _{w}h_{l}. \end{aligned}$$
(19)

where \(\lambda _{l}\) and \(\lambda _{l}\) are the arrival rate in each technology, \(h_{w}\) and \(h_{l}\) are the handover probability from WiFi technology and LTE technology respectively.

Then the average throughput of the user can be obtained from the standard result of multi-class processor sharing [5]:

$$\begin{aligned} \gamma _{w}=R_{w}(1-U);\quad \gamma _{l}=R_{l}(1-U). \end{aligned}$$
(20)

where \(\gamma _{w}\) and \(\gamma _{l}\) are the average throughput of WiFi and LTE technology respectively, \(R_{w}\) and \(R_{l}\) are the data rate of WiFi technology and LTe technology.

From the time spent in each technology we can get the handover users and the total amount of data transferred by each technology as follow [5]:

$$\begin{aligned}&D_{W}=\frac{\sigma \gamma _{w}}{\sigma \theta _{w} + \gamma _{w}};\quad h_{W}=\frac{\sigma \theta _{w}}{\sigma \gamma _{w} + \theta _{w}}; \end{aligned}$$
(21)
$$\begin{aligned}&D_{l}=\frac{\sigma \gamma _{l}}{\sigma \theta _{l} + \gamma _{l}};\quad h_{l}=\frac{\sigma \theta _{l}}{\sigma \gamma _{l} + \theta _{l}}; \end{aligned}$$
(22)

where the \(\sigma\) is total volume of data requested by the wireless devices and \(\theta\) is the time user spent downloading in each technology. From little’s law we can compute the average time spent by the user in both technologies as follows [5]:

$$\begin{aligned} {\bar{T}}_{t}=\frac{{\bar{Q}}_{w} +{\bar{Q}}_{l}}{A}. \end{aligned}$$
(23)

where \({\bar{Q}}_{w}\) and \({\bar{Q}}_{l}\) are the average numbers of active users in WiFi technology and LTE technology respectively.

We assume that the arrival at PSQ input is a combination of multiple sporadic sources (N=3 and N=4 as a case study) each one with a power tail active period distribution and exponential OFF period distribution, the integration of ”N” multiple exponential distributions with rate ”r” is Nr exponential distribution. Our queueing model is based on the (N-burst/M/1) PSQ model. For small values of ”b”, it can be approximated by a continuous arrival flow (the first case study) with rate NK while for large values of ”b” the arrival process model approaches the bulk arrival that leads to the worst performance of the network. Figure 7 presents the average packet delay as a function of burstiness parameter ”b”. From the figure it is clear that the delay increases significantly with the increase of the burstiness parameter ”b”, also the delay jumps to a large value at point (b = 0.1) and then starts to increase gradually. Even for the well behaved applications (modeled by the exponential distribution), the packet delay also increases with the increase of the burstiness parameter due to the effect of the burstiness and self-similarity. The more significant packet delay occurs for the applications which follow distributions with large tail. Figure 8 presents the blockage probability as a function of the burstiness parameter ”b”. The figure shows how the type of the traffic affects the behavior of the loss probability. Clearly the traffic with high variance (long tails) has significant loss probability than those with small variance (exponential distributions). Both figures show the significance of the model presented in this paper when compared to other models in the literature that use the exponential distribution for modeling the behavior of internet traffic. As our assumption of multiple users with ”N=3”, we have three jump points as in Fig. 7 for the delay and Fig. 8 for the blockage, but for multiple users the behavior of the delay will be more complex. The exact locations of the transitions points with multiple number of sporadic traffic can be given by the following equation:

$$\begin{aligned} b= 1 -\frac{K}{R_{p}}=1-\frac{\lambda }{NR_{p}} \end{aligned}$$
(24)

where b is the burst parameter and it ranges from 0 to 1, K is the arrival rate, N is the total connected devices and \(R_{p}\) is the peak transmission rate during active period.

Fig. 7
figure 7

The average packet delay as a function of traffic burstiness for exponential and power tail distributions

Fig. 8
figure 8

The blockage probability as a function of traffic burstiness for exponential and power tail distributions

5 Simulations Results

First we study the behavior of LTE technology with one eNB with two different scheduling mechanisms (Round Robin and Proportional Fair). In Fig. 9, we show the behavior of the total eNB throughput for the two popular scheduling algorithms. The settings of the LTE technology parameters are defined in Table 1 through NS3 simulator. Figure 9 shows the maximum capacity of single eNB which approximately 32mb/s and this is confirmed with the standards as in [12]. As can be seen from Fig. 9 where we compare the throughput of the two scheduling algorithms, Proportional fair provides the subscriber close to the eNB with higher throughput while less throughput to subscribers away from eNB due to weaker signal. Round robin assigns resources periodically to the subscribers without taking into account signal strength so it achieves the best fairness, but it would offer poor performance in throughput specially to edge users.

Fig. 9
figure 9

Wireless access network throughput for proportional fair and round robin schedulers

In Fig. 10, we show the behavior of the throughput of the whole heterogeneous access network. The throughput is presented for three different application traffic types namely fixed-size, exponential, and heavy tailed (Pareto) distributions. As we can notice from Fig. 10 the behavior of the total network throughput for applications that follow heavy tailed distributions is the worst among the three types, while the best throughput behavior is for the applications that follow the fixed-size. The behavior of exponential distribution is better than the heavy tailed distribution and close to the fixed-size distribution. There is clearly a significant degradation in the throughput between the applications that follow the power tail distribution and those that follow the exponential distribution. Figure 11 shows the instantaneous number of simultaneous users that can be served by the network. Figure 11 shows that the total number of users that can be served by the network is highly depend on the application type, where the application which follow heavy tailed distribution can serve smaller number of users when compared to the fixed-size and exponential distributions under the same network condition. The result shows the negative impact of sporadic traffic on the behavior of diverse access networks. From Figs. 10 and 11 we can conclude that the assumption of exponential distribution for nowadays Internet applications may lead to a serious overestimation of the capabilities of the access network. Figs. 12 and 13 show the behavior of the throughput and demand of cell 3. The figures show that the behavior of the throughput and demand of cell 3 is very close to the behavior of the throughput and demand of the whole network. So, one loaded cell can affect significantly the behavior of the whole network. We expect that this poor effect will be higher if more cells use the sporadic traffic arrival. Figures 14 and 15 show the total traffic handled by cell 1 and cell 2. The figures show the impact of the overloaded cell 3 on the neighbor cell 2. As can be seen from Fig. 15 the total accumulative traffic handled by cell 2 is greater than the total accumulative traffic of the edge cell 1 in Fig. 14, this is due to the handover between the cell 3 and cell 2. The figures show the effect of the three different application distributions. Figures 16 and 17 show the total traffic handled by cell 4 and the edge cell 5. The results in Figs. 16 and 17 matches the same results of cell 1 and cell 2. The aggregated traffic over all five cells is illustrated in Fig. 18. The figure shows that the total traffic served by the whole network for the fixed size application is larger than other distributions (Exponential and Pareto). Also from the Fig. 18 the least amount of traffic handled by the network is in case of the applications that follow the Pareto distribution. In Fig. 19, we can observe that the total data served by each technology (WiFi and LTE) over all five cells. The WiFi technology has a significant share of the handled traffic in the network. The figure clearly shows how the WiFi can improve the cost effective use of the network in case of using an effective offloading mechanism. So, we can conclude that the use of offloading mechanism can increase the efficiency of the wireless access networks.

Fig. 10
figure 10

Wireless access network throughput for fixed-size, exponential and Pareto distributions

Fig. 11
figure 11

The instantaneous number of simultaneous users that can be served by the network for fixed-size, exponential and Pareto distributions

Fig. 12
figure 12

Cell 3 throughput for fixed-size, exponential and Pareto distributions

Fig. 13
figure 13

The instantaneous number of simultaneous users that can be served by cell 3 for fixed-size, exponential and Pareto distributions

Fig. 14
figure 14

The total traffic handled in the edge cell 1 for fixed-size, exponential and Pareto distributions

Fig. 15
figure 15

The total traffic handled in the neighbor cell 2 for fixed-size, exponential and Pareto distributions

Fig. 16
figure 16

The total traffic handled in the neighbor cell 4 for fixed-size, exponential and Pareto distributions

Fig. 17
figure 17

The total traffic handled in the edge cell 5 for fixed-size, exponential and Pareto distributions

Fig. 18
figure 18

Wireless access network handled traffic for fixed-size, exponential and Pareto distributions

Fig. 19
figure 19

Wireless access network handled traffic for each Technology

6 Conclusions and Future work

The use of the wireless access networks is becoming more vital nowadays. Wireless access networks should deliver an acceptable level of quality of service to their users. In this paper, we developed an analytical model for the mixed LTE and WiFi access networks based on queuing theory. Our heterogeneous wireless access networks model estimates the effect of three types of user applications traffic analytically and by simulation. Through this paper we evaluate the impact of offloading and application type on the efficiency and performance of the heterogeneous access networks. Also we study the effect of different schedulers algorithms to show how LTE technology allocate resources to the subscribers. The behavior of diverse access network evaluated analytically using PSQ queuing model with sporadic arrival. We validate the model using discrete event simulator NS3 to reflect the credibility of the model. The extension of our work is to include the analytical analysis of various connectivity options to improve the edge user connectivity and poor coverage area through device to device communications using WiFi direct and Bluetooth technologies. Also, we are going to study the impact of mixing different types of traffic on the behavior of the diverse access network.