Keywords

1 Introduction

The recent years have seen a rapid growth in modern cellular networks traffic, contributed by billions of mobile devices and brand new technologies [1, 2]. This growth of traffic affects the availability of radio resource necessary for serving users with the required level of quality of service (QoS) [3, 4]. The main technologies developed to solve this problem are orthogonal frequency division multiple access (OFDM) [5, 6], multiple input multiple output (MIMO) [7,8,9], multimedia broadcast multicast service (MBMS) [10], licensed assisted-access framework (LAA) [11] and licensed shared access framework (LSA) [12, 13]. Within these technologies, researchers propose different radio resource management (RRM) mechanisms, for example transmission power limitation [14, 15] and user service interruption [16], that allow using more efficiently available radio spectrum. Models implementing such mechanisms could be described by a queuing system model with unreliable servers [17]. One type of these systems are systems operating in a random environment [18, 19].

Random environment (RE) is a significant obstacle to the efficient diffusion and use of telecommunication systems. It can strongly affect the system performance measures, for example the blocking probability and the achievable bit rate.

The aim of this paper is to propose methods for analyzing performance measures of one of the possible admission control schemes models for wireless network, described by a queuing system with unreliable servers within a RE.

The rest of the paper is organized as follows. In Sect. 2, we propose a general description of the model operating in RE, state of which can vary. In Sect. 3, we propose an accurate method to calculate the stationary probability distribution of the model. In Sect. 4 is proposed an approximate method that significantly reduces the complexity of the model. Section 5 describes and analyzes the main performance measures of the model. Conclusions are drawn in Sect. 6.

2 Mathematical Model

Let us consider a single cell of a wireless mono-service network with radius R within a RE that can impact on the QoS level of users requests. We assume that user requests arrive in the system according to the Poisson law with rate \(\lambda \) and are serviced according to the exponential law with rate \(\mu \). We suppose that the distance between all the users and the Base Station (BS) is constant and equal to d. Each request processed in the system is serviced with the guaranteed bit rate (GBR) equaling \(r_0\).

We assume that the RE can change its state. Unlike [20], in this paper the RE changes state from 0 to 2. Such limitation allows to obtain an approximate solution which significantly reduces the complexity of calculations. Transition from state s to \(s-1\) is made with rate \(\alpha _s,s=1,2\) and from s to \(s+1\) with rate \(\beta _s,s=0,1\). Note that the rates \(\alpha _s\) and \(\beta _s\) are exponentially distributed.

Access to radio resource of the system is implemented in such a way that downlink power can vary under RE influence. It decreases from \(p_s\) to \(p_{s-1}, s=1,2\) with rate \(\alpha _s, s=1,2\), when transition to state \(s-1\) occurs. Recovery to \(p_s, s=1,2\) is made with rate \(\beta _s, s=0,1\). Note that the rates \(\alpha _s\) and \(\beta _s\) are exponentially distributed.

Changing downlink power affects the QoS level of users in the system, due primarily to the deterioration of such parameters as the achievable bit rate \(r_s\) and the maximum number of requests \(N_s, s=\overline{0,2}\) that can be serviced. Transition to state \(s-1, s=1,2\) leads to a decrease of that maximum number from \(N_s\) to \(N_{s-1}, s=1,2\). According to Shannon formula and system current state, the value of \(N_s, s=\overline{0,2}\) (1) can be defined as ratio of achievable bit rate \(r_s, s=\overline{0,2}\) to GBR \(r_0\).

$$\begin{aligned} N_s=\left\lfloor \frac{\omega \ln \left( 1+\frac{Gp_s}{d^\kappa N_0}\right) }{r_0}\right\rfloor ,s=\overline{0,2}, \end{aligned}$$
(1)

where \(\omega \) is the bandwidth of uplink channel, G - the propagation constant, \(\kappa \) - the propagation exponent and \(N_0\) - the noise power.

We describe the behavior of the system using a two-dimensional vector (ns) over the state space \(\mathbf X =\left\{ (n,s):0\le n\le N_s, s=\overline{0,2} \right\} \), where n represents the current number of requests in the system and s - the current state of the RE. Data transfer is performed with the minimum downlink power \(p_0\) in state \(s=0\) and with the maximum \(p_2\) in state \(s=2\). It should be noted that under RE influence, the services of \(N_s-N_{s-1},s=1,2\) requests are interrupted, when transition occurs from state s to \(s-1, s=1,2\), since \(N_2>N_1>N_0\). The corresponding state transition and central state transition diagrams are shown respectively in Figs. 1 and 2.

Fig. 1.
figure 1

State transition diagram.

Fig. 2.
figure 2

Central state transition diagram.

In accordance with the central state transition diagram shown in Fig. 2, the corresponding Markov process is described by the following system of equilibrium equations

(2)

where \(p(n,s), (n,s) \in \mathbf X \) represents the stationary probability distribution and I - the indicator function equaling 1 when the condition is met and 0 otherwise.

3 Accurate Methods for Calculating Probability Distribution

3.1 Numerical Solution

The process describing the considered system is not a reversible Markov process. Therefore, due to the implementation of the user service interruption mechanism, the system stationary probability distribution \(p(n,s)_{(n,s) \in \mathbf{X }} =\mathbf{p }\) can be computed, first of all using a numerical solution of the system of equilibrium equations \(\mathbf p \cdot \mathbf A = \mathbf 0 , \mathbf p \cdot \mathbf 1 ^T = 1\), where \(\mathbf A \) is the infinitesimal generator of Markov process, elements \(a((n,s)(n',s'))\) of which are defined as follows

(3)

where \(*=-(\alpha \cdotp I(s \ne 0)+\beta \cdotp I(s \ne S,n\le N_s)+\lambda \cdotp I(n<N_s, s=\overline{0,2})+n\mu \cdotp I(n > 0)), (n,s) \in \mathbf{X }\).

3.2 Recursive Algorithm

The system stationary probability distribution \(p(n,s), (n,s) \in \mathbf{X }\) can also be computed using a recursive algorithm that significantly reduces the complexity of the calculations.

Let us consider the unnormalized probabilities \(q(n,s), (n,s) \in \mathbf X \). To calculate these probabilities, we use the algorithm described below.

Step 1. The unnormalized probabilities q(ns) are defined by formulas

$$\begin{aligned}&q(0,0)=1; \end{aligned}$$
(4)
$$\begin{aligned}&q(0,1)=x; \end{aligned}$$
(5)
$$\begin{aligned}&q(n,s)=\gamma _{ns} + \delta _{ns}x + \theta _{ns}y, (n,s) \in \mathbf X :n>0; \end{aligned}$$
(6)
$$\begin{aligned}&x = \left( P \cdot Q - R \cdot L \right) / \left( P \cdot T - U \cdot L \right) ; \end{aligned}$$
(7)
$$\begin{aligned}&y = \left( R \cdot T - U \cdot Q \right) / \left( P \cdot T - U \cdot L \right) , \end{aligned}$$
(8)

where

Step 2. The coefficients \(\gamma _{ns}\), \(\delta _{ns}\) and \(\theta _{ns}\) are defined by recursive formulas

Finding the unnormalized probabilities \(q(n,s), (n,s) \in \mathbf X \), one can compute the stationary probability distribution of the system as follows:

$$\begin{aligned} p(n,s)= \frac{q(n,s)}{\sum _{(i,j) \in \mathbf X }q(i,j)}, (n,s) \in \mathbf X . \end{aligned}$$
(9)

4 Approximate Method

According to the model considered in the previous sections, the stationary probability distribution \(p(n,s)_{(n,s) \in \mathbf X } =\mathbf p \) is not of product form.

To determine that form we simplify the model. We suppose that under RE influence, downlink power reduction occurs only when the current number of requests n in state \(s,s=1,2\) is equal to maximum number of serviced requests in state \(s-1\), i.e. \(n=N_{s-1},s=1,2\). In other words user service is not interrupted. In Figs. 3 and 4 are shown respectively the state transition and the central state transition diagrams of the new model.

Fig. 3.
figure 3

State transition diagram of model without service interruption.

Fig. 4.
figure 4

Central state transition diagram of model without service interruption.

The behavior of the system is described using a two-dimensional vector (ns) over the state space \(\mathbf X =\left\{ (n,s):0\le n\le N_s, s=0,1,2 \right\} \), where n represents the current number of requests in the system and s - the system current state.

The discussed Markov process is described by the following system of equilibrium equations:

where \(p(n,s), (n,s) \in \mathbf X \) is the stationary probability distribution.

After simplification, the process describing the behavior of the system becomes a reversible Markov process. This is verifiable using Kolmogorov criterion. Then, the stationary probability distribution \(p(n,s), (n,s) \in \mathbf X \) could be calculated using a product form (10), obtained throughout solution of system partial balance equations

(10)

where f(z) is the function equaling \(\prod _{k=1}^{z} {\beta _{k-1}/\alpha _k}\) when argument is strictly positive and 1 when null.

Note that, the stationary probability distribution \(p(n,s), (n,s) \in \mathbf X \) could also be calculated using a recursive algorithm like in Subsect. 3.2.

5 Performance Measures Analysis Using Both Methods

5.1 Performance Measures

Having found the stationary probability distribution \(p(n,s), (n,s) \in \mathbf X \), one can calculate the main performance measures of the considered model such as

  • Blocking probability B

    $$\begin{aligned} B=\sum _{s=0}^{2} p(N_s,s); \end{aligned}$$
    (11)
  • Average number of serviced requests \(\overline{N}\)

    $$\begin{aligned} \overline{N}=\sum _{s=0}^{2}\overline{N}_s=\sum _{s=0}^{2}\sum _{n=1}^{N_s} n p(n,s); \end{aligned}$$
    (12)
  • Mean bit rate \(\overline{r}\)

    $$\begin{aligned} \overline{r}=\frac{\sum _{s=0}^{2}r_s \cdot \sum _{n=1}^{N_s}p(n,s)}{1-\sum _{s=0}^{2}p(0,s)}; \end{aligned}$$
    (13)
  • Interruption probability \(\varPi \)

    (14)

5.2 Comparative Analysis of Results

We evaluate how effective is the developed approximate method with a comparative analysis of results obtained after the performance measures calculation, i.e. using the recursive algorithm described in Subsect. 3.2 and formula (10).

To understand the physical interpretation of the RE, let us consider the operation of the system within the LSA framework [11]. LSA facilitates access for additional licensees in bands which are already in use by one or more incumbents allowing to dynamically share the frequency band, whenever and wherever it is unused by the incumbent users, but only on the basis of an individual authorization, i.e. licensed.

We consider one frequency band in use by one mobile operator (licensee) who rent it from another mobile operator (incumbent). Whenever needed by the incumbent, the band is returned leading to a downlink power reduction and consequently, to a QoS degradation in the licensee network. We suppose that the incumbent does not use the frequency band permanently, i.e. every 30 min (urban use of the LSA system). Downlink power reduction occurs only when the data transfer quality in the incumbent network is not satisfying. We assume that the licensee requests to use the LSA band every 30 s. When access is granted, the downlink power increases to level \(p_1\). At that level, the licensee sends a request every 60 s to reach the maximum downlink power \(p_2\). We summarize all the parameters of the comparative analysis in Tables 1 and 2 [11].

Table 1. Constant parameters of the comparative analysis.
Table 2. Variable parameters of the comparative analysis.

Let us consider several scenarios for the analysis of the system blocking probability.

Scenario 1. We illustrate the behavior of the blocking probability B depending on the distance d between the users and the BS (Fig. 5). The results presented in the graph show that at low downlink power (i.e. 35 dBm), the approximate method is suitable only for small cells. With the increase of downlink power, approximate method becomes more accurate and can then be used for big cells.

Fig. 5.
figure 5

Blocking probability B depending on distance d to BS.

Scenario 2. We illustrate the behavior of the blocking probability B depending on the maximum downlink power \(p_2\) (Fig. 6). The results show that the higher maximum downlink power gets, the more accurate approximate method becomes.

Fig. 6.
figure 6

Blocking probability B depending on maximum downlink power \(p_2\).

6 Conclusion

In this paper, a mathematical model for accessing radio resources of wireless communication networks, i.e. using downlink power reduction and user service interruption mechanisms, is constructed and investigated. The model is described as a queuing system operating in RE. An accurate method (recursive algorithm) is proposed to calculate the stationary probability distribution of the model. An approximate method based on assumption that simplifies the model is also given. Formulas are proposed to calculate the main performance measures of the model - blocking probability, average number of serviced requests, mean bit rate and interruption probability. A comparative analysis of the blocking probability calculation using both methods showed that the approximation is quite precise at high downlink power and suitable for small cells only at low downlink power.