Keywords

1 Introduction

Teletraffic theory is a mathematical theory, or one of branches of queueing theory. It is used for studying and designing telecommunication systems (telephony, computer networks, etc.). More generally, one can set the goal of teletraffic theory: construction of mathematical models that map real processes in information distribution systems and development of methods for assessing the quality of their functioning [11,12,13]. The number of user devices connected to a high-speed network as well as the volume of traffic transmitted between them is constantly increasing [1]. Consequently, an increasing amount of resources is needed to provide quality services. The problem of resource shortage could be solved by using the licensed shared access (LSA) framework [2,3,4]. LSA framework could improve the efficiency of resource usage and ensure the access to a spectrum which otherwise would be underused [5]. By using this framework, the spectrum is shared between the owner (so-called incumbent) and a limited number of LSA licensees (mobile operators). The LSA licensee has access to single-tenant band (the part of the spectrum, belonging only to the mobile operator) and rents the multi-tenant band (the part of the spectrum, belonging to the incumbent and the mobile operator), whereas the incumbent has access only to multi-tenant band. For interference coordination between the incumbent and the LSA licensee three policies [6] are proposed: limit power policy, shutdown policy, and ignore policy. According to the limit power policy [7], there is no interruption of service due to the incumbent accessing spectrum. It implies managing the user equipment power in uplink and eNodeB (eNB) power in downlink. According to shutdown policy [8, 9], at any time, LSA spectrum could be used by incumbent or LSA licensees but not together at once. According to ignore policy LSA licensees use the shared spectrum without interference coordination.

In this paper we propose a scheme model of 3GPP wireless network within LSA framework [10]. For efficient interference coordination we consider the limit power policy, which allows us to continue the service of multi-tenant band users, even if the incumbent needs this part of the spectrum. In this case, the service of mobile operator users will not be interrupted, but the service bit rate will be reduced (degraded). At this time, the multi-tenant band goes into the so-called unavailable mode and user’s requests arrived on the multi-tenant band continue their service at the degraded bit rate – minimum bit rate. After the incumbent releases the multi-tenant band, the band goes from the unavailable to the operational mode and the service bit rate for the connected mobile network users increases to the maximum value - maximum bit rate. The service on the single-tenant band is always carried out at the maximum bit rate.

This model is an improved version of the model described in [7]. One of the main disadvantages of the previous model was that after the disconnection the band was not recovered which means that even after the band was vacated by the owner, the service continued with degraded quality until all users of multi-tenant band were served. In our model this drawback is eliminated, the band goes into operational mode as soon as the owner frees it, while the quality of user service is increased to the original level.

This paper is organized as follows. In Sect. 2, we propose a mathematical model of the LSA framework with the limit power policy. In Sect. 3, we analyze main characteristics of the model: the blocking probability and the mean bit rate. Finally, we conclude the paper in Sect. 4.

2 Mathematical Model

2.1 General Assumptions and Parameters

We propose a scheme model of a single mobile network cell with LSA framework and limit power policy. We suppose that the mobile operator has access to the single-tenant band with the total capacity of \(C_{1} \) bandwidth units (b.u.) and rents the multi-tenant band with the total capacity of \(C_{2} \) b.u. Let the arrival rate \(\lambda \) be Poisson distributed and let the service time be exponentially distributed with mean \(\mu ^{-1} \). Then, we denote the corresponding offered load as \(\rho =\lambda /\mu \).

Each request processed on the single-tenant band is served at the maximum bit rate \(d_{\max } \). Request on the multi-tenant band could be served at the maximum bit rate \(d_{\max } \) or at the minimum bit rate \(d_{\min } \) depending on the state of the multi-tenant band – operational or unavailable. Figure 1 shows the scheme of the model.

We assume that the multi-tenant band goes into unavailable mode with rate \(\alpha \) and recovers into operational mode with rate \(\beta \). Recovery and failure intervals follow the exponential distribution. All necessary notations are given in Table 1.

Fig. 1.
figure 1

The scheme of the model.

Table 1. System parameters

2.2 Limit Power Policy

Let us consider in more detail the limit power policy. First of all, we determine the rules for accepting requests for service.

When a new request arrives, four scenarios are possible:

  • The request will be accepted for service on the single-tenant band, if the single-tenant band has not less than \(d_{\max } \) free b.u.

  • The request will be accepted for service on the multi-tenant band, if the single-tenant band has less than \(d_{\max } \) b.u. free, the multi-tenant band is operational and has not less than \(d_{\max } \) b.u. free.

  • The request will be blocked, if the single-tenant band has less than \(d_{\max } \) b.u. free and the multi-tenant band is unavailable or has less than \(d_{\max } \) b.u. free.

Let us note if the owner does not use the frequency spectrum of the multi-tenant band, the data transfer can be carried out at the highest possible rate, which equals to \(d_{\max } \), in other case the service bit rate for the mobile operator users is degraded from the maximum \(d_{\max } \) to the minimum \(d_{\min } \) value. When the multi-tenant band recovers, the bit rates are switched back and all users that have been degraded continue to receive service at bit rate \(d_{\max } \).

2.3 System of Equilibrium Equations

The behavior of the system is defined by the Markov process \(\mathbf{X}(t)=\{(N_{1}(t),\) \(N_{2}(t),S(t)),t\ge 0\}\), where \(N_{1} (t)\) is the number of single-tenant band users, \(N_{2} (t)\) is the number of multi-tenant band users, \(S\left( t\right) \) is the state of the multi-tenant band at the moment \(t\ge 0\). Let us denote \(N_{1} =\left\lfloor \frac{C_{1} }{d_{\max } } \right\rfloor \) the maximum number of single-tenant band users, \(N_{2} =\left\lfloor \frac{C_{2} }{d_{\max } } \right\rfloor \) the maximum number of multi-tenant band users. Then the system state space is the following:

$$\begin{aligned} {\mathbf {X\,=\,}}\left\{ {n_{1} = 0, \ldots ,N_{1} ,\,\,n_{2} = 0, \ldots ,N_{2} ,\,\,s = 1} \right. \nonumber \\ \left. { \vee ~n_{1} = 0, \ldots ,N_{1} ,\,\,n_{2} = 0, \ldots ,N_{2} ,\,\,s = 0} \right\} . \quad \,\, \end{aligned}$$
(1)

State space (1) could be divided into two subspaces: \(\{n_{1} =0,\ldots ,N_{1} ,\; \; n_{2} =\) \(0,\ldots ,N_{2} ,\; \; s=1\}\) if the multi-tenant band is operational and requests could be served at the maximum bit rate \(d_{\max } \), and \(\{n_{1} =0,\ldots ,N_{1} ,\; \; n_{2} =0,\ldots ,N_{2} ,\) \(s=0\}\) if the multi-tenant band is unavailable and requests continue their service at the minimum bit rate \(d_{\min } \). Figure 2 shows the structure of the state space, considering the two subspaces.

The corresponding Markov process \(\mathbf{X}\left( t\right) \), which representing the system’s states, is described by the following system of equilibrium equations

$$\begin{aligned} \begin{array}{l} {p\left( n_{1},\,n_{2},\,s\right) \left[ \lambda \cdot \mathrm{I} \left( n_{1}< N_{1} \right) \right. +\lambda \cdot \mathrm{I} \left( n_{1} =N_{1} ,\; n_{2}<N_{2} ,\; s\,=\,1\right) } \\ {\left. +\; \left( n_{1} +n_{2} \right) \mu +\alpha \cdot \mathrm{I} \left( s=1\right) +\beta \cdot \mathrm{I} \left( s\,=\,0\right) \right] } \\ {=\,p\left( n_{1} +1,n_{2} ,s\right) \left[ \left( n_{1} +1\right) \mu \cdot \mathrm{I} \left( n_{1}<N_{1} \right) \right] } \\ {+~p\left( n_{1} ,n_{2} +1,s\right) \left[ \left( n_{2} +1\right) \mu \cdot \mathrm{I} \left( n_{2} <N_{2} \right) \right] \; }\\ {\,+~p\left( n_{1} -1,n_{2} ,s\right) \left[ \lambda \cdot \mathrm{I} \left( n_{1}>0\right) \right] } \\ {+~p\left( n_{1} ,n_{2} -1,1\right) \left[ \lambda \cdot \mathrm{I} \left( n_{1} =N_{1} ,\; n_{2} >0,\; s=1\right) \right] } \\ {+~p\left( n_{1} ,n_{2} ,1\right) \left[ \alpha \cdot \mathrm{I} \left( s=0\right) \right] +p\left( n_{1} ,n_{2} ,0\right) \left[ \beta \cdot \mathrm{I} \left( s=1\right) \right] ,\quad \left( n_{1} ,n_{2} ,s\right) \in X\mathrm{,}\; } \end{array} \end{aligned}$$
(2)

where \(\left( p\left( n_{1} ,n_{2} ,s\right) \right) _{\left( n_{1},\,n_{2},\,s\right) \in X} =\mathbf{p}\) is the stationary probability distribution.

Fig. 2.
figure 2

The state space.

Fig. 3.
figure 3

Central state.

2.4 Infinitesimal Generator

The system probability distribution is calculated as the numerical solution of the system of equilibrium equations \(\mathbf{p}\cdot \mathbf{A}=\mathbf{0}\), \(\mathbf{p}\cdot \mathbf{1}^{T} =1\), where \(\mathbf{A}\) is the infinitesimal generator of Markov process \(\mathbf{X}\left( t\right) \). Let us denote \(n=\overline{0,\,N_{1}\,+\,N_{2} }\) – the number of users.

The infinitesimal generator \(\mathbf{A}\) has a block tridiagonal form

$$\begin{aligned} \mathbf{A}\,=\,\left[ \begin{array}{ccccc} { \mathbf{N}_{0} } &{} {\mathbf{\Lambda } _{0} } &{} {\cdots } &{} {0} &{} {0} \\ {\mathbf{M}_{1} } &{} {\mathbf{N}_{1} } &{} {\cdots } &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {\cdots } &{} {\mathbf{N}_{N_{1}\,+\,N_{2} -1} } &{} {\mathbf{\Lambda } _{N_{1}\,+\,N_{2} -1} } \\ {0} &{} {0} &{} {\cdots } &{} {\mathbf{M}_{N_{1}\,+\,N_{2} } } &{} {\mathbf{N}_{N_{1}\,+\,N_{2} } } \end{array}\right] . \end{aligned}$$

Blocks \(\mathbf{\Lambda } _{n} \), \(n\,=\,\overline{0,\,N_{1}\,\,N_{2} -1}\) have the sizes

$$\begin{aligned} \dim \mathbf{\Lambda } _{n}\,=\,\left\{ \begin{array}{ll} {\left( 2n+2\right) \times \left( 2n+4\right) ,} &{} {n=\overline{0,\,N_{2} -1},} \\ {\left( 2N_{2} +2\right) \; \times \left( 2N_{2} +2\right) ,\mathrm{\; \; \; \; }} &{} {n=\overline{N_{2},\,N_{1} -1},\, \mathrm{if}\, N_{1} >N_{2} ,} \\ \left( 2\left( N_{1} +N_{2} -n\right) +2\right) \\ \times \,\left( 2\left( N_{1}\,+\,N_{2} -n\right) \right) , &{} {n=\overline{N_{1},\,N_{1}\,+\,N_{2} -1}.} \end{array}\right. \end{aligned}$$

and the following form:

  1. (1)

    \(n\,=\,\overline{0,\,N_{2} -1}\)

    $$\begin{aligned} \mathbf{\Lambda } _{n}\,=\,\left[ \begin{array}{ccccccc} {\lambda } &{} {0} &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {0} &{} {\lambda } &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {\cdots } &{} {\lambda } &{} {0} &{} {0} &{} {0} \\ {0} &{} {0} &{} {\cdots } &{} {0} &{} {\lambda } &{} {0} &{} {0} \end{array}\right] , \end{aligned}$$
  2. (2)

    \(n\,=\,\overline{N_{2},\,N_{1} -1},\, \mathrm{if}\, N_{1}\,>\,N_{2}\)

    $$\begin{aligned} \mathbf{\Lambda } _{n}\,=\,\left[ \begin{array}{ccccccc} {0} &{} {0} &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {0} &{} {\lambda } &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {\lambda } &{} {0} &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {0} &{} {\lambda } &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {\cdots } &{} {\lambda } &{} {0} &{} {0} &{} {0} \\ {0} &{} {0} &{} {\cdots } &{} {0} &{} {\lambda } &{} {0} &{} {0} \end{array}\right] , \end{aligned}$$
  3. (3)

    \(n\,=\,\overline{N_{1},\,N_{1}\,+\,N_{2} -1}\)

    $$\begin{aligned} \mathbf{\Lambda } _{n}\,=\,\left[ \begin{array}{ccccc} {0} &{} {0} &{} {\cdots } &{} {0} &{} {0} \\ {0} &{} {\lambda } &{} {\cdots } &{} {0} &{} {0} \\ {\lambda } &{} {0} &{} {\cdots } &{} {0} &{} {0} \\ {0} &{} {\lambda } &{} {\cdots } &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {\cdots } &{} {\lambda } &{} {0} \\ {0} &{} {0} &{} {\cdots } &{} {0} &{} {\lambda } \end{array}\right] . \end{aligned}$$

    Blocks \(\mathbf{M} _{n} \), \(n\,=\,\overline{1,\,N_{1}\,+\,N_{2} }\) have the sizes

    $$\begin{aligned} \dim \mathbf{M} _{n}\,=\,\left\{ \begin{array}{ll} {\left( 2n+2\right) \times 2n,} &{} {n\,=\,\overline{1,\,N_{2} },} \\ {\left( 2N_{2} +2\right) \; \times \left( 2N_{2} +2\right) ,\mathrm{\; \; \; \; }} &{} {n\,=\,\overline{N_{2}\,+\,1,\,N_{1} },\, \mathrm{if}\, N_{1} >\,N_{2} ,} \\ \left( 2\left( N_{1}\,+\,N_{2} -n\right) +2\right) \\ \times \,\left( 2\left( N_{1} +N_{2} -n\right) +4\right) , &{} {n\,=\,\overline{N_{1}\,+\,1,\,N_{1}\,+\,N_{2} }.} \end{array}\right. \end{aligned}$$

    and the following form:

  1. (1)

    \(n\,=\,\overline{1,\,N_{2} }\)

    $$\begin{aligned} \mathbf{M}_{n} =\left[ \begin{array}{ccccccc} {n\mu } &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {0} &{} {0} \\ {0} &{} {n\mu } &{} {0} &{} {0} &{} {\cdots } &{} {0} &{} {0} \\ {\mu } &{} {0} &{} {\left( n-1\right) \mu } &{} {0} &{} {\cdots } &{} {0} &{} {0} \\ {0} &{} {\mu } &{} {0} &{} {\left( n-1\right) \mu } &{} {\cdots } &{} {0} &{} {0} \\ {0} &{} {0} &{} {2\mu } &{} {0} &{} {\cdots } &{} {0} &{} {0} \\ {0} &{} {0} &{} {0} &{} {2\mu } &{} {\cdots } &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {\mu } &{} {0} \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {0} &{} {\mu } \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {n\mu } &{} {0} \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {0} &{} {n\mu } \end{array}\right] , \end{aligned}$$
  2. (2)

    \(n=\overline{N_{2} +1,\,N_{1} },\, \mathrm{if}\, N_{1} >N_{2}\)

    $$\begin{aligned} \mathbf{M}_{n} =\left[ \begin{array}{ccccccc} {\mu } &{} {0} &{} {N_{1} \mu } &{} {0} &{} {\cdots } &{} {0} &{} {0} \\ {0} &{} {\mu } &{} {0} &{} {N_{1} \mu } &{} {\cdots } &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {\mu } &{} {0} \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {0} &{} {\mu } \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {n\mu } &{} {0} \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {0} &{} {n\mu } \end{array}\right] , \end{aligned}$$
  3. (3)

    \(n\,=\,\overline{N_{1}\,+\,1,\,N_{1}\,+\,N_{2} }\)

    $$\begin{aligned} \mathbf{M}_{n} =\left[ \begin{array}{ccccccccc} {\left( n-N_{1} \right) \mu } &{} {0} &{} {N_{1} \mu } &{} {0} &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {0} &{} {\left( n-N_{1} \right) \mu } &{} {0} &{} {N_{1} \mu } &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {N_{2} \mu } &{} {0} &{} {\left( n-N_{2} \right) \mu } &{} {0} \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {0} &{} {N_{2} \mu } &{} {0} &{} {\left( n-N_{2} \right) \mu } \end{array}\right] . \end{aligned}$$

    Blocks \(\mathbf{N} _{n} \), \(n\,=\,\overline{0,N_{1}\,+\,N_{2} }\) have the sizes

    $$\begin{aligned} \dim \mathbf{N} _{n} =\left\{ \begin{array}{ll} {\left( 2n+2\right) \times \left( 2n+2\right) ,} &{} {n=\overline{0,N_{2} -1},} \\ {\left( 2N_{2} +2\right) \; \times \left( 2N_{2} +2\right) ,} &{} {n=\overline{N_{2} ,N_{1} +N_{2} -2},} \\ \left( 2\left( N_{1} +N_{2} -n\right) +2\right) \\ \times \,\left( 2\left( N_{1} +N_{2} -n\right) +2\right) , &{} {n=\overline{N_{1} +N_{2} -1,\,N_{1} +N_{2} }.} \end{array}\right. \end{aligned}$$

    and the following form:

  1. (1)

    \(n\,=\overline{0,N_{1} -1}\)

    $$\begin{aligned} \mathbf{N} _{n} =\left[ \begin{array}{ccccc} {-\left( \lambda +n\mu +\beta \right) } &{} {\beta } &{} {\cdots } &{} {0} &{} {0} \\ {\alpha } &{} {-\left( \lambda +n\mu +\alpha \right) } &{} {\cdots } &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {\cdots } &{} {-\left( \lambda +n\mu +\beta \right) } &{} {\beta } \\ {0} &{} {0} &{} {\cdots } &{} {\alpha } &{} {-\left( \lambda +n\mu +\alpha \right) } \end{array}\right] , \end{aligned}$$
  2. (2)

    \(n=\overline{N_{1} ,N_{1} +N_{2} -1}\)

    $$\begin{aligned} \mathbf{N} _{n} =\left[ \begin{array}{ccccc} {-\left( n\mu +\beta \right) } &{} {\beta } &{} {\cdots } &{} {0} &{} {0} \\ {\alpha } &{} {-\left( \lambda +n\mu +\alpha \right) } &{} {\cdots } &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {\cdots } &{} {-\left( \lambda +n\mu +\beta \right) } &{} {\beta } \\ {0} &{} {0} &{} {\cdots } &{} {\alpha } &{} {-\left( \lambda +n\mu +\alpha \right) } \end{array}\right] , \end{aligned}$$
  3. (3)

    \(n=N_{1} +N_{2}\)

    $$\begin{aligned} \mathbf{N} _{n} =\left[ \begin{array}{cc} {-\left( n\mu +\beta \right) } &{} {\beta } \\ {\alpha } &{} {-\left( n\mu +\alpha \right) } \end{array}\right] . \end{aligned}$$

3 Numerical Analysis

3.1 Performance Measures

Having found the probability distribution \(p\left( n_{1} ,n_{2} ,s\right) ,\; \left( n_{1} ,n_{2} ,s\right) \in X\), one may compute performance measures of the considered scheme:

  • Blocking probability

$$\begin{aligned} B=\sum _{i\,=\,0}^{N_{2} }p\left( N_{1} ,i,0\right) +p\left( N_{1} ,N_{2} ,1\right) ; \end{aligned}$$
(3)
  • Mean bit rate

$$\begin{aligned} \overline{d}=\frac{\sum _{\left( n_{1},\,n_{2},\,s\right) \in X/\left( 0,\,0,\,0\right) ,\left( 0,\,0,\,1\right) }\frac{n_{1} d_{\mathrm{max}}\,+\,n_{2} d_{\mathrm{max}} \cdot \mathrm{I} \left( s\,=\,1\right) \,+\,n_{2} d_{\min } \cdot \mathrm{I} \left( s\,=\,0\right) }{n_{1}\,+\,n_{2} } \cdot p\left( n_{1},\,n_{2} ,s\right) }{\sum _{\left( n_{1},\,n_{2},\,s\right) \in X/\left( 0,\,0,\,0\right) ,\,\left( 0,\,0,\,1\right) }p\left( n_{1},\,n_{2},\,s\right) } ; \end{aligned}$$
(4)
  • Mean bit rate on the multi-tenant band

    $$\begin{aligned} \overline{d}\left( C_{2} \right) \,=\,\frac{\sum _{\left( n_{1},\,n_{2},\,s\right) \in X:\, n_{2}\,\ne \,0}\left( d_{\mathrm{max}} \cdot p\left( n_{1},\,n_{2},\,1\right) ,\,+\,d_{\mathrm{min}} \cdot p\left( n_{1},\,n_{2},\,0\right) \right) }{\sum _{\left( n_{1},\,n_{2},\,s\right) \in X:\, n_{2}\,\ne \,0}p\left( n_{1},\,n_{2},\,s\right) } . \end{aligned}$$
    (5)

3.2 Numerical Example

Let us assume that users view short video in high quality at a bit rate \(d_{\max } \)= 1 Mbps. If a part of the frequency band has to be returned, the bit rate decreases to \(d_{\min } \)= 0.5 Mbps. So the users continue watching video but in a lower quality. The multi-tenant band goes into unavailable mode every hour (3600 s) or every four hours (14400 s) and the recovery takes around one minute. Table 2 summarizes the initial data of the example.

Table 2. System parameters

The figures below show the behavior of each characteristic – blocking probability B (Fig. 4), mean bit rates \(\overline{d}\) and \(\overline{d}\left( C_{2} \right) \) (Fig. 5) – for different values of \(\alpha ^{-1} \) (the mean time when the multi-tenant band is available). All figures show that the less multi-tenant band goes into unavailable mode, the better the performance metrics, namely, the blocking probability is lower, whereas the mean bit rate is higher.

Fig. 4.
figure 4

Blocking probability B for different \(\alpha ^{-1} \).

Fig. 5.
figure 5

Mean bit rates \(\overline{d}\) and \(\overline{d}\left( C_{2} \right) \) for different \(\alpha ^{-1} \).

4 Conclusion

We have presented the scheme model for analyzing the simultaneous access to spectrum in 3GPP cellular network within LSA framework for intolerant to delay traffic under the limit power policy. This policy is based on the implementation of a mechanism the service bit rate degradation for the mobile operator users on multi-tenant band, if it is necessary to release the resources of this band for the owner. We have obtained the infinitesimal generator as a block tridiagonal matrix, what is required for the numerical solution of the equilibrium equations system and the calculation of the performance metrics for the considered queuing system that characterize the impact of LSA on the QoS – the blocking probability and the mean bit rate.