Académique Documents
Professionnel Documents
Culture Documents
)P(A
)
(2)
In (2), A
i
s are different failures which affect call service. In
other words A
i
can be one of the BW, M, N, L, or A. Similarly,
the probability of unsuccessfulness in making data connection,
P(F
2
), can be calculated using the causality graph and is given
by (3).
P(F
2
) = P(F
2
)P(A
)
(3)
822
Figure 3. A Markov model showing number of users which receive service
and users in the queue.
In (3), A
i
s are different failures which affect on data service.
In other words A
i
can be one of the BW, M, N, L, or A. If
P(F
1
A
) and P(F
2
A
]
n
P(u,u) n = 1 to N (5)
where, , is the service rate of the NodeB, and N is the
number of total channels in the cell. Note that P(0,0) shows
the probability of the state, that the system is empty (with no
user being served or in the queue). Also, we have:
P(n, u) =
z +r
P(u, n) n = 1 to N (6)
and
P(n, N) =
x
[N!
[
[
N
[
[
N
n
P(u,u) ; n 1 (7)
The probability that n + N users are in the queue, while
NodeB is in the failure is given by (8):
P(n +N, u)
=
z
[(z +r)N!
(
[
)
N
(
[
N
)
n
P(u,u) ; n 1
(8)
The average number of subscribers in the queue, N
Q
, may
be determined based on the above equations:
N
= nP(n, u)
N
n=1
+nP(n, N)
n=1
+(n +N)P(n +N, u)
n=1
(9)
Also, the average of waiting time in the queue, W, is
calculated using equation (9) and the Littles formula [9]:
w =
N
z
(10)
V. NUMERICAL RESULTS
In order to evaluate the proposed model, a simulator has
been developed to solve the Markov chain of Section IV. By
solving this Markov chain, different probabilities of being in
different states could be determined. Based on these
probabilities, one can determine the expected values of
different system parameters. In this section, the numerical
results are described. The duration of simulation is equal to
1,000,000 units of time.
Numerical results are shown in Tables I and II and Figures
4 and 5. In Tables I and II, the average number of subscribers
in the queue is calculated for different failure and repair rates.
As it is expected, the average number of subscribers in the
queue is increased with increasing the value of f. In Table I
the values of , , and r are constant. N
Q
is determined for
different values of f. In Table II the values of , , f are
constant and each time r is multiplied by two. Approximately,
when r is multiplied by 2, the average number of customers in
the queue is halved. Also, with any reduction in r, the number
of users in the queue is increased and consequently the
average waiting time is increased according to (10). Based on
823
the culture and the social behavior of subscribers, people in
different societies may wait for a different period of time for
the network restoration. Hence, there must be a lower bound
for suitable repair (or restoration) rate, r, of the network.
In Figure 4(a), P(0,0) is calculated from the analytical
model for different values of s. This is also compared with
the numerical results generated by the simulator. It is almost
clear that P(0,0) is decreased with increasing of . Also, the
curves are approximately close together. Similar results are
illustrated in Figure 4(b), for P(0,0) versus . Figure 5
demonstrates variation of P(0, 4) for different values of and
. It is clear from this figure that P(0,4) is increased with
increasing of and is decreased with increase in .
VI. CONCLUSIONS
In this paper, different failures in the suggested architecture
for LTE were verified and the impact of them on network
services was evaluated through simulation and analytical
models. NodeB failure was modeled with an exponential
distribution with rate f. It was observed that f affects on the
average number of users in the waiting queue. Also,
simulation results show that repair rate (r) should be large
enough, in order to have a suitable average waiting time.
REFERENCES
[1] Hannes Ekstrom, Anders Furuskar, Jonas Karlson, Michael Meyer,
Stefan Parkvall, Johan Torsner, and Mattias Wahlqvist, Ericsson,
Technical Solutions for the 3G Long-Term Evolution, IEEE
Communications Magazine, page(s): 38-45, March 2006.
[2] David Astely, Erik Dahlman, Anders Furuskar, Ylva Jading, Magnus
Lindstrom, and Stefan Parkvall, Ericsson Research, LTE: The
Evolution of Mobile Broadband, IEEE Communications Magazine,
page(s):44-51, April 2009.
[3] Bhagyavati, Taxonomy of Faults in Wireless Networks, Wireless
Telecommunications Symposium, page(s):120-125, 2005.
[4] P. Khadivi, S. Samavi, H. Saidi, T D. Todd , D. Zhao, Dropping Rate
Reduction in Hybrid WLAN/Cellular Systems by Mobile Ad Hoc
Relaying, Wireless Personal Communications, Springer, page(s):515-
542, 2006.
TABLE I
N
Q
CHANGING WITH FAILURE RATES (f).
TABLE II
N
Q
CHANGING WITH REPAIR RATES (r).
(a)
(b)
Fig. 4 a) P(0,0) changing with different values for . b) P(0,0) changing with
different values for .
(a)
(b)
Fig. 5 a) P(0,4) changing with different values for . b) P(0,4) changing with
different values for .
0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9
0.06
0.08
0.1
0.12
0.14
0.16
0.18
0.2
0.22
0.24
0.26
lambda
P
(
0
,
0
)
Simulation model
Analytical model
0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9
0.2
0.25
0.3
0.35
0.4
0.45
0.5
mu
P
(
0
,
0
)
Simulation Model
Analytical Model
0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9
0.02
0.03
0.04
0.05
0.06
0.07
0.08
0.09
0.1
lambda
P
(
0
,
4
)
Simulation Model
Analytical Model
0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9
0
0.005
0.01
0.015
0.02
0.025
0.03
0.035
mu
P
(
0
,
4
)
Simulation Model
Analytical Model
824
[5] Upkar Varshney, Andrew P. Snow, and Alisha D. Malloy, Designing
Survivable Wireless and Mobile Networks, Department of Computer
Information Systems, Georgia State University, Atlanta, GA,
page(s):30-34, 1999.
[6] A. Snow, P. Rastogi, and G. Weckman, Assessing Dependability Of
Wireless Networks Using Neural Networks, Ohio University, Athens,
Military Communications Conference 2005.MILCOM 2005, IEEE
Volume, Issue page(s):2809-2815 Vol.5, 17-20 Oct. 2005.
[7] Yonal Kirsal, Orhan Gemikonakli, "Performability Modelling of
Handoff in Wireless Cellular Networks with Channel Failures and
Recovery", uksim, UKSim 2009: 11th International Conference on
Computer Modelling and Simulation, page(s): 544-547, 2009.
[8] Malgorzata Steinder, Adarshpal S. Sethi, A Survey of Fault
Localization Techniques in Computer Networks, Science of Computer
Programming 53 (2004), page(s):165-194, 2004.
[9] Demetri Bertsekas, Robert Gallager, Data Networks, second edition,
1992.S. M. Metev and V. P. Veiko, Laser Assisted Microtechnology,
2nd ed., R. M. Osgood, Jr., Ed. Berlin, Germany: Springer-Verlag,
1998.
825