List of Figures

Figure I.1 Traffic‐load in a link of three trunks (Example I.1)

Figure I.2 Qualitative relationships between traffic‐load, system capacity and GoS

Figure I.3 Call generation process

Figure I.4 Poisson distribution with rate images calls/hour

Figure I.5 Superposition and decomposition of Poisson processes

Figure I.6 Exponential distribution images

Figure I.7 Markov/memoryless property

Figure I.8 Representation of service systems

Figure I.9 Service systems of full and restricted availability (Example I.19)

Figure I.10 An access network as a queuing system (Example I.21)

Figure I.11 The CS policy (Example I.26) 

Figure I.12 A CS policy with ordering constraint (Example I.27)

Figure I.13 The TH policy (Example I.28)

Figure I.14 Comparison of the BR policy with the CS policy (Example I.29)

Figure I.15 System states in the CS and the BR policies (Example I.29)

Figure I.16 Visualization of (a) random/quasi‐random and (b) batch Poisson arrivals

Figure I.17 Visualization of (a) fixed and (b) elastic bandwidth requirements

Figure I.18 Visualization of (a) stream, (b) elastic, and (c) ON–OFF traffic

Figure I.19 (a) Resource separation (images QoS‐aware flows) and (b) resource sharing (two QoS classes)

Figure 1.1 State transition diagram for the Erlang loss model (images/images/images/0)

Figure 1.2 images/images/images/images FIFO – state transition diagram for images (Example 1.2)

Figure 1.3 Quantitative relationships between traffic‐load, system capacity, and CBP

Figure 1.4 Trunk efficiency for various values of GoS and images

Figure 1.5 A service system of images b.u. and two service‐classes under the CS policy (Example 1.6)

Figure 1.6 The state space images (CS policy) and the state transition diagram (Example 1.6)

Figure 1.7 State transition diagram of the EMLM

Figure 1.8 GB in the system of Example 1.6 (Example 1.7)

Figure 1.9 Sets images and images for the EMLM of two service‐classes, under the CS policy

Figure 1.10 The Kaufman–Roberts recursion as a birth–death process

Figure 1.11 Visualization of CBP calculation

Figure 1.12 CBP oscillations in the EMLM (CS policy) (Example 1.14)

Figure 1.13 An example of the EMLM under the BR policy

Figure 1.14 The state space images of the EMLM under the BR policy (Example 1.15)

Figure 1.15 The one‐dimensional Markov chain of the EMLM/BR (Roberts' assumption, Example 1.18) 

Figure 1.16 Calls of service‐classes images contribute in images by transferring the population of service‐class images to state images

Figure 1.17 The one‐dimensional Markov chain of the EMLM/BR under the Stasiak–Glabowski assumption (Example 1.19)

Figure 1.18 A multirate access tree network that accommodates images service‐classes of Poisson input (Example 1.22)

Figure 1.19 A single link that accommodates images service‐classes of Poisson input described by the EMLM/TH (Example 1.22)

Figure 1.20 The state space images of system under the TH policy (Example 1.23)

Figure 1.21 Comparison of the EMLM, the EMLM/BR, and the EMLM/TH (Example 1.23) 

Figure 1.22 The state space images of the three link network (Example 1.24) 

Figure 1.23 Two service‐classes accommodated in a fixed routing network of two links (Example 1.25)

Figure 1.24 Application of the RLA method in a telephone network of three links (Example 1.26)

Figure 1.25 A ring network supporting service‐classes under the BR policy (Example 1.28)

Figure 2.1 Service system of the SRM

Figure 2.2 The CAC mechanism for a new call in the SRM

Figure 2.3 The state space images (CS policy) and the state transition diagram (Example 2.1)

Figure 2.4 The state space images (BR policy) and the state transition diagram (Example 2.3)

Figure 2.5 CBP in the SRM and EMLM, for various values of images (Example 2.5)

Figure 2.6 Link utilization in the SRM and EMLM (Example 2.5)

Figure 2.7 CBP in the SRM/BR and the EMLM/BR for various values of images (Example 2.5)

Figure 2.8 The state space images (CS policy) and the state transition diagram (Example 2.6)

Figure 2.9 The state space images (BR policy) and the state transition diagram (Example 2.8)

Figure 2.10 CBP of the first three service‐classes in the MRM, SRM, and EMLM for various values of images (Example 2.10) 

Figure 2.11 CBP of service‐class 4 in the MRM, SRM, and EMLM for various values of images (Example 2.10) 

Figure 2.12 Equalized CBP in the MRM/BR and EMLM/BR for various values of images (Example 2.10) 

Figure 2.13 The state space images (CS policy) and the state transition diagram (Example 2.11)

Figure 2.14 The state space images (BR policy) and the state transition diagram (Example 2.13)

Figure 2.15 Left: CBP of service‐classes 1, 2 in the STM and SRM versus various values of images. Right: The corresponding graphs for service‐classes 3, 4 (Example 2.15)

Figure 2.16 CBP in the STM/BR and SRM/BR versus images and two values of images (Example 2.15)

Figure 2.17 The MTM principle of operation

Figure 2.18 Left: CBP of service‐classes 1, 2, and 3 versus the sets of thresholds. Right: Conditional CBP of service‐class 4 versus the sets of thresholds (MTM) (Example 2.16)

Figure 2.19 Equalized CBP of all service‐classes versus the sets of thresholds (MTM/BR) (Example 2.16)

Figure 2.20 The CDTM principle of operation

Figure 2.21 The service system (Example 2.17)

Figure 2.22 Graphical representation of the LB equations 2.63 (left) and 2.64 (right)

Figure 2.23 Migration and upward migration spaces (Example 2.18)

Figure 2.24 Thresholds and bandwidth requirements of service‐classes 3 and 4 (Example 2.20)

Figure 2.25 Recurrent determination of the resource share (Example 2.21)

Figure 2.26 Excerpt of the state transition diagram (Example 2.22)

Figure 2.27 Migration and upward migration space (Example 2.22)

Figure 3.1 The state space images and the state transition diagram (Example 3.1)

Figure 3.2 State transition diagram of four adjacent states (Example 3.2)

Figure 3.3 The state space images and the modified state transition diagram (Example 3.3)

Figure 3.4 State transition diagram of the E‐EMLM

Figure 3.5 CBP of both service‐classes in the E‐EMLM (Example 3.5) 

Figure 3.6 Link utilization in the E‐EMLM (Example 3.5) 

Figure 3.7 The state space images and the state transition diagram (Example 3.6)

Figure 3.8 The state space images and the modified state transition diagram (Example 3.6)

Figure 3.9 CBP of service‐class 1 (EMLM, E‐EMLM) (Example 3.8)

Figure 3.10 CBP of service‐class 2 (EMLM, E‐EMLM) (Example 3.8)

Figure 3.11 Equalized CBP (EMLM/BR, E‐EMLM/BR) (Example 3.8)

Figure 3.12 Link utilization for all models (Example 3.8)

Figure 3.13 The state space images and the state transition diagram (Example 3.9)

Figure 3.14 The state space images and the modified state transition diagram (Example 3.9)

Figure 3.15 The loss system of Example 3.9 as an access tree network (Example 3.11)

Figure 3.16 CBP of service‐class 1, when images (Example 3.12)

Figure 3.17 CBP of service‐class 2, when images (Example 3.12)

Figure 3.18 CBP of service‐class 3, when images (Example 3.12)

Figure 3.19 Link utilization (Example 3.12)

Figure 3.20 CBP of the first service‐class, when images and images (Example 3.12)

Figure 3.21 CBP of the second service‐class, when images and images (Example 3.12)

Figure 3.22 CBP of the third service‐class, when images and images (Example 3.12)

Figure 3.23 The state space images and the state transition diagram (Example 3.13)

Figure 3.24 CBP of both service‐classes in the EA‐EMLM (Example 3.16)

Figure 3.25 Link utilization in the EA‐EMLM (Example 3.16) 

Figure 3.26 The state space images and the state transition diagram (Example 3.17)

Figure 3.27 Equalized CBP of the EA‐EMLM/BR and CBP per service‐class of the EA‐EMLM (Example 3.19)

Figure 3.28 The state space images and the state transition diagram (Example 3.20)

Figure 3.29 CBP of service‐class 1, when images and 5 (Example 3.22)

Figure 3.30 CBP of service‐class 2, when images, and images (Example 3.22)

Figure 3.31 CBP of service‐class 3, when images, and images (Example 3.22)

Figure 3.32 SDN/NFV based next‐generation network architecture

Figure 3.33 Layering concept in SDN

Figure 3.34 SDN/NFV based RAN

Figure 4.1 The state space images and the state transition diagram (Example 4.1)

Figure 4.2 The state space images and the modified state transition diagram (Example 4.2)

Figure 4.3 The state space images and the state transition diagram (Example 4.4)

Figure 4.4 The state space images and the modified state transition diagram (Example 4.4)

Figure 4.5 CBP of service‐class 1 (MRM, E‐MRM) (Example 4.12)

Figure 4.6 CBP of service‐class 2 (MRM, E‐MRM) (Example 4.12)

Figure 4.7 CBP of service‐class 3 (MRM, E‐MRM) (Example 4.12)

Figure 4.8 Equalized CBP (MRM/BR, E‐MRM/BR) (Example 4.12)

Figure 4.9 The state space images and the state transition diagram (Example 4.13)

Figure 4.10 The state space images and the state transition diagram (Example 4.16)

Figure 4.11 CBP of service‐class 1 (MRM, MRM/BR, EA‐MRM, EA‐MRM/BR) (Example 4.24)

Figure 4.12 CBP of service‐class 2 (MRM, MRM/BR, EA‐MRM, EA‐MRM/BR) (Example 4.24)

Figure 4.13 CBP of service‐class 3 (MRM, MRM/BR, EA‐MRM, EA‐MRM/BR) (Example 4.24)

Figure 4.14 Link utilization (MRM/BR, EA‐MRM/BR) (Example 4.24)

Figure 5.1 The service model of ON–OFF calls

Figure 5.2 The mechanisms of call and burst blocking in the ON–OFF model

Figure 5.3 The state transition diagram of the ON–OFF model

Figure 5.4 Basic assumption (approximation) for the determination of BBP

Figure 5.5 Analytical CBP when images b.u. (Example 5.6)

Figure 5.6 Analytical CBP when images b.u. (Example 5.6)

Figure 5.7 The fixed routing network with two links and three service‐classes (Example 5.7) 

Figure 5.8 Analytical CBP for the three service‐classes (Example 5.7)

Figure 5.9 Total utilization for the first link (Example 5.7.)

Figure 5.10 Total utilization for the second link (Example 5.7)

Figure 5.11 BBP for all service‐classes when images and images (Example 5.7)

Figure 5.12 A WDM‐TDMA PON servicing ON–OFF traffic

Figure 6.1 State transition diagram for the Engset loss model images

Figure 6.2 The state space images and the state transition diagram (Example 6.4) 

Figure 6.3 State transition diagram of the EnMLM

Figure 6.4 TC probabilities (Example 6.9)

Figure 6.5 TC probabilities of service‐class 1 (Example 6.12)

Figure 6.6 TC probabilities of service‐class 2 (Example 6.12)

Figure 6.7 TC probabilities of service‐class 3 (Example 6.12)

Figure 6.8 Link utilization (Example 6.12) 

Figure 6.9 TC probabilities of service‐class 1 for various numbers of sources (Example 6.12)

Figure 6.10 TC probabilities of service‐class 2 for various numbers of sources (Example 6.12)

Figure 6.11 TC probabilities of service‐class 3 for various numbers of sources (Example 6.12)

Figure 6.12 The S1 interface and the X2 interface between source and target eNBs

Figure 7.1 The state space images and the state transition diagram (Example 7.1)

Figure 7.2 The state space images and the state transition diagram (Example 7.4)

Figure 7.3 The state space images and the state transition diagram (Example 7.6)

Figure 7.4 The state space images and the state transition diagram (Example 7.8)

Figure 7.5 The state space images and the state transition diagram (Example 7.11)

Figure 7.6 The state space images and the state transition diagram (Example 7.14)

Figure 8.1 The state space images and the state transition diagram (Example 8.1)

Figure 8.2 The state space images and the state transition diagram (Example 8.2)

Figure 8.3 The state space images and the state transition diagram (Example 8.4)

Figure 8.4 The state space images and the modified state transition diagram (Example 8.4)

Figure 8.5 The state space images and the state transition diagram (Example 8.6)

Figure 8.6 The state space images and the state transition diagram (Example 8.9)

Figure 8.7 TC probabilities for service‐class 1 images b.u.) (Example 8.11)

Figure 8.8 TC probabilities for service‐class 1 (images b.u.) (Example 8.11)

Figure 8.9 TC probabilities for service‐class 2 (T = 90 b.u.) (Example 8.11) 

Figure 8.10 TC probabilities for service‐class 2 (T = 100 b.u.) (Example 8.11) 

Figure 8.11 TC probabilities for service‐class 3 (T = 90 b.u.) (Example 8.11) 

Figure 8.12 TC probabilities for service‐class 3 (T = 100 b.u.) (Example 8.11) 

Figure 8.13 The reference C‐RAN architecture

Figure 8.14 Enabling a hybrid SON

Figure 9.1 The state transition diagram of the f‐ON–OFF model

Figure 9.2 TC probabilities for service‐class 1 when a) images, (b) images, and (c) images (Example 9.4)

Figure 9.3 TC probabilities for service‐class 2 when (a) images, (b) images, and (c) images (Example 9.4)

Figure 9.4 BBP for both service‐classes when (a) images and (b) images (Example 9.4)

Figure 9.5 A basic configuration of an OCDMA PON

Figure 10.1 Call arrivals according to (a) a Poisson process and (b) a batched Poisson process

Figure 10.2 The state transition diagram in (a) the EMLM and (b) the BP‐EMLM (Example 10.1)

Figure 10.3 Graphical representation of 10.13 (Example 10.3)

Figure 10.4 Difference between CC and TC probabilities (Example 10.5)

Figure 10.5 TC probabilities of service‐class 1 (Example 10.11)

Figure 10.6 CC probabilities of service‐class 1 (Example 10.11)

Figure 10.7 TC probabilities of service‐class 2 (Example 10.11)

Figure 10.8 CC probabilities of service‐class 2 (Example 10.11)

Figure 10.9 A rectangular cell model for the LEO‐MSS network

Figure 11.1 Equalized TC probabilities (Example 11.5)

Figure 11.2 CC probabilities for service‐class 1 (Example 11.5)

Figure 11.3 CC probabilities for service‐class 2 (Example 11.5)

Figure 11.4 CC probabilities for service‐class 3 (Example 11.5)

Figure 11.5 Equalized TC probabilities (Example 11.10)

Figure 11.6 CC probabilities for service‐class 1 (Example 11.10)

Figure 11.7 CC probabilities for service‐class 2 (Example 11.10)

Figure 11.8 CC probabilities for service‐class 3 (Example 11.10)

Figure 11.9 CC probabilities for service‐class 4 (Example 11.10)

Figure 11.10 Link utilization (in b.u.) (Example 11.10)

Figure 11.11 Congestion probabilities of all service‐classes (elastic/adaptive) (Example 11.10)

Figure A.1 Interdependency of the teletraffic models of Part I of this book

Figure A.2 Interdependency of the teletraffic models of Part II of this book

Figure A.3 Interdependency of the teletraffic models of Part III of this book

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset