Research Article Two-Dimensional Convolution Algorithm for ...

19
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2013, Article ID 852082, 18 pages http://dx.doi.org/10.1155/2013/852082 Research Article Two-Dimensional Convolution Algorithm for Modelling Multiservice Networks with Overflow Traffic Mariusz GBdbowski, Adam Kaliszan, and Maciej Stasiak Poznan University of Technology, Polanka 3, 60-965 Poznan, Poland Correspondence should be addressed to Mariusz GΕ‚Δ…bowski; [email protected] Received 10 March 2013; Accepted 7 May 2013 Academic Editor: Jun Jiang Copyright Β© 2013 Mariusz GΕ‚Δ…bowski et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. e present paper proposes a new method for analytical modelling multiservice networks with implemented traffic overflow mechanisms. e basis for the proposed method is a special two-dimensional convolution algorithm that enables determination of the occupancy distribution and the blocking probability in network systems in which traffic streams of individual classes can be serviced by both primary and alternative resources. e algorithm worked out by the authors makes it possible to model systems with any type of traffic offered to primary resources. In order to estimate the accuracy of the proposed method, the analytical results of blocking probabilities in selected networks with traffic overflow have been compared with simulation data. 1. Introduction e basic structure of telecommunications networks is the hierarchical topology (a.k.a. tree topology). e application of the hierarchical topology is followed by a reduction in financial outlays in constructing networks and makes the effective management of their resources possible. Initially, networks with hierarchical structures were public switched telephone networks (PSTN) [1], based on the application of the circuit switching technology. In the 1950s, the hierarchical structure applied to the PSTN network made it possible to introduce a strategy for diverting traffic via alternative routes [2–5]. To achieve that, the following types of resources were distinguished in the hierarchical structure of a network (defined in systems with circuit switching as link groups): (i) direct group: a group of links defined directly between end nodes, that is, ingress and egress nodes, (ii) transit group: a group of links between the end node and a transit node or between transit nodes, (iii) basic group: a transit group that connects any switch- ing node with its superordinate or subordinate node, or one that leads between nodes of the highest hierarchy. e assumption was at the time that both direct groups and transit groups could be high-usage groups or groups with minimal loss. Basic groups constitute the network backbone of a PSTN telecommunications networkβ€”the so- called core network. e use of these groups decreases the overall cost of the network and enables operators to extend their transmission capabilities without a simultaneous increase in the capacities of nodes and with the assumed traffic loss factor retained. Basic groups are generally groups with relatively minimal losses, whereas direct groups are in the main high-usage groups. According to the traffic management strategy for alternative routes, calls arriving at the nodes of telecommunications networks free resources in direct groups, that are primary groups, are searched. Some part of this traffic, the so-called overflow traffic, that cannot be serviced by a primary group due to its occupancy, is offered to alternative groups. Traffic that is not carried by this group is rejected traffic. e above-discussed method for traffic management via alternative routes was then applied to wireless networks: 2G (e.g., GSMβ€”Global System for Mobile Communications), 3G (e.g. UMTSβ€”Universal Mobile Telecommunication System) and 4G networks (e.g., LTEβ€”Long Term Evolution LTE). Overflow traffic in wireless networks was applied within the framework of the same technology and between networks

Transcript of Research Article Two-Dimensional Convolution Algorithm for ...

Page 1: Research Article Two-Dimensional Convolution Algorithm for ...

Hindawi Publishing CorporationMathematical Problems in EngineeringVolume 2013, Article ID 852082, 18 pageshttp://dx.doi.org/10.1155/2013/852082

Research ArticleTwo-Dimensional Convolution Algorithm for ModellingMultiservice Networks with Overflow Traffic

Mariusz GBdbowski, Adam Kaliszan, and Maciej Stasiak

Poznan University of Technology, Polanka 3, 60-965 Poznan, Poland

Correspondence should be addressed to Mariusz GΕ‚Δ…bowski; [email protected]

Received 10 March 2013; Accepted 7 May 2013

Academic Editor: Jun Jiang

Copyright Β© 2013 Mariusz GΕ‚Δ…bowski et al. This is an open access article distributed under the Creative Commons AttributionLicense, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properlycited.

The present paper proposes a new method for analytical modelling multiservice networks with implemented traffic overflowmechanisms. The basis for the proposed method is a special two-dimensional convolution algorithm that enables determinationof the occupancy distribution and the blocking probability in network systems in which traffic streams of individual classes can beserviced by both primary and alternative resources. The algorithm worked out by the authors makes it possible to model systemswith any type of traffic offered to primary resources. In order to estimate the accuracy of the proposedmethod, the analytical resultsof blocking probabilities in selected networks with traffic overflow have been compared with simulation data.

1. Introduction

The basic structure of telecommunications networks is thehierarchical topology (a.k.a. tree topology). The applicationof the hierarchical topology is followed by a reduction infinancial outlays in constructing networks and makes theeffective management of their resources possible. Initially,networks with hierarchical structures were public switchedtelephone networks (PSTN) [1], based on the application ofthe circuit switching technology. In the 1950s, the hierarchicalstructure applied to the PSTN network made it possibleto introduce a strategy for diverting traffic via alternativeroutes [2–5]. To achieve that, the following types of resourceswere distinguished in the hierarchical structure of a network(defined in systems with circuit switching as link groups):

(i) direct group: a group of links defined directly betweenend nodes, that is, ingress and egress nodes,

(ii) transit group: a group of links between the end nodeand a transit node or between transit nodes,

(iii) basic group: a transit group that connects any switch-ing node with its superordinate or subordinate node,or one that leads between nodes of the highesthierarchy.

The assumption was at the time that both direct groupsand transit groups could be high-usage groups or groupswith minimal loss. Basic groups constitute the networkbackbone of a PSTN telecommunications networkβ€”the so-called core network. The use of these groups decreasesthe overall cost of the network and enables operators toextend their transmission capabilities without a simultaneousincrease in the capacities of nodes and with the assumedtraffic loss factor retained. Basic groups are generally groupswith relatively minimal losses, whereas direct groups arein the main high-usage groups. According to the trafficmanagement strategy for alternative routes, calls arriving atthe nodes of telecommunications networks free resources indirect groups, that are primary groups, are searched. Somepart of this traffic, the so-called overflow traffic, that cannotbe serviced by a primary group due to its occupancy, is offeredto alternative groups. Traffic that is not carried by this groupis rejected traffic.

The above-discussed method for traffic management viaalternative routes was then applied to wireless networks: 2G(e.g., GSMβ€”Global System forMobile Communications), 3G(e.g. UMTSβ€”Universal Mobile Telecommunication System)and 4G networks (e.g., LTEβ€”Long Term Evolution LTE).Overflow traffic in wireless networks was applied within theframework of the same technology and between networks

Page 2: Research Article Two-Dimensional Convolution Algorithm for ...

2 Mathematical Problems in Engineering

operating in different technologies (e.g. GSM, UMTS, andLTE) [6–8].

In present-daymarket place, the growing variety of differ-ent access technologiesβ€”both wireless and wired networksβ€”is accompanied by a concurrent unification with regard tonetwork layer protocols: the standard for the network layeris the IP protocol (v4, v6). At the same time, the increasingnumber of network service has eventually led to a necessityto ensure predefined quality of service (QoS) parametersdemanded by traffic sources in a network. Defined quality ofservice parameters in networks with packet switching is guar-anteed following creation of virtual channels (with dedicatedor shared resources) that transmit packet streams related to agiven class (or classes) of service, which leads to a connection-oriented packet-switching architecture communications.Theallocation of packet streams to given classes of services isexecuted (in edge routers) as a result of an appropriatedetermination of the field of the type (class) of service inthe IP header. This identification field can then be used asa DSCP (Differentiated Services Code Point) code point inpacket marking in the case of the DiffServ (DifferentiatedServices) architecture. In the case of the MPLS technology(MultiProtocol Label Switching), the most widely used byoperators in backbone networks, the field determining thetype of class is mapped into a value of a corresponding labelthat unequivocally determines the path in the network and/orthe EXP (experimental) parameter used for distinguishingquality parameters for packet streams transmitted over thesame path.Theparameters that can be used for a classificationof packet streams are, for example, the interface of theedge router (ingress router), the address of the destinationnetwork, and the relationship of the source of traffic streamwith a given VPN network (virtual private networks) of thesecond or the third layer [9–11].

From the traffic engineering perspective, the resources(virtual channels, MPLS paths) that are used to serviceindividual packet streams (traffic) can be treated as theprimary resources. At the same time, in order to optimize theresources of a network and to secure the demanded qualityof service, prevent the network from being overloaded, aswell as for network survivability, additional resources (suchas additional MPLS paths, additional resources within MPLSpath) can be introduced to the connection-oriented packetnetworks in which packets lost as a result of the servicein dedicated primary resources would be transmitted. Suchan additional resource (virtual channel, MPLS path) thatservices blocked traffic in the primary resources can betreated as the alternative resources that service overflowtraffic.

The major difficulty that occurs during an analysis ofsystems with traffic overflow is to determine the demandedvolume of alternative resources (with low losses). If weassume that a given distribution of time between calls (a callin packet networks can be interpreted as a session, e.g., TCPor UDP session) is offered to the primary resources (e.g.,exponential distribution), then traffic that overflows fromthese resources will be of a different nature [12], becausecalls from an overflow stream can appear only during thetotal occupancy of the primary resources.This means that an

overflow stream is more β€œconcentrated/dense” within certaintime intervals, that is, having a dynamic and β€œpeak” natureas compared to traffic offered to primary resources. If weassume identical value of offered traffic and identical value ofthe blocking probability, then to execute service for overflowtraffic, a greater number of resources is required than that forthe service of traffic offered to the primary resources.

In traffic engineering, in works devoted to modelling ofsystems with traffic overflow, it has been usually assumedthat the call stream offered to primary resources is consistentwith the Poisson distribution or with binomial distribution[8, 12–19]. The variety of network services to be observedin modern-day networks results, however, in a situationwhere the previously adopted assumptions do not describecall streams generated in packet networks precisely enough.To make an analytical modelling of the network with anydistribution of call streams offered to primary resourcespossible, this paper proposes a new method for modellingmultiservice packet networks with implemented traffic over-flow mechanisms. The basis of the proposed method is aspecial two dimensional convolution algorithm.Theworked-out method allows researchers to determine the occupancydistribution and the blocking/loss probability in networkswith both primary and alternative resources.

The further part of the paper is organized as follows.Section 2 presents an overview of research studies in mod-elling multiservice networks with traffic overflow. Section 3proposes a new model of the overflow system with multiratetraffic. In Section 4, the results of the analytical calculationsare compared with the results of the simulation. Section 5sums up the paper’s main conclusions.

2. Related Works

In traffic theory both single-service systems [12, 14, 16] andmultiservice systems [17, 20] have been considered. In thecase of single-service systems, all calls that are serviced by atelecommunications system always demand the same amountof resources. In the case of multiservice systems, in whichmultirate models are used for modelling, offered traffic isa mixture of different classes of calls, each demanding aninteger multiplicity of a certain unit of the resources, calledbasic bandwidth unit (BBU) [21–28]. In the case of constantbit rate sources, resources are expressed in bit rates of originaltraffic streams. In the case of variable bit rate sources prior theBBU determination, the so-called equivalent bandwidth [27]for particular traffic packet streams is calculated (Methodsfor determination of equivalent bandwidth depend on suchparameters such as admissible packet loss rate, admissiblelatency, link capacity, the average and the maximum valueof bit rate, the nature of packet streams (e.g., self-similarstreams), and the type of the network. Algorithms for deter-mination of the equivalent bandwidth for defined types of thenetwork and services are proposed, for example, in [27, 29–36].)

For single-rate traffic, two basic methods for determina-tion of blocking probabilities in alternative groups (groupsto which traffic overflows from other groups) have been

Page 3: Research Article Two-Dimensional Convolution Algorithm for ...

Mathematical Problems in Engineering 3

worked-out: the equivalent random technique (ERT)method[12, 14] and the Fredericks-Hayward method [16]. The lattermethod has become the basis for a generalization for multi-rate overflow traffic [17]. In this method [17], probabilities ofsubsequent states were determined in a recurrent way usingthe generalization of Kaufman-Roberts formula [37, 38].

A different technique for modelling networks with trafficoverflow is proposed in [39]. The basis for the methodproposed in [39] is the Erlang’s Ideal Grading model withmultirate traffic [40, 41]. The objective of the proposedmethod is to simplify the process of the determination of theoccupancy distribution in systems with traffic overflow as itdoes not require calculations for the parameters of overflowtraffic. Its accuracy is comparable to the accuracy of themethod [17]. The basic limitation of this method is that onlyone class of calls is offered to each of the primary resources.

In calculations of multiservice systems with traffic over-flow, the so-called convolution algorithms [20, 22, 42, 43]can also be used. The advantage of these algorithms is thatthey offer a possibility to model systems with any streams ofoffered traffic. References [22, 42, 43] propose convolutionmodels of systems with reservation. In [44], the authorsof the paper describe, for the first time, the problem ofmodelling systems with overflow traffic with the applicationof the convolution mechanism. The presented method ischaracterized by high accuracy, though the scope of itsapplication is limited to systems in which each of the primaryresources services directly calls of only one traffic class. Thispaper proposes, using the concept idea presented in [44], anew, generalized method that makes it possible to determinecharacteristics of multiservice systems with traffic overflowin which each primary group is offered a number of trafficstreams. To improve the order of computational complexityof the new method, the simultaneous convolution operation(proposed in [44]) has been replaced by a two-dimensionalconvolution operation worked-out for the purposes of thispaper (Section 3).

3. Modelling of Multiservice Systems withTraffic Overflow

3.1. Basic Assumptions. In order to present the basic assump-tions of the proposed method for modelling systems withoverflow traffic, let us consider an overflow system thatconsists of π‘˜ primary groups that belong to the set𝐾 and onealternative group (Figure 1). Each primary group 𝑗 (𝑗 ∈ 𝐾)is offered traffic classes π‘š(𝑗)1 , π‘š

(𝑗)

2 , . . . , π‘š(𝑗)

π‘šπ‘—from the set𝑀{𝑗}

with cardinality π‘š{𝑗}. Traffic of class π‘š(𝑗)𝑖, the calls of which

demand 𝑑(𝑗)𝑖

BBUs, is offered to the primary group 𝑗. Let𝑀denote a set of all offered classes:

𝑀 = {𝑀{1},𝑀{2}, . . . ,𝑀

{π‘˜}}

= {π‘š(1)

1 , π‘š(1)

2 , . . . , π‘š(1)

π‘š{1}, π‘š(2)

1 , . . . ,

π‘š(2)

π‘š(2), . . . , π‘š

(π‘˜)

1 , . . . , π‘š(π‘˜)

π‘š{π‘˜}} .

(1)

Classes of set 𝑀

π‘š{1} classes of set 𝑀{1} π‘š{π‘˜} classes of set 𝑀{π‘˜}

Clas

sπ‘š(1)

1

Clas

sπ‘š(π‘˜)

1

𝐴(1)

1,𝑑

(1)

1

𝐴(π‘˜)

1,𝑑

(π‘˜)

1

𝐴(1)

π‘š1,𝑑

(1)

π‘š1

Clas

sπ‘š(1)

π‘š1

Clas

sπ‘š(π‘˜)

π‘šπ‘˜

𝑉1

𝑉0

π‘‰π‘˜Β· Β· Β·Β· Β· Β·

Β· Β· Β·

...

...

...

𝐴(π‘˜)

1,𝑑

(π‘˜)

π‘šπ‘˜

Figure 1: Structure of an overflow system.

A primary group with the capacity 𝑉𝑗 services traffic streamswith the intensity𝐴(𝑗)1 , 𝐴

(𝑗)

2 , . . . , 𝐴(𝑗)

π‘š{𝑗}. Discarded traffic that is

not serviced in these groups forms an overflow traffic stream.This traffic is then offered to the alternative group with thecapacity 𝑉0. Hence, calls of classes of the set𝑀

{𝑗} can occupyat the maximum 𝑑{𝑗} BBUs in the system:

𝑑{𝑗}= 𝑉0 + 𝑉𝑗. (2)

The calls of classπ‘š(𝑗)𝑖

can occupy at the maximum 𝑑{𝑗}𝑖

BBUsin the system:

𝑑{𝑗}

𝑖= ⌊

𝑉𝑗

𝑑(𝑗)

𝑖

βŒ‹ 𝑑(𝑗)

𝑖+ ⌊

𝑉0

𝑑(𝑗)

𝑖

βŒ‹ 𝑑(𝑗)

𝑖. (3)

The total capacity of the system is

𝑉 = 𝑉0 +

π‘˜

βˆ‘

𝑗=1

𝑉𝑗. (4)

3.2. OccupancyDistribution. Firstly, let us consider the occu-pancy distribution [𝑃]𝑀

{𝑗}

𝑑{𝑗}= {[𝑃0]

𝑀{𝑗}

𝑑{𝑗}, [𝑃1]𝑀{𝑗}

𝑑{𝑗},. . .,[𝑃𝑛]

𝑀{𝑗}

𝑑{𝑗},

. . . , [𝑃𝑑{𝑗}]𝑀{𝑗}

𝑑{𝑗}} in the basic subsystem of the considered

overflow system presented in Figure 1, that is, a system withone primary group 𝑗 and one alternative group for calls ofclasses of the set𝑀{𝑗}. A single 𝑛th element of the distribution[𝑃]𝑀{𝑗}

𝑑{𝑗}, that is, [𝑃𝑛]

𝑀{𝑗}

𝑑{𝑗}, denotes the probability of 𝑛 busy

BBUs. The maximum number of BBUs that can be occupiedin such a system is 𝑑{𝑗} (equation (2)).

By expanding our analysis of the system into a subsystemthat is composed of two primary groups β€œπ‘—β€ and β€œπ‘— + 1”,we can determine the occupancy distribution for two sets ofservice classes𝑀{𝑗} and𝑀{𝑗+1}. The single element [𝑃𝑛]

𝑀{𝑗,𝑗+1}

𝑑{𝑗,𝑗+1}

of the occupancy distribution in the systemwith two primarygroups 𝑗 and 𝑗+1 can be obtained by a convolution operationof distributions [𝑃]𝑀

{𝑗}

𝑑{𝑗}and [𝑃]𝑀

{𝑗+1}

𝑑{𝑗+1}:

[𝑃𝑛]𝑀{𝑗,𝑗+1}

𝑑{𝑗,𝑗+1}= π‘˜ β‹…

𝑛

βˆ‘

𝑙=0

[𝑃𝑙]𝑀{𝑗}

𝑑{𝑗}[π‘ƒπ‘›βˆ’π‘™]

𝑀{𝑗+1}

𝑑{𝑗+1}, (5)

Page 4: Research Article Two-Dimensional Convolution Algorithm for ...

4 Mathematical Problems in Engineering

where 𝑑{𝑗} and 𝑑{𝑗+1} are determined by (2), in which 𝑑{𝑗,𝑗+1}determines a new length of the distribution equal to

𝑑{𝑗,𝑗+1}

= 𝑉𝑗 + 𝑉𝑗+1 + 𝑉0. (6)

The parameter π‘˜ in (5) is the normalization coefficient.Notice that according to the convolution operation definedby (5), the distribution [𝑃]𝑀

{𝑗,𝑗+1}

𝑑{𝑗,𝑗+1}is shortened to the length

𝑑{𝑗,𝑗+1} that is lower than 𝑑{𝑗} + 𝑑{𝑗+1}. After shortening of

the distribution, it is necessary then to normalize it. Thenormalization coefficient π‘˜ ensures the sum of all elementsof the distribution to be equal to one:

π‘˜ =1

βˆ‘π‘‘{𝑗,𝑗+1}

𝑛=0 βˆ‘π‘›

𝑙=0 [𝑃𝑙]𝑀{𝑗}

𝑑{𝑗}[π‘ƒπ‘›βˆ’π‘™]

𝑀{𝑗+1}

𝑑{𝑗+1}

. (7)

Let us notice that the expression (5) does not preciselyreflect the operation of the overflow system since the convo-lution operation does not take into consideration states thatappear as a result of the termination of a service of certaincalls. States that occur directly after the termination of theservice of a call in the primary group, in instances whereall BBUs of the primary group and some (or all) BBUs ofthe alternative group were busy before the termination ofthis service, are not taken into consideration properly. Topresent this phenomenon, let us consider a simple exampleof an overflow system that is composed of three primarygroups 1, 2, and 3 with the capacities 𝑉1 = 4, 𝑉2 = 4,and 𝑉3 = 4 BBUs. Each group is offered one traffic classwith demands equal to 1 BBU. Traffic coming from the threegroups overflows to alternative groupwith the capacity𝑉0 = 4BBUs. The total capacity of this system is then equal to 16BBUs. Let us consider now the combination (4, 8, 0). Theadopted notation is such that calls of the first class, offeredto the first group, occupy 4 BBUs and calls of the secondclass, offered to the second group, occupy 8 BBUs, whereasno call that was offered to the third group is currently beingserviced. The combination (4, 8, 0) is feasible because callsof the first class π‘š(1)1 occupy the entire primary group 1 (4BBUs). Then, calls of class π‘š(2)2 can occupy 8 BBUs (entireprimary group 2 (4 BBUs) and the whole alternative group (4BBUs)) because calls of class π‘š(3)3 are not serviced at all. Theconsidered combination is shown in Figure 2(a).

Note that themethod for determination of the occupancydistribution in the system with traffic overflow presentedin [44] assumes that after termination of each of the callsserviced in the primary group, calls are transferred from thealternative group to the appropriate primary group providedthat the latter has free resources. This means that after adisconnection of a call of class 2 in the primary group 2in the considered state (4, 8, 0), the system transits to state(4, 7, 0) (Figure 2(b)) in which immediately a transfer of theserviced connection of class 2 in the alternative group tothe primary group is executed (Figure 2(c)). Consequently,the combination (4, 7, 0) means the occupancy of 4 BBUs bycalls of class 1 in the primary group 1 and 7 BBUs by callsof class 2; while all 4 BBUs are busy in the primary group,2 and 3 BBUs are busy in the alternative group. Hence, the

convolution (5) determines the occupancy distribution in theoverflow system that includes a transfer of connections fromalternative group to primary group.

Subsequently, let us try to determine, for the consideredexemplary system, the aggregated distribution for the casewhen the system simultaneously services calls that are offeredto all of the three primary groups.This distribution cannot bedetermined in a direct way since not all of the combinationsincluded and taken into consideration in the distribution (5)are allowable. Consider an exemplary combination (2, 8, 5)in which calls offered to primary group 1 occupy 2 BBUs,calls offered to primary group 2 occupy 8 BBUs, and callsoffered to primary group 3 occupy 5 BBUs. In total, thereare 15 BBUs occupied for such a combination, less thanthe total capacity of the system 𝑉 = 16. Note, however,that according to the combination under consideration callsoffered initially to primary group 2 occupy 4 BBUs in thealternative group, whereas calls offered initially to primarygroup 3 occupy 1 BBU. This means that calls offered initiallyto primary group 2 and 3 β€œoccupy” more resources of thealternative group than the number of resources available inthe group.Therefore, while determining probabilities for eachof the states, it is necessary to omit those combinations thatlead to an occupancy state in the alternative group higherthan its capacity.

Themethod that assumes call transfers between the alter-native and the primary group and eliminates all forbiddenstates in which the number of busy BBUs in the alternativegroup exceeds the capacity of this group, the so-calledsimultaneous convolution operation of many distributions,is proposed in [44]. The method is characterized by highaccuracy, while its limitation involves the assumption ofonly one call class that is offered to each of the primarygroups. In Section 3.3, a new method will be proposed. Themethod is based on the so-called two-dimensional convo-lution operation that, due to a lower order of complexity,can make it possible to model more effectively systems withoverflow traffic in which the primary group services singleclasses of calls. This will be followed by a presentation of twogeneralized methods (continuous methodβ€”Section 3.5.1β€”and discrete methodβ€”Section 3.5.2) that enable modellingsystems in which each primary group can be offered manyclasses of calls.

3.3. Two-Dimensional Distribution. Let state (𝑦, 𝑛) denotea state in which there are 𝑦 occupied resources of thealternative group, with the total occupancy of the systemequal to 𝑛. The two-dimensional occupancy distribution inthis system will be denoted by the symbol [𝑅]𝑉0 ,𝑉. In thisdistribution a single element [𝑅𝑦,𝑛]𝑉0 ,𝑉 determines the stateprobability (𝑦, 𝑛).

According to the adopted notation in the paper, the firstdimension determines the occupancy state of the alterna-tive group, whereas the second dimension determines theoccupancy state of the whole system. To justify such anapproach let us consider an exemplary relation betweenthe one-dimensional distribution [𝑃]

𝑀{𝑗}

𝑉 and the two-dimensional distribution [𝑅]𝑀

{𝑗}

𝑉0 ,𝑉. Both distributions describe

Page 5: Research Article Two-Dimensional Convolution Algorithm for ...

Mathematical Problems in Engineering 5

state probabilities for the system with traffic overflow that iscomposed of the primary group 𝑗with the capacity𝑉𝑗 and thealternative group with the capacity 𝑉0. The primary group 𝑗is offered calls from the set 𝑀{𝑗}. The relations between theelements of both distributions can be written in the followingway:

[𝑃𝑛]𝑀{𝑗}

𝑉=

𝑉0

βˆ‘

𝑦=0

[𝑅𝑦,𝑛]𝑀{𝑗}

𝑉0,𝑉. (8)

Figure 3 shows the interpretation of (8) for the systemcomposed of the primary group with the number 1, withthe capacity 𝑉1 = 4 and the alternative group with thecapacity 𝑉0 = 4. The primary group is offered calls fromthe set 𝑀{1}. The figure shows only those statesβ€”(𝑦, 𝑛)β€”of the distribution [𝑅]𝑀

{1}

𝑉0 ,𝑉that are permitted by the system.

Thus, the states in which a larger amount of resources ofthe alternative group than the capacity of this group wouldbe occupied (𝑦 > 𝑉0), as well as the states in which moreresources of the alternative group than the total amount ofoccupied resources would be occupied (𝑦 > 𝑛), are omitted.

3.4. Modelling of Systems in Which the Primary Group IsOffered a Single Class of Calls. Let us recall that the methodproposed in [44] is limited to the instances of modelling ofsystems in which the primary group is offered only one classof calls.Themethod [44] can be optimized effectivelywith theapplication of the two-dimensional distribution presented inthe further part of this subsection.The input data that enablethe determination of the two-dimensional distribution arethen the occupancy distributions of the so-called subsystems.A subsystem is composed of a set of a certain number ofprimary groups and an alternative group. In this paper, thebasic subsystem 𝑗 will be a system that is composed of theprimary group 𝑗 and an alternative group. In our furtherconsiderations, the assumption that the system with trafficoverflow is approximated by a system with calls transfer stillholds good.

3.4.1. Determination of the Two-Dimensional Occupancy Dis-tribution of the Basic Subsystem. Using the two-dimensionaldistribution [𝑅]𝑀

{𝑗}

𝑉0,𝑑{𝑗} , it is possible to describe the char-

acteristics of the occupancy for the basic subsystem 𝑗. Asingle element [𝑅𝑦,𝑛]

𝑀{𝑗}

𝑉0 ,𝑑{𝑗} of this distribution determines the

occupancy probability of 𝑦 BBUs in the alternative group and𝑛 BBUs in the whole system by calls of the classes from theset𝑀{𝑗}. In the case of the basic subsystem 𝑗 the set𝑀{𝑗} is aone-element set. To improve the readability of the notation,we adopt that the symbols [𝑝] and [π‘Ÿ] will always denoteoccupancy distributions for one class of calls exclusively.

In the basic subsystem 𝑗, which is offered one call ofclass 𝑖, the distribution [π‘Ÿ]{π‘š

(𝑗)

𝑖}

𝑉0 ,𝑑{𝑗} is the equivalent of the dis-

tribution [𝑅]𝑀{𝑗}

𝑉0 ,𝑑{𝑗} . In a similar way, the distribution [𝑝]{π‘š

(𝑗)

𝑖}

𝑑{𝑗}

is the equivalent of the distribution [𝑃]𝑀{𝑗}

𝑑{𝑗}. A single element

[π‘Ÿπ‘¦,𝑛]{π‘š(𝑗)

𝑖}

𝑉0 ,𝑑{𝑗} of the two-dimensional distribution can be deter-

mined on the basis of a single element of the one-dimensionaldistribution [𝑝]{π‘š

(𝑗)

𝑖}

𝑑{𝑗}for the group with the capacity 𝑑{𝑗}. For

this purpose, we adopt that for the occupancy states 𝑛 >𝑉𝑗, where 𝑛 denotes the total number of busy (occupied)resources, the relation 𝑦 = 𝑛 βˆ’ βŒŠπ‘‰π‘—/𝑑

(𝑗)

π‘–βŒ‹π‘‘(𝑗)

𝑖is fulfilled. The

parameter 𝑦 denotes the number of busy resources of thealternative group. The adopted assumption is fulfilled for thesystems with calls’ transfer and allows for the occurrence ofa state in which the resources of the alternative group arebusy, while part of the resources of the primary group has notbeen entirely used. Unused resources of the primary groupresult from the necessity of servicing a single call requiring𝑑(𝑗)

𝑖within one group.Thus according to adopted assumptions, the relation

between the expressions of both distributions (one-dimensional and two-dimensional) can then be written inthe following way:

[π‘Ÿπ‘¦,𝑛]{π‘š(𝑗)

𝑖}

𝑉0,𝑑{𝑗}=

{{{{{{{{{{{{{{{

{{{{{{{{{{{{{{{

{

[𝑝𝑛]{π‘š(𝑗)

𝑖}

𝑑{𝑗}for (𝑦 = 0)

∧(𝑛 β©½ βŒŠπ‘‰π‘—

𝑑(𝑗)

𝑖

βŒ‹ 𝑑(𝑗)

𝑖) ,

[𝑝𝑛]{π‘š(𝑗)

𝑖}

𝑑{𝑗}for (𝑦 = 𝑛 βˆ’ ⌊

𝑉𝑗

𝑑(𝑗)

𝑖

βŒ‹ 𝑑(𝑗)

𝑖)

∧(βŒŠπ‘‰π‘—

𝑑(𝑗)

𝑖

βŒ‹ 𝑑(𝑗)

𝑖< 𝑛 β©½ 𝑑

{𝑗}) ,

0 in remaining cases.(9)

Following the assumption for transferring the calls, it ispossible to determine in an easy way the two-dimensionaldistribution [𝑅]{𝑀

{𝑗}

𝑖}

𝑉0 ,𝑑{𝑗} of the occupancy in the basic system to

which one class of calls is offered. The following subsectionwill present a description of the method for a determinationof the two-dimensional occupancy distribution for multiser-vice systems with traffic overflow.Themethod (Section 3.4.2)is universal and does not depend on the number of trafficclasses offered to basic subsystems. The distributions deter-mined in the following subsection will provide a startingpoint for the algorithms formodelling systems inwhichmanyclasses of calls are offered to the primary group.

3.4.2. Two-Dimensional Convolution Operation. Considernow a method for a determination of the two-dimensionaloccupancy distribution [𝑅]𝑀𝑉0 ,𝑉 for amultiservice systemwithtraffic overflow. Each expression [𝑅𝑦,𝑛]

𝑀𝑉0 ,𝑉

of this distributiondetermines the occupancy probability 𝑦 BBU of the alterna-tive group and 𝑛 BBU of all groups (including the alternativegroup). The two-dimensional convolution operation makesit possible to effectively determine the distribution [𝑅]𝑀𝑉0 ,𝑉for the whole system with traffic overflow on the basis ofthe occupancy distributions [𝑅]𝑀

{𝑗}

𝑉0 ,𝑑{𝑗} of basic subsystems

𝑗 with traffic overflow. The distribution [𝑅]𝑀{𝑗}

𝑉0,𝑑{𝑗} can be

Page 6: Research Article Two-Dimensional Convolution Algorithm for ...

6 Mathematical Problems in Engineering

1111

2222

2222

Group1 Group2 Group3

Unoccupied BBU12

BBU occupied by a call of class 1BBU occupied by a call of class 2

(a) combination (4, 8, 0)

Unoccupied BBU12

BBU occupied by a call of class 1BBU occupied by a call of class 2

1111

2

22

2222

Group1 Group2 Group3

(b) combination (4, 7, 0) before thetransfer of the call

1111

2222

2

22

Group1 Group2 Group3

Unoccupied BBU12

BBU occupied by a call of class 1BBU occupied by a call of class 2

(c) combination (4, 7, 0) after the trans-fer of the call

Figure 2: Occupancy of resources in the overflow system with calls’ transfer.

0 1 2 3 4 5 6 7 8

0

1

2

3

4

[𝑅1,1]𝑀{1}

4,8

[𝑅0,1]𝑀{1}

4,8[𝑅0,0]𝑀{1}

4,8[𝑅0,2]

𝑀{1}

4,8

[𝑅1,2]𝑀{1}

4,8

[𝑅2,2]𝑀{1}

4,8

[𝑅0,3]𝑀{1}

4,8

[𝑅1,3]𝑀{1}

4,8

[𝑅2,3]𝑀{1}

4,8

[𝑅3,3]𝑀{1}

4,8

[𝑅0,4]𝑀{1}

4,8

[𝑅1,4]𝑀{1}

4,8

[𝑅2,4]𝑀{1}

4,8

[𝑅3,4]𝑀{1}

4,8

[𝑅4,4]𝑀{1}

4,8

[𝑅1,5]𝑀{1}

4,8

[𝑅2,5]𝑀{1}

4,8

[𝑅3,5]𝑀{1}

4,8

[𝑅4,5]𝑀{1}

4,8

[𝑅2,6]𝑀{1}

4,8

[𝑅3,6]𝑀{1}

4,8

[𝑅4,6]𝑀{1}

4,8

[𝑅3,7]𝑀{1}

4,8

[𝑅4,7]𝑀{1}

4,8 [𝑅4,8]𝑀{1}

4,8

[𝑃0]𝑀(1)

8 [𝑃1]𝑀(1)

8[𝑃2]

𝑀(1)

8 [𝑃3]𝑀(1)

8 [𝑃4]𝑀(1)

8 [𝑃5]𝑀(1)

8 [𝑃6]𝑀(1)

8 [𝑃7]𝑀(1)

8 [𝑃8]𝑀(1)

8

𝑛

𝑦

Figure 3: The relation between the one-dimensional and the two-dimensional distribution for a system with traffic overflow.

a distribution for a subsystem in which the group 𝑗 isoffered one class of calls (its determination is described inSection 3.4.1) or a subsystem in which the primary groupis offered a number of call classes (two different methodsfor a determination of these distributions are presented inSection 3.5.1 and Section 3.5.2, resp.).

In order to determine the occupancy distribution for asystem composed of primary groups that belong to the set𝐾, all distributions [𝑅]𝑀

{𝑗}

𝑉0,𝑑{𝑗} (𝑗 ∈ 𝐾) are to be aggregated.

The distribution [𝑅𝑦,𝑛]𝑀{1,...,𝑗}

𝑉0,𝑑{1,...,𝑗} , which determines state prob-

abilities for a subsystem composed of primary groups 1, . . . , 𝑗and the alternative group, is determined on the basis of theconvolution operation formulated as follows:

[𝑅𝑦,𝑛]𝑀{1,...,𝑗}

𝑉0 ,𝑑{1,...,𝑗}

= π‘˜

𝑦

βˆ‘

𝑙𝑦=0

𝑛

βˆ‘

𝑙𝑛=0

[𝑅𝑙𝑦 ,𝑙𝑛]𝑀{1,...,π‘—βˆ’1}

𝑉0 ,𝑑{1,...,π‘—βˆ’1}

[π‘…π‘¦βˆ’π‘™π‘¦ ,π‘›βˆ’π‘™π‘›]𝑀{𝑗}

𝑉0 ,𝑑{𝑗},

(10)

for 𝑦 β©½ 𝑉0 and 𝑦 β©½ 𝑛. The symbol π‘˜ in formula (10) is thenormalization coefficient that is determined as follows:

π‘˜

𝑉0

βˆ‘

𝑦=0

𝑉

βˆ‘

𝑛=0

𝑦

βˆ‘

𝑙𝑦=0

𝑛

βˆ‘

𝑙𝑛=0

[𝑅𝑙𝑦,𝑙𝑛]𝑀{1,...,π‘—βˆ’1}

𝑉0,𝑑{1,...,π‘—βˆ’1}

[π‘…π‘¦βˆ’π‘™π‘¦ ,π‘›βˆ’π‘™π‘›]𝑀{𝑗}

𝑉0,𝑑{𝑗}= 1. (11)

Let us interpret (10) with the example of a system thatis composed of 3 primary groups with the capacity 4 BBUseach and an alternative group with the capacity 4 BBU. Wewill be considering combinations (𝑦, 𝑛) of an overflow systemcomposed of three primary groups and one alternative groupwith the following capacities: 𝑉1 = 𝑉2 = 𝑉3 = 𝑉0 = 4.Let us consider then a combination ((0, 2); (4, 8); (1, 5)) forthe respective 3 subsystems. The considered combinationdescribes a state in which calls of the classes from the set𝑀{1} occupy 2 BBUs in a primary group and do not occupy

resources in the alternative group of the subsystem. Calls ofthe classes from the set𝑀{2} occupy 4 BBUs in the primarygroup and 4 BBUs in the alternative group of the subsystem,

Page 7: Research Article Two-Dimensional Convolution Algorithm for ...

Mathematical Problems in Engineering 7

whereas calls of the classes from the set𝑀{3} occupy 4 BBUsin the primary group and 1 BBU in the alternative groupof the subsystem. Thus, the total number of busy BBUs inthe alternative group is equal to 5, which means that thiscombination is not applicable. Let us analyse now a methodfor determination of the probability of an occurrence ofsuch a combination using the two-dimensional convolutionoperation.

Note that after the classes from the set 𝑀{1} and theclasses from the set𝑀{2} are aggregated, the probabilities ofthe occurrence of the state combination ((0, 2); (4, 8)) will beadded up to the probability of the permitted state [𝑅4,10]

𝑀{1,2}

𝑑{1,2}.

While proceedingwith further aggregation of the distributionof the classes from the set 𝑀{1,2} with the distribution ofthe classes from the set 𝑀{3}, the probability of occurrenceof the state combination ((4, 10); (1, 5)) should be addedto the state probability [𝑅5,15]

𝑀{1,2,3}

𝑑{1,2,3}. This state, however, is

not a permitted state in view of the convolution operationdetermined in (10), which allows us to eliminate properlynonpermitted states in the process of the determination ofthe two-dimensional distribution for the system with trafficoverflow.

Note that the convolution operation increases the lengthof the distribution in the dimension that determines thetotal number of busy BBUs, while the dimension that definesthe capacity of the alternative group remains without anychanges.

The introduced notation, in which one dimension deter-mines the occupancy of the alternative group while theother determines the occupancy of primary groups and thealternative group,makes it possible to directly convolute two-dimensional distributions.The order of complexity of a singleconvolution operation of two-dimensional distributions isequal to Θ(𝑉20𝑉

2), whereas the order of computational com-

plexity of the algorithm for π‘˜ primary groups is Θ(π‘˜π‘‰20𝑉2),

which is a major advantage over the method discussed in[44], where the order of complexity is Θ(π‘‰π‘˜).

3.4.3. Blocking Probability. On the basis of the convolutionoperation (10) it is possible to determine the aggregatedoccupancy distributions [𝑅]𝑀\{𝑀

{𝑗}} for all groups except the

group 𝑗:

[𝑅]𝑀\𝑀

{𝑗}

𝑉0 ,π‘‰βˆ’π‘‰π‘—

= [𝑅]𝑀{1}

𝑑{1}βˆ— β‹… β‹… β‹… βˆ— [𝑅]

𝑀{π‘—βˆ’1}

𝑑{π‘—βˆ’1}βˆ— [𝑅]𝑀{𝑗+1}

𝑑{𝑗+1}βˆ— β‹… β‹… β‹… βˆ— [𝑅]

𝑀{π‘˜}

𝑑{π‘˜}.

(12)

Distribution (12) will allow us to work out a method fordetermination of the blocking probability for calls of trafficclasses offered to group 𝑗, when the alternative group isoffered overflow traffic from all primary groups.

For this purpose, let us consider now the feasible combi-nations of the distributions [𝑅]𝑀\{𝑀

{𝑗}}

𝑉0 ,π‘‰βˆ’π‘‰π‘—and [𝑅]{𝑀

{𝑗}}

𝑉0 ,𝑑{𝑗} . Let the

set Ξ¨(𝑗) be a set of all permitted occupancy combinationsfor the basic subsystem 𝑗 with a subsystem that is composedof primary groups that belong to the set {1, 2, . . . , 𝑗 βˆ’ 1, 𝑗 +1, . . . , π‘˜}. Let us define the possible combinations ((𝑛 βˆ’ 𝑙𝑛,

𝑦 βˆ’ 𝑙𝑦); (𝑛, 𝑦)) of the occupancy of the basic subsystem 𝑗 withthe subsystem that is composed of the remaining primarygroups and the alternative group:

Ξ¨(𝑗)= { (𝑛, 𝑦, 𝑙𝑛, 𝑙𝑦) : (𝑛 β©½ 𝑉) ∧ (𝑦 β©½ min (𝑛, 𝑉0))

∧ (𝑙𝑛 β©½ min (𝑛, 𝑑{𝑗})) ∧ (𝑙𝑦 β©½ min (𝑦, 𝑙𝑛))} .(13)

The condition 𝑛 β©½ 𝑉 is self-explanatory since the totalnumber of BBUs serviced in the system cannot exceed thecapacity of the system. The condition 𝑦 β©½ min(𝑛, 𝑉0) informula (13) means that the number of all busy BBUs inthe alternative group will always be equal to 𝑉0 or 𝑛 at themaximum, if 𝑛 < 𝑉0. The condition 𝑙𝑛 β©½ min(𝑛, 𝑑{𝑗}) meansthat the total number of busy BBUs occupied by calls offeredto the group 𝑗 cannot be higher than the availability 𝑑{𝑗} of thebasic subsystem 𝑗 or than the total number of 𝑛 busy BBUs inthe system (if 𝑛 < 𝑑{𝑗}).The condition 𝑙𝑦 β©½ min(𝑦, 𝑙𝑛), in turn,expresses the fact the number of busy BBUs in the alternativegroup occupied by calls that overflow from the group 𝑗 willnever be higher than the total number 𝑙𝑛 of the resources thatoccupy calls offered to the group 𝑗 or than the total number𝑦 of occupied resources of the alternative group, if 𝑦 < 𝑙𝑛.

In the same way we will define the setΞ¨(𝑗)𝑖

that is a subsetof the set Ξ¨(𝑗) and that determines the blocking state for theclass π‘š(𝑗)

𝑖. The basis for the determination of this set is the

lack of 𝑑(𝑗)𝑖

free BBUs in both the alternative and the primarygroup 𝑗. Therefore we get

Ξ¨(𝑗)

𝑖= { (𝑛, 𝑦, 𝑙𝑛, 𝑙𝑦) ∈ Ξ¨

(𝑗): (𝑦 > V0 βˆ’ 𝑑

(𝑗)

𝑖)

∧ (𝑙𝑛 βˆ’ 𝑙𝑦 > 𝑉𝑗 βˆ’ 𝑑(𝑗)

𝑖)} .

(14)

The probability 𝑃(𝑛, 𝑦, 𝑙𝑛, 𝑙𝑦) of the combination from theset Ξ¨(𝑗), in which calls of all classes occupy 𝑛 BBUs in theprimary groups and in the alternative group, while calls ofthe classes from the set𝑀{𝑗} occupy 𝑙𝑛 BBUs in the primarygroup 𝑗 and the alternative group (𝑙𝑦 BBUs in the alternativegroup), can be determined on the basis of the distributions[𝑅]𝑀\{𝑀

{𝑗}}

𝑉0 ,π‘‰βˆ’π‘‰π‘—and [𝑅]𝑀

{𝑗}

𝑑{𝑗}:

𝑃 (𝑛, 𝑦, 𝑙𝑛, 𝑙𝑦) = π‘˜[𝑅𝑙𝑦 ,𝑙𝑛]𝑀{𝑗}

𝑉0,𝑑{𝑗}[π‘…π‘¦βˆ’π‘™π‘¦ ,π‘›βˆ’π‘™π‘›

]𝑀\𝑀

{𝑗}

𝑉0,π‘‰βˆ’π‘‰π‘—

, (15)

where π‘˜ is the normalization coefficient equal to

π‘˜ =1

βˆ‘Ξ¨(𝑗) [𝑅𝑙𝑦 ,𝑙𝑛]𝑀{𝑗}

𝑉0,𝑑{𝑗}[π‘…π‘¦βˆ’π‘™π‘¦ ,π‘›βˆ’π‘™π‘›

]𝑀\𝑀{𝑗}

𝑉0,π‘‰βˆ’π‘‰π‘—

.(16)

The blocking probability 𝐸(𝑗)𝑖

for the class π‘š(𝑗)𝑖

can bedetermined on the basis of the sum of the probabilities𝑃(𝑛, 𝑦, 𝑙𝑛, 𝑙𝑦) of blocking combinations from the set Ξ¨(𝑗)

𝑖:

𝐸(𝑗)

𝑖= βˆ‘

Ξ¨(𝑗)

𝑖

𝑃 (𝑛, 𝑦, 𝑙𝑛, 𝑙𝑦) . (17)

Page 8: Research Article Two-Dimensional Convolution Algorithm for ...

8 Mathematical Problems in Engineering

3.4.4. Algorithm for Modelling Systems with Overflow forPrimary Groups with Single Classes of Calls. The algorithmthat allows us to determine the blocking probability innetworks with traffic overflow in which each primary groupis offered a single class of calls can be written in the form ofthe following four stages:

(1) determination of the one-dimensional distribution[𝑝]{π‘š(𝑗)

𝑖}

𝑑{𝑗}for a single class π‘š(𝑗)

𝑖offered to the primary

group 𝑗 on the basis of models worked-out for single-service systems,

(2) determination of two-dimensional distributions[π‘Ÿ]π‘š(𝑗)

𝑖

𝑉0 ,𝑑{𝑗} for all primary groups on the basis of one-

dimensional distributions [𝑝]π‘š(𝑗)

𝑖

𝑑{𝑗}(formula (9)),

(3) determination, for every primary group 𝑗, of aggre-gated distributions [𝑅]𝑀\𝑀

{𝑗}

𝑉0,π‘‰βˆ’π‘‰π‘—of all primary groups

except group 𝑗 (formula (12)),

(4) determination of the blocking probability (formula(17)) for each traffic classπ‘š(𝑗)

𝑖offered to each primary

group 𝑗.

3.5. Modelling of Systems in Which the Primary Group IsOffered a Number of Call Classes

3.5.1. ContinuousMethod. Consider now an overflow systemin which primary groups are offered many classes of calls(multiple classes of calls). According to the adopted notation,the primary group 𝑗 is offered call classes from the set𝑀{𝑗}. In the first proposed method, that is, the continuous

method, we adopt the assumption that a single call can beserviced simultaneously by the resources of the primary aswell as the alternative group. The occupancy distribution inthe considered basic subsystem is determined on the basisof a modified convolution operation of two-dimensionaldistributions.

Consider a system in which the primary group 𝑗 hasthe capacity 𝑉𝑗. Traffic from this group overflows to thealternative group with the capacity𝑉0. Assume that the sets𝐴and𝐡 are separable subsets of the set𝑀{𝑗}.The primary group𝑗 is offered mixtures of call classes that belong to the sets 𝐴and 𝐡 for which the distributions [𝑅]𝐴

𝑉0,𝑑{𝑗} and [𝑅]𝐡𝑉0 ,𝑑{𝑗} have

been determined.For any group 𝑗 in the overflow system with the assumed

calls’ transfer, the two-dimensional convolution operationmakes it possible to determine the elements [𝑅𝑦,𝑛]

𝐴βˆͺ𝐡

𝑉0 ,𝑑{𝑗} of

the distribution [𝑅]𝐴βˆͺ𝐡𝑉0 ,𝑑{𝑗} on the basis of the summation of

probabilities (combinations) of states ((𝑦𝐴, 𝑛𝐴); (𝑦𝐡, 𝑛𝐡)) thatsatisfy the following condition:

𝑛𝐴 βˆ’ 𝑦𝐴 + 𝑛𝐡 βˆ’ 𝑦𝐡 β©½ 𝑉𝑗. (18)

Condition (18) determines all combinations for states((𝑦𝐴, 𝑛𝐴); (𝑦𝐡, 𝑛𝐡))whose probabilities can be added up to the

probability of the aggregated state (𝑦, 𝑛). For the states thatsatisfy the condition (18), the following relations then ensue:

𝑛 = 𝑛𝐴 + 𝑛𝐡, (19)

𝑦 = 𝑦𝐴 + 𝑦𝐡. (20)

Let us determine now for the state (𝑦, 𝑛) a set 𝛼𝐴𝐡 (𝑦, 𝑛)of all state combinations ((𝑦𝐴, 𝑛𝐴); (𝑦𝐡, 𝑛𝐡)) for which thecondition (18) is fulfilled, that is, for which the value of deficit𝑧 (described in the next paragraph) is equal to 0:

𝛼𝐴

𝐡 (𝑦, 𝑛) = {((𝑦𝐴, 𝑛𝐴) ; (𝑦𝐡, 𝑛𝐡)) : (𝑛 = 𝑛𝐴 + 𝑛𝐡)

∧ (𝑦 = 𝑦𝐴 + 𝑦𝐡) ∧ (𝑛𝐴 βˆ’ 𝑦𝐴 + 𝑛𝐡 βˆ’ 𝑦𝐡 β©½ 𝑉𝑗)

∧ (𝑦 β©½ 𝑉0)} .

(21)

The system also offers such combinations of states((𝑦𝐴, 𝑛𝐴); (𝑦𝐡, 𝑛𝐡)) that do not satisfy the condition (18).These combinations will be permitted in the system whenpart of the serviced calls is transferred to the alternativegroup. Then, the relation (19) that determines the totaloccupancy in the system is still retained, while the relation(20) is not satisfied because the occupancy of the alternativegroup changes.The failure of the relation (20) results from theso-called deficit 𝑧 in the resources of the primary group.Thisdeficit can be determined in the following way:

𝑧 = 𝑛𝐴 βˆ’ 𝑦𝐴 + 𝑛𝐡 βˆ’ 𝑦𝐡 βˆ’ 𝑉𝑗. (22)

The interpretation of the deficit of the primary resourcesis shown in Figure 4. Figure 4(a) presents the combination((𝑦𝐴, 𝑛𝐴); (𝑦𝐡, 𝑛𝐡)), when the resources of the primary andthe alternative groups are occupied only by calls from the set𝐴 and when the resources are occupied only by calls fromthe set 𝐡. Figure 4(b) shows the attempt to aggregate bothcombinations. It is clear to see the deficit in the resourcesthat is to be β€œtransferred” to the resources of the alternativegroup (Figure 4(c)). Note that the amount of all resources ofthe alternative group after the transfer of the deficit resourcestaken into consideration is equal to

𝑦 = 𝑛𝐴 + 𝑛𝐡 βˆ’ 𝑉𝑗. (23)

Taking into account (19), which is always true (for 𝑧 = 0 andfor 𝑧 = 0), we can express (23) in the following form:

𝑦 = 𝑛 βˆ’ 𝑉𝑗. (24)

Now, we are in a position to define the set 𝛽𝐴𝐡 (𝑦, 𝑛) of allpermitted combinations ((𝑦𝐴, 𝑛𝐴); (𝑦𝐡, 𝑛𝐡)) for which thedeficit value 𝑧 is higher than zero (the condition (18) has notbeen fulfilled):

𝛽𝐴

𝐡 (𝑦, 𝑛) = { ((𝑦𝐴, 𝑛𝐴) ; (𝑦𝐡, 𝑛𝐡)) : (𝑛 = 𝑛𝐴 + 𝑛𝐡)

∧ (𝑦 = 𝑦𝐴 + 𝑦𝐡 + 𝑧)

∧ (𝑛𝐴 βˆ’ 𝑦𝐴 + 𝑛𝐡 βˆ’ 𝑦𝐡 > 𝑉𝑗) ∧ (𝑦 β©½ 𝑉0)} .

(25)

Page 9: Research Article Two-Dimensional Convolution Algorithm for ...

Mathematical Problems in Engineering 9

𝐴𝐴𝐴𝐴𝐴𝐴𝐴

𝐡𝐡𝐡𝐡

𝑉0

𝑛𝐴

𝑦𝐴

𝑛𝐡

𝑉𝑗

(a) Combination of occu-pancy states

𝐴

𝐴𝐴

𝐴

𝐴𝐴𝐴

𝐡

𝐡𝐡

𝐡

𝑉0

𝑉𝑗

𝑦𝐴 + 𝑦𝐡

𝑧

(b) Deficit in theresources in the primarygroup

𝐴𝐴

𝐴𝐴𝐴

𝐴𝐴

𝐡𝐡

𝐡𝐡

𝑉0

𝑉𝑗

𝑦

𝑦

𝐴 + 𝑦𝐡

𝑧

𝑛

(c) Transferred deficit ofresources of the alternativegroup

Figure 4: Interpretation of the parameter 𝑧 defining the deficit of resources in the primary group.

Taking into account (22), the set (25) can be rewritten asfollows:

𝛽𝐴

𝐡 (𝑦, 𝑛) = { ((𝑦𝐴, 𝑛𝐴) ; (𝑦𝐡, 𝑛𝐡)) : (𝑛 = 𝑛𝐴 + 𝑛𝐡)

∧ (𝑦 = 𝑛𝐴 + 𝑛𝐡 βˆ’ 𝑉𝑗)

∧ (𝑛𝐴 βˆ’ 𝑦𝐴 + 𝑛𝐡 βˆ’ 𝑦𝐡 > 𝑉𝑗) ∧ (𝑦 β©½ 𝑉0)} .

(26)

On the basis of the sets 𝛼𝐴𝐡 (𝑦, 𝑛) and 𝛽𝐴𝐡 (𝑦, 𝑛) it is possible

to determine the sum of the probabilities of all combinationsfor the state (𝑦, 𝑛), that is, the probability [𝑅𝑦,𝑛]

𝐴βˆͺ𝐡

𝑉0 ,𝑑{𝑗} for this

state:

[𝑅𝑦,𝑛]𝐴βˆͺ𝐡

𝑉0 ,𝑑{𝑗}= π‘˜ βˆ‘

𝛼𝐴𝐡(𝑦,𝑛)βˆͺ𝛽𝐴

𝐡(𝑦,𝑛)

[𝑅𝑦𝐴,𝑛𝐴]𝐴

𝑉0 ,𝑑{𝑗}[𝑅𝑦𝐡,𝑛𝐡

]𝐡

𝑉0 ,𝑑{𝑗}.

(27)

Equation (27) can be rewritten in the following way:

[𝑅𝑦,𝑛]𝐴βˆͺ𝐡

𝑉0 ,𝑑{𝑗}

= π‘˜

{{{{{{{{{{{{

{{{{{{{{{{{{

{

𝑛

βˆ‘

𝑛𝐴=0

𝑦

βˆ‘

𝑦𝐴=0

[𝑅𝑦𝐴,𝑛𝐴]𝐴

𝑉0 ,𝑑{𝑗}[π‘…π‘¦βˆ’π‘¦π΅,𝑛𝐡

]𝐡

𝑉0,𝑑{𝑗}

for𝑦 > 𝑛 βˆ’ 𝑉𝑗,𝑛

βˆ‘

𝑛𝐴=0

π‘›βˆ’π‘‰π‘—

βˆ‘

𝑧=0

π‘¦βˆ’π‘§

βˆ‘

𝑦𝐴=0

[𝑅𝑦𝐴,𝑛𝐴]𝐴

𝑉0 ,𝑑{𝑗}[π‘…π‘¦βˆ’π‘¦π΄βˆ’π‘§,𝑛𝐡

]𝐡

𝑉0,𝑑{𝑗}

for𝑦 = 𝑛 βˆ’ 𝑉𝑗,0 for𝑦 < 𝑛 βˆ’ 𝑉𝑗.

(28)

The transformation of (27) into (28) is presented inAppendix A. Using (28) we are in a position to aggregatesubsequent distributions in the primary group. It is thus aconvenient notation for a construction of the computationalalgorithm.

3.5.2. Discrete Method. Themethod for determination of theoccupancy distribution in the basic subsystem with multiple

call classes, that is, a system that is composed of the primarygroup and the alternative group presented in Section 3.5.1,adopts the assumption that the transfer of calls results in atotal exploitation of the primary group. Such an approachassumes a possibility of simultaneous occupation of theresources of the primary and the alternative group by onecall in the stage of the aggregation of classes within thebasic subsystem and, in consequence, leads to inaccurate andimprecise determination of the deficit in resources.

Let us consider nowamodifiedmethod for determinationof the two-dimensional occupancy distribution [𝑅]𝐴βˆͺ𝐡

𝑉0 ,𝑑{𝑗} for

the basic subsystem on the basis of the occupancy dis-tributions [𝑅]𝐴

𝑉0,𝑑{𝑗} and [𝑅]𝐡𝑉0 ,𝑑{𝑗} in which a possibility of

a simultaneous servicing of calls by the resources of theprimary and the alternative groups is excluded. Note that,on the basis of the given combination ((𝑦𝐴, 𝑛𝐴); (𝑦𝐡, 𝑛𝐡)),it is not possible to unequivocally determine the history ofcall acceptance and call service. It is not possible then todetermine the amount 𝑠 of resources of the primary groupthat cannot be used due to the lack of the possibility of adivision of the serviced call between the primary group andthe alternative group. The value of the parameter 𝑠 dependsnot only on the combination itself but also on the history ofcall acceptance and call service.

As previously mentioned, let us assume that the basicsubsystem 𝑗 is offered mixtures of call classes that belong tothe set 𝐴 and 𝐡. The sets 𝐴 and 𝐡 are separate subsets of theset𝑀{𝑗} traffic classes.

The number of occupied resources 𝑦 in the alternativegroup can be determined in the same way as in Section 3.5.1but with the number 𝑠 of unused resources in the primarygroup taken additionally into account. If the total numberof occupied resources is lower than or equal to the capacityof the primary group, then there is no deficit in resourcesand all resources of the primary group can be used. In thissituation, the condition (18) is also fulfilled. If the number ofoccupied resources exceeds the capacity of the primary groupand the condition (18) is at the same time fulfilled, then thereis no deficit in the primary group. When this is the case, thenumber of busy resources of the alternative group is higher

Page 10: Research Article Two-Dimensional Convolution Algorithm for ...

10 Mathematical Problems in Engineering

by the number of unused resources of the primary group 𝑠.In the casewhen the condition (18) is not fulfilled, the number𝑦 of busy resources of the primary group is increased by theparameters 𝑧 and 𝑠. We can thus write

𝑦 =

{{{{

{{{{

{

𝑦𝐴 + 𝑦𝐡 for 𝑛 β©½ 𝑉𝑗,𝑦𝐴 + 𝑦𝐡 + 𝑠 for (𝑛𝐴 βˆ’ 𝑦𝐴 + 𝑛𝐡 βˆ’ 𝑦𝐡 β©½ 𝑉𝑗) ,

𝑦𝐴 + 𝑦𝐡 + 𝑠 + 𝑧 for (𝑛𝐴 βˆ’ 𝑦𝐴 + 𝑛𝐡 βˆ’ 𝑦𝐡 > 𝑉𝑗) .

(29)

Consider now the way the parameter 𝑠 that determinesthe number of unused resources of the primary groupis estimated. Assuming that there is a possibility of calls’transfer, there can be at themaximum 𝑑max(𝐴)βˆ’1 unused BBUor 𝑑max(𝐡) βˆ’ 1 unused BBU in the primary group, dependingon which call class has been admitted for service as the lastone. The upper boundary for the value of the parameter 𝑠is (𝑉 βˆ’ 𝑛) BBU, that is, the number of free resources inboth groups (primary and alternative). Let 𝑠𝐴max(𝑛) denote themaximumnumber of unused resources in the primary group,on condition that a call that belongs to the set 𝐴 has beenaccepted as the last one:

𝑠𝐴

max (𝑛) = {min (𝑑max(𝐴) βˆ’ 1, 𝑉 βˆ’ 𝑛) for 𝑛 > 𝑉𝑗,0 for 𝑛 β©½ 𝑉𝑗.

(30)

Let 𝑃𝑛(𝑠 | 𝐴) denote the probability of 𝑠 BBU unusedin the primary group in state 𝑛, on condition that the lastaccepted call was a call of the class that belongs to the set 𝐴.A determination of this probability is fairly complex. Let usassume then that the distributions 𝑃(𝑠 | 𝐴) and 𝑃(𝑠 | 𝐡) areapproximated by the uniform distribution:

𝑃𝑛 (𝑠 | 𝐴) ={

{

{

1

𝑠𝐴max (𝑛)for 0 β©½ 𝑠 β©½ 𝑠𝐴max (𝑛) ,

0 in other cases,

𝑃𝑛 (𝑠 | 𝐡) ={

{

{

1

𝑠𝐡max (𝑛)for 0 β©½ 𝑠 β©½ 𝑠𝐡max (𝑛) ,

0 in other cases.

(31)

Let 𝑃𝑛(𝐴) denote the probability that the state 𝑛 has beenreached when the last accepted call was a call of the class thatbelonged to the set 𝐴, and 𝑃𝑛(𝐡) denotes the probability thatthe state 𝑛 has been reached when the last accepted call wasa call of the class that belonged to the set 𝐡. The proposedmethod makes the assumption that these probabilities aredirectly proportional to the number of resources that areoccupied by calls that belong to the sets 𝐴 and 𝐡:

𝑃𝑛 (𝐴) =𝑛𝐴

𝑛, 𝑃𝑛 (𝐡) =

𝑛𝐡

𝑛. (32)

Let us define the convolution of the distributions [𝑅]𝐴𝑉0 ,𝑑{𝑗}

and [𝑅]𝐡𝑉0,𝑑{𝑗} . To determine the state probability (𝑦, 𝑛), let us

consider the three intervals defined in (29). The first intervalincludes the states (𝑦, 𝑛) for 𝑛 β©½ 𝑉𝑗. The second and the third

intervals include states in which the total number of occupiedresources 𝑛 is higher than the capacity of the primary group𝑉𝑗. Each interval includes the combinations of states denotedas ((𝑦𝐴, 𝑛𝐴); (𝑦𝐡, 𝑛𝐡)).

Let us consider the method for determination of theprobability of occurrence of the states (𝑦, 𝑛) for 𝑛 β©½ 𝑉𝑗 asthe first. The probability of the occurrence of the state (𝑦, 𝑛)is equal to the sum of the probability of occurrence for allcombinations for this particular state, defined in (19) and(29):

βˆ€π‘›β©½π‘‰π‘—[𝑅𝑦,𝑛]

𝐴βˆͺ𝐡

𝑉0 ,𝑑{𝑗}

= π‘˜

𝑛

βˆ‘

𝑛𝐴=0

𝑦

βˆ‘

𝑦𝐴=0

[𝑅𝑦𝐴,𝑛𝐴]𝐴

𝑉0,𝑑{𝑗}[π‘…π‘¦βˆ’π‘¦π΄,π‘›βˆ’π‘›π΄

]𝐡

𝑉0 ,𝑑{𝑗}.

(33)

For the remaining two intervals defined in (29), to determinethe state probability (𝑦, 𝑛), for 𝑛 > 𝑉𝑗, it is necessary to takeinto consideration additional parameters such as 𝑃𝑛(𝑠 | 𝐴),𝑃𝑛(𝑠 | 𝐡) (formula (31)) and 𝑃𝑛(𝐴) and 𝑃𝑛(𝐡) (formula (32)).In addition, it is necessary to define the set 𝛾 of all possiblecombinations (𝑦𝐴, 𝑛𝐴); (𝑦𝐡, 𝑛𝐡) for the second interval of(29) and the set πœ‘ of all possible combinations for the thirdinterval.

Definitions of the sets 𝛾 andπœ‘ depend on the last admittedcall. If the last admitted call is a call of the classes from the set𝐴, then for the state (𝑦, 𝑛) we denote these sets as 𝛾𝐴𝐡 (𝑦, 𝑛)and πœ‘π΄π΅ (𝑦, 𝑛). Similarly, if the last admitted call was a callof the class that belonged to the set 𝐡, then the sets will bedenoted as 𝛾𝐡𝐴(𝑦, 𝑛) and πœ‘

𝐡𝐴(𝑦, 𝑛). The sets 𝛾𝐴𝐡 (𝑦, 𝑛), πœ‘

𝐴𝐡 (𝑦, 𝑛),

𝛾𝐡𝐴(𝑦, 𝑛) and πœ‘

𝐡𝐴(𝑦, 𝑛) define all the possible combinations

((𝑦𝐴, 𝑛𝐴); (𝑦𝐡, 𝑛𝐡)) as well as the number of unused resources𝑠 for the state (𝑦, 𝑛). In addition, the setsπœ‘π΄π΅ (𝑦, 𝑛) andπœ‘

𝐡𝐴(𝑦, 𝑛)

define the deficit 𝑧 of the resources of the primary group. Asa consequence of our considerations we can write

𝛾𝐴

𝐡 (𝑦, 𝑛) ={ ((𝑦𝐴, 𝑛𝐴) ; (𝑦𝐡, 𝑛𝐡) , 𝑠) : (𝑛 = 𝑛𝐴 + 𝑛𝐡)

∧ (𝑦 = 𝑦𝐴 + 𝑦𝐡 + 𝑠) ∧ (0 β©½ 𝑠 β©½ 𝑠𝐴

max (𝑛))

∧ (𝑦 = 𝑛 βˆ’ 𝑉𝑗 + 𝑠)} ,

𝛾𝐡

𝐴 (𝑦, 𝑛) = { ((𝑦𝐴, 𝑛𝐴) ; (𝑦𝐡, 𝑛𝐡) , 𝑠) : (𝑛 = 𝑛𝐴 + 𝑛𝐡)

∧ (𝑦 = 𝑦𝐴 + 𝑦𝐡 + 𝑠) ∧ (0 β©½ 𝑠 β©½ 𝑠𝐡

max (𝑛))

∧ (𝑦 = 𝑛 βˆ’ 𝑉𝑗 + 𝑠)} ,

πœ‘π΄

𝐡 (𝑦, 𝑛) ={ ((𝑦𝐴, 𝑛𝐴) ; (𝑦𝐡, 𝑛𝐡) , 𝑠, 𝑧) : (𝑛 = 𝑛𝐴 + 𝑛𝐡)

∧ (𝑦 = 𝑦𝐴 + 𝑦𝐡 + 𝑧 + 𝑠) ∧ (0 β©½ 𝑠 β©½ 𝑠𝐴

max (𝑛))

∧ (1 β©½ 𝑧 β©½ 𝑛 βˆ’ 𝑉𝑗) ∧ (𝑦 = 𝑛 βˆ’ 𝑉𝑗 + 𝑠)} ,

Page 11: Research Article Two-Dimensional Convolution Algorithm for ...

Mathematical Problems in Engineering 11

πœ‘π΅

𝐴 (𝑦, 𝑛) ={ ((𝑦𝐴, 𝑛𝐴) ; (𝑦𝐡, 𝑛𝐡) , 𝑠, 𝑧) : (𝑛 = 𝑛𝐴 + 𝑛𝐡)

∧ (𝑦 = 𝑦𝐴 + 𝑦𝐡 + 𝑧 + 𝑠) ∧ (0 β©½ 𝑠 β©½ 𝑆𝐡

max (𝑛))

∧ (1 β©½ 𝑧 β©½ 𝑛 βˆ’ 𝑉𝑗) ∧ (𝑦 = 𝑛 βˆ’ 𝑉𝑗 + 𝑠)} .

(34)

In line with the adopted notation, the state probability(𝑦, 𝑛) (for 𝑛 > 𝑉𝑗) can be written as follows:

βˆ€π‘›>𝑉𝑗[𝑅𝑦,𝑛]

𝐴βˆͺ𝐡

𝑉0,𝑑{𝑗}

= π‘˜π‘ƒ (𝐴) βˆ‘

𝛾𝐴𝐡 (𝑦,𝑛)βˆͺπœ‘

𝐴𝐡 (𝑦,𝑛)

𝑃𝑛 (𝑠 | 𝐴)

Γ— [𝑅𝑦𝐴,𝑛𝐴]𝐴

𝑉0,𝑑{𝑗}[𝑅𝑦𝐡,𝑛𝐡

]𝐡

𝑉0,𝑑{𝑗}

+ π‘˜π‘ƒ (𝐡) βˆ‘

𝛾𝐡𝐴(𝑦,𝑛)βˆͺπœ‘

𝐡𝐴(𝑦,𝑛)

𝑃𝑛 (𝑠 | 𝐡)

Γ— [𝑅𝑦𝐴,𝑛𝐴]𝐴

𝑉0,𝑑{𝑗}[𝑅𝑦𝐡,𝑛𝐡

]𝐡

𝑉0,𝑑{𝑗}.

(35)

Equations (33) and (35) can be combined and eventuallyrewritten in the following form:

[𝑅𝑦,𝑛]𝐴βˆͺ𝐡

𝑉0 ,𝑑{𝑗}

= π‘˜

Γ—

{{{{{{{{{{{{{{{{

{{{{{{{{{{{{{{{{

{

𝑛

βˆ‘

𝑛𝐴=0

𝑦

βˆ‘

𝑦𝐴=0

[𝑅𝑦𝐴,𝑛𝐴]𝐴

𝑉0,𝑑{𝑗}[π‘…π‘¦βˆ’π‘¦π΄,π‘›βˆ’π‘›π΅

]𝐡

𝑉0,𝑑{𝑗}

for 𝑛 β©½ 𝑉𝑗,𝑛

βˆ‘

𝑛𝐴=0

𝑛𝐴𝑃𝑛 (𝑦 + 𝑉𝑗 βˆ’ 𝑛 | 𝐴) + 𝑛𝐡𝑃𝑛 (𝑦 + 𝑉𝑗 βˆ’ 𝑛 | 𝐡)

𝑛

Γ—

π‘›βˆ’π‘‰π‘—

βˆ‘

𝑧=0

π‘›βˆ’π‘‰π‘—

βˆ‘

𝑦𝐴=0

𝑅[𝑦𝐴, 𝑛𝐴]𝐴

𝑉0,𝑑{𝑗}

×𝑅[𝑛 βˆ’ 𝑉𝑗 βˆ’ 𝑦𝐴 βˆ’ 𝑧, 𝑛 βˆ’ 𝑛𝐴]𝐡

𝑉0 ,𝑑{𝑗}

for 𝑛 > 𝑉𝑗.(36)

The way (33) is transformed to the form (36) is described inAppendix B.

4. Numerical Results

To confirm the accuracy and effectiveness of the proposedconvolution method, the results of the blocking probabilityin the overflow systems obtained on the basis of the analyticalcalculations, both for the continuous method (Section 3.5.1),and the discrete method (Section 3.5.2), were compared withthe results of the simulation experiments. Additionally, inthe case of call streams generated by infinite number oftraffic sources, the results obtained on the basis of a modifiedHayward method [17] are presented. The characteristicspresented in the graphs show the dependence between the

blocking probability of each of the offered classes in thewholesystem and offered traffic π‘Ž, offered to a single BBU of theprimary group:

βˆ€π‘—βˆˆπΎ π‘Ž =

βˆ‘π‘š{𝑗}

π‘–βˆˆπ‘€π‘—π΄(𝑗)

𝑖𝑑(𝑗)

𝑖

𝑉𝑗

. (37)

The event-oriented discrete simulation method was usedfor simulation [45, 46]. Each simulation experiment con-sisted of 10 series. The length of each series was determinedby the number of lost calls (at least 200000 lost calls for eachtraffic class). The 99% confidence intervals were calculatedaccording to the Student-Fisher distribution.

The study was carried out for the telecommunicationssystems defined in Table 1. The systems are offered threetypes of Erlang (Poisson call streams), Engset (binomial callstreams), and Pascal (negative binomial call streams) trafficstreams [20, 47]. The selected types of traffic cover threedifferent types of the dependence between the mean arrivalrates of calls and the occupancy state of the system: (1)the mean arrival rate of new calls does not depend on theoccupancy state of the system (Erlang traffic), (2) the meanarrival rate of new calls decreases with the increase in theoccupancy state of the system (Engset traffic), and (3) themean arrival rate of new calls increases with the increase inthe occupancy state of the system (Pascal traffic).

The graphs presented in Figures 5, 6, 7, 8, and 9 showingthe blocking probability, determined on the basis of the two-dimensional convolution algorithm, both continuous anddiscrete, as well as the results of the simulation experiments,are presented for each of the systems under consideration. Inaddition, for the systems 1 and 2, the results obtained on thebasis of the generalized Hayward method are included. Theconfidential interval in the graphs is too small to be visibledue to the length and the number of series in the simulation.

We can notice that both convolution algorithms, contin-uous and discrete, ensure higher accuracy than the mod-ified Hayward method. Additionally, we can observe, thatthe continuous algorithm lowers probabilities of states thatbelong to the blocking area for classes that demand thehighest number of BBUs in relation to the remaining classes.This phenomenon can be justified in the following way. Thecontinuousmethod assumes a possibility of servicing a singlecall by the primary and the alternative group. In this way, themodel assumes a better use of resources than it is actually thecase in a real system. As a consequence of the adoption ofthis assumption, states in which some resources of primarygroups would not be busy do not occur. This leads to anincrease in the number of free resources of the alternativegroup and, in consequence, to an increase in the number ofserviced calls that require a higher number of BBUs. At thesame time, elimination of states in which the primary groupwould have free resources leads to an increase in the blockingstate for calls that demand a lower number of resources. As aresult, the probabilities determined for classes that demanda higher number of BBUs are lower than those obtainedin real systems, while blocking probabilities for classes thatdemand a lownumber of BBUs are overestimated.Thehighest

Page 12: Research Article Two-Dimensional Convolution Algorithm for ...

12 Mathematical Problems in Engineering

Table 1: Parameters of the considered systems.

No. 𝑉0 𝑉1 𝑑(1)

1 Sources type 𝑑(1)

2 Sources type 𝑉2 𝑑(2)

1 Sources type 𝑑(2)

2 Sources type1 20 15 1 Poisson 2 Poisson 15 3 Poisson 4 Poisson2 20 15 1 Binomial 2 Binomial 15 3 Binomial 4 Binomial3 20 15 1 Negative binomial 2 Negative binomial 15 3 Negative binomial 4 Negative binomial4 20 15 1 Poisson 2 Poisson 15 3 Binomial 4 Binomial5 20 15 1 Poisson 2 Poisson 15 3 Negative binomial 4 Negative binomial

0.0001 0.0002 0.0005

0.001 0.002 0.005

0.01 0.02 0.05

0.1 0.2 0.5

1

0.8 0.9 1 1.1 1.2 1.3 1.4 1.5

𝐸(b

lock

ing

prob

abili

ty)

π‘Ž (traffic offered to a single BBU)

Sim. class π‘š(1)1

Alg. class π‘š(1)1

Sim. class π‘š(2)1

Alg. class π‘š(2)1

Sim. class π‘š(1)2

Alg. class π‘š(1)2

Sim. class π‘š(2)2

Alg. class π‘š(2)2

(a) Two-dimensional continuous convolution algorithm

0.0001 0.0002 0.0005

0.001 0.002 0.005

0.01 0.02 0.05

0.1 0.2 0.5

1

0.8 0.9 1 1.1 1.2 1.3 1.4 1.5𝐸

(blo

ckin

g pr

obab

ility

)π‘Ž (traffic offered to a single BBU)

Sim. class π‘š(1)1

Alg. class π‘š(1)1

Sim. class π‘š(2)1

Alg. class π‘š(2)1

Sim. class π‘š(1)2

Alg. class π‘š(1)2

Sim. class π‘š(2)2

Alg. class π‘š(2)2

(b) Two-dimensional discrete convolution algorithm

0.0001 0.0002 0.0005

0.001 0.002 0.005

0.01 0.02 0.05

0.1 0.2 0.5

1

0.8 0.9 1 1.1 1.2 1.3 1.4 1.5

𝐸(b

lock

ing

prob

abili

ty)

π‘Ž (traffic offered to a single BBU)

Sim. class π‘š(1)1

Alg. class π‘š(1)1

Sim. class π‘š(2)1

Alg. class π‘š(2)1

Sim. class π‘š(1)2

Alg. class π‘š(1)2

Sim. class π‘š(2)2

Alg. class π‘š(2)2

(c) Generalized Hayward method

Figure 5: Blocking probability in system no. 1 with overflow traffic (𝑉1 = 15, 𝑉2 = 15, 𝑑(1)

1 = 1 (Poisson); 𝑑(1)

2 = 2 (Poisson); 𝑑(2)

1 = 3 (Poisson);𝑑(2)

2 = 4 (Poisson); 𝑉0 = 20).

accuracy of calculation process is ensured by the discretealgorithm.

5. Conclusions

The paper proposes new methods for modelling of networksystems with traffic overflow. The methods are based onthe proposed two-dimensional convolution algorithm and

can be applied to determine the parameters of the overflowsystem exclusively on the basis of the knowledge of theparameters of offered traffic and the volume of the resources.Additionally, the method makes it possible to determine theblocking probability in systems that are offered traffic streamsof any type, which is an important advantage of the proposedmethod. The proposed methods differ considerably in theway two-dimensional distributions [𝑅]π‘š

𝑗

𝑉0 ,𝑑𝑗 that describe the

Page 13: Research Article Two-Dimensional Convolution Algorithm for ...

Mathematical Problems in Engineering 13

0.0001 0.0002 0.0005

0.001 0.002 0.005

0.01 0.02 0.05

0.1 0.2 0.5

1

0.8 0.9 1 1.1 1.2 1.3 1.4 1.5

𝐸(b

lock

ing

prob

abili

ty)

π‘Ž (traffic offered to a single BBU)

Sim. class π‘š(1)1

Alg. class π‘š(1)1

Sim. class π‘š(2)1

Alg. class π‘š(2)1

Sim. class π‘š(1)2

Alg. class π‘š(1)2

Sim. class π‘š(2)2

Alg. class π‘š(2)2

(a) Two-dimensional continuous convolution algorithm

0.0001 0.0002 0.0005

0.001 0.002 0.005

0.01 0.02 0.05

0.1 0.2 0.5

1

0.8 0.9 1 1.1 1.2 1.3 1.4 1.5

𝐸(b

lock

ing

prob

abili

ty)

π‘Ž (traffic offered to a single BBU)

Sim. class π‘š(1)1

Alg. class π‘š(1)1

Sim. class π‘š(2)1

Alg. class π‘š(2)1

Sim. class π‘š(1)2

Alg. class π‘š(1)2

Sim. class π‘š(2)2

Alg. class π‘š(2)2

(b) Two-dimensional discrete convolution algorithm

Figure 6: Blocking probability in system no. 2 with overflow traffic (𝑉1 = 15,𝑉2 = 15; 𝑑(1)

1 = 1, 𝑆11 = 60 (binomial); 𝑑(1)2 = 2, 𝑆

12 = 30 (binomial);

𝑑(2)

1 = 3, 𝑆21 = 20 (binomial); 𝑑(2)2 = 4, 𝑆

22 = 15 (binomial); 𝑉0 = 20).

0.001 0.002

0.005 0.01 0.02

0.05 0.1 0.2

0.51

0.8 0.9 1 1.1 1.2 1.3 1.4 1.5

𝐸(b

lock

ing

prob

abili

ty)

π‘Ž (traffic offered to a single BBU)

Sim. class π‘š(1)1

Alg. class π‘š(1)1

Sim. class π‘š(2)1

Alg. class π‘š(2)1

Sim. class π‘š(1)2

Alg. class π‘š(1)2

Sim. class π‘š(2)2

Alg. class π‘š(2)2

(a) Two-dimensional continuous convolution algorithm

0.8 0.9 1 1.1 1.2 1.3 1.4 1.5π‘Ž (traffic offered to a single BBU)

0.001 0.002

0.005 0.01 0.02

0.05 0.1 0.2

0.51

𝐸(b

lock

ing

prob

abili

ty)

Sim. class π‘š(1)1

Alg. class π‘š(1)1

Sim. class π‘š(2)1

Alg. class π‘š(2)1

Sim. class π‘š(1)2

Alg. class π‘š(1)2

Sim. class π‘š(2)2

Alg. class π‘š(2)2

(b) Two-dimensional discrete convolution algorithm

Figure 7: Blocking probability in system no. 3 with overflow traffic (𝑉1 = 15,𝑉2 = 15, 𝑑(1)

1 = 1,𝑁11 = 60 (negative binomial); 𝑑(1)2 = 2,𝑁

12 = 30

(negative binomial); 𝑑(2)1 = 3,𝑁21 = 20 (negative binomial); 𝑑(2)2 = 4,𝑁

22 = 15 (negative binomial); 𝑉0 = 20).

occupancy of the primary group 𝑗 and the alternative groupare determined.

The first method for determination of the two-di-mensional convolution, the so-called continuous method,gives the same results as the simultaneous convolutionmethod [44].Theproposed algorithmoffers, however, a lowerorder of computational complexity and can be used for mod-elling systems in which the primary group is offered multiplecall classes. The other method, the so-called discrete methodfor determination of the two-dimensional convolution, givesmore accurate results with the same order of computationalcomplexity retained.

It should be emphasized that the methods formodelling multirate systems with traffic overflow developedin [17] aimed at determining the blocking probability only inalternative resources (groups). Moreover, all hitherto knownmethods for modelling systems with both single-serviceoverflow traffic (ERT method and Hayward method),and with multiservice overflow traffic [17], require theoverflow traffic parameters to be first determined in theprocess of a determination of losses in the overflow system.Consequently, these methods are limited to modelling onlysystems with Erlang and Engset traffic streams, whereas themethod proposed in the present article makes it possible to

Page 14: Research Article Two-Dimensional Convolution Algorithm for ...

14 Mathematical Problems in Engineering

0.0001 0.0002 0.0005

0.001 0.002 0.005

0.01 0.02 0.05

0.1 0.2 0.5

1

0.8 0.9 1 1.1 1.2 1.3 1.4 1.5

𝐸(b

lock

ing

prob

abili

ty)

π‘Ž (traffic offered to a single BBU)

Sim. class π‘š(1)1

Alg. class π‘š(1)1

Sim. class π‘š(2)1

Alg. class π‘š(2)1

Sim. class π‘š(1)2

Alg. class π‘š(1)2

Sim. class π‘š(2)2

Alg. class π‘š(2)2

(a) Two-dimensional continuous convolution algorithm

0.0001 0.0002 0.0005

0.001 0.002 0.005

0.01 0.02 0.05

0.1 0.2 0.5

1

0.8 0.9 1 1.1 1.2 1.3 1.4 1.5

𝐸(b

lock

ing

prob

abili

ty)

π‘Ž (traffic offered to a single BBU)

Sim. class π‘š(1)1

Alg. class π‘š(1)1

Sim. class π‘š(2)1

Alg. class π‘š(2)1

Sim. class π‘š(1)2

Alg. class π‘š(1)2

Sim. class π‘š(2)2

Alg. class π‘š(2)2

(b) Two-dimensional discrete convolution algorithm

Figure 8: Blocking probability in system no. 4 with overflow traffic (𝑉1 = 15, 𝑉2 = 15, 𝑑(1)

1 = 1 (Poisson); 𝑑(1)

2 = 2 (Poisson); 𝑑(2)

1 = 3, 𝑆21 = 20

(binomial); 𝑑(2)2 = 4, 𝑆22 = 15 (binomial); 𝑉0 = 20).

0.0001 0.0002 0.0005

0.001 0.002 0.005

0.01 0.02 0.05

0.1 0.2 0.5

1

0.8 0.9 1 1.1 1.2 1.3 1.4 1.5

𝐸(b

lock

ing

prob

abili

ty)

π‘Ž (traffic offered to a single BBU)

Sim. class π‘š(1)1

Alg. class π‘š(1)1

Sim. class π‘š(2)1

Alg. class π‘š(2)1

Sim. class π‘š(1)2

Alg. class π‘š(1)2

Sim. class π‘š(2)2

Alg. class π‘š(2)2

(a) Two-dimensional continuous convolution algorithm

0.0001 0.0002 0.0005

0.001 0.002 0.005

0.01 0.02 0.05

0.1 0.2 0.5

1

0.8 0.9 1 1.1 1.2 1.3 1.4 1.5

𝐸(b

lock

ing

prob

abili

ty)

π‘Ž (traffic offered to a single BBU)

Sim. class π‘š(1)1

Alg. class π‘š(1)1

Sim. class π‘š(2)1

Alg. class π‘š(2)1

Sim. class π‘š(1)2

Alg. class π‘š(1)2

Sim. class π‘š(2)2

Alg. class π‘š(2)2

(b) Two-dimensional discrete convolution algorithm

Figure 9: Blocking probability in system no. 5 with overflow traffic (𝑉1 = 15,𝑉2 = 15, 𝑑(1)

1 = 1 (Poisson); 𝑑(1)

2 = 2 (Poisson);𝑁21 = 20 (negative

binomial), 𝑑(2)1 = 3; 𝑑(2)

2 = 4,𝑁22 = 15 (negative binomial); 𝑉0 = 20).

model systems with multiservice overflow traffic generatedby sources of any type.

Appendices

A.

Let us consider again (27):

[𝑅𝑦,𝑛]𝐴βˆͺ𝐡

𝑉0 ,𝑑{𝑗}= π‘˜ βˆ‘

𝛼𝐴𝐡(𝑦,𝑛)βˆͺ𝛽𝐴

𝐡(𝑦,𝑛)

[𝑅𝑦𝐴,𝑛𝐴]𝐴

𝑉0 ,𝑑{𝑗}[𝑅𝑦𝐡,𝑛𝐡

]𝐡

𝑉0 ,𝑑{𝑗}.

(A.1)

Equation (A.1) can be expressed in the form of the followingfunctional dependency:

[𝑅𝑦,𝑛]𝐴βˆͺ𝐡

𝑉0 ,𝑑{𝑗}= π‘˜ βˆ‘

𝛼𝐴𝐡 (𝑦,𝑛)

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡)

+ π‘˜ βˆ‘

𝛽𝐴𝐡 (𝑦,𝑛)

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡) ,

(A.2)

where the parameter 𝐹(𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡) determines the prod-uct convolution depending on four parameters: the occu-pancy of the alternative group 𝑦𝐴, 𝑦𝐡 and the occupancy of

Page 15: Research Article Two-Dimensional Convolution Algorithm for ...

Mathematical Problems in Engineering 15

the whole system 𝑛𝐴, 𝑛𝐡 by the calls of the classes from sets𝐴and 𝐡:

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡) = [𝑅𝑦𝐴,𝑛𝐴]𝐴

𝑉0 ,𝑑{𝑗}[𝑅𝑦𝐡,𝑛𝐡

]𝐡

𝑉0 ,𝑑{𝑗}. (A.3)

Taking into account the conditions determining set𝛼𝐴𝐡 (𝑦, 𝑛) in definition (21), we get

βˆ€{𝑦𝐴,𝑛𝐴,𝑦𝐡,𝑛𝐡}βˆˆπ›Όπ΄π΅(𝑦,𝑛)𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡)

= 𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦 βˆ’ 𝑦𝐴, 𝑛 βˆ’ 𝑛𝐴) .

(A.4)

Therefore the convolution defined by Function (A.3) can bepresented in the form of a double sum with regard to the twoparameters 𝑛𝐴 and 𝑦𝐴 only:

βˆ‘

𝛼𝐴𝐡 (𝑦,𝑛)

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡)

=

{{

{{

{

𝑛

βˆ‘

𝑛𝐴=0

𝑦

βˆ‘

𝑦𝐴=0

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦 βˆ’ 𝑦𝐴, 𝑛 βˆ’ 𝑛𝐴) for𝑦 β©Ύ 𝑛 βˆ’ 𝑉𝑗,

0 for𝑦 < 𝑛 βˆ’ 𝑉𝑗.(A.5)

By analyzing the conditions defining the set 𝛽𝐴𝐡 (𝑦, 𝑛)in Definition (25), Function 𝐹(𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡) can be madedependent on the three parameters:

βˆ€{𝑦𝐴,𝑛𝐴,𝑦𝐡,𝑛𝐡}βˆˆπ›½π΄π΅(𝑦,𝑛)𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡)

= 𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦 βˆ’ 𝑦𝐴 βˆ’ 𝑧, 𝑛 βˆ’ 𝑛𝐴) .

(A.6)

The notation (A.6) allows us to express the second sum in(A.2) as a triple sum:

βˆ‘

𝛽𝐴𝐡 (𝑦,𝑛)

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡)

=

{{{{

{{{{

{

𝑛

βˆ‘

𝑛𝐴=0

π‘›βˆ’π‘‰π‘—

βˆ‘

𝑧=1

π‘¦βˆ’π‘§

βˆ‘

𝑦𝐴=0

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦 βˆ’ 𝑦𝐴 βˆ’ 𝑧, 𝑛 βˆ’ 𝑛𝐴)

for𝑦 = 𝑛 βˆ’ 𝑉𝑗,0 for𝑦 = 𝑛 βˆ’ 𝑉𝑗.

(A.7)

Observe that the parameter 𝑧 can, at the maximum, take onthe value equal to 𝑦 defined by formula (24). This occurswhen the total resources serviced in an alternative groupresult from the deficit (i.e., when 𝑦𝐴 = 𝑦𝐡 = 0).

In line with (A.5) and (A.7), the sums βˆ‘π›Όπ΄π΅(𝑦,𝑛)

𝐹(𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡) and βˆ‘π›½π΄π΅(𝑦,𝑛) 𝐹(𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡) can be

expressed as follows:

βˆ‘

𝛼𝐴𝐡 (𝑦,𝑛)

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡) + βˆ‘

𝛽𝐴𝐡 (𝑦,𝑛)

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡)

=

{{{{{{{{{{{{

{{{{{{{{{{{{

{

𝑛

βˆ‘

𝑛𝐴=0

𝑦

βˆ‘

𝑦𝐴=0

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦 βˆ’ 𝑦𝐴, 𝑛 βˆ’ 𝑛𝐴)

for𝑦 β‰₯ 𝑛 βˆ’ 𝑉𝑗,𝑛

βˆ‘

𝑛𝐴=0

π‘›βˆ’π‘‰π‘—

βˆ‘

𝑧=1

π‘¦βˆ’π‘§

βˆ‘

𝑦𝐴=0

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦 βˆ’ 𝑦𝐴 βˆ’ 𝑧, 𝑛 βˆ’ 𝑛𝐴)

for𝑦 = 𝑛 βˆ’ 𝑉𝑗,0 for𝑦 < 𝑛 βˆ’ 𝑉𝑗.

(A.8)

Observe that the case 𝑦 = 𝑛 βˆ’ 𝑉𝑗 for the first equation informula (A.8) can be taken into consideration in the secondequation in formula (A.8) as a result of the exchange of thelower bound of the sum 𝑧 = 1 to 𝑧 = 0. Eventually, (A.8) canbe written in the following way:

βˆ‘

𝛼𝐴𝐡 (𝑦,𝑛)

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡) + βˆ‘

𝛽𝐴𝐡 (𝑦,𝑛)

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡)

=

{{{{{{{{{{{{

{{{{{{{{{{{{

{

𝑛

βˆ‘

𝑛𝐴=0

𝑦

βˆ‘

𝑦𝐴=0

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦 βˆ’ 𝑦𝐴, 𝑛 βˆ’ 𝑛𝐴)

for𝑦 > 𝑛 βˆ’ 𝑉𝑗,𝑛

βˆ‘

𝑛𝐴=0

π‘›βˆ’π‘‰π‘—

βˆ‘

𝑧=0

π‘¦βˆ’π‘§

βˆ‘

𝑦𝐴=0

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦 βˆ’ 𝑦𝐴 βˆ’ 𝑧, 𝑛 βˆ’ 𝑛𝐴)

for𝑦 = 𝑛 βˆ’ 𝑉𝑗,0 for𝑦 < 𝑛 βˆ’ 𝑉𝑗.

(A.9)

According to (27) and (A.9), we get

[𝑅𝑦,𝑛]𝐴βˆͺ𝐡

𝑉0,𝑑(𝑗)

= π‘˜

{{{{{{{{{{{{

{{{{{{{{{{{{

{

𝑛

βˆ‘

𝑛𝐴=0

𝑦

βˆ‘

𝑦𝐴=0

[𝑅𝑦𝐴,𝑛𝐴]𝐴

𝑉0 ,𝑑(𝑗)[π‘…π‘¦βˆ’π‘¦π΅,𝑛𝐡

]𝐡

𝑉0 ,𝑑(𝑗)

for𝑦 > 𝑛 βˆ’ 𝑉𝑗𝑛

βˆ‘

𝑛𝐴=0

π‘›βˆ’π‘‰π‘—

βˆ‘

𝑧=0

π‘¦βˆ’π‘§

βˆ‘

𝑦𝐴=0

[𝑅𝑦𝐴,𝑛𝐴]𝐴

𝑉0,𝑑(𝑗)[π‘…π‘¦βˆ’π‘¦π΄βˆ’π‘§,𝑛𝐡

]𝐡

𝑉0 ,𝑑(𝑗)

for𝑦 = 𝑛 βˆ’ 𝑉𝑗0 for𝑦 < 𝑛 βˆ’ 𝑉𝑗.

(A.10)

Page 16: Research Article Two-Dimensional Convolution Algorithm for ...

16 Mathematical Problems in Engineering

B.

Let us consider again (35):

βˆ€π‘›>𝑉𝑗[𝑅𝑦,𝑛]

𝐴βˆͺ𝐡

𝑉0 ,𝑑{𝑗}

= π‘˜π‘ƒ (𝐴) βˆ‘

𝛾𝐴𝐡 (𝑦,𝑛)βˆͺπœ‘

𝐴𝐡 (𝑦,𝑛)

𝑃𝑛 (𝑠 | 𝐴)

Γ— [𝑅𝑦𝐴,𝑛𝐴]𝐴

𝑉0 ,𝑑{𝑗}[𝑅𝑦𝐡,𝑛𝐡

]𝐡

𝑉0 ,𝑑{𝑗}

+ π‘˜π‘ƒ (𝐡)

Γ— βˆ‘

𝛾𝐴𝐡 (𝑦,𝑛)βˆͺπœ‘

𝐴𝐡 (𝑦,𝑛)

𝑃𝑛 (𝑠 | 𝐡) [𝑅𝑦𝐴,𝑛𝐴]𝐴

𝑉0 ,𝑑{𝑗}[𝑅𝑦𝐡,𝑛𝐡

]𝐡

𝑉0 ,𝑑{𝑗}.

(B.1)

Equation (B.1) will be written in a more convenient wayby replacing the product [𝑅𝑦𝐴,𝑛𝐴]

𝐴

𝑉0 ,𝑑{𝑗}[𝑅𝑦𝐡,𝑛𝐡

]𝐡

𝑉0,𝑑{𝑗} with the

function 𝐹(𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡). Then, to this modified formula wesubstitute (32) and we get

βˆ€π‘›>𝑉𝑗[𝑅𝑦,𝑛]

𝐴βˆͺ𝐡

𝑉0 ,𝑑{𝑗}

= π‘˜ βˆ‘

𝛾𝐴𝐡 (𝑦,𝑛)βˆͺπœ‘π΄π΅ (𝑦,𝑛)

𝑛𝐴 β‹… 𝑃𝑛 (𝑠 | 𝐴)

𝑛𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡)

+ π‘˜ βˆ‘

𝛾𝐡𝐴(𝑦,𝑛)βˆͺπœ‘

𝐡A(𝑦,𝑛)

𝑛𝐡 β‹… 𝑃𝑛 (𝑠 | 𝐡)

𝑛𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡) .

(B.2)

Now we transform (B.2) into a form that enables its simpleapplication in engineering calculations. Observe that thedeterminacy interval for the parameter 𝑠, that is, the numberof unused resources in the primary group, has been deter-mined in the same way in both the probability definitions𝑃𝑛(𝑠 | 𝐴), 𝑃𝑛(𝑠 | 𝐡) (formula (31)) and in the definitions ofthe sets 𝛾𝐴𝐡 (𝑦, 𝑛), 𝛾

𝐡𝐴(𝑦, 𝑛), πœ‘

𝐴𝐡 (𝑦, 𝑛), πœ‘

𝐡𝐴(𝑦, 𝑛) (formula (34)).

Hence, the determinacy interval of the parameter 𝑠 can beremoved from the definition of the appropriate sets 𝛾 and πœ‘with no influence upon the distribution (B.2). Thus, the sets𝛾𝐴𝐡 (𝑦, 𝑛), 𝛾

𝐡𝐴(𝑦, 𝑛) can be redefined in the following way:

𝛾𝐴

𝐡 (𝑦, 𝑛) = 𝛾𝐡

𝐴 (𝑦, 𝑛)

= { ((𝑦𝐴, 𝑛𝐴) ; (𝑦𝐡, 𝑛𝐡) , 𝑠) : 𝑛 = 𝑛𝐴 + 𝑛𝐡

∧ 𝑦 = 𝑦𝐴 + 𝑦𝐡 + 𝑠 ∧ 𝑠 = 𝑉𝑗 βˆ’ 𝑛 + 𝑦} .

(B.3)

Similarly, the sets πœ‘π΄π΅ (𝑦, 𝑛), πœ‘π΅π΄(𝑦, 𝑛) can be rewritten as

follows:

(B.4)

πœ‘π΄

𝐡 (𝑦, 𝑛) = πœ‘π΅

𝐴 (𝑦, 𝑛)

= { ((𝑦𝐴, 𝑛𝐴) ; (𝑦𝐡, 𝑛𝐡) , 𝑠, 𝑧) : 𝑛 = 𝑛𝐴 + 𝑛𝐡

∧ 𝑦 = 𝑦𝐴 + 𝑦𝐡 + 𝑧 + 𝑠 ∧ 1 β©½ 𝑧 β©½ 𝑛 βˆ’ 𝑉𝑗

∧ 𝑠 = 𝑉𝑗 βˆ’ 𝑛 + 𝑦} .

(B.5)

The definitions for the sets 𝛾 and πœ‘, according to (B.3) and(B.5), make it possible to simplify formula (B.2):

βˆ€π‘›>𝑉𝑗[𝑅𝑦,𝑛]

𝐴βˆͺ𝐡

𝑉0 ,𝑑{𝑗}

= π‘˜ βˆ‘

𝛾𝐴𝐡 (𝑦,𝑛)

𝑛𝐴 β‹… 𝑃𝑛 (𝑠 | 𝐴) + (𝑛 βˆ’ 𝑛𝐴) 𝑃𝑛 (𝑠 | 𝐡)

𝑛

Γ— 𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡)

+ π‘˜ βˆ‘

πœ‘π΄π΅ (𝑦,𝑛)

𝑛𝐴 β‹… 𝑃𝑛 (𝑠 | 𝐴) + (𝑛 βˆ’ 𝑛𝐴) 𝑃𝑛 (𝑠 | 𝐡)

𝑛

Γ— 𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡) .

(B.6)

In (B.6), the resulting sumhas been divided into two sumsover the separable sets 𝛾 and πœ‘. Let us consider first, then,the first sum in formula (B.6). Notice that according to thedefinition of the set 𝛾 (B.3), the pair of the parameters 𝑦 and𝑛 unequivocally determines one and only one value 𝑠:

𝑠 = 𝑦 + 𝑉𝑗 βˆ’ 𝑛. (B.7)

Taking into account all the conditions determining set 𝛾 inDefinition (B.3), we are in a position to write the followingequation:

βˆ€π‘¦π΄,𝑛𝐴,𝑦𝐡,π‘›π΅βˆˆπ›Ύπ΄π΅(𝑦,𝑛)𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡)

= 𝐹 (𝑦𝐴, 𝑛𝐴, 𝑛 βˆ’ 𝑉𝑗 βˆ’ 𝑦𝐴, 𝑛 βˆ’ 𝑛𝐴) .

(B.8)

Therefore, the convolution defined by Function (B.8), thatis, the first sum in formula (B.6), can be presented in the formof double sum with regard to two parameters 𝑛𝐴, 𝑦𝐴 only:

βˆ‘

𝛾𝐴𝐡 (𝑦,𝑛)

𝑛𝐴𝑃𝑛 (𝑠 | 𝐴) + (𝑛 βˆ’ 𝑛𝐴) 𝑃𝑛 (𝑠 | 𝐡)

𝑛𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡)

=

𝑛

βˆ‘

𝑛𝐴=0

𝑛𝐴𝑃𝑛 (𝑦 + 𝑉𝑗 βˆ’ 𝑛 | 𝐴) + (𝑛 βˆ’ 𝑛𝐴) 𝑃𝑛 (𝑦 + 𝑉𝑗 βˆ’ 𝑛 | 𝐡)

𝑛

Γ—

π‘›βˆ’π‘‰π‘—

βˆ‘

𝑦𝐴=0

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑛 βˆ’ 𝑉𝑗 βˆ’ 𝑦𝐴, 𝑛 βˆ’ 𝑛𝐴) .

(B.9)

Page 17: Research Article Two-Dimensional Convolution Algorithm for ...

Mathematical Problems in Engineering 17

Let us proceed to a transformation of the second sumof (B.6).By analyzing the conditions determining the set πœ‘π΄π΅ (𝑦, 𝑛)in Definition (B.5) we can make Function 𝐹(𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡)dependent on the three parameters 𝑦𝐴, 𝑛𝐴, and 𝑧:

βˆ€π‘¦π΄,𝑛𝐴,𝑦𝐡,π‘›π΅βˆˆπœ‘π΄π΅(𝑦,𝑛)𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡)

= 𝐹 (𝑦𝐴, 𝑛𝐴, 𝑛 βˆ’ 𝑉𝑗 βˆ’ 𝑦𝐴 βˆ’ 𝑧, 𝑛 βˆ’ 𝑛𝐴) .

(B.10)

The notation (B.10) makes it possible to present the secondsum in formula (B.6) in the form of the following triple sum:

βˆ‘

πœ‘π΄π΅ (𝑦,𝑛)

𝑛𝐴𝑃𝑛 (𝑠 | 𝐴) + 𝑛𝐡𝑃𝑛 (𝑠 | 𝐡)

𝑛𝐹 (𝑦𝐴, 𝑛𝐴, 𝑦𝐡, 𝑛𝐡)

=

𝑛

βˆ‘

𝑛𝐴=0

𝑛𝐴𝑃𝑛 (𝑦 + 𝑉𝑗 βˆ’ 𝑛 | 𝐴) + (𝑛 βˆ’ 𝑛𝐴) 𝑃𝑛 (𝑦 + 𝑉𝑗 βˆ’ 𝑛 | 𝐡)

𝑛

Γ—

π‘›βˆ’π‘‰π‘—

βˆ‘

𝑧=1

π‘›βˆ’π‘‰π‘—

βˆ‘

𝑦𝐴=0

𝐹 (𝑦𝐴, 𝑛𝐴, 𝑛 βˆ’ 𝑉𝑗 βˆ’ 𝑦𝐴 βˆ’ 𝑧, 𝑛 βˆ’ 𝑛𝐴) .

(B.11)

Now, by adding the expressions (B.9) and (B.11) we caneventually reduce formula (B.6) to the form used in theexpression (36) for 𝑛 > 𝑉𝑗:

βˆ€π‘›>𝑉𝑗[𝑅𝑦,𝑛]

𝐴βˆͺ𝐡

𝑉0 ,𝑑{𝑗}

= π‘˜

β‹…

𝑛

βˆ‘

𝑛𝐴=0

𝑛𝐴𝑃𝑛 (𝑦 + 𝑉𝑗 βˆ’ 𝑛 | 𝐴) + (𝑛 βˆ’ 𝑛𝐴) 𝑃𝑛 (𝑦 + 𝑉𝑗 βˆ’ 𝑛 | 𝐡)

𝑛

Γ—

π‘›βˆ’π‘‰π‘—

βˆ‘

𝑧=0

π‘›βˆ’π‘‰π‘—

βˆ‘

𝑦𝐴=0

𝑅[𝑦𝐴, 𝑛𝐴]𝐴

𝑉0,𝑑{𝑗}

Γ— 𝑅[𝑛 βˆ’ 𝑉𝑗 βˆ’ 𝑦𝐴 βˆ’ 𝑧, 𝑛 βˆ’ 𝑛𝐴]𝐡

𝑉0 ,𝑑{𝑗}.

(B.12)

Observe that in formula (B.12) the value of the sum for 𝑧 = 0corresponds to the value of the expression (B.9).

References

[1] L. Harte and A. Ofrane, Telecom Systems: Pstn, Pbx, Datacom,Ip Telephony, Iptv, Wireless and Billing, Althos, 2006.

[2] R. J. Harris, β€œConcepts of optimality in alternate routing net-works,” in Proceedings of 7th International Teletraffic Congress,1973.

[3] Y. Rapp, β€œThe use of computers for network planning,” Telecom-munication Journal, vol. 12, 1971.

[4] B. Wallstrom, β€œMethods for optimazing alternative routingnetworks,” Ericsson Technics, no. 1, 1969.

[5] I. Weber, β€œSome traffic characteristics of communication net-works with automatic alternate routing,” Bell System TechnicalJournal, vol. 41, no. 2, pp. 769–786, 1962.

[6] M. Glabowski, M. Stasiak, A. Wisniewski, and P.Zwierzykowski, β€œUplink blocking probability calculationfor cellular systems withWCDMA radio interface, finite sourcepopulation and differently loaded neighbouring cells,” inProceedings of the Asia-Pacific Conference on Communications,pp. 138–142, Perth, Australia, 2005.

[7] H. Holma and A. Toskala,WCDMA for UMTS: HSPA Evolutionand LTE, John Wiley & Sons, New York, NY, USA, 2007.

[8] M. Stasiak, M. Glabowski, A. Wisniewski, and P.Zwierzykowski, Modeling and Dimensioning of MobileNetworks, Wiley, 2011.

[9] L. De Ghein,MPLS Fundamentals, Cisco Press, 2007.[10] J. Evans andC. Filsfils,Deploying IP andMPLSQoS forMultiser-

vice Networks:Theory & Practice,TheMorgan Kaufmann Seriesin Networking, Elsevier Science, 2010.

[11] C. Lewis and S. Pickavance, Selecting Mpls Vpn Services,Networking Technology Series, Cisco Press, 2006.

[12] R. I. Wilkinson, β€œTheories for toll traffic engineering in theUSA,” Bell System Technical Journal, vol. 35, no. 2, pp. 421–514,1956.

[13] M. Asaduzzaman, T. J. Chaussalet, and N. J. Robertson, β€œAloss network model with overflow for capacity planning of aneonatal unit,” Annals of Operations Research, vol. 178, pp. 67–76, 2010.

[14] G. Bretschneider, β€œDie Berechnung von Leitungsgruppen furberfließenden Verkehr in Fernsprechwahlanlagen,” Nachricht-entechnische Zeitung, vol. 11, pp. 533–540, 1956.

[15] L. E. N.Delbrouck, β€œOn the steady-state distribution in a servicefacility carrying mixtures of traffic with different peakednessfactors and capacity requirements,” IEEE Transactions on Com-munications, vol. 31, no. 11, pp. 1209–1211, 1983.

[16] A. Fredericks, β€œCongestion in blocking systemsβ€”a simpleapproximation technique,”TheBell System technical journal, vol.59, no. 6, pp. 805–828, 1980.

[17] M. Glabowski, K. Kubasik, and M. Stasiak, β€œModeling ofsystems with overflow multi-rate traffic,” TelecommunicationSystems, vol. 37, no. 1–3, pp. 85–96, 2008.

[18] Q. Huang, K. T. Ko, and V. B. Iversen, β€œAn approximationmethod for multiservice loss performance in hierarchical net-works,” in Managing Traffic Performance in Converged Net-works, Proceedings of the 20th International Teletraffic Congress(ITC 07), L. Mason, T. Drwiega, and J. Yan, Eds., vol. 4516 ofLecture Notes in Computer Science, pp. 901–912, Springer, 2007.

[19] J. S. Kaufman and K. M. Rege, β€œBlocking in a shared resourceenvironment with batched Poisson arrival processes,” Perfor-mance Evaluation, vol. 24, no. 4, pp. 249–263, 1996.

[20] V. Iversen, Teletraffic Engineering Handbook, ITU-D, StudyGroup 2, Question 16/2, ITC, Geneva, Switzerland, 2005.

[21] M. Glabowski, β€œModelling of state-dependent multi-rate sys-tems carrying BPP traffic,” Annals of Telecommunications, vol.63, no. 7-8, pp. 393–407, 2008.

[22] M. Glabowski, A. Kaliszan, andM. Stasiak, β€œModeling product-form state-dependent systems with BPP traffic,” PerformanceEvaluation, vol. 67, no. 3, pp. 174–197, 2010.

[23] M. Glabowski and M. Stasiak, β€œPoint-to-point blocking prob-ability in switching networks with reservation,” Annales desTelecommunications, vol. 57, no. 7-8, pp. 798–831, 2002.

[24] M. Glabowski and M. Stasiak, β€œMulti-rate model of thegroup of separated transmission links of various capacities,”in Telecommunications and Networking, Proceedings of the 11thInternational Conference on Telecommunications (ICT ’04), J. N.

Page 18: Research Article Two-Dimensional Convolution Algorithm for ...

18 Mathematical Problems in Engineering

de Souza, P. Dini, and P. Lorenz, Eds., vol. 3124 of Lecture Notesin Computer Science, pp. 1101–1106, Springer, Fortaleza, Brazil,August 2004.

[25] M. Glabowski, M. Stasiak, and P. Zwierzykowski, β€œModellingof virtual-circuit switching nodes with multicast connections,”EuropeanTransactions onTelecommunications, vol. 20, no. 2, pp.123–137, 2009.

[26] D. Parniewicz, M. Stasiak, and P. Zwierzykowski, β€œMulticastconnections in mobile networks with embedded thresholdmechanism,” in Computer Networks, Proceedings of the 18thConference on Computer Networks (CN ’11), A. Kwiecien, P. Gaj,and P. Stera, Eds., vol. 160 of Communications in Computer andInformation Science, pp. 407–416, Springer, Ustron, Poland, June2011.

[27] J. Roberts, V. Mocci, and I. Virtamo, β€œBroadband networkteletraffic,” Final Report of Action COST 242, Commission ofthe European Communities, Springer, Berlin, Germany, 1996.

[28] M. Stasiak, J. Wiewiora, P. Zwierzykowski, and D. Parniewicz,β€œAnalyticalmodel of traffic compression in theUMTSnetwork,”in Computer Performance Engineering, Proceedings of the 6thEuropean Performance Engineering Workshop, J. T. Bradley, Ed.,vol. 5652 of Lecture Notes in Computer Science, pp. 79–93,Springer, London, UK, July 2009.

[29] S. Bodamer and J. Charzinski, β€œEvaluation of effective band-width schemes for self-similar traffic,” in Proceedings of the 13thITC Specialist Seminar on IP TrafficMeasurement,Modeling andManagement, pp. 21.1–21.10, Monterey, Calif, USA, September2000.

[30] J. Charzinski, β€œInternet trafficmeasurment and characterisationresults,” in Proceedings of the 13th Internetional Symposium onServices and Local Access (ISSLS ’00), Stockholm, Sweden, June2000.

[31] N. L. S. Fonseca, G. S. Mayor, and C. A. V. Neto, β€œOn the equiv-alent bandwidth of self-similar sources,” ACM Transactions onModeling and Computer Simulation, vol. 10, no. 2, pp. 104–124,2000.

[32] R. Gibbens and Y. The, β€œCritical time and space scales forstatistical multiplexing,” in Proceedings of the 16th InternationalTeletraffic Congress (ITC ’99), pp. 87–96, Edinburgh, UK, June1999.

[33] J. Y. Hui, β€œResource allocation in broadband networks,” Journalon Selected Areas in Communications, vol. 6, no. 9, pp. 1598–1608, 1988.

[34] F. P. Kelly, β€œEffective bandwidths at multi-class queues,” Queue-ing Systems, vol. 9, no. 1-2, pp. 5–15, 1991.

[35] T. Neame,M. Zuckerman, and R. Addie, β€œA paractical approachfor multimedia traffic modeling,” in Proceedings of the 5thInternational Conference on Broadband Communications, pp.73–82, Hong Kong, November 1999.

[36] I. Norros, β€œOn the use of fractional Brownian motion in thetheory of connectionless networks,” IEEE Journal on SelectedAreas in Communications, vol. 13, no. 6, pp. 953–962, 1995.

[37] J. S. Kaufman, β€œBlocking in a shared resource environment,”IEEE Transactions on Communications, vol. 29, no. 10, pp. 1474–1481, 1981.

[38] J. Roberts, β€œA service system with heterogeneous userrequirementsβ€”application tomultiservice telecommunicationssystems,” in Proceedings of the the International Conferenceon Performance of Data Communications Systems and TheirApplications, G. Pujolle, Ed., pp. 423–431, North-Holland,Paris, France, September 1981.

[39] M. Glabowski, S. Hanczewski, and M. Stasiak, β€œErlang’s idealgrading in diffserv modelling,” in Proceedings of IEEE Africon2011, pp. 1–6, (IEEE, Livingstone, Zambia, September 2011.

[40] M. Glabowski, S. Hanczewski, M. Stasiak, and J. Weissenberg,β€œModeling erlang’s ideal grading with multi-rate BPP traffic,”Mathematical Problems in Engineering, vol. 2012, Article ID456910, 35 pages, 2012.

[41] M. Stasiak and S. Hanczewski, β€œApproximation for multi-service systems with reservation by systems with limited-availability,” in Computer Performance Engineering, Proceedingsof the 5th European Performance Engineering Workshop (EPEW’08), N. Thomas and C. Juiz, Eds., vol. 5261 of Lecture Notesin Computer Science, pp. 257–267, Springer, Palma de Mallorca,Spain, September 2008.

[42] M. Glabowski, A. Kaliszan, and M. Stasiak, β€œAsymmetric con-volution algorithm for blocking probability calculation in full-availability group with bandwidth reservation,” IET Circuits,Devices and Systems, vol. 2, no. 1, pp. 87–94, 2008.

[43] M. Glabowski, A. Kaliszan, and M. Stasiak, β€œOn the applicationof the asymmetric convolution algorithm in modeling of full-availability group with bandwidth reservation,” in ManagingTraffic Performance in Converged Networks, Proceedings of the20th International Teletraffic Congress (ITC ’07), L. Mason, T.Drwiega, and J. Yan, Eds., vol. 4516 of Lecture Notes in ComputerScience, pp. 878–889, Springer, Ottawa, Canada, June 2007.

[44] M. Glabowski and A. Kaliszan, β€œConvolution algorithm foroverflow calculation in integrated services networks,” in Pro-ceedings of the 17th Asia-Pacific Conference on Communication(APCC ’11), pp. 428–433, IEEE, Kota Kinabalu, Malaysia, Octo-ber 2011.

[45] M. Glabowski and A. Kaliszan, β€œSimulator of full-availabilitygroup with bandwidth reservation and multi-rate bernoulli-poisson-pascal traffic streams,” in Proceedings of Eurocon 2007,pp. 2271–2277, Warszawa, Poland, September 2007.

[46] J. Tyszer, Object-Oriented Computer Simulation of Discrete-Event Systems, Kluwer Academic Publishers, 1999.

[47] H. Akimaru and K. Kawashima, Teletraffic:Theory and Applica-tion, Springer, New York, NY, USA, 1999.

Page 19: Research Article Two-Dimensional Convolution Algorithm for ...

Submit your manuscripts athttp://www.hindawi.com

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttp://www.hindawi.com

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

CombinatoricsHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com

Volume 2014 Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Stochastic AnalysisInternational Journal of