Blocking analysis of persistent resource allocations for M2M applications in wireless systems
- Publication Type:
- Journal Article
- Transactions on Emerging Telecommunications Technologies, 2016, 27 (11), pp. 1513 - 1529
- Issue Date:
Files in This Item:
|Blocking Analysis of Persistent Resource Allocations.pdf||Accepted Manuscript||974.89 kB|
Copyright Clearance Process
- Recently Added
- In Progress
- Open Access
This item is being processed and is not currently available.
Copyright © 2016 John Wiley & Sons, Ltd. Wide area wireless systems conventionally employ dynamic scheduling for stochastic or bursty applications and persistent resource allocations of a given period for deterministic applications such as voice. When considering persistent resource allocations for machine-to-machine (M2M) applications from different markets, a wide range of allocation periods may be required to fully support the diversity of applications. The set of periods supported by the wireless system is a compromise between efficient use of the available resources and supporting as many M2M applications as possible. We consider two schemes: a simply periodic system which offers a limited set of periods with very efficient use of resources, and a complex periodic system which offers a wider range of periods at the cost of lower efficiency. We derive formulae for the blocking probability of these two systems by considering different resource sharing policies of the Erlang Multirate Loss Model (EMLM) and the concepts of packing (when a new persistent allocation is admitted to the system) and repacking (when an existing persistent allocation leaves the system). The theoretical models are verified using a discrete event simulation with variable offered traffic loads. The concepts discussed in this paper are generic, but may find particular application in Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) networks for the purposes of system configuration (particularly in terms of the set of periods supported for persistent allocations), resource dimensioning and system performance characterisation. Copyright © 2016 John Wiley & Sons, Ltd.
Please use this identifier to cite or link to this item: