SlideShare a Scribd company logo
1 of 10
Download to read offline
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 2, April 2020, pp. 603~612
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i2. 13900  603
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
An optimum dynamic priority-based call admission control
scheme for universal mobile telecommunications system
Anike Uchenna, Ajibo Chinenye Augustine, Chinaeke-Ogbuka Ifeanyi Maryrose,
Odo Chinedu Matthew, Amoke Amobi Douglas, Ani Cosmas
Department of Electronic Engineering, University of Nigeria, Nigeria
Article Info ABSTRACT
Article history:
Received Aug 14, 2019
Revised Jan 6, 2020
Accepted Feb 4, 2020
The dynamism associated with quality of service (QoS) requirement for
traffic emanating from smarter end users devices founded on the internet of
things (IoTs) drive, places a huge demand on modern telecommunication
infrastructure. Most telecom networks, currently utilize robust call admission
control (CAC) policies to ameliorate this challenge. However, the need for
smarter CAC has becomes imperative owing to the sensitivity of traffic
currently being supported. In this work, we developed a prioritized CAC
algorithm for third Generation (3G) wireless cellular network. Based on
the dynamic priority CAC (DP-CAC) model, we proposed an optimal
dynamic priority CAC (ODP-CAC) scheme for Universal Mobile
Telecommunication System (UMTS). We then carried out simulation under
heavy traffic load while also exploiting renegotiation among different call
traffic classes. Also, we introduced queuing techniques to enhance the new
calls success probability while still maintaining a good handoff failure across
the network. Results show that ODP-CAC provides an improved
performance with regards to the probability of call drop for new calls,
network load utilization and grade of service with average percentage value
of 15.7%, 5.4% and 0.35% respectively.
Keywords:
3G
CAC
IoTs
QoS
UMTS
This is an open access article under the CC BY-SA license.
Corresponding Author:
Ajibo Chinenye Augustine,
Department of Electronic Engineering,
University of Nigeria, Nsukka, Nigeria.
Email: augustine.ajibo@unn.edu.ng
1. INTRODUCTION
The third generation (3G) wireless networks also called β€œUniversal Mobile Telecommunication
System” has amongst other features, a call admission control (CAC) mechanism that is adjudged to have
the capacity to consider different service classes and also take the advantage of the changing nature of
multimedia service. This is in a bid to minimize the probability of call drops while also ensuring that end
users enjoy improved QoS [1-3]. With the recent increase in the interest in data inspired communication and
multimedia services, attributable to the rise in smarter end user devices and the quest for interaction amongst
things; heralded by the IoTs, the development of multiple-class CAC schemes for modern communication
infrastructure has become even more challenging [4]. Critical issues bordering on fairness, service
prioritization, and resource allocation policy have taken central stage in deliberations geared towards
improving CAC schemes for future generations of wireless cellular networks [5].
CAC schemes play a dual role to both the network and end users as they provide users with access
network services while at the same time serving as the decision-making part of the network for optimal
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 603 - 612
604
network resource utilization [6, 7]. Several CAC schemes have been proposed in literatures. However,
the complete sharing (CS) based scheme, such as hybrid priority CAC (HP-CAC) and queuing priority CAC
(QP-CAC), have been established to produce the best resource utilization [8-10]. Though with the deficiency
of not guaranteeing the independent QoS demand for a certain group of service.
In this work, we present an optimum dynamic priority call admission control (ODP-CAC) that takes
into account the aforementioned challenges associated with DP-CAC scheme. The proposed scheme, adopts
a dynamic approach in that the diversified network traffic load of modern telecom network requires
admission control policies to be adaptive to the varying traffic pattern. The ODP-CAC, using renegotiation,
explored the unused bandwidth of the network and allocate such to services which at the point of admission
into the network were availed insufficient resources. This bandwidth renegotiation is done for a lower
priority services in the event of the availability of the medium. Thus, improving the overall bandwidth usage
of the lower priority classes.
To realize the specific intent of this work, the remaining part of this work is ordered as follow:
Section 2 provides a survey of related studies centering on CAC. Section 3 presents an analythical
description of the adopted DP-CAC model. Furthermore, an in-depth insight of the proposed ODP-CAC
algorithm was explored. Subsequently, in section 4 we carried-out the simulation of the developed DP-CAC
and ODP-CAC models, and also investigate their performance by subjecting them to voice, video, and
real-time services. Then simulation results were analyzed and discussed. Finally, Section 5 concludes and
makes recommendations for future work.
2. OVERVIEW OF RELATED WORKS
Several methods have been proposed recently in literatures for radio resource distribution in mobile
networks. We thus, present a review of some of these studies. [11, 12], proposed a priority-based resource
distribution scheme for voice and data services in a homogeneous network using the limited fractional guard
channel (LFGCP). Their study, took into consideration handoffs owing to user adaptability, varying traffic
properties, and changing service load. Numerical results from their proposed scheme, revealed its ability to
concurrently provide sufficient QoS for both services while also maintaining a reasonable network resource
utilization. Similarly, Khanjari et.al, [13] proposed a QoS sensitive and guaranteed adaptive CAC for
multiclass service in mobile network. The proposed model utilizes bandwidth leasing and prediction
techniques in prioritizing traffic classes for a maximum allocation of the available bandwidth. This technique
was found to improve bandwidth utilization. It was also found to reduce the blocking probability of calls
significantly. Also, [14] proposed a CAC technique that utilizes the interference estimation and
differentiation of QoS demand for separate services. The interferences in this case, is estimated from
the impact of the to-be-admitted new call on the QoS of the existing connections in the adjacent cells. Higher
chances of admission were given to calls adjacent to their serving base station (BS) and those experiencing
lower path-loss. While calls emanating from the edge of the serving cell and having large path-loss to
the serving BS had the tendency of introducing excess interference to adjacent cells as such they were given
lower admission probability. Results from simulation revealed that the proposed scheme performs better in
outage and blocking probabilities. However, the issue of call hand-off was not considered in the scheme.
In [15, 16], an optimal joint call admission control (JCAC) for inter-radio access technology (RAT) was
developed to cater for issues associated with cell re-selection for the support of real-time and non-real-time
services. The proposed JCAC utilizes a cost function that compares the blocking and accepting costs
respectively. The scheme also utilizes a semi-markov decision process (SMDP) in formulating its
optimization problem. Finding from their study revealed that the proposed optimal JCAC was able to select
bigger RAT for real-time service while smaller RAT was allocated to non-real-time services.
Furthermore, [17] proposed a radio resource management (RRM) scheme which integrated
resource-reservation estimation (RRE) and CAC; their study was founded on the concept of interference
guard margin (IGM) for CDMA systems. The CAC scheme offered higher priority to handoff calls by
reserving a specific amount of resource based on the IGM. The RRE which was implemented in each BS
assisted the RRM in dynamically adjusting the level of IGM. Wang and Zhuang [18], on the other hand
proposed a CAC for a code division multiple access (CDMA) network that supports heterogeneous
self-similar data traffic. Their techniques, guaranteed service requirements for both calls and packet in
the network. The GoS for their schemes with respect to the supported service were evaluated in terms of
handoff call dropping probability and packet transmission delay respectively. Results from simulation
revealed that the proposed scheme was able to satisfy both QoS and GoS requirements for supported traffic
and was also able to realize efficient network resource utilization. In [19, 20] a real-time dynamic CAC
scheme that jointly provide connection-level QoS and packet-level QoS for heterogeneous and varying
multimedia traffic in the next generation wireless networks was proposed. The proposed scheme was found
TELKOMNIKA Telecommun Comput El Control 
An optimum dynamic priority-based call admission control scheme… (Anike Uchenna)
605
to be computationally-efficient for real-time implementation. Preliminary simulation showed that scheme
realized better performance relative to the stationary CAC scheme under heterogeneous and varying
multimedia traffic load conditions. In addition, [21] proposed a CAC that that protects users with strict
transmission bit-rate requirements, while also offering sufficient capacity to delay-tolerant services over
prolonged duration. οΏΌοΏΌ a complete sharing (CS)-based dual threshold bandwidth reservation (DTBR)
algorithm which handles two broad classes of traffic voice traffic (high priority) and data traffic (low
priority) was proposed. The total system bandwidth C was divided into three partitions by using two fixed
thresholds T1 and T1 (T2 <T1). When the total occupied bandwidth was less than T2, both voice and data traffic
were serviced by the system. While in cases where the occupied bandwidth was more than T2 but less than T1,
only voice calls was serviced and when the occupied bandwidth was more than T1 οΏΌοΏΌ, proposed
a bandwidth reservation CAC scheme, where priority was given to unsolicited grant service (UGS)
connection by allocating a predetermined value of the total network bandwidth. The fixed bandwidth served
to guarantee guaranteed QoS for UGS. Moreover, a degradation model was also developed by the authors to
reduce non-real time packet switch (nrtPS) connection from its peak sustained traffic rate in a bid to reduce
traffic rate in order to allow for more UGS, real time (rtPS) and non-real time packet switch (nrtPS) non-
degradation mode. In contrast, only UGS and nrtPS connections were addressed in their proposed algorithm.
In summary, most of the reviewed literatures tried to address issues centering on GoS indicators:
call blocking and dropping probability, by favoring the handoff calls over new call in their CAC policies;
with the justification that supporting an ongoing call is more important than accepting a fresh one.
To the best of our knowledge, none of these studies attempted the rerouting of the un-transmitted packets
which we envisage could help maximize the overall network resource utilization. We thus seek to develop
an optimal dynamic priority CAC scheme which seek to cater for the aforementioned gap while also
guaranteeing QoS of each service class.
3. SYSTEM DESCRIPTION
For this study, two types of services: real-time service (RT), such as conversational and streaming
traffic, and non-real-time service (NRT) such as interactive and background services were considered.
To realize the objective of this study, we divide the priority classes of incoming call requests into four groups
namely: (group1) RT service handoff requests; (group2) NRT service handoff requests; (group3) newly
originating RT calls; and (group4) newly originating NRT calls as shown in Table 1.
The capacity of a typical WCDMA cell in terms of its cell load is described thus: the load factor,ƞ,
is the instantaneous resource utilization upper bounded by the maximum cell capacity ƞ π‘šπ‘Žπ‘₯. Instantaneous
values for the cell load range from 0 to 1. Using this load factor, we developed a QoS-aware CAC algorithm
for WCDMA-based networks using the concept of thresholds and queuing techniques as shown in Figure 1.
Each call category has its unique queue represented as Q1, Q2, Q3 and Q4 each with fixed sizes: K, L, M and
N respectively. In this scheme, call class request is assigned its queue on arrival when such request on arrival
cannot be serviced owing to resource unavailability. Such request is later assigned a resource when available
based on its calculated priority.
Let Ζžπ‘–, be the load margin (LM) of the 𝑖 π‘‘β„Ž
(i = 1, 2, 3 and 4) traffic group, while ƞ π‘šπ‘Žπ‘₯ represents
the maximum loading that can be tolerated by the network. Based on the set loading threshold, we realized
two CAC schemes namely: the hybrid priority CAC (HP-CAC) scheme which has set LM for each group
and the dynamic priority CAC (DP-CAC) scheme which utilizes the fixed load partition and the set system
load to adaptively admit the queued calls. The priority of traffic classes is dynamically adjusted in a bid to
ensure that the higher priority class maintains higher priority in as much as the lower priority class do not
suffer any consequence by this act. One of the setbacks with the HP-CAC scheme is that unused marked out
loading limits for higher priority groups cannot be utilized by lower class traffic thus resulting in a waste of
network resource. Also, there is an overwhelming of traffic of lower priority as more preference is given to
traffic of higher priority at all point in time. The DP-CAC scheme ameliorates the aforementioned setbacks
with HP-CAC by providing tolerable QoS for each traffic class and preventing higher traffic class from
suppressing lower traffic class in order to enhance fairness in resource allocation. We thus present
an overview of the DP-CAC in section 3.1.
Table 1. Traffic class and description
Class Traffic groups Request types Class descriptions
1 RT Handoff calls Conversational and streaming
2 NRT Handoff calls Interactive and background
3 RT New calls Conversational and streaming
4 NRT New calls Interactive and background
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 603 - 612
606
Figure 1. Dynamic priority call admission control (DP-CAC) scheme
3.1. Overview of the DP-CAC scheme
We present a step description of the DP-CAC procedure as thus:
βˆ’ The arrived class 𝑖 call is served as long as (1) is met.
βˆ†Ζžπ‘– + ƞ 𝑐 ≀ ƞ π‘šπ‘Žπ‘₯ (1)
βˆ’ Fresh calls are assigned their respective queue when all resources are utilized.
βˆ’ Called are removed from the queue when they exceed set queuing time.
βˆ’ When trunks capacities are released, priority values are dynamically computed for all call classes with
non-empty queues using the total load currently occupied by class 𝑖 calls in (2) and the load partition
predefined for class 𝑖 π‘‘β„Ž
calls in (1):
𝑂𝑖 = (1 + 𝑓) βˆ‘
𝑣𝑖
1+𝐺 𝑖 𝜌 𝑖⁄
≀ 𝐿𝑖
𝐡 𝑖
𝑖=1 (2)
where,𝑂𝑖is the total usage load occupied by each connected call class 𝑖 at an instance, and 𝐿𝑖 is the size of
the load partition. 𝐡𝑖 is the number of connected class 𝑖 call at an instance. Then, the queue with least priority
value is served first based on first-in-first-out (FIFO) policy. The dynamic priority value for class 𝑖 call is
determined by (3).
𝑃𝑖 =
𝑂 𝑖
𝐿 𝑖
(3)
In this scheme, traffic class 𝑖 with a minimum priority 𝑃𝑖value are assigned the highest priority.
Also, as the total instantaneous load of class 𝑖 calls drop below the pre-fixed partition size 𝐿𝑖,its priority value
reduces. Hence, it will receive a high priority. In a situation where two or more call classes have the same
priority value, then the call with lower class index (higher priority) will be served first. With this algorithm,
unused load of one traffic class can be utilized by other traffic classes as the demand arises. Also, at high
system load, the priority value will prevent the classes from enormously affecting each other. The flowchart
of the DP-CAC algorithm is shown in Figure 2.
Though the DP-CAC remediate the failures of the HP-CAC, it however, fail to provide
a satisfactory dropping probability for handoff calls. It however, fails to decrease the blocking probability of
TELKOMNIKA Telecommun Comput El Control 
An optimum dynamic priority-based call admission control scheme… (Anike Uchenna)
607
a new call to desirable level. We thus propose an optimal dynamic priority call admission control
(ODP-CAC) takes into account aforementioned issues associated DP-CAC scheme. Section 3.2 presents
a description of the ODP-CAC scheme.
Figure 2. Dynamic priority call admission control (DP-CAC) Flowchart
3.2. Overview of the ODP-CAC schemes
For the proposed scheme, we adopted a dynamic approach for CAC. This is to accommodate for
the diversity associated with the traffic pattern generated by smarter end user devices. The proposed
ODP-CAC scheme uses renegotiation, in exploring the unused bandwidth of the network and in assigning
resource to services which were under furnished with their required network resource at the point of
admission into the network. This scheme differs from DP-CAC scheme in that it utilizes a queuing system to
enhance the success probability for new calls and also for retransmitting unused bandwidth.
The algorithm utilizes the effective load as an admission requirement and applies varying thresholds
for hand-off and new calls. If the total instantaneous usage load 𝑂𝑖occupied by each connected call class is
less than 1, i.e., 𝑂𝑖 ≀ 1where𝑖 ∈ {1,2, … , π‘˜}, the class is said to be using less than its allotted fair share
bandwidth. In this case, the maximum bandwidthπ‘π‘–π‘šπ‘Žπ‘₯, is assigned to the incoming calls either from
the maximum loadingƞ π‘šπ‘Žπ‘₯, or by degrading ongoing calls of class i (𝑖 β‰  𝑗, 𝑖 ∈ {1,2, … , π‘˜}) with
higher𝑂𝑖values than𝑂𝑗 i.e., 𝑂𝑖 > 𝑂𝑗 . If π‘π‘–π‘šπ‘Žπ‘₯ bandwidth not available,π‘π‘–π‘šπ‘–π‘› bandwidth is allotted following
the same procedure as above. If neither π‘π‘–π‘šπ‘Žπ‘₯ nor π‘π‘–π‘šπ‘–π‘› bandwidth is available, the new call is rejected.
The optimal DP-CAC scheme flowchart is shown in Figure 3.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 603 - 612
608
Figure 3. Optimal dynamic priority call admission control (ODP-CAC) flowchart
4. SIMULATION AND RESULT ANALYSIS
We adopted the traffic model established in [9, 25], for this study. Markov modulated poisson
process (MMPP) was assumed for traffic arrival processes of new and handoff calls, belonging to each call
class, with traffic arrival rates of πœ†β„Ž1, πœ†β„Ž2, πœ† 𝑛1, πœ† 𝑛2, for real time (RT) handoff, non-real time (NRT) handoff
calls, real time (RT) new calls and non-real time (NRT) new calls, respectively. We computed the the total
arrival rate of the systemπœ†, using (4):
πœ† = πœ†β„Ž1 + πœ†β„Ž2 + πœ† 𝑛1 + πœ† 𝑛2 (4)
Similarly, the channel holding time for the various call class are exponentially distributed with mean
value given as πœ‡βˆ’1
while the queuing time limit of each handoff calls class is exponentially distributed with
mean 𝛾𝑗
βˆ’1
. Using the above definitions, the generated load of each traffic class 𝑖, denoted by πœŒπ‘– is given by:
πœŒπ‘– = πœ‡π‘–
βˆ’1
(5)
The total load offered to the system is given as 𝜌, and computed using (6):
TELKOMNIKA Telecommun Comput El Control 
An optimum dynamic priority-based call admission control scheme… (Anike Uchenna)
609
𝜌 = πœ‡π‘–
βˆ’1(πœ†β„Ž1 + πœ†β„Ž2 + πœ† 𝑛1 + πœ† 𝑛2) (6)
the simulation parameters for the proposed schemes are presented in Table 2.
Table 2. Table of simulation parameters
Parameter Value
Radio acceses mode WCDMA (FDD) uplink with perfect power control
Chip rate 3.84 Mcps
Spread spectrum 5.0 MHz
WCDMA channel rate 2.0 Mbps
Slot duration 0.667 ms
Frame duration 10 ms
Dedicated channel rates 12.2, 64, 128, 256, 384 kbps
RT active factor (class 1 and 3) 0.4
NRT active factor (class 2 and 4) 1
Max. cell load 100% of pole capacity
Class 1, 2, 3, and 4 load margin 0.35, 0.25, 0.2 and 0.2
Packet arrival Poisson
Packet generation type Exponential
Queue type FIFA, Priority
TTI 100
4.1. System performance measures
The following system performance metrics as described below was used in evaluating
the performance of both algorithms.
a. Call dropping probability: this is calculated using (7)
π‘ƒβ„Žπ‘— =
π‘“π‘Žπ‘–π‘™π‘’π‘‘β„Žπ‘Žπ‘›π‘‘π‘œπ‘“π‘“π‘Žπ‘‘π‘‘π‘’π‘šπ‘π‘‘
π‘‘π‘œπ‘‘π‘Žπ‘™π‘›π‘’π‘šπ‘π‘’π‘Ÿπ‘œπ‘“β„Žπ‘Žπ‘›π‘‘π‘œπ‘“π‘“π‘Žπ‘‘π‘‘π‘’π‘šπ‘π‘‘π‘’π‘‘
(7)
b. Call blocking probability: this is computed using (8)
𝑃𝑛𝑖 =
π‘“π‘Žπ‘–π‘™π‘›π‘’π‘€π‘π‘Žπ‘™π‘™π‘ π‘Žπ‘‘π‘‘π‘’π‘šπ‘π‘‘
π‘‘π‘œπ‘‘π‘Žπ‘™π‘›π‘’π‘šπ‘π‘’π‘Ÿπ‘œπ‘“π‘›π‘’π‘€π‘π‘Žπ‘™π‘™π‘Žπ‘Žπ‘‘π‘‘π‘’π‘šπ‘π‘‘π‘’π‘‘
(8)
Grade of service (GoS): the GoS is defined as:
πΊπ‘œπ‘†π‘— = 𝛼 βˆ— π‘ƒβ„Žπ‘— + 𝑃𝑛𝑖 (9)
where π‘ƒβ„Žπ‘— is the probability of handoff failure, and 𝑃𝑛𝑖 is the blocking probability for new traffic belonging
to (j = 1, 2) RT and NRT respectively Ξ± = 10 indicates penalty weight for dropping a handoff call relative to
blocking a new call. It is pertinent to mention that it is always desirable to have smaller GoS value as it
indicates improved performance.
c. System utilization (U): this represent the mean number of connections in each traffic group that
the system can accept for a given traffic intensity. It is defined as 𝑛𝑖.The bandwidth ( 𝑏𝑖) of connection 𝑖is
defined by the load increment, βˆ†Ζžπ‘–, such that, 𝑏𝑖 = βˆ†Ζžπ‘–. The average system utilization is defined as:
π‘ˆ = βˆ‘ ( 𝑛𝑖)4
𝑖=1 . ( 𝑏𝑖) =
ƞ´
ƞ π‘šπ‘Žπ‘₯
(10)
whereƞ´, is the average utilized load.
4.2. Simulation results
This section presents the simulation results of the proposed ODP-CAC scheme and that of
the DP-CAC under the same conditions. At the end of each simulation we obtained an evaluation of call
dropping probability π‘ƒβ„Žπ‘— and call blocking probability 𝑃𝑛𝑖. We also obtain the mean resource utilization
which is an important criterion for evaluating the performance of any typical CAC algorithms. It is pertinent
to mention that it is always desirable to realize a network utilization of about 100%. In the simulation results,
a percentage value is used to compare the performance of both schemes.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 603 - 612
610
4.2.1. Handoff call dropping probability
In a typical network, the drop of a handoff traffic is similar to a dropping a fresh call from
the perspective of the user. Thus, it is desired that the fraction of traffic that suffer this loss be significantly
low. Figure 4 shows the handoff call dropping probability comparison of DP-CAC and ODP-CAC for
different traffic intensity. It is seen that the dropping probability of handoff call is smaller than that of newly
admitted calls. Similarly, Figure 5 shows that the traffic load of the network increases, as a result of the CAC
operation. But no significant improvement was observed from both schemes.
4.2.2. New Traffic blocking probability
Figures 5 compares the performance of the new calls blocking probability of our proposed optimal
DP-CAC scheme with that of DP-CAC scheme. As anticipated, this figure shows a linear relationship
between traffic intensity and loss for bandwidth demanding services. Thus, resulting in an increase drop rate
for new traffics. Our proposed scheme outperformed the DP-CAC by an average percentage value of 15.7%
improvement. This is owing to the fact that the scheme offers less blocking to fresh traffic while satisfying
the QoS and GoS demands of other services already admitted into the network. The ODP-CAC scheme is
able to achieve this for newly originating calls, by allocating bandwidth to the lower priority class which got
a lesser resource either from the unused bandwidth of the network or by degrading the overloaded higher
priority call requests.
4.2.3. Grade of service
The GoS against traffic intensity for an aggregation of traffic demand is depicted in Figure 6.
The improved performance of the ODP-CAC over the DP-CAC by an average percentage value of
5.4% comes from the use of queuing to enhance the new call success probability (i.e., one minus
the blocking probability).
4.2.4. Utilization
Figure 7 shows the system utilization comparison of our proposed ODP-CAC scheme with that of
DP-CAC scheme. It can be noted that, the utilization of ODP-CAC scheme outperform that offered by
DP-CAC scheme as results shows an average utilization improvement of 0.35% percentage value. At high
traffic intensity the ODP-CAC scheme was also able to achieve a cell capacity utilization of 98%. This is
attributable to the fact that the ODP-CAC scheme was capable of rerouting the unused network resources by
dynamically controlling priority level of queued traffic.
Figure 4. Handoff traffic dropping probability against traffic intensity
Figure 5. New traffic blocking probability against traffic intensity
TELKOMNIKA Telecommun Comput El Control 
An optimum dynamic priority-based call admission control scheme… (Anike Uchenna)
611
Figure 6. GoS against traffic intensity
Figure 7. System utilization as a function
of traffic intensity
5. CONCLUSION
In this study, an optimal dynamic priority call admission control (ODP-CAC) scheme was proposed.
The scheme was extended to WCDMA by using adaptive loading range of ƞ1, ƞ2, ƞ3 and ƞ4 in order to assign
priority to handoff RT request, handoff NRT request, new RT request and new NRT request respectively.
Owing to the dynamism currently associated with end user devices attributable to the demand for
connectivity for all things, we proposed an adaptive CAC policy to enhance the 3G system performance.
The most significant advantage of the new proposed scheme is its dynamic behavior which allows for
flexible adaptation to the continuously changing network parameters, which is the main shortcoming of
the traditional bandwidth-based solution. Results obtained from simulation indicates that by degrading
the handoff call request when not effectively utilize and by exploring and retransmitting the unused network
resources, it is possible to decrease the loss rate for new traffic demand. Similarly, our findings reveal that in
addition to better performance in QoS provisioning the ODP-CAC scheme also achieves a better network
resources usage. Significant improvement has been realized by using queuing to enhance the lower priority
class (i.e., new calls request) and by means of lowering the associated dropping probability of new traffic
with the resultant improvement in the utilization of cell capacity. However, this comes at the detriment of
other higher priority class. Further research is thus recommended in this area to improve fairness of
the proposed ODP-CAC scheme.
REFERENCES
[1] Yao J., Xiao L., Nie C., Wong D.T.C., and Chew Y.H. β€œResource allocation for end-to-end QoS provisioning in a
hybrid wireless WCDMA and wireline IP-based DiffServ network,” Eur. J. Oper. Res. vol. 191, no. 3,
pp. 1139–1160, 2008.
[2] Patil G. U and Deshmukh C. N., β€œCAC Scheme for 3G Wireless Cellular Networks with QoS Provisioning and
Queuing Traffic,” International Journal of Research in Computer Engineering and Electronics, vol. 2, no. 1,
pp. 1–5, 2013.
[3] Ajibo A., Chinaeke-Ogbuka I., Udechukwu F., β€œComparative analysis of LTE backbone transport techniques for
efficient broadband penetration in a heterogeneous network morphology,” TELKOMNIKA Telecommun Comput El
Control, vol. 17, no. 5, pp. 2226-2234, 2019.
[4] Abedin S., Alam G., Kazmi A., Tran N., Niyato D., Hong C., β€œResource allocation for Ultra-Reliable and Enhanced
Mobile Broadband IoT Applications in Fog Network,” IEEE Transactions on Communications, vol. 67, no. 1,
pp. 489-502, 2019.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 603 - 612
612
[5] Sallabi F., Shuaib K., and Shafique M., β€œQuality of Service provisioning for UMTS network users with immediate
and advance radio resource reservations,” Journal of the Franklin Institute, vol. 104, no. 6, pp. 468–479, 2006.
[6] Kumar S., β€œA Comparative Study of Call Admission Control in Mobile Multimedia Networks using Soft
Computing,” International Journal of Computer Applications, vol. 107, no. 16, pp. 5–11, 2014.
[7] Alhihi M., Khosravi M., Attar H., Samour M., β€œDetermining the Optimum Number of Paths for Realization of
Multi-path Routing in MPLS-TE Networks,” TELKOMNIKA Telecommun Comput El Control, vol. 15, no. 4,
pp. 1701-1709, 2017.
[8] Alqahtani S. A., and Mahmoud A. S., β€œPerformance analysis of two throughput-based call admission control
schemes for 3G WCDMA wireless networks supporting multiservices,” Computer Communications, vol. 31, no. 1,
pp. 49–57, 2008.
[9] Osuwagu H. O, Ajibo A. C., Ugwuanyi S. O, Nwachi-Ikpo J., and Ani C. I., β€œDynamic bandwidth scheduling for
WCDMA uplink transmission,” International Journal of Scientific & Engineering Research, vol. 8, no. 2,
pp. 798-805, 2017.
[10] Setiyo B., and Arissetyanto N., β€œA New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load
Balancing and Offloading on the UMTS-IEEE 802.11g Hybrid Networks,” TELKOMNIKA Telecommun Comput El
Control, vol. 15, no. 2, pp. 598-605, 2017.
[11] Leong C. W., Zhuang W., Member S., and Cheng Y., β€œOptimal Resource Allocation and Adaptive Call Admission
Control for Voice/Data Integrated cellular networks, IEEE Transactions on Vehicular Technology, vol. 55, no. 2,
pp. 654–669, 2006.
[12] Chen W., Yu J., Pan F., β€œOptimal priority-based call admission control scheme for QoS provisioning in
heterogeneous wireless networks,” Journal of Networks, vol. 6, no. 2, pp. 319-329, 2011.
[13] Khanjari S. A., Arafeh B., Day K., and N. Alzeidi, β€œBandwidth borrowing-based QoS approach for adaptive call
admission control in multiclass traffic wireless cellular networks,” International Journal of Communication
Systems, vol. 26, no. 7, pp. 811-831, 2011.
[14] Huang Q., Chen H. M., Ko K. T., Chan S., Chan K. S., β€œCall Admission Control for 3G CDMA Networks
with Differentiated QoS,” International Conference on Research in Networking, pp. 636–647, 2002.
[15] Carvalho G. H. S., Woungang I., Anpalagan A., Coutinho R.W. L., and Costa J. C. W. A., β€œA semi-Markov
decision process-based joint call admission control for inter-RAT cell re-selection in next generation wireless
networks,” Comput. Networks, vol. 57, no. 17, pp. 3545–3562, 2013.
[16] Kaur S., Selvamuthu D., β€œAdaptive joint call admission control scheme in LTE-UMTS networks,” In 2014 IEEE
International Conference on Communication, Networks and Satellite (COMNETSAT), pp. 63-70, 2013.
[17] Chen H., Kumar S., and Kuo C. C. J., β€œQoS-aware radio resource management scheme for CDMA
cellular networks based on dynamic interference guard margin (IGM),” Comput. Networks, vol. 46, no. 6,
pp. 867–879, 2004.
[18] Wang L. and Zhuang W., β€œA Call Admission Control Scheme for Packet Data in CDMA Cellular
Communications,” Wirel. Commun. IEEE Trans, vol. 5, no. 2, pp. 406–416, 2006.
[19] Huang L. and Kuo C. J., β€œDynamic Call Admission Control with Joint Connection-level and Packet-level QoS
Support in Wireless Multimedia Networks,” IEEE Symposium on Real-Time and Embedded Technologies and
Applications, May 2004.
[20] Rejeb S. B., Nasser N., Tabbane S., β€œA novel resource allocation scheme for LTE network in the presence of
mobility,” Journal of Network and Computer Applications, vol. 46, pp. 352-61, 2014.
[21] Lizhong L., Bin L., Bo L., and Xi-Ren C., β€œPerformance Analysis of Bandwidth Allocations for Multi-services
Mobile Wireless Cellular Networks,” Proc. IEEE Wirel. Commun. Netw. Conf., 2003.
[22] W. L. and D. P. A. Haitang Wang, β€œDynamic Admission Control and QoS for 802.16 Wireless MAN,” Symposium,
2005 Wireless Telecommunications, 2005.
[23] Wei D., Ansari N., β€œImplementing fair bandwidth allocation schemes in hose-modelled VPN,” IEE Proceedings-
Communications, vol. 151, no. 6, pp. 521-8, Dec. 2004.
[24] Kokila S., Shankar R., Dananjayan P., β€œPerformance analysis of dual threshold call admission control in
3G/WLAN coupled network,” In IEEE-International Conference on Advances in Engineering, Science and
Management (ICAESM-2012), 2012.
[25] Augustine A., Chukwudi I., Cosmas A., β€œPerformance Evaluation of Enterprise-Wide Network that Its Backbone Is
Based on Leased Trunk,” International Journal of Communications, Network and System Sciences, vol. 8, no. 10,
pp. 399-407, 2015.

More Related Content

What's hot

ELSEVIER - WIRELESS COMMUNICATON RESERCH PAPER
ELSEVIER - WIRELESS COMMUNICATON RESERCH PAPERELSEVIER - WIRELESS COMMUNICATON RESERCH PAPER
ELSEVIER - WIRELESS COMMUNICATON RESERCH PAPERAnand Pandey
Β 
Performance Analysis of Wireless Networks With MDQOS
Performance Analysis of Wireless Networks With MDQOSPerformance Analysis of Wireless Networks With MDQOS
Performance Analysis of Wireless Networks With MDQOSIJERA Editor
Β 
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband IJECEIAES
Β 
Channel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkChannel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkIJECEIAES
Β 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Β 
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...IJECEIAES
Β 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
Β 
Application-Based QoS Evaluation of Heterogeneous Networks
Application-Based QoS Evaluation of Heterogeneous Networks Application-Based QoS Evaluation of Heterogeneous Networks
Application-Based QoS Evaluation of Heterogeneous Networks csandit
Β 
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...IJNSA Journal
Β 
An improved radio_resource_management_wi
An improved radio_resource_management_wiAn improved radio_resource_management_wi
An improved radio_resource_management_wiMd.Akm Sahansha
Β 
IRJET- An Incentive Framework for Cellular Traffic Offloading
IRJET-  	  An Incentive Framework for Cellular Traffic OffloadingIRJET-  	  An Incentive Framework for Cellular Traffic Offloading
IRJET- An Incentive Framework for Cellular Traffic OffloadingIRJET Journal
Β 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...cscpconf
Β 
QoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
QoS Based Capacity Enhancement for WCDMA Network with Coding SchemeQoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
QoS Based Capacity Enhancement for WCDMA Network with Coding SchemeVLSICS Design
Β 
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...IJCNCJournal
Β 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
Β 

What's hot (18)

ELSEVIER - WIRELESS COMMUNICATON RESERCH PAPER
ELSEVIER - WIRELESS COMMUNICATON RESERCH PAPERELSEVIER - WIRELESS COMMUNICATON RESERCH PAPER
ELSEVIER - WIRELESS COMMUNICATON RESERCH PAPER
Β 
B010410411
B010410411B010410411
B010410411
Β 
Performance Analysis of Wireless Networks With MDQOS
Performance Analysis of Wireless Networks With MDQOSPerformance Analysis of Wireless Networks With MDQOS
Performance Analysis of Wireless Networks With MDQOS
Β 
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
Β 
Channel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkChannel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous Network
Β 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
Β 
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
Β 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Β 
T0 numtq0n tg=
T0 numtq0n tg=T0 numtq0n tg=
T0 numtq0n tg=
Β 
Application-Based QoS Evaluation of Heterogeneous Networks
Application-Based QoS Evaluation of Heterogeneous Networks Application-Based QoS Evaluation of Heterogeneous Networks
Application-Based QoS Evaluation of Heterogeneous Networks
Β 
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...
Β 
An improved radio_resource_management_wi
An improved radio_resource_management_wiAn improved radio_resource_management_wi
An improved radio_resource_management_wi
Β 
IRJET- An Incentive Framework for Cellular Traffic Offloading
IRJET-  	  An Incentive Framework for Cellular Traffic OffloadingIRJET-  	  An Incentive Framework for Cellular Traffic Offloading
IRJET- An Incentive Framework for Cellular Traffic Offloading
Β 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
Β 
A044030110
A044030110A044030110
A044030110
Β 
QoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
QoS Based Capacity Enhancement for WCDMA Network with Coding SchemeQoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
QoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
Β 
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Β 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
Β 

Similar to An optimum dynamic priority-based call admission control scheme for universal mobile telecommunications system

A reservation-based call admission control scheme and system modeling in 4G v...
A reservation-based call admission control scheme and system modeling in 4G v...A reservation-based call admission control scheme and system modeling in 4G v...
A reservation-based call admission control scheme and system modeling in 4G v...Perumalraja Rengaraju
Β 
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkAdaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkIJCNCJournal
Β 
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKIJCNCJournal
Β 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksIJAEMSJORNAL
Β 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...IEEEGLOBALSOFTTECHNOLOGIES
Β 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementati...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementati...JAVA 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementati...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementati...IEEEGLOBALSOFTTECHNOLOGIES
Β 
Proposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidthProposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidthijcsity
Β 
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
Β 
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...IJERA Editor
Β 
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEA SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
Β 
Optimized reduction approach of congestion in mobile ad hoc network based on...
Optimized reduction approach of congestion in mobile ad hoc  network based on...Optimized reduction approach of congestion in mobile ad hoc  network based on...
Optimized reduction approach of congestion in mobile ad hoc network based on...IJECEIAES
Β 
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
Β 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIAEME Publication
Β 
Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
Β 
Constellation Shared Multiple Access - A Noma Scheme for Increased User Capac...
Constellation Shared Multiple Access - A Noma Scheme for Increased User Capac...Constellation Shared Multiple Access - A Noma Scheme for Increased User Capac...
Constellation Shared Multiple Access - A Noma Scheme for Increased User Capac...IJCNCJournal
Β 
CONSTELLATION SHARED MULTIPLE ACCESS - A NOMA SCHEME FOR INCREASED USER CAPAC...
CONSTELLATION SHARED MULTIPLE ACCESS - A NOMA SCHEME FOR INCREASED USER CAPAC...CONSTELLATION SHARED MULTIPLE ACCESS - A NOMA SCHEME FOR INCREASED USER CAPAC...
CONSTELLATION SHARED MULTIPLE ACCESS - A NOMA SCHEME FOR INCREASED USER CAPAC...IJCNCJournal
Β 
Resource optimization-based network selection model for heterogeneous wireles...
Resource optimization-based network selection model for heterogeneous wireles...Resource optimization-based network selection model for heterogeneous wireles...
Resource optimization-based network selection model for heterogeneous wireles...IAESIJAI
Β 

Similar to An optimum dynamic priority-based call admission control scheme for universal mobile telecommunications system (20)

A reservation-based call admission control scheme and system modeling in 4G v...
A reservation-based call admission control scheme and system modeling in 4G v...A reservation-based call admission control scheme and system modeling in 4G v...
A reservation-based call admission control scheme and system modeling in 4G v...
Β 
D1102031727
D1102031727D1102031727
D1102031727
Β 
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkAdaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Β 
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
Β 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Β 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
Β 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementati...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementati...JAVA 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementati...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementati...
Β 
Proposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidthProposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidth
Β 
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Β 
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Β 
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEA SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
Β 
C0941017
C0941017C0941017
C0941017
Β 
Optimized reduction approach of congestion in mobile ad hoc network based on...
Optimized reduction approach of congestion in mobile ad hoc  network based on...Optimized reduction approach of congestion in mobile ad hoc  network based on...
Optimized reduction approach of congestion in mobile ad hoc network based on...
Β 
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
Β 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networks
Β 
Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks
Β 
Constellation Shared Multiple Access - A Noma Scheme for Increased User Capac...
Constellation Shared Multiple Access - A Noma Scheme for Increased User Capac...Constellation Shared Multiple Access - A Noma Scheme for Increased User Capac...
Constellation Shared Multiple Access - A Noma Scheme for Increased User Capac...
Β 
CONSTELLATION SHARED MULTIPLE ACCESS - A NOMA SCHEME FOR INCREASED USER CAPAC...
CONSTELLATION SHARED MULTIPLE ACCESS - A NOMA SCHEME FOR INCREASED USER CAPAC...CONSTELLATION SHARED MULTIPLE ACCESS - A NOMA SCHEME FOR INCREASED USER CAPAC...
CONSTELLATION SHARED MULTIPLE ACCESS - A NOMA SCHEME FOR INCREASED USER CAPAC...
Β 
Resource optimization-based network selection model for heterogeneous wireles...
Resource optimization-based network selection model for heterogeneous wireles...Resource optimization-based network selection model for heterogeneous wireles...
Resource optimization-based network selection model for heterogeneous wireles...
Β 
D044021420
D044021420D044021420
D044021420
Β 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
Β 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
Β 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
Β 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Β 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Β 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
Β 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
Β 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Β 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
Β 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
Β 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
Β 
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...TELKOMNIKA JOURNAL
Β 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
Β 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
Β 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
Β 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
Β 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
Β 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
Β 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
Β 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Β 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
Β 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Β 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
Β 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Β 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
Β 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Β 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
Β 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
Β 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
Β 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
Β 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
Β 
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Β 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Β 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
Β 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
Β 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Β 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
Β 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
Β 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
Β 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Β 

Recently uploaded

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
Β 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
Β 
πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
Β 
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
Β 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
Β 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
Β 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
Β 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
Β 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
Β 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
Β 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
Β 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
Β 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
Β 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
Β 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
Β 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
Β 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
Β 

Recently uploaded (20)

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Β 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Β 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
Β 
πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Β 
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Β 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Β 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Β 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Β 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Β 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
Β 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Β 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Β 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Β 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Β 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
Β 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
Β 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Β 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Β 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Β 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Β 

An optimum dynamic priority-based call admission control scheme for universal mobile telecommunications system

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 2, April 2020, pp. 603~612 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i2. 13900  603 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA An optimum dynamic priority-based call admission control scheme for universal mobile telecommunications system Anike Uchenna, Ajibo Chinenye Augustine, Chinaeke-Ogbuka Ifeanyi Maryrose, Odo Chinedu Matthew, Amoke Amobi Douglas, Ani Cosmas Department of Electronic Engineering, University of Nigeria, Nigeria Article Info ABSTRACT Article history: Received Aug 14, 2019 Revised Jan 6, 2020 Accepted Feb 4, 2020 The dynamism associated with quality of service (QoS) requirement for traffic emanating from smarter end users devices founded on the internet of things (IoTs) drive, places a huge demand on modern telecommunication infrastructure. Most telecom networks, currently utilize robust call admission control (CAC) policies to ameliorate this challenge. However, the need for smarter CAC has becomes imperative owing to the sensitivity of traffic currently being supported. In this work, we developed a prioritized CAC algorithm for third Generation (3G) wireless cellular network. Based on the dynamic priority CAC (DP-CAC) model, we proposed an optimal dynamic priority CAC (ODP-CAC) scheme for Universal Mobile Telecommunication System (UMTS). We then carried out simulation under heavy traffic load while also exploiting renegotiation among different call traffic classes. Also, we introduced queuing techniques to enhance the new calls success probability while still maintaining a good handoff failure across the network. Results show that ODP-CAC provides an improved performance with regards to the probability of call drop for new calls, network load utilization and grade of service with average percentage value of 15.7%, 5.4% and 0.35% respectively. Keywords: 3G CAC IoTs QoS UMTS This is an open access article under the CC BY-SA license. Corresponding Author: Ajibo Chinenye Augustine, Department of Electronic Engineering, University of Nigeria, Nsukka, Nigeria. Email: augustine.ajibo@unn.edu.ng 1. INTRODUCTION The third generation (3G) wireless networks also called β€œUniversal Mobile Telecommunication System” has amongst other features, a call admission control (CAC) mechanism that is adjudged to have the capacity to consider different service classes and also take the advantage of the changing nature of multimedia service. This is in a bid to minimize the probability of call drops while also ensuring that end users enjoy improved QoS [1-3]. With the recent increase in the interest in data inspired communication and multimedia services, attributable to the rise in smarter end user devices and the quest for interaction amongst things; heralded by the IoTs, the development of multiple-class CAC schemes for modern communication infrastructure has become even more challenging [4]. Critical issues bordering on fairness, service prioritization, and resource allocation policy have taken central stage in deliberations geared towards improving CAC schemes for future generations of wireless cellular networks [5]. CAC schemes play a dual role to both the network and end users as they provide users with access network services while at the same time serving as the decision-making part of the network for optimal
  • 2.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 603 - 612 604 network resource utilization [6, 7]. Several CAC schemes have been proposed in literatures. However, the complete sharing (CS) based scheme, such as hybrid priority CAC (HP-CAC) and queuing priority CAC (QP-CAC), have been established to produce the best resource utilization [8-10]. Though with the deficiency of not guaranteeing the independent QoS demand for a certain group of service. In this work, we present an optimum dynamic priority call admission control (ODP-CAC) that takes into account the aforementioned challenges associated with DP-CAC scheme. The proposed scheme, adopts a dynamic approach in that the diversified network traffic load of modern telecom network requires admission control policies to be adaptive to the varying traffic pattern. The ODP-CAC, using renegotiation, explored the unused bandwidth of the network and allocate such to services which at the point of admission into the network were availed insufficient resources. This bandwidth renegotiation is done for a lower priority services in the event of the availability of the medium. Thus, improving the overall bandwidth usage of the lower priority classes. To realize the specific intent of this work, the remaining part of this work is ordered as follow: Section 2 provides a survey of related studies centering on CAC. Section 3 presents an analythical description of the adopted DP-CAC model. Furthermore, an in-depth insight of the proposed ODP-CAC algorithm was explored. Subsequently, in section 4 we carried-out the simulation of the developed DP-CAC and ODP-CAC models, and also investigate their performance by subjecting them to voice, video, and real-time services. Then simulation results were analyzed and discussed. Finally, Section 5 concludes and makes recommendations for future work. 2. OVERVIEW OF RELATED WORKS Several methods have been proposed recently in literatures for radio resource distribution in mobile networks. We thus, present a review of some of these studies. [11, 12], proposed a priority-based resource distribution scheme for voice and data services in a homogeneous network using the limited fractional guard channel (LFGCP). Their study, took into consideration handoffs owing to user adaptability, varying traffic properties, and changing service load. Numerical results from their proposed scheme, revealed its ability to concurrently provide sufficient QoS for both services while also maintaining a reasonable network resource utilization. Similarly, Khanjari et.al, [13] proposed a QoS sensitive and guaranteed adaptive CAC for multiclass service in mobile network. The proposed model utilizes bandwidth leasing and prediction techniques in prioritizing traffic classes for a maximum allocation of the available bandwidth. This technique was found to improve bandwidth utilization. It was also found to reduce the blocking probability of calls significantly. Also, [14] proposed a CAC technique that utilizes the interference estimation and differentiation of QoS demand for separate services. The interferences in this case, is estimated from the impact of the to-be-admitted new call on the QoS of the existing connections in the adjacent cells. Higher chances of admission were given to calls adjacent to their serving base station (BS) and those experiencing lower path-loss. While calls emanating from the edge of the serving cell and having large path-loss to the serving BS had the tendency of introducing excess interference to adjacent cells as such they were given lower admission probability. Results from simulation revealed that the proposed scheme performs better in outage and blocking probabilities. However, the issue of call hand-off was not considered in the scheme. In [15, 16], an optimal joint call admission control (JCAC) for inter-radio access technology (RAT) was developed to cater for issues associated with cell re-selection for the support of real-time and non-real-time services. The proposed JCAC utilizes a cost function that compares the blocking and accepting costs respectively. The scheme also utilizes a semi-markov decision process (SMDP) in formulating its optimization problem. Finding from their study revealed that the proposed optimal JCAC was able to select bigger RAT for real-time service while smaller RAT was allocated to non-real-time services. Furthermore, [17] proposed a radio resource management (RRM) scheme which integrated resource-reservation estimation (RRE) and CAC; their study was founded on the concept of interference guard margin (IGM) for CDMA systems. The CAC scheme offered higher priority to handoff calls by reserving a specific amount of resource based on the IGM. The RRE which was implemented in each BS assisted the RRM in dynamically adjusting the level of IGM. Wang and Zhuang [18], on the other hand proposed a CAC for a code division multiple access (CDMA) network that supports heterogeneous self-similar data traffic. Their techniques, guaranteed service requirements for both calls and packet in the network. The GoS for their schemes with respect to the supported service were evaluated in terms of handoff call dropping probability and packet transmission delay respectively. Results from simulation revealed that the proposed scheme was able to satisfy both QoS and GoS requirements for supported traffic and was also able to realize efficient network resource utilization. In [19, 20] a real-time dynamic CAC scheme that jointly provide connection-level QoS and packet-level QoS for heterogeneous and varying multimedia traffic in the next generation wireless networks was proposed. The proposed scheme was found
  • 3. TELKOMNIKA Telecommun Comput El Control  An optimum dynamic priority-based call admission control scheme… (Anike Uchenna) 605 to be computationally-efficient for real-time implementation. Preliminary simulation showed that scheme realized better performance relative to the stationary CAC scheme under heterogeneous and varying multimedia traffic load conditions. In addition, [21] proposed a CAC that that protects users with strict transmission bit-rate requirements, while also offering sufficient capacity to delay-tolerant services over prolonged duration. οΏΌοΏΌ a complete sharing (CS)-based dual threshold bandwidth reservation (DTBR) algorithm which handles two broad classes of traffic voice traffic (high priority) and data traffic (low priority) was proposed. The total system bandwidth C was divided into three partitions by using two fixed thresholds T1 and T1 (T2 <T1). When the total occupied bandwidth was less than T2, both voice and data traffic were serviced by the system. While in cases where the occupied bandwidth was more than T2 but less than T1, only voice calls was serviced and when the occupied bandwidth was more than T1 οΏΌοΏΌ, proposed a bandwidth reservation CAC scheme, where priority was given to unsolicited grant service (UGS) connection by allocating a predetermined value of the total network bandwidth. The fixed bandwidth served to guarantee guaranteed QoS for UGS. Moreover, a degradation model was also developed by the authors to reduce non-real time packet switch (nrtPS) connection from its peak sustained traffic rate in a bid to reduce traffic rate in order to allow for more UGS, real time (rtPS) and non-real time packet switch (nrtPS) non- degradation mode. In contrast, only UGS and nrtPS connections were addressed in their proposed algorithm. In summary, most of the reviewed literatures tried to address issues centering on GoS indicators: call blocking and dropping probability, by favoring the handoff calls over new call in their CAC policies; with the justification that supporting an ongoing call is more important than accepting a fresh one. To the best of our knowledge, none of these studies attempted the rerouting of the un-transmitted packets which we envisage could help maximize the overall network resource utilization. We thus seek to develop an optimal dynamic priority CAC scheme which seek to cater for the aforementioned gap while also guaranteeing QoS of each service class. 3. SYSTEM DESCRIPTION For this study, two types of services: real-time service (RT), such as conversational and streaming traffic, and non-real-time service (NRT) such as interactive and background services were considered. To realize the objective of this study, we divide the priority classes of incoming call requests into four groups namely: (group1) RT service handoff requests; (group2) NRT service handoff requests; (group3) newly originating RT calls; and (group4) newly originating NRT calls as shown in Table 1. The capacity of a typical WCDMA cell in terms of its cell load is described thus: the load factor,ƞ, is the instantaneous resource utilization upper bounded by the maximum cell capacity ƞ π‘šπ‘Žπ‘₯. Instantaneous values for the cell load range from 0 to 1. Using this load factor, we developed a QoS-aware CAC algorithm for WCDMA-based networks using the concept of thresholds and queuing techniques as shown in Figure 1. Each call category has its unique queue represented as Q1, Q2, Q3 and Q4 each with fixed sizes: K, L, M and N respectively. In this scheme, call class request is assigned its queue on arrival when such request on arrival cannot be serviced owing to resource unavailability. Such request is later assigned a resource when available based on its calculated priority. Let Ζžπ‘–, be the load margin (LM) of the 𝑖 π‘‘β„Ž (i = 1, 2, 3 and 4) traffic group, while ƞ π‘šπ‘Žπ‘₯ represents the maximum loading that can be tolerated by the network. Based on the set loading threshold, we realized two CAC schemes namely: the hybrid priority CAC (HP-CAC) scheme which has set LM for each group and the dynamic priority CAC (DP-CAC) scheme which utilizes the fixed load partition and the set system load to adaptively admit the queued calls. The priority of traffic classes is dynamically adjusted in a bid to ensure that the higher priority class maintains higher priority in as much as the lower priority class do not suffer any consequence by this act. One of the setbacks with the HP-CAC scheme is that unused marked out loading limits for higher priority groups cannot be utilized by lower class traffic thus resulting in a waste of network resource. Also, there is an overwhelming of traffic of lower priority as more preference is given to traffic of higher priority at all point in time. The DP-CAC scheme ameliorates the aforementioned setbacks with HP-CAC by providing tolerable QoS for each traffic class and preventing higher traffic class from suppressing lower traffic class in order to enhance fairness in resource allocation. We thus present an overview of the DP-CAC in section 3.1. Table 1. Traffic class and description Class Traffic groups Request types Class descriptions 1 RT Handoff calls Conversational and streaming 2 NRT Handoff calls Interactive and background 3 RT New calls Conversational and streaming 4 NRT New calls Interactive and background
  • 4.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 603 - 612 606 Figure 1. Dynamic priority call admission control (DP-CAC) scheme 3.1. Overview of the DP-CAC scheme We present a step description of the DP-CAC procedure as thus: βˆ’ The arrived class 𝑖 call is served as long as (1) is met. βˆ†Ζžπ‘– + ƞ 𝑐 ≀ ƞ π‘šπ‘Žπ‘₯ (1) βˆ’ Fresh calls are assigned their respective queue when all resources are utilized. βˆ’ Called are removed from the queue when they exceed set queuing time. βˆ’ When trunks capacities are released, priority values are dynamically computed for all call classes with non-empty queues using the total load currently occupied by class 𝑖 calls in (2) and the load partition predefined for class 𝑖 π‘‘β„Ž calls in (1): 𝑂𝑖 = (1 + 𝑓) βˆ‘ 𝑣𝑖 1+𝐺 𝑖 𝜌 𝑖⁄ ≀ 𝐿𝑖 𝐡 𝑖 𝑖=1 (2) where,𝑂𝑖is the total usage load occupied by each connected call class 𝑖 at an instance, and 𝐿𝑖 is the size of the load partition. 𝐡𝑖 is the number of connected class 𝑖 call at an instance. Then, the queue with least priority value is served first based on first-in-first-out (FIFO) policy. The dynamic priority value for class 𝑖 call is determined by (3). 𝑃𝑖 = 𝑂 𝑖 𝐿 𝑖 (3) In this scheme, traffic class 𝑖 with a minimum priority 𝑃𝑖value are assigned the highest priority. Also, as the total instantaneous load of class 𝑖 calls drop below the pre-fixed partition size 𝐿𝑖,its priority value reduces. Hence, it will receive a high priority. In a situation where two or more call classes have the same priority value, then the call with lower class index (higher priority) will be served first. With this algorithm, unused load of one traffic class can be utilized by other traffic classes as the demand arises. Also, at high system load, the priority value will prevent the classes from enormously affecting each other. The flowchart of the DP-CAC algorithm is shown in Figure 2. Though the DP-CAC remediate the failures of the HP-CAC, it however, fail to provide a satisfactory dropping probability for handoff calls. It however, fails to decrease the blocking probability of
  • 5. TELKOMNIKA Telecommun Comput El Control  An optimum dynamic priority-based call admission control scheme… (Anike Uchenna) 607 a new call to desirable level. We thus propose an optimal dynamic priority call admission control (ODP-CAC) takes into account aforementioned issues associated DP-CAC scheme. Section 3.2 presents a description of the ODP-CAC scheme. Figure 2. Dynamic priority call admission control (DP-CAC) Flowchart 3.2. Overview of the ODP-CAC schemes For the proposed scheme, we adopted a dynamic approach for CAC. This is to accommodate for the diversity associated with the traffic pattern generated by smarter end user devices. The proposed ODP-CAC scheme uses renegotiation, in exploring the unused bandwidth of the network and in assigning resource to services which were under furnished with their required network resource at the point of admission into the network. This scheme differs from DP-CAC scheme in that it utilizes a queuing system to enhance the success probability for new calls and also for retransmitting unused bandwidth. The algorithm utilizes the effective load as an admission requirement and applies varying thresholds for hand-off and new calls. If the total instantaneous usage load 𝑂𝑖occupied by each connected call class is less than 1, i.e., 𝑂𝑖 ≀ 1where𝑖 ∈ {1,2, … , π‘˜}, the class is said to be using less than its allotted fair share bandwidth. In this case, the maximum bandwidthπ‘π‘–π‘šπ‘Žπ‘₯, is assigned to the incoming calls either from the maximum loadingƞ π‘šπ‘Žπ‘₯, or by degrading ongoing calls of class i (𝑖 β‰  𝑗, 𝑖 ∈ {1,2, … , π‘˜}) with higher𝑂𝑖values than𝑂𝑗 i.e., 𝑂𝑖 > 𝑂𝑗 . If π‘π‘–π‘šπ‘Žπ‘₯ bandwidth not available,π‘π‘–π‘šπ‘–π‘› bandwidth is allotted following the same procedure as above. If neither π‘π‘–π‘šπ‘Žπ‘₯ nor π‘π‘–π‘šπ‘–π‘› bandwidth is available, the new call is rejected. The optimal DP-CAC scheme flowchart is shown in Figure 3.
  • 6.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 603 - 612 608 Figure 3. Optimal dynamic priority call admission control (ODP-CAC) flowchart 4. SIMULATION AND RESULT ANALYSIS We adopted the traffic model established in [9, 25], for this study. Markov modulated poisson process (MMPP) was assumed for traffic arrival processes of new and handoff calls, belonging to each call class, with traffic arrival rates of πœ†β„Ž1, πœ†β„Ž2, πœ† 𝑛1, πœ† 𝑛2, for real time (RT) handoff, non-real time (NRT) handoff calls, real time (RT) new calls and non-real time (NRT) new calls, respectively. We computed the the total arrival rate of the systemπœ†, using (4): πœ† = πœ†β„Ž1 + πœ†β„Ž2 + πœ† 𝑛1 + πœ† 𝑛2 (4) Similarly, the channel holding time for the various call class are exponentially distributed with mean value given as πœ‡βˆ’1 while the queuing time limit of each handoff calls class is exponentially distributed with mean 𝛾𝑗 βˆ’1 . Using the above definitions, the generated load of each traffic class 𝑖, denoted by πœŒπ‘– is given by: πœŒπ‘– = πœ‡π‘– βˆ’1 (5) The total load offered to the system is given as 𝜌, and computed using (6):
  • 7. TELKOMNIKA Telecommun Comput El Control  An optimum dynamic priority-based call admission control scheme… (Anike Uchenna) 609 𝜌 = πœ‡π‘– βˆ’1(πœ†β„Ž1 + πœ†β„Ž2 + πœ† 𝑛1 + πœ† 𝑛2) (6) the simulation parameters for the proposed schemes are presented in Table 2. Table 2. Table of simulation parameters Parameter Value Radio acceses mode WCDMA (FDD) uplink with perfect power control Chip rate 3.84 Mcps Spread spectrum 5.0 MHz WCDMA channel rate 2.0 Mbps Slot duration 0.667 ms Frame duration 10 ms Dedicated channel rates 12.2, 64, 128, 256, 384 kbps RT active factor (class 1 and 3) 0.4 NRT active factor (class 2 and 4) 1 Max. cell load 100% of pole capacity Class 1, 2, 3, and 4 load margin 0.35, 0.25, 0.2 and 0.2 Packet arrival Poisson Packet generation type Exponential Queue type FIFA, Priority TTI 100 4.1. System performance measures The following system performance metrics as described below was used in evaluating the performance of both algorithms. a. Call dropping probability: this is calculated using (7) π‘ƒβ„Žπ‘— = π‘“π‘Žπ‘–π‘™π‘’π‘‘β„Žπ‘Žπ‘›π‘‘π‘œπ‘“π‘“π‘Žπ‘‘π‘‘π‘’π‘šπ‘π‘‘ π‘‘π‘œπ‘‘π‘Žπ‘™π‘›π‘’π‘šπ‘π‘’π‘Ÿπ‘œπ‘“β„Žπ‘Žπ‘›π‘‘π‘œπ‘“π‘“π‘Žπ‘‘π‘‘π‘’π‘šπ‘π‘‘π‘’π‘‘ (7) b. Call blocking probability: this is computed using (8) 𝑃𝑛𝑖 = π‘“π‘Žπ‘–π‘™π‘›π‘’π‘€π‘π‘Žπ‘™π‘™π‘ π‘Žπ‘‘π‘‘π‘’π‘šπ‘π‘‘ π‘‘π‘œπ‘‘π‘Žπ‘™π‘›π‘’π‘šπ‘π‘’π‘Ÿπ‘œπ‘“π‘›π‘’π‘€π‘π‘Žπ‘™π‘™π‘Žπ‘Žπ‘‘π‘‘π‘’π‘šπ‘π‘‘π‘’π‘‘ (8) Grade of service (GoS): the GoS is defined as: πΊπ‘œπ‘†π‘— = 𝛼 βˆ— π‘ƒβ„Žπ‘— + 𝑃𝑛𝑖 (9) where π‘ƒβ„Žπ‘— is the probability of handoff failure, and 𝑃𝑛𝑖 is the blocking probability for new traffic belonging to (j = 1, 2) RT and NRT respectively Ξ± = 10 indicates penalty weight for dropping a handoff call relative to blocking a new call. It is pertinent to mention that it is always desirable to have smaller GoS value as it indicates improved performance. c. System utilization (U): this represent the mean number of connections in each traffic group that the system can accept for a given traffic intensity. It is defined as 𝑛𝑖.The bandwidth ( 𝑏𝑖) of connection 𝑖is defined by the load increment, βˆ†Ζžπ‘–, such that, 𝑏𝑖 = βˆ†Ζžπ‘–. The average system utilization is defined as: π‘ˆ = βˆ‘ ( 𝑛𝑖)4 𝑖=1 . ( 𝑏𝑖) = ƞ´ ƞ π‘šπ‘Žπ‘₯ (10) whereƞ´, is the average utilized load. 4.2. Simulation results This section presents the simulation results of the proposed ODP-CAC scheme and that of the DP-CAC under the same conditions. At the end of each simulation we obtained an evaluation of call dropping probability π‘ƒβ„Žπ‘— and call blocking probability 𝑃𝑛𝑖. We also obtain the mean resource utilization which is an important criterion for evaluating the performance of any typical CAC algorithms. It is pertinent to mention that it is always desirable to realize a network utilization of about 100%. In the simulation results, a percentage value is used to compare the performance of both schemes.
  • 8.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 603 - 612 610 4.2.1. Handoff call dropping probability In a typical network, the drop of a handoff traffic is similar to a dropping a fresh call from the perspective of the user. Thus, it is desired that the fraction of traffic that suffer this loss be significantly low. Figure 4 shows the handoff call dropping probability comparison of DP-CAC and ODP-CAC for different traffic intensity. It is seen that the dropping probability of handoff call is smaller than that of newly admitted calls. Similarly, Figure 5 shows that the traffic load of the network increases, as a result of the CAC operation. But no significant improvement was observed from both schemes. 4.2.2. New Traffic blocking probability Figures 5 compares the performance of the new calls blocking probability of our proposed optimal DP-CAC scheme with that of DP-CAC scheme. As anticipated, this figure shows a linear relationship between traffic intensity and loss for bandwidth demanding services. Thus, resulting in an increase drop rate for new traffics. Our proposed scheme outperformed the DP-CAC by an average percentage value of 15.7% improvement. This is owing to the fact that the scheme offers less blocking to fresh traffic while satisfying the QoS and GoS demands of other services already admitted into the network. The ODP-CAC scheme is able to achieve this for newly originating calls, by allocating bandwidth to the lower priority class which got a lesser resource either from the unused bandwidth of the network or by degrading the overloaded higher priority call requests. 4.2.3. Grade of service The GoS against traffic intensity for an aggregation of traffic demand is depicted in Figure 6. The improved performance of the ODP-CAC over the DP-CAC by an average percentage value of 5.4% comes from the use of queuing to enhance the new call success probability (i.e., one minus the blocking probability). 4.2.4. Utilization Figure 7 shows the system utilization comparison of our proposed ODP-CAC scheme with that of DP-CAC scheme. It can be noted that, the utilization of ODP-CAC scheme outperform that offered by DP-CAC scheme as results shows an average utilization improvement of 0.35% percentage value. At high traffic intensity the ODP-CAC scheme was also able to achieve a cell capacity utilization of 98%. This is attributable to the fact that the ODP-CAC scheme was capable of rerouting the unused network resources by dynamically controlling priority level of queued traffic. Figure 4. Handoff traffic dropping probability against traffic intensity Figure 5. New traffic blocking probability against traffic intensity
  • 9. TELKOMNIKA Telecommun Comput El Control  An optimum dynamic priority-based call admission control scheme… (Anike Uchenna) 611 Figure 6. GoS against traffic intensity Figure 7. System utilization as a function of traffic intensity 5. CONCLUSION In this study, an optimal dynamic priority call admission control (ODP-CAC) scheme was proposed. The scheme was extended to WCDMA by using adaptive loading range of ƞ1, ƞ2, ƞ3 and ƞ4 in order to assign priority to handoff RT request, handoff NRT request, new RT request and new NRT request respectively. Owing to the dynamism currently associated with end user devices attributable to the demand for connectivity for all things, we proposed an adaptive CAC policy to enhance the 3G system performance. The most significant advantage of the new proposed scheme is its dynamic behavior which allows for flexible adaptation to the continuously changing network parameters, which is the main shortcoming of the traditional bandwidth-based solution. Results obtained from simulation indicates that by degrading the handoff call request when not effectively utilize and by exploring and retransmitting the unused network resources, it is possible to decrease the loss rate for new traffic demand. Similarly, our findings reveal that in addition to better performance in QoS provisioning the ODP-CAC scheme also achieves a better network resources usage. Significant improvement has been realized by using queuing to enhance the lower priority class (i.e., new calls request) and by means of lowering the associated dropping probability of new traffic with the resultant improvement in the utilization of cell capacity. However, this comes at the detriment of other higher priority class. Further research is thus recommended in this area to improve fairness of the proposed ODP-CAC scheme. REFERENCES [1] Yao J., Xiao L., Nie C., Wong D.T.C., and Chew Y.H. β€œResource allocation for end-to-end QoS provisioning in a hybrid wireless WCDMA and wireline IP-based DiffServ network,” Eur. J. Oper. Res. vol. 191, no. 3, pp. 1139–1160, 2008. [2] Patil G. U and Deshmukh C. N., β€œCAC Scheme for 3G Wireless Cellular Networks with QoS Provisioning and Queuing Traffic,” International Journal of Research in Computer Engineering and Electronics, vol. 2, no. 1, pp. 1–5, 2013. [3] Ajibo A., Chinaeke-Ogbuka I., Udechukwu F., β€œComparative analysis of LTE backbone transport techniques for efficient broadband penetration in a heterogeneous network morphology,” TELKOMNIKA Telecommun Comput El Control, vol. 17, no. 5, pp. 2226-2234, 2019. [4] Abedin S., Alam G., Kazmi A., Tran N., Niyato D., Hong C., β€œResource allocation for Ultra-Reliable and Enhanced Mobile Broadband IoT Applications in Fog Network,” IEEE Transactions on Communications, vol. 67, no. 1, pp. 489-502, 2019.
  • 10.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 603 - 612 612 [5] Sallabi F., Shuaib K., and Shafique M., β€œQuality of Service provisioning for UMTS network users with immediate and advance radio resource reservations,” Journal of the Franklin Institute, vol. 104, no. 6, pp. 468–479, 2006. [6] Kumar S., β€œA Comparative Study of Call Admission Control in Mobile Multimedia Networks using Soft Computing,” International Journal of Computer Applications, vol. 107, no. 16, pp. 5–11, 2014. [7] Alhihi M., Khosravi M., Attar H., Samour M., β€œDetermining the Optimum Number of Paths for Realization of Multi-path Routing in MPLS-TE Networks,” TELKOMNIKA Telecommun Comput El Control, vol. 15, no. 4, pp. 1701-1709, 2017. [8] Alqahtani S. A., and Mahmoud A. S., β€œPerformance analysis of two throughput-based call admission control schemes for 3G WCDMA wireless networks supporting multiservices,” Computer Communications, vol. 31, no. 1, pp. 49–57, 2008. [9] Osuwagu H. O, Ajibo A. C., Ugwuanyi S. O, Nwachi-Ikpo J., and Ani C. I., β€œDynamic bandwidth scheduling for WCDMA uplink transmission,” International Journal of Scientific & Engineering Research, vol. 8, no. 2, pp. 798-805, 2017. [10] Setiyo B., and Arissetyanto N., β€œA New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Balancing and Offloading on the UMTS-IEEE 802.11g Hybrid Networks,” TELKOMNIKA Telecommun Comput El Control, vol. 15, no. 2, pp. 598-605, 2017. [11] Leong C. W., Zhuang W., Member S., and Cheng Y., β€œOptimal Resource Allocation and Adaptive Call Admission Control for Voice/Data Integrated cellular networks, IEEE Transactions on Vehicular Technology, vol. 55, no. 2, pp. 654–669, 2006. [12] Chen W., Yu J., Pan F., β€œOptimal priority-based call admission control scheme for QoS provisioning in heterogeneous wireless networks,” Journal of Networks, vol. 6, no. 2, pp. 319-329, 2011. [13] Khanjari S. A., Arafeh B., Day K., and N. Alzeidi, β€œBandwidth borrowing-based QoS approach for adaptive call admission control in multiclass traffic wireless cellular networks,” International Journal of Communication Systems, vol. 26, no. 7, pp. 811-831, 2011. [14] Huang Q., Chen H. M., Ko K. T., Chan S., Chan K. S., β€œCall Admission Control for 3G CDMA Networks with Differentiated QoS,” International Conference on Research in Networking, pp. 636–647, 2002. [15] Carvalho G. H. S., Woungang I., Anpalagan A., Coutinho R.W. L., and Costa J. C. W. A., β€œA semi-Markov decision process-based joint call admission control for inter-RAT cell re-selection in next generation wireless networks,” Comput. Networks, vol. 57, no. 17, pp. 3545–3562, 2013. [16] Kaur S., Selvamuthu D., β€œAdaptive joint call admission control scheme in LTE-UMTS networks,” In 2014 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), pp. 63-70, 2013. [17] Chen H., Kumar S., and Kuo C. C. J., β€œQoS-aware radio resource management scheme for CDMA cellular networks based on dynamic interference guard margin (IGM),” Comput. Networks, vol. 46, no. 6, pp. 867–879, 2004. [18] Wang L. and Zhuang W., β€œA Call Admission Control Scheme for Packet Data in CDMA Cellular Communications,” Wirel. Commun. IEEE Trans, vol. 5, no. 2, pp. 406–416, 2006. [19] Huang L. and Kuo C. J., β€œDynamic Call Admission Control with Joint Connection-level and Packet-level QoS Support in Wireless Multimedia Networks,” IEEE Symposium on Real-Time and Embedded Technologies and Applications, May 2004. [20] Rejeb S. B., Nasser N., Tabbane S., β€œA novel resource allocation scheme for LTE network in the presence of mobility,” Journal of Network and Computer Applications, vol. 46, pp. 352-61, 2014. [21] Lizhong L., Bin L., Bo L., and Xi-Ren C., β€œPerformance Analysis of Bandwidth Allocations for Multi-services Mobile Wireless Cellular Networks,” Proc. IEEE Wirel. Commun. Netw. Conf., 2003. [22] W. L. and D. P. A. Haitang Wang, β€œDynamic Admission Control and QoS for 802.16 Wireless MAN,” Symposium, 2005 Wireless Telecommunications, 2005. [23] Wei D., Ansari N., β€œImplementing fair bandwidth allocation schemes in hose-modelled VPN,” IEE Proceedings- Communications, vol. 151, no. 6, pp. 521-8, Dec. 2004. [24] Kokila S., Shankar R., Dananjayan P., β€œPerformance analysis of dual threshold call admission control in 3G/WLAN coupled network,” In IEEE-International Conference on Advances in Engineering, Science and Management (ICAESM-2012), 2012. [25] Augustine A., Chukwudi I., Cosmas A., β€œPerformance Evaluation of Enterprise-Wide Network that Its Backbone Is Based on Leased Trunk,” International Journal of Communications, Network and System Sciences, vol. 8, no. 10, pp. 399-407, 2015.