Optimal threshold characteristics of call admission control by considering cooperative behavior of users (loss model)

Sumiko Miyata, Katsunori Yamaoka, Hirotsugu Kinoshita

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Call admission control (CAC) is an important technology for maintaining Quality of Service (QoS) in Software-Defined Networking (SDN). The most popular type of CACs is trunk reservation (TR) control, and many TR control methods had been proposed for improving evaluation values such as call blocking probability or the resource utilization rate. In general, some users under these TR control methods may behave cooperatively. However, conventional TR methods do not take into account a user's cooperative behavior when they begin to communicate. In this paper, we propose a novel TR-type CAC method by considering the cooperative behavior of some users. This proposed method is presented using the loss model of queueing theory for the call-level analysis of a single link. We also analyze the characteristics of the optimal control parameter.

Original languageEnglish
Title of host publication2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PACRIM 2013
Pages165-170
Number of pages6
DOIs
Publication statusPublished - 2013 Dec 9
Externally publishedYes
Event14th IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing, PACRIM 2013 - Vancouver, BC, Canada
Duration: 2013 Aug 272013 Aug 29

Publication series

NameIEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings

Other

Other14th IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing, PACRIM 2013
Country/TerritoryCanada
CityVancouver, BC
Period13/8/2713/8/29

ASJC Scopus subject areas

  • Signal Processing
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Optimal threshold characteristics of call admission control by considering cooperative behavior of users (loss model)'. Together they form a unique fingerprint.

Cite this