SlideShare a Scribd company logo
BLOCKING PROBABILITY: VERIFYING RESULTS USING COMPUTER SIMULATION

                                  Jasper Valentine Hatilima (MSc Student #: 11042005)
                                       School of Information Science and Technology
                                                 Southwest Jiaotong University
                                                   Chengdu, Sichuan, PR China
                             Phone: +8613540757472, email: jasperhatilima@yahoo.com
                                                           November 2011
------------------------------------------------------------------------------------------------------------------------------------------
           To describe the call handling capacity of a server system, we can define a hypothetical network
with U potential users and is able to handle C simultaneous users (capacity of C channels). If U=<C, then
the system is called a non blocking system; this implies that all calls can be handled at the same time.
Else if U>C, then the system is referred to as a blocking system. For a blocking system, there are two
factors that are used to define the traffic model. Firstly, it is the manner in which a blocked call is
handled: Lost Call delayed (LCD) or Lost Call Cleared (LCC). The second traffic element model is whether
the number of users is assumed infinite or finite. Infinite sources are analytically easier to deal with and
are reasonable when number of sources is 5 to 10 times the capacity.

     1. Derivation

        Using LCC and Infinite Source model, we will derive the probability of blocking at state k as
below. The system to consider has the following parameters:
     Number of trunked channels = C
     Average mean holding time = H or service rate
     If we take traffic intensity to be A , then A =H [offered Traffic]
We define two statistical components of the trunks:
     Arrival Times
        A Poisson distribution is assumed for the arrival of the calls. Therefore from 0 to t seconds, the
        probability of n calls arriving is:

                           e  (t 0) [ (t  0)]n             e   t ( t ) n
           Pn (t  0)                              = Pn (t )                                                       (1)
                                        n!                             n!

         Service Times
          The mean call duration is H and so 1/H=  is the mean number of calls serviced in a unit of time
          i.e. mean service time. Here we assume an exponential distribution of the service time.
                                                                  th
          Therefore the probability that the duration S k of the K call will be less than an arbitrary call
          duration S is:
          Pr{ S k < S }= 1  e  S S >0
          This gives a probability density function
           p ( S k )   e  Sk                                                                                      (2)

We use the property of Markov chains i.e. the transition from the present state i to the next state i+1
depends only on the state i. The trunk operation is a continuous process but may be analyzed in small
discrete small time intervals  . If N z is the number of calls in the system at time z , then N z = N ( z ),
where N is a random process representing the number of occupied channels at discrete times.
Using equation (1) and the small interval of time interval  , then the probability of k arrivals in 
seconds is
                                          e  ( )k
                               Pr  {k} 
                                                k!
 defines a transition probability to use in the Markov chain i.e. probability of having k channels in
use is equivalent to the probability of having (k-1) channels in use multiplied by transition probability
 i.e.
                  Pk 1 = Pk                                                              (3)
                                        1
But  is the time equivalent to
                                       k
Therefore using this in equation (3) gives,

 Pk 1  k  Pk
                         P0
For k =1,          P                                                                         (4)
                   1
                         
Equation (3) under steady state condition i.e. a Markov chain over a long period of time becomes:

 Pk 1  k  Pk                                                                            (5)
                                                                                1
For various states up to state k, equation (5) becomes Pk  P0 ( )
                                                                   k
                                                                                              (6)
                                                                                k!
                                                                     C
and                                             P0  ( )k Pk k !  1   Pi                   (7)
                                                                     i 1
In equation (6), the probability of blocking for C channels is

                  1
PC  P0 ( )C                                                                                  (8)
                  C!
                                                      1   
                                                         ( )C
                                                     C!   
Substituting equation (7) into (8) yields PC  C                                              (9)
                                                     1
                                               (  )k k !
                                               k 0


                                        
But traffic intensity is A =  H =        ; substituting this into equation (9) gives:
                                        


                                                   1
                                                         AC
Probability of Blocking for C servers is PC  C C !
                                                     1
                                              Ak k !
                                              k 0
2. Computer Simulation

The probability of blocking using the above derivation was simulated using Matlab and the following
graph was obtained. Also shown below is the Matlab code used for this graphical analysis.




        Figure 1.0 Probability of Blocking Vs Traffic Intensity obtained from Matlab simulation

When C is plotted against Offered Traffic, the graph can be used for two kinds dimensioning cases in
network planning. From the graph a desired probability of blocking (GoS) can be used against the given
number of servers C to determine the maximum traffic that can be carried. Alternatively, this data can
be used to determine the channels required to carry a specific amount of maximum traffic at a given
GoS.

Find below the Matlab M-file used for this analysis. The M-file is also included in the submitted folder
under the file name is Prob_Block_Simulation_Jasper.m:
%%Program to simulate blocking probability

%%   Name:       Jasper Valentine Hatilima
%%   Student #: 11042005
%%   Southwest Jiaotong University (2011-11-18)
%%   ---------------------------Program----------------------------------


clear all;
close all;
C=[1 2 3 4 5 10 20 60]; % The number of Servers
rho=[0.1:0.1:100];       % Traffic intensity rho = lambda/mu
for i=1:length(C),
    inc=0;
    for q=0:C(i)
        inc=inc+rho.^q/factorial(q);
    end
    pb(i,:)=rho.^C(i)./factorial(C(i))./inc;
end
figure(1)
loglog(rho,pb(1,:),'-b',rho,pb(2,:),'-b',rho,pb(3,:),'-b',...
    rho,pb(4,:),'-b',rho,pb(5,:),'-b',rho,pb(6,:),'-b',rho,pb(7,:),'-b',...
    rho,pb(8,:),'-b');

%% ----------------------------Plotting---------------------------------

xlabel('Traffic Intensity,rho [Erlangs]');
ylabel('Probability of Blocking');
title('Probability of Blocking Vs Traffic Intensity');
axis([0.1 100 1e-4 1]);
text(2.e-1,0.15,'C=1');
text(3.2e-1,3e-2,'C=2');
text(4.8e-1,1e-2,'C=3');
text(7.2e-1,5e-3,'C=4');
text(1,3e-3,'C=5');
text(3.4,1.5e-3,'C=10');
text(9.8,1.6e-3,'C=20');
text(41,1.6e-3,'C=60');
grid on;

%% ------------------------------END------------------------------------

More Related Content

PDF
Sparse Random Network Coding for Reliable Multicast Services
PDF
An improved dft based channel estimation
PDF
A fast re route method
PDF
ECE 467 Mini project 1
PDF
Dynamic time warping and PIC 16F676 for control of devices
PDF
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PPT
Network Information Processing
Sparse Random Network Coding for Reliable Multicast Services
An improved dft based channel estimation
A fast re route method
ECE 467 Mini project 1
Dynamic time warping and PIC 16F676 for control of devices
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Network Information Processing

What's hot (19)

PDF
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)
DOCX
Question bank of module iv packet switching networks
PPT
第四次课程 Chap8
PDF
A method to determine partial weight enumerator for linear block codes
PPTX
PSpiceで位相余裕度シミュレーション
PDF
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
PPT
Tmp
PDF
B0311219
PDF
IEOR 250 Final Paper - Final Version
PDF
Joint Timing and Frequency Synchronization in OFDM
PDF
Efficient mission planning in communication constrained environment
PDF
A Novel Flipflop Topology for High Speed and Area Efficient Logic Structure D...
PDF
publication1
PDF
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
PDF
A method to determine partial weight enumerator for linear block codes
PDF
Code matlab mô phỏng dung lượng kênh truy ền reyleght trong kĩ thuật mimo
PDF
MFMP Vs ECMP Under RED Queue Management
PDF
Reconfigurable floating impedance using single digitally programmable cmos dvcc
PDF
D0511924
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)
Question bank of module iv packet switching networks
第四次课程 Chap8
A method to determine partial weight enumerator for linear block codes
PSpiceで位相余裕度シミュレーション
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Tmp
B0311219
IEOR 250 Final Paper - Final Version
Joint Timing and Frequency Synchronization in OFDM
Efficient mission planning in communication constrained environment
A Novel Flipflop Topology for High Speed and Area Efficient Logic Structure D...
publication1
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
A method to determine partial weight enumerator for linear block codes
Code matlab mô phỏng dung lượng kênh truy ền reyleght trong kĩ thuật mimo
MFMP Vs ECMP Under RED Queue Management
Reconfigurable floating impedance using single digitally programmable cmos dvcc
D0511924
Ad

Viewers also liked (7)

PDF
Dissertation
PDF
Study and simulation of gait cycle of a planar five link kanwar et al. 2015
PPT
Is95 System Engineering
PDF
Teletraffic engineering handbook
PDF
Wireless traffic theory and handoff
PPTX
Lecture5 teletraffic
PPTX
cellular concepts in wireless communication
Dissertation
Study and simulation of gait cycle of a planar five link kanwar et al. 2015
Is95 System Engineering
Teletraffic engineering handbook
Wireless traffic theory and handoff
Lecture5 teletraffic
cellular concepts in wireless communication
Ad

Similar to Assignment 1 -_jasper_hatilima (20)

PPTX
Circuit complexity
PDF
Design of a Pseudo-Random Binary Code Generator via a Developed Simulation Model
PDF
Time-Variant Distortions in OFDM
PDF
Design limitations and its effect in the performance of ZC1-DPLL
PDF
F04701046050
PPTX
Stochastic modelling and its applications
PDF
Paper.pdf
PPTX
A new approach in specifying the inverse quadratic matrix in modulo-2 for con...
PPT
stochasticmodellinganditsapplications.ppt
PDF
Mid term
PDF
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
PDF
The RC Circuit
PDF
FEEDBACK SHIFT REGISTERS AS CELLULAR AUTOMATA BOUNDARY CONDITIONS
PDF
FEEDBACK SHIFT REGISTERS AS CELLULAR AUTOMATA BOUNDARY CONDITIONS
PPTX
Advanced Modularity Optimization Assignment Help
PDF
PPTX
Digital Communication Exam Help
PPT
Class06_Transmission_line_basics.ppt
DOCX
ACS 22LIE12 lab Manul.docx
PDF
Ultrasound Modular Architecture
Circuit complexity
Design of a Pseudo-Random Binary Code Generator via a Developed Simulation Model
Time-Variant Distortions in OFDM
Design limitations and its effect in the performance of ZC1-DPLL
F04701046050
Stochastic modelling and its applications
Paper.pdf
A new approach in specifying the inverse quadratic matrix in modulo-2 for con...
stochasticmodellinganditsapplications.ppt
Mid term
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
The RC Circuit
FEEDBACK SHIFT REGISTERS AS CELLULAR AUTOMATA BOUNDARY CONDITIONS
FEEDBACK SHIFT REGISTERS AS CELLULAR AUTOMATA BOUNDARY CONDITIONS
Advanced Modularity Optimization Assignment Help
Digital Communication Exam Help
Class06_Transmission_line_basics.ppt
ACS 22LIE12 lab Manul.docx
Ultrasound Modular Architecture

Recently uploaded (20)

PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
01-Introduction-to-Information-Management.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Lesson notes of climatology university.
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
O7-L3 Supply Chain Operations - ICLT Program
01-Introduction-to-Information-Management.pdf
Sports Quiz easy sports quiz sports quiz
Renaissance Architecture: A Journey from Faith to Humanism
Microbial diseases, their pathogenesis and prophylaxis
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Lesson notes of climatology university.
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Computing-Curriculum for Schools in Ghana
FourierSeries-QuestionsWithAnswers(Part-A).pdf
GDM (1) (1).pptx small presentation for students
102 student loan defaulters named and shamed – Is someone you know on the list?
Microbial disease of the cardiovascular and lymphatic systems
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Abdominal Access Techniques with Prof. Dr. R K Mishra
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
VCE English Exam - Section C Student Revision Booklet

Assignment 1 -_jasper_hatilima

  • 1. BLOCKING PROBABILITY: VERIFYING RESULTS USING COMPUTER SIMULATION Jasper Valentine Hatilima (MSc Student #: 11042005) School of Information Science and Technology Southwest Jiaotong University Chengdu, Sichuan, PR China Phone: +8613540757472, email: jasperhatilima@yahoo.com November 2011 ------------------------------------------------------------------------------------------------------------------------------------------ To describe the call handling capacity of a server system, we can define a hypothetical network with U potential users and is able to handle C simultaneous users (capacity of C channels). If U=<C, then the system is called a non blocking system; this implies that all calls can be handled at the same time. Else if U>C, then the system is referred to as a blocking system. For a blocking system, there are two factors that are used to define the traffic model. Firstly, it is the manner in which a blocked call is handled: Lost Call delayed (LCD) or Lost Call Cleared (LCC). The second traffic element model is whether the number of users is assumed infinite or finite. Infinite sources are analytically easier to deal with and are reasonable when number of sources is 5 to 10 times the capacity. 1. Derivation Using LCC and Infinite Source model, we will derive the probability of blocking at state k as below. The system to consider has the following parameters:  Number of trunked channels = C  Average mean holding time = H or service rate  If we take traffic intensity to be A , then A =H [offered Traffic] We define two statistical components of the trunks:  Arrival Times A Poisson distribution is assumed for the arrival of the calls. Therefore from 0 to t seconds, the probability of n calls arriving is: e  (t 0) [ (t  0)]n e   t ( t ) n Pn (t  0)  = Pn (t )  (1) n! n!  Service Times The mean call duration is H and so 1/H=  is the mean number of calls serviced in a unit of time i.e. mean service time. Here we assume an exponential distribution of the service time. th Therefore the probability that the duration S k of the K call will be less than an arbitrary call duration S is: Pr{ S k < S }= 1  e  S S >0 This gives a probability density function p ( S k )   e  Sk (2) We use the property of Markov chains i.e. the transition from the present state i to the next state i+1 depends only on the state i. The trunk operation is a continuous process but may be analyzed in small
  • 2. discrete small time intervals  . If N z is the number of calls in the system at time z , then N z = N ( z ), where N is a random process representing the number of occupied channels at discrete times. Using equation (1) and the small interval of time interval  , then the probability of k arrivals in  seconds is e  ( )k Pr  {k}  k!  defines a transition probability to use in the Markov chain i.e. probability of having k channels in use is equivalent to the probability of having (k-1) channels in use multiplied by transition probability  i.e.  Pk 1 = Pk (3) 1 But  is the time equivalent to k Therefore using this in equation (3) gives,  Pk 1  k  Pk  P0 For k =1, P (4) 1  Equation (3) under steady state condition i.e. a Markov chain over a long period of time becomes:  Pk 1  k  Pk (5)  1 For various states up to state k, equation (5) becomes Pk  P0 ( ) k (6)  k!  C and P0  ( )k Pk k !  1   Pi (7)  i 1 In equation (6), the probability of blocking for C channels is  1 PC  P0 ( )C (8)  C! 1  ( )C C!  Substituting equation (7) into (8) yields PC  C (9)  1  (  )k k ! k 0  But traffic intensity is A =  H = ; substituting this into equation (9) gives:  1 AC Probability of Blocking for C servers is PC  C C ! 1  Ak k ! k 0
  • 3. 2. Computer Simulation The probability of blocking using the above derivation was simulated using Matlab and the following graph was obtained. Also shown below is the Matlab code used for this graphical analysis. Figure 1.0 Probability of Blocking Vs Traffic Intensity obtained from Matlab simulation When C is plotted against Offered Traffic, the graph can be used for two kinds dimensioning cases in network planning. From the graph a desired probability of blocking (GoS) can be used against the given number of servers C to determine the maximum traffic that can be carried. Alternatively, this data can be used to determine the channels required to carry a specific amount of maximum traffic at a given GoS. Find below the Matlab M-file used for this analysis. The M-file is also included in the submitted folder under the file name is Prob_Block_Simulation_Jasper.m:
  • 4. %%Program to simulate blocking probability %% Name: Jasper Valentine Hatilima %% Student #: 11042005 %% Southwest Jiaotong University (2011-11-18) %% ---------------------------Program---------------------------------- clear all; close all; C=[1 2 3 4 5 10 20 60]; % The number of Servers rho=[0.1:0.1:100]; % Traffic intensity rho = lambda/mu for i=1:length(C), inc=0; for q=0:C(i) inc=inc+rho.^q/factorial(q); end pb(i,:)=rho.^C(i)./factorial(C(i))./inc; end figure(1) loglog(rho,pb(1,:),'-b',rho,pb(2,:),'-b',rho,pb(3,:),'-b',... rho,pb(4,:),'-b',rho,pb(5,:),'-b',rho,pb(6,:),'-b',rho,pb(7,:),'-b',... rho,pb(8,:),'-b'); %% ----------------------------Plotting--------------------------------- xlabel('Traffic Intensity,rho [Erlangs]'); ylabel('Probability of Blocking'); title('Probability of Blocking Vs Traffic Intensity'); axis([0.1 100 1e-4 1]); text(2.e-1,0.15,'C=1'); text(3.2e-1,3e-2,'C=2'); text(4.8e-1,1e-2,'C=3'); text(7.2e-1,5e-3,'C=4'); text(1,3e-3,'C=5'); text(3.4,1.5e-3,'C=10'); text(9.8,1.6e-3,'C=20'); text(41,1.6e-3,'C=60'); grid on; %% ------------------------------END------------------------------------