20.11.2012 Views

Contents Telektronikk - Telenor

Contents Telektronikk - Telenor

Contents Telektronikk - Telenor

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

144<br />

Number of type<br />

2 connections<br />

Figure 3 Set of feasible states with a completely partitioned trunk<br />

group, case with 2 traffic types<br />

Ei ≈<br />

Feasible state<br />

⎧<br />

⎨<br />

⎩<br />

1−α d i<br />

1− D<br />

A<br />

· Erl<br />

di·A<br />

V · Erl<br />

�<br />

D<br />

ζ �<br />

D·A<br />

V<br />

�<br />

A , ζ<br />

, A2<br />

V<br />

The Lindberger and Labourdette & Hart<br />

methods are meant for network planning<br />

purposes where the calculations must be<br />

iterated a great number of times in the<br />

process of optimising a network. For the<br />

purpose of dimensioning of the trunk<br />

groups between a network node and the<br />

adjacent network nodes the exact methods<br />

can be used.<br />

5 Service protection<br />

methods<br />

, α �= 1<br />

�<br />

, α =1<br />

A complete sharing strategy will probably<br />

not be an optimal dimensioning strategy,<br />

though this depends on the traffic<br />

mix and the required maximum connection<br />

blocking probability for the different<br />

traffic types. The reason for this is that a<br />

complete sharing strategy will result in a<br />

higher connection blocking probability<br />

the higher the bandwidth demands are.<br />

An effect of this will be that requests for<br />

high bandwidth services will be rejected<br />

in heavy traffic periods due to lack of<br />

resources. Under normal conditions the<br />

connection blocking probability may be<br />

satisfactory, but then at the expense of a<br />

low network utilisation.<br />

boundary given by<br />

linear CAC<br />

Number of type<br />

1 connections<br />

For trunk groups consisting of more than<br />

one ATM link, this may partly be remedied<br />

by using routing methods when<br />

hunting for free capacity. Two such routing<br />

methods are<br />

- the concentration method, and<br />

- the separation method.<br />

The concentration method is a sequential<br />

hunting with homing. Since we then<br />

always start the hunting with the same<br />

link, this link will always be heavily<br />

loaded and the last link in the sequence<br />

will be less loaded (depending on the<br />

offered traffic).<br />

When using the separation method we<br />

still do sequential hunting with homing,<br />

but the traffic types are divided in two<br />

classes (the types with the highest bit<br />

rates is one class) with opposite homing<br />

positions.<br />

The advantage of these methods is a<br />

lower connection blocking probability<br />

for traffic types with high capacity<br />

demands. A disadvantage is a higher processor<br />

load due to more retrials before<br />

success in the hunting process.<br />

Routing methods alone are not the best<br />

way to compensate for the bad effects of<br />

a complete sharing stategy and we have<br />

to use service protection methods for best<br />

network utilisation with given connection<br />

blocking constraints. Methods for pro-<br />

tecting certain services in the connection<br />

establishment phase will normally give a<br />

lower dimensioned capacity for carrying<br />

the offered traffic streams with the constraints<br />

given by these connection blocking<br />

objectives. Such methods are described<br />

below.<br />

5.1 Completely partitioned<br />

trunk groups<br />

This is the straightforward service protection<br />

method in which case the trunk<br />

group is divided in K parts, one for each<br />

traffic type. It is illustrated in Figure 3<br />

for K = 2. The needed capacity is dimensioned<br />

for each traffic type separately,<br />

based on offered traffic and connection<br />

blocking objective for this traffic type.<br />

Standard dimensioning methods can be<br />

used as if only this traffic type was offered<br />

to the system. The total dimensioned<br />

capacity will be the sum of the dimensioned<br />

capacity for each traffic type.<br />

This method may be used in combination<br />

with one of the methods given below, i.e.<br />

the traffic types may be divided in<br />

classes with complete partitioning of the<br />

trunk group between the classes and use<br />

of one of the methods below inside a<br />

class.<br />

5.2 Traffic type limitation<br />

method<br />

This method is also called the partial<br />

sharing method.<br />

The total number of connections of traffic<br />

type i is limited by<br />

ni ≤ n max<br />

i<br />

for i = 1,...,K, where<br />

K�<br />

i=1<br />

≤ D<br />

di<br />

The method is illustrated in Figure 4 for<br />

a case with 2 traffic types,<br />

n max<br />

1<br />

di · n max<br />

i<br />

>D.<br />

= D<br />

,n<br />

d1<br />

max<br />

2<br />

< D<br />

.<br />

d2<br />

For this method we still get a product<br />

form solution for the state probabilities<br />

and we may also apply a modified version<br />

of Roberts and Kaufmanns recursion<br />

algorithm for the overall occupancy distribution:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!