Contents Telektronikk - Telenor
Contents Telektronikk - Telenor
Contents Telektronikk - Telenor
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
144<br />
Number of type<br />
2 connections<br />
Figure 3 Set of feasible states with a completely partitioned trunk<br />
group, case with 2 traffic types<br />
Ei ≈<br />
Feasible state<br />
⎧<br />
⎨<br />
⎩<br />
1−α d i<br />
1− D<br />
A<br />
· Erl<br />
di·A<br />
V · Erl<br />
�<br />
D<br />
ζ �<br />
D·A<br />
V<br />
�<br />
A , ζ<br />
, A2<br />
V<br />
The Lindberger and Labourdette & Hart<br />
methods are meant for network planning<br />
purposes where the calculations must be<br />
iterated a great number of times in the<br />
process of optimising a network. For the<br />
purpose of dimensioning of the trunk<br />
groups between a network node and the<br />
adjacent network nodes the exact methods<br />
can be used.<br />
5 Service protection<br />
methods<br />
, α �= 1<br />
�<br />
, α =1<br />
A complete sharing strategy will probably<br />
not be an optimal dimensioning strategy,<br />
though this depends on the traffic<br />
mix and the required maximum connection<br />
blocking probability for the different<br />
traffic types. The reason for this is that a<br />
complete sharing strategy will result in a<br />
higher connection blocking probability<br />
the higher the bandwidth demands are.<br />
An effect of this will be that requests for<br />
high bandwidth services will be rejected<br />
in heavy traffic periods due to lack of<br />
resources. Under normal conditions the<br />
connection blocking probability may be<br />
satisfactory, but then at the expense of a<br />
low network utilisation.<br />
boundary given by<br />
linear CAC<br />
Number of type<br />
1 connections<br />
For trunk groups consisting of more than<br />
one ATM link, this may partly be remedied<br />
by using routing methods when<br />
hunting for free capacity. Two such routing<br />
methods are<br />
- the concentration method, and<br />
- the separation method.<br />
The concentration method is a sequential<br />
hunting with homing. Since we then<br />
always start the hunting with the same<br />
link, this link will always be heavily<br />
loaded and the last link in the sequence<br />
will be less loaded (depending on the<br />
offered traffic).<br />
When using the separation method we<br />
still do sequential hunting with homing,<br />
but the traffic types are divided in two<br />
classes (the types with the highest bit<br />
rates is one class) with opposite homing<br />
positions.<br />
The advantage of these methods is a<br />
lower connection blocking probability<br />
for traffic types with high capacity<br />
demands. A disadvantage is a higher processor<br />
load due to more retrials before<br />
success in the hunting process.<br />
Routing methods alone are not the best<br />
way to compensate for the bad effects of<br />
a complete sharing stategy and we have<br />
to use service protection methods for best<br />
network utilisation with given connection<br />
blocking constraints. Methods for pro-<br />
tecting certain services in the connection<br />
establishment phase will normally give a<br />
lower dimensioned capacity for carrying<br />
the offered traffic streams with the constraints<br />
given by these connection blocking<br />
objectives. Such methods are described<br />
below.<br />
5.1 Completely partitioned<br />
trunk groups<br />
This is the straightforward service protection<br />
method in which case the trunk<br />
group is divided in K parts, one for each<br />
traffic type. It is illustrated in Figure 3<br />
for K = 2. The needed capacity is dimensioned<br />
for each traffic type separately,<br />
based on offered traffic and connection<br />
blocking objective for this traffic type.<br />
Standard dimensioning methods can be<br />
used as if only this traffic type was offered<br />
to the system. The total dimensioned<br />
capacity will be the sum of the dimensioned<br />
capacity for each traffic type.<br />
This method may be used in combination<br />
with one of the methods given below, i.e.<br />
the traffic types may be divided in<br />
classes with complete partitioning of the<br />
trunk group between the classes and use<br />
of one of the methods below inside a<br />
class.<br />
5.2 Traffic type limitation<br />
method<br />
This method is also called the partial<br />
sharing method.<br />
The total number of connections of traffic<br />
type i is limited by<br />
ni ≤ n max<br />
i<br />
for i = 1,...,K, where<br />
K�<br />
i=1<br />
≤ D<br />
di<br />
The method is illustrated in Figure 4 for<br />
a case with 2 traffic types,<br />
n max<br />
1<br />
di · n max<br />
i<br />
>D.<br />
= D<br />
,n<br />
d1<br />
max<br />
2<br />
< D<br />
.<br />
d2<br />
For this method we still get a product<br />
form solution for the state probabilities<br />
and we may also apply a modified version<br />
of Roberts and Kaufmanns recursion<br />
algorithm for the overall occupancy distribution: