Modelling of Cellular Networks with Traffic Overflow

Thepaper proposes a newmethod formodellingmultiservice cellular networkswith traffic overflow.Theproposedmethod employs a model of Erlang’s Ideal Grading (EIG) with multiservice traffic and differentiated availability. The fundamental advantage of the proposed method, as compared to other relevant methods, is a major simplification in modelling systems with traffic overflow that results from the elimination of the necessity of a determination of the parameters of overflow traffic, that is, the average value and the variance. According to the proposed method, calculations in the overflow system can be reduced to calculations in a system composed of one grading only. The paper presents the method for determining availability in such a grading that models a system with traffic overflow.The results of analytical calculations were compared with the results of simulation experiments. The results of the research study confirm high accuracy of the proposed method.


Introduction
New technologies used in building mobile networks evolve very quickly.Not much long ago, UMTS networks (Universal Mobile Telecommunications System) [1,2] and their extension HSPA (high speed packet access) [2,3] were a novelty.Currently, more advanced 4G networks are being developed.4G networks operate according to the LTE (long term evolution) standard [4] that enables data transmission to be enhanced in a way much exceeding hitherto existing possibilities of cellular networks.Mobility of users and the expanding available bitrates for data transmission make it possible for mobile networks to become universal and efficient multiservice access networks.The above is particularly apparent in highly urbanized areas where GSM networks (global system for mobile communications) 900/1800, UMTS, and LTE cooperate with one another within cellular networks of one operator.
In order to ensure optimum usage of resources of mobile networks that belong to a given operator, it is necessary to take advantage of various traffic management mechanisms [5].One of such mechanisms is traffic overflow performed with the application of connection transfer procedures (Han-dOver (HO)) [6][7][8].Connection handover ensures mobility of users on the one hand and makes it possible to utilize available network resources on the other hand.In mobile networks, each transfer of a connection (in the network of a given operator)-effected by lack of available resources in the cell in which a new call appears-can be treated as overflow [9].In the existing cellular networks, the handover procedure can be executed between cells of the same system or between cells that belong to different systems (e.g., UMTS and GSM).
In 2G networks, the traffic overflow mechanism has been introduced to achieve optimum usage of GSM900 and GSM1800 network resources [6].In the case when GSM900 and GSM1800 networks coexist in one area, handover of connections is used to control the admission process for new calls in such a way as to make resources of the GSM1800 network to be used first.Such a procedure results from the characteristics of both systems.A network operating in 900 MHz frequency range is characterized by large cell diameters (even up to 35 km), as well as high power of the transmitted signal.GSM1800 networks, in turn, have smaller cell diameters and lower power of the transmitted signal (as compared to GSM900).An application of a bigger number of GSM1800 cells would increase the involved costs in constructing the network and, at the same time, increase its capacity.From the point of view of optimal operation of the whole of the network, new calls should then be directed first to the GSM1800 network and then-in the case of 2 Mathematical Problems in Engineering the lack of free resources-to the GSM900 network.In order to impose such a scenario for resource utilization-despite higher signal power in GSM900-each new call that appears in the GSM900 network is transferred to the GSM1800 network.It is only in the case when there are no free resources in the network that new calls remain in the GSM900 network (the HO mechanism will have no effect).Such an operation corresponds to traffic overflow in which traffic from many cells (or just one cell) in GSM1800 is transferred to one cell in GSM900.
The overflow mechanism is also used with the coexistence of 2G and 3G networks in a given area.In this case, calls are transferred from the 3G network to the 2G network based on the IRAT HO (Inter Radio Access Technology HandOver) connection transfer procedure [10].Due to particular properties of the WCDMA (wideband code division multiple access) radio interface [10] used in 3G networks, the parameters deciding on the activation of the IRAT HO mechanism are signal power of a given RSCP (received signal code power) cell and the signal to noise ratio   / 0 .It is worthwhile to note that a handover of a connection from the 3G system to 2G can have influence upon a change in the parameters of some services; for example, data transmission speed in older generations of wireless systems can be lower.In turn, a transfer of a voice connection between 3G and 2G systems is not followed by a change in the quality parameters for this service.The traffic overflow mechanism has been also implemented in 4G systems in the form of the IRAT mechanism that manages handover connections between 3G and 2G networks [11].
The phenomenon of traffic overflow in telecommunications is well-known and has been studied since the mid-20th century.The mechanism was used for the first time in hierarchical networks in which resources (historically called link groups (defining network resources as the link group resulted from the structure of the first telecommunications networks in which the basic resource was the link, while the link corresponded to the physical pair of wires connecting, e.g., telephone exchanges.In the paper, the term "network resources" will be used to define resources of modern telecommunications networks, whereas, in the descriptions of analytical models of traffic overflow systems, the notion of the group, viewed as system resources expressed in allocation units, e.g., links, channels, basic bandwidth units [12], etc., is introduced due to historical reasons)) were divided into two groups: direct and alternative resources.New calls that appear in the network are offered first to direct resources (direct groups) and then, only in a situation when there are no free direct resources available, these calls are transferred to alternative resources (alternative groups).Since the nature of the traffic stream that overflows from direct resources and then is offered to alternative resources (called overflow traffic) is different than the nature of traffic streams offered to direct resources, the modelling process for such networks could not employ the models that were available at the time (e.g., Erlang model [12]).New methods for the analytical modelling of networks with single-service (single-rate) overflow traffic were proposed for the first time in the 1950s.The most important methods, summarized in Section 2.1, include equivalent random theory [13,14] and Fredericks-Hayward method [15].First methodologies for modelling of networks with multiservice (multirate) traffic, presented in Section 2.2, were proposed in [16][17][18].
All the methods for modelling traffic overflow systems that have been developed so far require first a determination of characteristics of overflow traffic, that is, the average value of overflow traffic intensity and the related variance.The present paper proposes a simpler analytical method for overflow systems calculation that is based on the Erlang's Ideal Grading model [19][20][21][22].The method does not require calculations of the parameters of overflow traffic.To determine traffic characteristics of overflow systems it is sufficient to know the value of traffic offered to the system and the capacity of direct and alternative resources.The research studies carried out by the authors proved high accuracy of the above approach.
The paper is organized as follows.Section 2 describes the analytical network models with traffic overflow that are known from the literature of the subject.Section 3 proposes a new network model with traffic overflow.Section 4 presents a comparison of the results of the analytical calculations with the results of the simulations for different scenarios for traffic overflow in cellular networks.Section 5 sums up the paper.

Modelling of Single-Service Systems with Traffic Overflow.
The first models of networks with traffic overflow were proposed in the 1950s.The literature of the subject includes a number of models of full-availability groups (full-availability group is the model of a resource with complete sharing policy [23,24]) with overflow traffic, derived under the assumption that call streams and service streams of traffic offered to direct resources [13,15,25] have the exponential distribution.The best known methods include equivalent random theory method (ERT method) [13,14] and Fredericks-Hayward method [15].The basis for both methods is a determination of the parameters that describe the properties of overflow traffic, that is, the average value  of overflow traffic (the first moment of the probability distribution for the number of busy allocation units (as the allocation unit we consider, e.g., link/channel in circuit switching [23], bandwidth (bit rate) unit [24,26,27], or load factor (in wireless systems with soft capacity [12])) in the alternative resource with infinite capacity) and the second moment and the related variance  2 .These parameters can be used for evaluation of "peakedness" of the overflow stream by the introduction of the peakedness coefficient  that is equal to the ratio between the variance  2 and the average value of overflow traffic : . . . . . . . . .
Figure 1: Graphic presentation of the ERT method: (a) overflow scheme for real network and (b) overflow scheme for equivalent system.
In both the ERT method and Fredericks-Hayward method, the parameters  and  2 are determined on the basis of Riordan formula [13]: where  is the traffic offered to the direct resource and  is the capacity of the direct resource.
The most common form of overflow in telecommunications networks is when call streams from a number of direct resources overflow to one alternative resource.If we assume that PCT1 (pure chance traffic of Type 1 (PCT1) [23], i.e., traffic generated by infinite number of sources, the arrival rate is constant and independent of the number of occupied sources (Poisson streams)) streams that are offered to these resources are statistically independent, then traffic streams that overflow from these resources will also be independent.If this is the case, then the parameters of the total overflow traffic can be determined: where  is the number of direct resources,   is the average value of traffic that overflows from the resource , and  2  is the variance of traffic that overflows from the resource .
In the ERT method all direct resources are replaced by one equivalent resource with the capacity  * , to which such equivalent traffic  * is offered that the parameters of overflow traffic ( and  2 ) from such a resource are the same as those of overflow traffic from all direct resources.The parameters  * and  * of the equivalent resource can be determined on the basis of the known values  and  2 after providing the solution to the Riordan system of equations [13], written in the following form: Equivalent traffic  * requires  * +  alt allocation units (Figure 1) for servicing calls with the assigned blocking probability .The required capacity of an alternative resource can be finally determined on the basis of Erlang-B formula: It is worthwhile to mention at this point that in this method the so-called overflow scheme was used for the graphical representation of a network with traffic overflow.The overflow scheme shows in a simplified way and independently of the network technology the dependencies between direct and alternative resources.Such an exemplary overflow scheme, used in the ERT method, is presented in Figure 1.
The other method for modelling of single-service systems with traffic overflow, the so-called Fredericks-Hayward method [15], was proposed in the 1980s.The basic foundation for this method is a decomposition of the alternative resource with the capacity  alt , to which overflow traffic with the parameters  and  is offered, into  identical component resources with the following parameters: (i) capacity of a single component resource: (ii) traffic offered to a single component resource: (iii) peakedness coefficient   for traffic offered to each of the component resources: The value of the coefficient   equal to 1 means that traffic offered to each of the component resource is Erlang traffic, that is, PCT1 traffic.Therefore, the blocking probability for each of the resources formed as a result of decomposition, described by the parameters   = /,   = /, and   = 1, can be modelled on the basis of Erlang-B Formula [15].Since this probability is the same in each of the resources formed as a result of the decomposition, it is then possible to adopt that it also describes the blocking probability in a resource after a decomposition with the parameters  alt , , and .Ultimately, we get where  is the blocking probability determined on the basis of Erlang-B formula.Equation ( 9) is a modified Erlang-B formula that takes into account the peakedness of the overflow call stream offered to the alternative resource.In traffic theory, the formula is called the Fredericks-Hayward formula.This approach makes use of the Erlang model only, which, in consequence, is followed by a significant simplification as compared to the ERT method.
Fredericks-Hayward method and the ERT method that both make it possible to determine traffic properties of systems that are characterized by the exponential service time and service calls generated according to the Poisson distribution triggered further work on single-service systems with overflow traffic.The author of [28] attempts to approach the problem of modelling resources with overflow traffic with the assumption of hyperexponential service time, whereas single-service systems with overflow traffic generated by a finite number of traffic sources (pure chance traffic of type 2 (PCT2) (pure chance traffic of type 2 (PCT2); the traffic generated by a finite number of sources.Each idle source has its own arrival rate and the total arrival rate is proportional to the number of simultaneous idle sources) traffic [23]) are considered in, for example, [29][30][31].

Modelling of Multiservice Systems with Traffic Overflow.
First studies in modelling systems with multiservice traffic began in the 1980s [32][33][34][35].Over time, the problem of a determination of the occupancy distribution and the blocking probability in the full-availability group with multiservice traffic with the known value of the parameter  [36][37][38] was handled.One of the first methods enabling modelling systems with multiservice traffic overflow was the methods that are based on MMPP processes (Markov-modulated Poisson process), and proposed in [39,40], among others.The accuracy of these methods is accompanied, however, with high computational complexity of the process of the determination of variances for overflow traffic streams.The first effective methodology for modelling multiservice systems with traffic overflow that made it possible to both analyse and dimension such systems was proposed in [17,41].In the works [17,41] the traffic overflow scheme presented in Figure 2 was considered.In the considered network with traffic overflow, each of the direct resources  ( = 1, . . ., ) and the alternative resource were offered a call from the set M = {1, 2, . . ., } of traffic classes.Each direct resource is offered a maximum of  traffic classes of PCT1 type.Calls of class  demand   allocation units to set up a connection.The intensity of PCT1 traffic of class  offered to the resource  is equal to  , .In the case when a given resource did not service calls of a given traffic class, it was assumed that the traffic intensity for this stream was equal to zero.Traffic streams of individual classes, not serviced in direct resources, overflow to an alternative resource.The blocking probability  , for calls of class  in the direct resource  can be determined on the basis of the Kaufman-Roberts recursion [34,35]: where [  ]   is the occupancy probability of  allocation units in a resource with the capacity   allocation units and [  ]   = 0 for  < 0.
The variance of each of call streams is determined approximatively by carrying out a decomposition of each real resource  into   fictitious component resources with the capacities  , (  is the number of traffic classes offered to the resource ).The capacity of the fictitious component resource  , is defined, after [17], as this part of the real resource   which is not occupied by calls of the remaining classes: where  , determines the average number of calls of class  that are serviced in the resource : Each fictitious resource will service calls of one class exclusively, which will make it possible to apply Riordan formulas in order to determine the following: (i) the average value of the intensity of traffic of class  that overflows from the resource : (ii) the variance  2 , for particular call streams that overflow to the alternative resource: where the quotient  , /  normalizes the system to a single-service case, (iii) the peakedness coefficient for class  overflow traffic stream: where the parameters of the total traffic of class  offered to the alternative resource are calculated as follows: An alternative method for a determination of the capacity of fictitious groups is proposed in [18,42].In this method, the capacity of the fictitious group  , is determined as such a capacity that leads to obtaining the blocking value  , , on the assumption of offered traffic  , and given calls of class  being equal to 1 BBU: To determine the blocking probability of calls in the resource servicing multiservice overflow traffic, the Hayward method described in Section 2.1 was generalized in [43].In the case of the multiservice systems, appropriate values of peakedness coefficients are introduced [17] into the Kaufman-Roberts model [34,35] that originally described multiservice systems without traffic overflow (i.e., systems with   = 1 for all ): where  is the so-called collective peakedness coefficient.
In [17], the authors propose to define the coefficient  as the weighted mean of the coefficients   for individual call streams [17]: , where: Formula (19) adopts that the contribution of the peakedness coefficient for the stream of class  in the collective peakedness coefficient  is directly proportional to the value of traffic offered to the alternative resource by the class .
Another general approach to the analysis of multiservice, hierarchical networks with overflow traffic were proposed in [16].It is based on the process in which the overflow traffic was approximated by ON/OFF and MMPP traffic.This method is characterized by high computational complexity which greatly hinders its practical application.

New Approach to Modelling of Overflow Systems
All the methods presented in earlier sections are based in their operation on the full-availability group model.It is necessary in these models to determine values of additional parameters (  ,  2  ) describing traffic that overflows to the alternative resource.In this section we propose a method for a determination of the blocking probability in systems with multiservice overflow traffic that is based on the Erlang's Ideal Grading (EIG) model.The principal advantage of the proposed method is that it is not necessary to determine the mean value and the variance of overflow traffic.To determine traffic characteristics of overflow systems it is sufficient to know the value of traffic offered to the system, the capacity of direct and alternative resources, and the value of the socalled availability parameter.
The proposed method relates to the remark given by the authors of the book on the life and lifetime achievements of Agner Krarup Erlang [44], who noticed that a simple EIG approximates other nonfull-availability groups (gradings) very well, including those that correspond to the simplest symmetrical overflow schemes (overflow scheme symmetry is understood here as the identical structure of direct resources, i.e., the same capacity and the same offered traffic).The remark of the authors of the book [44] passed unnoticed and has never been addressed by scientific community that dealt with research pertaining to traffic overflow.The reason for the above is the asymmetry of overflow systems, that is, different capacity of direct resources and, in consequence, different availability of resources of an overflow scheme for individual call streams offered to direct resources.It was only the construction of the generalized EIG model [45] with different values of offered traffic and different availabilities for different call classes that made the problem of approximation of asymmetrical overflow schemes by such groups very interesting.Reference [46] attempts for the first time to apply a model of EIG for the analysis of simplified multiservice overflow system in which only one call class is offered to given direct resources.The study showed that the use of the Erlang's Ideal Grading to calculate the blocking probability in networks with traffic overflow provided the accuracy of calculations comparable to others available but more complex methods described in the literature of the subject.Further on in Section 3 a generalized model of multiservice networks with traffic overflow will be proposed in which direct resources can service a number of traffic classes.To enhance the presentation of the basic assumptions of the proposed method for modelling systems with multiservice overflow traffic, the basic assumption of Erlang's Ideal Grading will be outlined in Section 3.1.

Erlang's Ideal
Grading.Erlang's Ideal Grading (EIG) for single-service traffic was defined by A. K. Erlang [19,47], who introduced a formula for a determination of the occupancy distribution in the grading in question.EIG, schematically presented in Figure 3(a), is described by three parameters: , , and , where  is the average traffic offered to the grading,  is the grading capacity, and  is the so-called availability.Availability determines resources that are available for a given group of inputs, the so-called load group.The number of load groups  in EIG is equal to the number of possible ways of choosing the  allocation units from their general number : Further assumption is that traffic offered by calls is distributed uniformly to all load groups.Figure 3 shows Erlang's Ideal Grading with the following parameters:  = 3,  = 2, and  = 3. Due to the uniform distribution of traffic with the intensity  to all load groups, traffic offered by each load group is /3.
In 1993, in [20] a model for Erlang's Ideal Grading with multiservice traffic was proposed.Soon afterwards, in [21,45], this model was expanded for the case in which each class can have a different value of the availability parameter and then for the case of noninteger values of the availability parameter.An exemplary model of the multiservice EIG with the capacity  = 3 with different values of the availability parameter ( 1 = 2,  1 = 1,  1 = 3,  2 = 3,  2 = 3, and  2 = 1) is shown in Figure 4.The grading under scrutiny was offered streams of two traffic classes with the intensities  1 and  2 , respectively.Traffic  1 was distributed uniformly into  1 = 3 load groups, whereas traffic  2 was distributed into  2 = 1 load group.
According to [45], the occupancy distribution in such a grading can be described by the following formula: where   is the traffic intensity of class  traffic,   is the number of allocation units demanded by a call of class ,  is the number of traffic classes, and   () is the conditional probability of transition for a class  traffic stream in occupancy state : where   =  if (  −   + 1) ≤  <   , and Probability  ,  (, ) is the probability of occupancy of  allocation units in a given load group, under the condition that in the whole of the grading  allocation units are occupied.The probability  ,  (, ) is described by a hypergeometric distribution: where   is the availability for calls of class  expressed in allocation units.The blocking probability for calls of class  in the considered model is determined by the following formula:

New Network Model with Traffic Overflow.
Let us consider now a new approach to modelling systems with multiservice traffic overflows.The presented multiservice traffic overflow scheme shown in Figure 5 will be used to demonstrate the operation of the method.The overflow system presented in Figure 5(a) is composed of V direct resources and an alternative resource.The considered network with traffic overflow services calls from the set M = {1, 2, . . ., } of traffic classes.Each direct resource is offered the maximum of  traffic classes of PCT1 type.A call of class  appearing at the input of resource  demands   allocation units to set up a connection.The assumption is that calls of class  demand the same number of allocation units in each of the direct resources and in the alternative resource.The capacity of the alternative resource is equal to  alt allocation units, whereas the capacity of the direct resource  is   allocation units.
The intensity of PCT1 traffic of class  offered to the resource  is equal to  , .In the case when a given resource does not service calls of a given traffic class, it is adopted that the traffic intensity for this stream is equal to zero.Traffic streams of individual classes, not serviced in direct resources, overflow to an alternative resource.The alternative resource can also service traffic that is offered directly-not only overflow traffic from direct resources (Figure 5(a)).The intensity of PCT1 traffic of class  offered directly to the alternative resource is equal to  ,alt .
In the proposed method, calculations of the blocking probability in the overflow system composed of many fullavailability groups (both direct and alternative resources) can be reduced to calculations of this probability in a system that is composed of one group only: Erlang's Ideal Grading (Figure 5(b)).According to the proposed method, the blocking probability in the overflow system is determined from the following dependence: where  is the total capacity of Erlang's Ideal Grading approximating the overflow system,  , is the availability for calls of class , offered to direct resource , in EIG approximating the overflow system,  ,alt is the availability for calls of class , offered directly to the alternative resource, in EIG approximating the overflow system,  , is the traffic intensity offered to direct resource  by calls of class ,  ,alt is the traffic intensity offered directly to the alternative resource by calls of class ,   is the number of allocation units demanded by calls of class , and  is the function that defines the dependence between the values of blocking of particular traffic classes offered to the network and the traffic intensity of offered streams and the availability.At the first stage of defining the function  that makes a determination of the values for blocking in call streams offered to a network with traffic overflow possible, the occupancy distribution in the nonfull-availability group (grading) that approximates the network with traffic overflow is determined on the basis of the modified formula (21): In (26),  , () is the conditional probability of transition for a class  traffic stream, offered to the direct resource , in occupancy state : where  , =  if ( , −   + 1) ≤  <  , , and  , =  , if  ≥  , .Probability  , , (, ) is the occupancy probability of  allocation units in resources available for calls of class  offered to the direct resource , determined under the condition that there are  busy allocation units in the whole resources: where  , is the availability-expressed in allocation unitsfor calls of class  offered to direct resource .
The value of the parameter  ,alt in Formula ( 26) can be determined on the basis of Formulas ( 27) and (28), by replacing the index of direct resource "" with the index of alternative resource "alt." Figure 5: Presentation of the method for modelling systems with traffic overflow with the application of Erlang's Ideal Grading (a) overflow scheme for real network and (b) equivalent grading.
The proposed model assumes that the capacity of Erlang's Ideal Grading used for the calculations is determined as the sum of the capacities of the resources in the system under consideration, that is, the capacity of all direct resources and the alternative resource: Such an approach results in the approximating Erlang's Ideal Grading to be corresponding, in terms of its capacity, to the overflow system (considered group of cells) for which the calculations are to be made.Moreover, offered traffic to a single allocation unit is the same in both systems (real and its analytical model).
The values of the availability parameters for individual call classes are determined in the following way: a call of class  that appears at the input of the direct resource  can be serviced only when it can be serviced entirely by the direct resource  or, if the resource is busy, by the alternative resource.Hence, the value of the availability parameter will be the sum of availabilities in the direct resource  (at the input of which the considered call class appears) and in the alternative resource.In the case when the resource capacity is not an integer multiple of the number of allocation units demanded by a call of class , it is assumed that the availability in the direct resource will be defined by the number of allocation units that corresponds to the maximum number of calls of class  that can be serviced in this resource, that is, ⌊  /  ⌋  .Availability in the alternative resource is determined in a similar way, that is, on the basis of the maximum number of allocation units that calls of class  can occupy in the alternative resource: Taking into consideration the availability for class  calls (offered to the direct resource ) in the direct resource  and the alternative resource, the total availability will be determined on the basis of the following formula: Having determined the capacity and the availability that approximates the overflow system by the EIG, we are in position to determine the occupancy distribution in Erlang's Ideal Grading on the basis of formulas ( 26) and ( 27) and then, the blocking probability for calls of class : The sequence of calculations in the proposed method can be written in the form of the Overflow-EIG method:
(2) Determine availabilities  , for call classes that are offered to individual direct resources (formula (31)).
(3) Determine availabilities  ,alt for call classes that are offered directly to the alternative resource (formula (30)).
(5) Determine the blocking probability in Erlang's Ideal Grading (formula (32)) that approximates the blocking probability of the overflow system.
Observe that the analytical model of the network with multiservice traffic overflow (each of direct resources services many traffic classes) proposed in the paper is simplified to  the model considered in [46] if each of the direct resources will be offered only one traffic stream.
The method for modelling networks with multiservice overflow traffic proposed in the paper is presented for the case of systems in which direct resources are offered Poisson call streams.It should be stressed, however, that the method can be easily adopted for modelling systems with traffic overflow in which direct resources are offered multiservice BPP (Bernoulli-Poisson-Pascal) call streams [23].To achieve that, one can make use of the results of studies devoted to modelling (determination of occupancy distributions and the blocking probability) of systems with BPP traffic, such as [48][49][50].
The proposed method can be easily adopted for modelling of multitier overflow systems.An example of a scheme for traffic overflow in three-tier systems is shown in Figure 6.Traffic of class  that overflows from the direct resource   ( = 1, 2, . . ., ) is directed to one of the two alternative resources of the second tier, that is,  alt-T2,1 and  alt-T2,2 .If the resources do not currently have free allocation units, then overflow traffic is directed to an alternative resource in the third tier  alt-T3,3 .
In the considered case, the availability for traffic   includes all resources that can service this traffic, and formula (31) can be written in the following way: where  is the number of allocation units of the second tier to which traffic from resource  overflows.

Numerical Results for Modelling Cellular Networks with Traffic Overflow
The presented method for modelling multiservice systems with overflow traffic is an approximate method.To evaluate the accuracy of the proposed solution, the results of the analytical calculations of the blocking probability in cellular networks with traffic overflow have been compared with simulation data.The study was conducted for many scenarios of traffic overflow that occur in currently used mobile 2G, 2.5G, 3G, and 4G networks.The studies on systems with traffic overflow, for the scenarios under consideration, were carried out at the call level.In the simulation model, each cell was represented as an object with a given capacity and offered traffic.Depending on the current load of cells to which calls generated by subscribers were directly offered, these calls were either serviced by the cells or directed to the alternative cell.The analysis of the system at the call level makes it possible to consider traffic overflow regardless of the technology employed to construct a mobile network.A detailed description of the methods for modelling mobile systems at the call level in wireless networks of different technologies is presented in, for example, [12].The obtained results of the blocking probability for individual traffic classes are presented in  in relation to the value of the average traffic offered to an allocation unit of the system: The diagram for the case of traffic overflow that was considered first is presented in Figure 7.The scheme relates to traffic overflow between cells of the GSM900 system.Figure 7(a) shows the idea of the handover of connections between the cells of the considered GSM900 system, whereas Figure 7(b) shows the overflow scheme that was used for analytical calculations according to the proposed method.In the considered system, the area serviced by the base station was divided into three sectors with the angle of the coverage area equal to 120 degrees.To enhance the effectiveness of the operation of the network, the base station managed yet another cell, the so-called omnidirectional cell that serviced the whole of the area.This cell admits for service only those calls that cannot be serviced in one of the three sectors.This means that the omnidirectional cell does not have its own traffic, that is, calls appearing directly in this cell.
The results for the blocking probability obtained for the considered case of traffic overflow (Figure 7) are shown in Figure 8.The assumption was that all cells (sectors) operated in the same technology (GSM900) and that they serviced only voice connections that demanded  = 1 allocation unit.The capacities of the individual sectors and the omnidirectional cell were identical and were equal to  1 =  2 =  3 =  alt = 16 allocation units.Another assumption was that traffic offered to individual sectors had the same value.Since the capacities of the sectors and the intensities of offered traffic were identical, the blocking probability for calls appearing in each cell is the same-Figure 8 shows then the results for calls offered to one, selected sector.
Figure 9 presents the results for the blocking probability obtained also for the scheme shown in Figure 7, and this time with the assumption that each cell services two classes of traffic: voice connections ( 1 = 1 allocation units) and data transmission ( 2 = 2 allocation units).Similarly as in the earlier case, the capacity of each sector and the omnidirectional cell was  1 =  2 =  3 =  alt = 16 allocation units.Since the capacities of the sectors are identical; therefore, availabilities for particular call classes in each of the sectors are the same.This means that the blocking probability  1,1 ,  1,2 , and  1,3 is identical, which     is indicated in Figure 9 as the blocking probability of class 1.Similarly, traffic  2,1 ,  2,2 , and  2,3 is characterized by identical blocking probability, indicated in Figure 9 as the blocking probability for calls of class 2.
Figure 9 shows the results obtained during the simulation study and on the basis of the three analytical methods: the Overflow-EIG method proposed in the paper, generalized Hayward method (HAY) [17] and the method that takes into consideration a modification to the way the determination of the capacity of fictitious groups is executed (IVE) (17).It is noticeable that for each of the offered traffic classes the proposed Overflow-EIG (EIG) method is characterized by the greatest accuracy.
Figure 10 shows the results with the assumption that the capacities of GSM900 cells (direct resources) have different   capacities that are, respectively, equal to  1 = 16,  2 = 10, and  3 = 8 allocation units.The capacity of the alternative cell is equal to  alt = 16 allocation units.The presented results show that the accuracy of the proposed method does not depend on the capacities of direct resources.In the case of a coexistence of the systems: GSM900 and GSM1800 within the network of one operator, there is still a possibility for connections to be transferred between cells.As the example presented in Figure 11 shows, the cell GSM900 (with higher power range than cells of GSM1800) is considered as the alternative resource to which calls from occupied cells of GSM1800 (operating in the area also covered by the GSM900 cell) are directed.
The results of the blocking probability for the considered network with traffic overflow between cells of the GSM1800 and GSM900 systems (according to the overflow scheme presented in Figure 11) are shown in Figure 12.The presented results were obtained for a network combined of 4 GSM1800 cells (direct resources) and one GSM900 cell (alternative resources).An additional assumption was that the GSM900 cell, servicing overflow traffic from 4 GSM1800 cells, had no traffic of its own.In the considered example, each cell serviced two classes of call: voice connections ( 1 = 4 allocation units) and data transmission ( 2 = 1 allocation unit).The capacity of each of the cells was 32 allocation units.The results obtained in the simulation study were compared with the data provided by the methods.Overflow-EIG generalized Hayward method (HAY) [17] and the method that includes a modification to the way of the determination of the capacity of fictitious groups (IVE) [42].It is clearly observable that also in this case the proposed Overflow-EIG method is characterized by the greatest accuracy for each of the offered traffic classes.Consequently, in Figures 13-17 the results obtained on the basis of Overflow-EIG method are compared with simulation results only.
The next considered case was a network with traffic overflow between the systems: UMTS and GSM (Figure 13).These systems differ in terms of available packet transmission speed, but assuming that the GSM system is enhanced by the EDGE, mechanism, redirecting packet transmission to this system is possible (in the boundary case, only voice connections can be transferred).The assumption is that calls transferred to the GSM system are first directed to the GSM1800 system.If there are no free resources, calls are transferred to the GSM900 system.Figure 14 shows the results for the considered type of overflow, that is, between 4 cells of the UMTS system and one GSM1800 cell and one GSM900 cell.The assumption was that the alternative resource, that is, the GSM cells, did not service its own traffic.The capacity of the UMTS cells was equal to 140 allocation units, whereas the capacity of the GSM cell was 32 allocation units.Each UMTS cell serviced three classes of calls that demanded 1, 4, and 10 allocation units, respectively.Since the capacities of all cells were identical, then availabilities for particular classes of calls offered to each of the cells were also identical.This means that the blocking probability for calls of a given traffic class depends only on the size of demanded resources and not on the cell to which these calls are offered.Therefore, Figure 14 shows only blocking probabilities for 3 traffic classes.
The last considered case of traffic overflow involves traffic overflow between the systems: LTE and UMTS.We assume that these two systems are comparable as far as data transmission possibilities are concerned.Traffic overflow in this particular case relates to all types of connections (Figure 15).In this scenario, overflow of voice connections to the GSM system is omitted.The results of the blocking probability for calls of particular traffic classes, in the network with traffic overflow between the LTE and the UMTS systems, are presented in Figure 16.Connections from 3 LTE cells were directed to one UMTS cell that serviced additionally its own traffic.The system serviced four classes of calls: voice connection class ( 1 = 1 allocation units) and three call classes related to data transmission ( 2 = 5 allocation units,  3 = 10 allocation units, and  4 = 30 allocation units, resp.).The capacities of the LTE cells were identical and were equal to  1 =  2 =  3 = 600 allocation units, whereas the capacity of the UMTS cell was equal to 200 allocation units.The cells 1 and 2 were offered four traffic classes and the cell 3 was offered three traffic classes (Figure 15).Traffic offered directly to the UMTS cell was lower by 80% than traffic offered to the LTE cells.
In the last part of our research we have considered the network with traffic overflow between the LTE and the UMTS systems (Figure 15), under the assumption that the LTE cells have different capacities:  1 =  2 = 300 allocation units,  3 = 400 allocation units, and  alt = 200 allocation units.The results of the blocking probability for calls of particular traffic classes are presented in Figure 17.Connections from 3 LTE cells were directed to one UMTS cell

Conclusions
This paper proposes a simple analytical method for a determination of traffic characteristics of mobile systems with traffic overflow, both single service and multiservice.The proposed

Figure 2 :
Figure 2: Overflow scheme for multiservice overflow traffic networks.

Figure 7 :
Figure 7: Traffic overflow between cell of the GSM900 system: (a) traffic overflow between cells and (b) overflow scheme ( , is traffic generated by calls of class  in cell  and   is the number of resources demanded by calls of class ).

Figure 8 :
Figure 8: Blocking probability in mobile system GSM900 with overflow traffic, only voice traffic.

Figure 9 :
Figure 9: Blocking probability in mobile system GSM900 with overflow traffic, two traffic classes: voice and data.

Figure 10 :
Figure 10: Blocking probability in mobile system GSM900 with overflow traffic, various capacities of direct resources.

Figure 11 :
Figure 11: Overflow between cells of systems GSM1800 and GSM900: (a) traffic overflow between cells and (b) overflow scheme ( , is traffic generated by calls of class  in cell  and   is the number of demanded resources by calls of class ).

Figure 12 :
Figure12: Blocking probability in mobile system with overflow traffic between cells of GSM1800 and GSM900 systems.

Figure 13 :
Figure 13: Traffic overflow between cells of the UMTS system and GSM1800 and GSM900: (a) traffic overflow between cells and (b) overflow scheme ( , is traffic generated by calls of class  in cell  and   is the number of demanded resources by calls of class ).

Figure 14 :
Figure14: Blocking probability in mobile system with overflow traffic: overflow between cells of the UMTS system and GSM1800 and GSM900.

Figure 17 :
Figure 17: Blocking probability in mobile system with overflow traffic: overflow between cells of the LTE system (different capacities of LTE cells) and UMTS; (1) is blocking probability in resources  1 and  2 , (2) is blocking probability in resource  3 .