Modelling of Multiservice Networks with Separated Resources and Overflow of Adaptive Traffic

The article proposes a newmethod of determining traffic characteristics of multiservice overflow systems that carry adaptive traffic. When the total offered load in primary resources exceeds a certain value, this type of traffic is admitted for service with lower bitrate. A particular attention is given in the article to a method for a determination of the parameters of traffic that overflows to secondary resources as well as to the way adaptive traffic is serviced. The method takes into consideration three possible types of traffic: Erlang, Engset, and Pascal traffic. It is based on a generalization of Hayward’s concept and its application to model systems with adaptive traffic with threshold compression. The method can be used for optimal dimensioning of logical networks (slices) in modern mobile systems due to possibility of analytical determination of grade of service parameters (blocking probability, carried traffic, and network load). To verify the accuracy of the proposed model the results of analytical calculations, obtained on the basis of the proposedmodel, are then comparedwith the results of simulation experiments for a number of selected structures of overflow systems that service adaptive traffic. The results of the study demonstrate high accuracy of the proposed theoretical model.


Introduction
The mechanism of traffic overflow has been used in telecommunications networks for over seventy years as one of the oldest optimization techniques for traffic distribution.The overflow mechanism is initiated when the resources of a given system (the so-called primary resources (PR)) are occupied and, in consequence, unavailable for new calls.These calls, however, can be admitted for service by other systems that have free resources (the so-called secondary resources (SR)) available to handle new calls [1].In the 1950s, the introduction of cross-connect switching systems to telecommunications networks allowed overflow mechanisms to be applied in network engineering.These mechanisms for single-service networks have been thoroughly described and analyzed in such classic works as [2][3][4][5][6][7][8][9][10][11][12].In [2,3], the Equivalent Random Traffic (ERT) method is developed for a determination of the blocking probability in single-service overflow systems.This method takes advantage of the first two moments of traffic that overflows from PR to SR, i.e., the mean value and variance.This, in turn, provides a basis for the so-called equivalent resources to be defined.Equivalent resources allow then the blocking probability in an overflow system to be directly determined.An interesting method for a description of single-service overflow systems is proposed in [10].The method is based on a modification of Erlang's formula, in which the capacity of secondary resources and the value of traffic offered to the overflow group are divided by the peakedness factor of overflow traffic, i.e., by the ratio of the variance of overflow traffic to its mean value.Such an approach has significantly simplified the way the blocking probability in overflow systems can be determined as compared to the ERT method.The works [5,13,14] point out the possibility of an approximation of the call stream that overflows from the primary resources in a call stream of Pascal type.In [15,16] systems with mutual traffic overflow are considered and discussed.
A commercial application of the first multiservice Integrated Services Digital Network (ISDN) in continuously carried out until now within the context of new technologies and network standards that are being successively introduced.The works [17][18][19] propose a description of overflow traffic 2 Wireless Communications and Mobile Computing with Markov-Modulated Poisson Process (MMPP processes), whereas in [20,21] the Batched Poisson Process (BPP) is used.The authors of [20,22,23] consider a possibility of an application of traffic stream with an assumed value of the peakedness factor.The papers [24][25][26] propose a number of engineering methods for dimensioning multiservice systems with overflow traffic.These methods are based on an application of the approach [10] with regard to multiservice full-availability resources (FAR full availability resources), the so-called full-availability groups (FAG) [1,27].The full-availability approach means that a new call will be admitted for service if the system has sufficient capacity (resources) necessary for this call to be serviced.FAR with offered mixture of Erlang, Engset, and Pascal traffic streams with varied bitrates can be described on the basis of multiservice Markov processes that, when solved, provide simple recurrence formulas [28,29] (for a mixture of Erlang traffic) and [30,31] (for a mixture of Erlang, Engset and Pascal traffic).Dividing the values of traffic of individual classes offered to the secondary resources by the corresponding peakedness factors makes it possible to model multiservice SR and, in consequence, the blocking probability of an overflow system.In [32], to model overflow systems a two-dimensional convolution model is proposed, while in [33] the overflow system is approximated by ideal nonfull availability resources (called Erlang Ideal Grading (EIG) in the literature of the subject [34]).In models [35][36][37] overflow systems are considered in which overflow traffic changes the service parameters in the secondary resources, such as the service time and bitrate.In the study, a change in the parameters is not, however, related to network mechanisms for traffic shaping.
Present-day multiservice networks, including 4G and 5G mobile networks, are packet networks (based on IP (Internet protocol) at Internet Layer and TCP (Transmission Control Protocol) at transportation layer in which packet streams undergo different traffic shaping mechanisms.One of the most widely used mechanisms used in TCP/IP networks, both wired and mobile, are the mechanisms of threshold and thresholdless traffic compression.Traffic that is subject to the operation of these mechanisms is called elastic [38] (based on TCP) or adaptive traffic [39] (based on RTP/UDP (Real Time Protocol/User Datagram Protocol)), respectively.Compression mechanisms lead to a decrease in the bitrate of new or currently serviced packet streams and, in consequence, make it possible for a larger number of streams to be serviced.A decrease in the bitrate can be accompanied with an extension of service time, which occurs, for example, in the case of an execution of a service in which all data has to be transferred in its entirety (elastic traffic).In other cases, the service time is fixed (adaptive traffic).Elastic and adaptive traffic can be executed by threshold and thresholdless compression mechanisms.Thresholdless compression mechanisms influence calls that are being serviced, whereas threshold compression mechanisms reduce bitrate of streams in the admission stage of new calls with the help of the Call Admission Control (CAC) function.When this service has been initiated, the bitrate determined by the CAC function is not changed any more.In practice, elastic traffic is executed in a thresholdless manner, since it is characteristic for all services that employ the TCP protocol.These are typically nonreal time services, in which all data has to be transmitted.Hence, a decrease in the bitrate will be accompanied by an extension of the service time.Adaptive traffic, in turn, is typically executed in the threshold manner and is characteristic for real time services that employ the UDP protocol.Since the UDP protocol itself does not have an ability of influencing a packet source, it was necessary to introduce the RTP (Real Time Protocol) and RTSP (Real Time Streaming Protocol) protocols in upper layers.The protocols allow rapid changes in the bitrate speed of generated packet streams to be executed without any extension of the service time.
The work [40] proposes a multiservice FAR model that services thresholdless elastic traffic with finite compression.The notion of finite compression means that the allocated bitrate for a given flow (call) can be decreased within certain boundaries.In [41], this model is generalized to include infinite thresholdless compression in which flows always decrease their bitrates as soon as resources are occupied.In such a system, the phenomenon of call blocking will never occur even though the bitrates of serviced calls can, with large loads of the system, tend towards zero.The analytical base for the models [40,41] is multidimensional reversible Markov processes with strictly specified values for service streams in individual states.They directly determine the distribution of FAR resources between serviced call classes.This distribution, resulting from a Markov process, is compliant with the so-called balanced fairness algorithm [42][43][44].The algorithm leads to a state-dependent Markov process service of all traffic classes offered to the system.In [45], the model [40] is expanded to include service of thresholdless elastic and adaptive traffic.
The first FAR model with threshold compression is proposed in [46,47].In this model, developed for Erlang elastic traffic, one threshold is used (the so-called Single Threshold System (STS)).When the threshold is crossed by input signal, the bitrates of new calls that arrive are decreased.In [40], STS for elastic Engset traffic is proposed.The work [48] discusses systems with multiple thresholds (the so-called Multi Threshold System (MTS)) and for elastic Erlang traffic, while works [49,50] discuss systems for Engset traffic and ON/OFF traffic, respectively.The authors of [1,51] propose MTS for elastic and adaptive Erlang, Engset, and Pascal traffic.In [52], the threshold compression mechanism is replaced with a more complex hysteresis mechanism, in which thresholds are dependent on the direction of changes in the load of the system, i.e., two thresholds are introduced: one for the direction of changes: low loads-high loads; the other for the direction of changes: high loads-low loads.The paper [53] describes a model with double hysteresis and Erlang, Engset, and Pascal traffic.
The problem of determining traffic parameters of multiservice networks and optimal resource allocation in multiservice networks became especially important in the case of 5G mobile networks that rely on virtualization (slicing) of resources [54][55][56][57].One of the fundamental difficulties arises from the necessity of servicing different classes of traffic streams by a network.The next important element influencing the complexity of the resource management mechanisms in virtual networks (slices) is the fact that resources can be executed both with the utilization of a single physical resource and with the utilization of many physical resources.The initial analysis of the problem related to designing feasible strategies of resource management in multiservice network indicates that the ones of the most effective strategies can be reservation mechanisms of resources, both dynamic (executed online and securing well-balanced access to network resources) and static (executed appropriately ahead of time with time advancement) [1], as well as threshold mechanisms [58,59] and priority mechanisms [60].
The mechanisms adopted by telecommunications operators and network protocols (e.g., reservation mechanism and compression) require performing appropriate traffic analysis of the operating network systems and their optimal dimensioning.Until recently, the main emphasis has been put on the blocking probability calculation in systems without virtualization.Nowadays, in order to fully determine the influence of resource management mechanisms on the effectiveness of telecommunications networks as well as in order to determine the optimal share of virtual operators in physical resources, it is necessary to work out analytical methods that would enable us to model traffic characteristics of virtual networks with various resource management mechanisms and network protocols.Additionally, in the case of the mobile networks implementing slicing of resources, the very promising technique of optimization of network resources utilization is the overflow technique.The possibility of having dedicated resources (treated as primary resources) for particular traffic streams (flows) allows mobile network operator also to reserve a common resources (treated as secondary resources) for streams that-even after compression-could not be carried by the primary resources.
The first results on modelling networks with traffic overflow and elastic traffic were published in [45,61].The model [61] is generalized in [62] to include systems that service thresholdless elastic traffic in which secondary resources have a distributed nature, i.e., are composed of a number of separated resources with identical capacities [63] or differentiated capacities [64].A model in which both primary resources and secondary resources have distributed nature is proposed in [65].
Until now, no models of overflow systems with threshold traffic compression have been developed, i.e., no model of an overflow system with adaptive traffic in which calls can undergo threshold compression in both primary resources and secondary resources has been developed.This means that, in the case where certain loads of the resources, determined earlier by an adopted set of thresholds, are exceeded, new calls will be admitted for service with decreased bitrates and unchanged service time.The absence of free resources in primary resources results in a situation where a call overflows to secondary resources, whereas lack of free resources in the secondary resources leads to a loss of the call.This article proposes a new model of an overflow system with adaptive Erlang, Engset, and Pascal traffic, executed by threshold mechanisms.The basis for the analytical description of primary and secondary resources will be the resource models proposed in [1,51].The accuracy of the proposed model will be verified on the basis of a comparison of the results of the analytical calculations with the results of the simulation experiments carried out for a network with dedicated primary resources and a common secondary resources.
The present article is structured as follows.Section 2 presents a description of the multiservice overflow system for adaptive traffic in which calls undergo the threshold compression mechanism.Section 3 includes a description of primary resources with streaming and adaptive traffic that is compressed in the threshold manner.This section also provides a description of a method for an evaluation of the traffic parameters for traffic that overflows from primary resources.Section 4 provides a method for modeling secondary resources as well as the algorithm for a determination of the blocking probability in an overflow adaptive traffic system.Section 5 provides a comparison of the results of the analytical calculation with the results of the simulation experiments for selected structures of overflow systems.Section 6 sums up the article.

Overflow of Adaptive Traffic in Mobile Networks
Literature on modeling networks (systems) with traffic overflow mostly considers systems in which primary resources are composed of a number of independent resources, called primary groups or direct groups, and secondary resources called secondary or alternative groups [66].The approach adopted for this article employs the following terminology for primary resources (PR (primary resources)) and secondary resources (SR (secondary resources)) [62,65] that better express the substantial idea of the overflow phenomenon described in the article, i.e., the authors believe that the notions of "virtual resources", "cell resources", or "radio interface resources" will be more understandable by the reader than the notion of "group".
The assumption in the article is that in both primary resources (slices) and secondary resources (slices) certain classes of traffic-related to the RTP/UDP protocols-can independently undergo threshold compression.This means that when given resources exceed the assumed occupancy threshold (load), new calls will be admitted with decreased bitrate that, during the service, will remain unchanged.Since the model aims at a description of adaptive traffic, the call service time is always the same and is independent of the compression process.Absence of appropriate bitrates for calls that are compressed in primary resources will cause, in turn, these calls to overflow to secondary resources.Since the threshold compression mechanism is assigned to given resources, the assumption is that a given flow overflows in noncompressed form and, while in secondary resources, can undergo independent (of primary resources) threshold compression.Absence of free resources in secondary resources leads then to losses in flows (calls) of particular classes.

Traffic Representation in the System
. In modern mobile networks information is transmitted in IP packets.Packets that belong to a given service that is just being executed form streams that can be considered as calls or flows, e.g., [42,45,67].A mathematical analysis of systems in which the internal structure of packet streams is taken into consideration is very complex [68,69] and frequently leads to solutions that are approximate and of a very limited practical applicability or to simulation solutions [70,71].In dimensioning and optimization of network systems, however, the approach based on an analysis at the packet level cannot be applied to an all-encompassing and broad-based network analysis.The analysis at packet level only allows the aggregated parameters of a packet stream to be evaluated, whereas a determination of the characteristics of streams related to a given service in such a mixture of different streams with different characteristics is impossible.Therefore, the packet approach is not workable and inadequate for network operators.In traffic theory of multiservice systems a dominant approach is then the "call level" approach.It is only this approach that makes it possible to develop coherent models for dimensioning and optimization of networks that would make evaluation of the characteristics of individual services with their relevant GoS (Grade of Service), QoS (Quality of Service), and QoE (Quality of Experience) parameters taken into consideration possible.The results of the studies [58,67] carried out in recent years indicate that streams at the call level can be described or approximated by streams that have "Poisson" nature.The adoption of such an approach makes it possible to discretize the system and to analyze it on the basis of multidimensional Markov processes.Discretization is based on an exchange of the variable bit rate (VBR) of a packet stream that forms a call by a certain constant bit rate (CBR), called equivalent bandwidth (EB) [72,73].EB describes then a constant bitrate that is logically allocated to a given call to provide appropriate (accurate) service parameters for this call in the network.Equivalent bandwidth is typically determined heuristically [74,75], with regard to such parameters as the total capacity of the system, maximum and average bitrate of the packet stream, bit rate variance, maximum packet delay (latency), jitter, and other parameters characteristics for a given network technology [75][76][77][78].Nowadays, in the description of multiservice systems related to modern packet networks (TCP/IP networks in particular), the assumption is that EB of relevant call classes is determined on the basis of the maximum bitrates of packet streams that correspond to calls.Such an approach is compliant with the system dimensioning principle for the highest network load conditions.It should be pointed out at this point, however, that the method for EB determination has no influence on a mathematical model of a system under consideration, while a choice as to the most appropriate method should be subjected to relevant arrangements between the network operator and involved entities or stakeholders that are to execute all the tasks concerning the design, development, and optimization of a network.
The next stage in the discretization process is a determination of the allocation unit (AU) for a given system, also called in literature Basic Bandwidth Unit (BBU) [58,79,80].
Most frequently this unit is defined as such a bitrate that a demanded EB of calls of individual classes offered to the system (called demands) is the multiple of the allocation unit.If an assumption is that a demanded EB for calls of individual classes that are offered to the system is determined on the basis of the maximum bitrates of calls of individual classes, then the maximum value of AU can be determined as the Greatest Common Divisor (GCD) of all maximum bitrates of calls offered to the system: where  ,max is the maximum bitrate of a call of class , whereas  AU is the bitrate of AU.In the last stage of the discretization process, both the demands of calls of individual classes and the capacity of the system (real or virtual) are expressed in AUs: where  is the capacity of the system.Since the value of AU determined on the basis of ( 1) is the maximum value, then if at a certain stage of considerations noninteger values of demands   for calls of particular classes appear (e.g. as a result of threshold traffic compression), then the system can be rescaled by an appropriate decrease in the value of AUs, which will provide integer values for demands of all call classes that are serviced in a system with threshold compression.For example, if the assumption is that as a result of the operation of a certain traffic shaping mechanism in the system, calls of class  with altered bitrate  ,max,new will appear, then the value of AUs can be selected on the basis of (1), with new bitrates for calls of individual classes taken into consideration: max  AU = GCD ( 1,max ,  2,max , . . .,  ,max ,  1,max,new ,  2,max,new , . . .,  ,max,new ) . ( In modelling network systems related to TCP/IP networks the frequent assumption is that one AU has the value of 1 bps (or 1 kbps).Such an approach allows modeling of network systems to be greatly simplified [58].The assumption in this article is that a call of each traffic class is determined by the number of demanded allocation units, calculated earlier on the basis of ( 2) and (3), that will always be integer numbers.
Another assumption in the article is that both primary resources and secondary resources (real or virtual) have a defined capacity, expressed in AUs.Demands of individual call classes, also expressed in AUs, are known.

Resource Model with Threshold Compression for Adaptive Erlang Traffic.
As an appropriate resource model with threshold compression for Erlang traffic, the Multi Threshold System (MTS), discussed in [1] can be used.Full-availability resources (FARs), with the capacity  AUs, are offered  call classes from the set .For each call of class  (0 ), a set   of thresholds { ,1 ,  ,2 , . . .,  ,  } is introduced individually, while { ,1 ≤  ,2 ≤ . . .≤  ,  }.A threshold is understood to be a certain occupancy state in FAR, expressed in the number of occupied AUs.The occupancy area, such that the number of occupied  AUs satisfies the condition 0 ≤  ≤  ,1 , is called the prethreshold area.If the number of occupied AUs belongs to the postthreshold area , then the condition  , <  ≤  ,+1 is fulfilled, where 0 <  ≤   .The postthreshold area   satisfies the condition  ,  <  ≤  , (Figure 1).In each postthreshold area , the number of AUs allocated to service a call of class  is  , , whereas this parameter in the prethreshold area is  ,0 .The assumption is that the parameters  , satisfy the inequality  ,0 ≤  ,1 ≤ ... ≤  ,  .In the prethreshold area and in each postthreshold area , offered traffic of class  is described by its own set of parameters { , ,  , ,  , }.The parameter  , is the intensity of calls of a Poisson stream (Erlang type traffic) and is independent of the FAR occupancy state.Since adaptive traffic is considered in MTS in which a change in the demanded AUs is not accompanied by any extension of the service time, then the average service intensity  , in each area, pre-and postthreshold, is identical.Therefore Following ( 4), the intensity of traffic of class  in the prethreshold area and in each postthreshold area is identical: The symbol  in the lower index indicates that traffic under consideration is Erlang traffic.The operation of MTS with the example of one call class for two thresholds is shown in Figure 2. In the prethreshold area (0 ≤  ≤  ,1 ), the CAC function allocates to each call (of class )  ,0 AUs.An increase in the load of the system, i.e., the crossing of the threshold  ,1 results in a transition to the first postthreshold area ( ,1 <  ≤  ,2 ), in which the number of allocated AUs for each call of class  is  ,1 .A transition to the second postthreshold area ( ,2 <  ≤ ) is followed by a decrease in the number of allocated AUs to the value  ,2 .The occupancy distribution in MTS can be determined by the following recurrence formula: where [  ]  is occupancy probability  AUs in FAR with the capacity  AUs and  , () is conditional probability of transition for a stream of class  that can be determined in the following way: 1 for  , <  ≤  ,+1 , 0 for the remaining .
The assumption in Formula ( 7) is that  ,0 = 0. Notice that the conditional transitional probability  , () is equal to unity only in such a load area in which the number of allocated AUs is equal to  , .
The blocking probability in MTS can be determined on the basis of Formula (8): where  , is the blocking probability of class  in the postthreshold area : On the basis of ( 9) it is possible to verify that the blocking probability in a given postthreshold area  depends on the position of a given reference state − , in relation to the pair of thresholds  , and  ,+1 that limit the threshold area .
The assumption in our further considerations is that blocking of the system can occur only in the oldest post-threshold area   .This means that all reference states  −  , , for  ̸ =   , are located above the threshold  ,+1 , whereas the threshold  ,  is selected in such a way that the conditions  , < − ,  <  are fulfilled.In this particular case the blocking probability in the threshold system is defined by the following formula: It should be stressed that such a choice as to the thresholds, where blocking state is possible only in the oldest postthreshold area, is in compliance with the very idea of the introduction of threshold mechanism; i.e., to avoid the blocking phenomenon, the system decreases bitrates of new calls after successive thresholds are crossed and it is only in the oldest postthreshold area (where the lowest bitrate is allocated to new calls) that a certain number of calls are blocked.Therefore, a selection of thresholds that allows blocking in different postthreshold areas to occur is not a workable choice from the engineering point of view.If a given traffic class  is a class of streaming traffic that does not undergo threshold compression, then, in line with the adopted notation, one threshold is introduced to this traffic with the value equal to the capacity of FAR, i.e.,  ,1 = .This means that the system in all the areas of possible occupancies can be treated as a prethreshold area in which the number of allocated AUs is always constant and is  ,0 .Hence, streaming traffic of class  can be described by the following conditions: 1 for  = 0 and 0 ≤  ≤ , If all traffic classes are of streaming nature, then (6) comes in its essence to the well-known recurrence [28,29]: The method for a determination of these parameters will be given further on in the section.Let us assume now that each class of Engset and Pascal traffic will be assigned its own set of thresholds and that traffic is of adaptive nature.The occupancy distribution in MTS to which a mixture of Erlang, Engset, and Pascal traffic is offered can be determined on the basis of the following recurrence formula [51]: where the parameters  ,, and  ,, () are the average numbers of serviced Engset calls of class  and Pascal calls of class  in FAR that are in the occupancy state  AUs, whereas  belongs to the prethreshold area ( = 0) or postthreshold area (0 <  ≤   , 0 <  ≤   ).These parameters can be determined on the basis of the following formula: Formulas ( 19) and (20) define, respectively, the parameters  ,, () and  ,, () for the following ranges of the variable :  , +  , <  ≤  ,+1 ;  , +  , <  ≤  ,+1 [51].
Assuming, exactly as in the case of MTS with Erlang traffic, that blocking of the system can occur only in the oldest postthreshold area, the blocking probability for calls of individual types can be expressed by Formula (10) that in the adopted notation for particular traffic types can be written as follows: In the occupancy distribution FAR with adaptive traffic executed in the threshold manner (18), there are the parameters  ,, () and  ,, () that can, in turn, be determined on the basis of the occupancy distribution (Formulas (19) and ( 20)).Therefore, to determine the distribution (18) it is necessary to construct an iterative algorithm in which in each iteration step the approximate occupancy distribution can be determined on the basis of the values of the average number of serviced calls of Engset and Pascal classes, determined in the preceding iteration step.A general method for a construction of these algorithms is proposed in [31,34].

Modelling of Primary Resources with Adaptive Traffic and Threshold Compression
Figure 3 shows a general diagram of a multiservice traffic overflow system.The system of primary resources (PRs) is composed of  FARs, from which each can be considered as MTS with Erlang, Engset, and Pascal adaptive traffic.Each PR  (0 <  ≤ ) has the capacity  () expressed in AUs.The primary resources  are offered  () traffic classes from the set  () , where  ()   classes that belong to the set  ()   are Erlang,  ()  classes that belong to the set  ()  are Engset, and  ()   classes that belong to the set  ()  are Pascal traffic sources, while  ()   +  ()  +  ()  =  () and  ()  ∪  ()   ∪  ()  =  () .In Figure 3, the following notation for the respective traffic intensities is adopted: , is average intensity of traffic of class  ( ∈  () ) that overflows from PR no., with the assumption that traffic of class  offered to primary resources  is of type  ( =  |  | ).
In each PR , for each call class , an individual set  ()   of thresholds { () ,1 ,  () ,1 , . . .,  () ,1 } and an individual set  ()   + 1 of demands allocated in appropriate load areas { ()  ,0 ,  () ,1 , . . .,  () ,  , } are defined.With these assumptions and on the basis of the model presented in Section 2.3, Formulas ( 18)-( 23) can be applied to determine blocking probabilities for individual call classes in each primary resource .The blocking probability for calls of class  ( ∈  () ) of type  ( =  |  | ) can be written on the basis of ( 21)-( 23) as follows: 3.1.Decomposition of Primary Resources.In multiservice models that are based on a description of overflow traffic with two moments, the average value and variance, each PR  undergoes decomposition into  () fictitious primary resources (FPR   ) [24], each with the capacity V () , .Then, each FPR   is replaced by equivalent fictitious primary resources (EFPR   ).Each EFPR   can be characterized by equivalent capacity V * () , and offered, equivalent, Erlang traffic with the intensity  * () , , while these parameters are selected in such a way that traffic that overflows from EFPR   has exactly the same parameters (average value and variance) as traffic that overflows from FPR   .
V (0) V (r) V (1)   A i,Er (1) A j,En (1) A l,Pa A i,Er (r) A j,En (r) A l,Pa R j,En R i,Er R l,Pa

Determination of the Parameters of FPR 𝑠 𝑐 .
The need for decomposition results from the fact that PR  carries multiservice traffic, and in consequence a direct determination of variance for traffic of individual classes is not possible.Each FPR   services exclusively calls of just one class , which, further on in the article, will allow Riordan formulas [3] to be applied to determine variance of traffic of class  that overflows from FPR   .The following assumptions are made to determine the capacity of FPRs: (1) Blocking probability , of calls of class  type  in FPR  with the capacity V () , is exactly the same as the blocking probability  ()  , of calls of this class in PR  with the capacity  () : (2) Traffic in FPR   does not undergo the threshold compression mechanism.
Figure 4 shows the way PR  is decomposed into FPR   and EFPR   .The adopted assumptions define the method for a decomposition of the resources.As it is mentioned earlier, on the basis of the model presented in Section 2.3 (Formulas ( 18)-( 23), it is possible to determine blocking probabilities for individual call classes in each of the PRs .It results from the adoption of Assumption (1) (Formula ( 25)) that the obtained probabilities are exactly the same as the probabilities in the corresponding FPR.Assumption (2) indicates that there is a possibility to determine the capacity V () , of decomposed resources on the basis of single-service models FAR for Erlang, Engset, and Pascal traffic, in which it is possible to determine the blocking probability as the occupancy probability of all AUs: Thus, in the case of Erlang traffic, the capacity of the fictitious primary resources can be determined on the basis of Erlang B Formula: Wireless Communications and Mobile Computing 9 In Formula ( 27), the parameters , and  () , are known; hence, on their basis, it is possible to determine the parameter V () , .In a similar way, the capacities of fictitious resources to which single-service Engset and Pascal traffic is offered can be determined on the basis of appropriate formulas that determine the blocking probability in the Engset and Pascal model: Note that Formulas ( 27)-( 29) apply to single-service systems in which admission of a new call means the occupation of one AU.and  * () , is such traffic offered to certain fictitious, additional resources with the capacities ΔV ()  , and ΔV () , that traffic that overflows from these resources is equal, with respect to the average value and variance, to Engset ( ()  , , (2 Δ ) () , ) and Pascal traffic ( ()  , , ( 2 Δ ) () , ), respectively.Note that, in the notation of equivalent traffic, e.g., in  * () , , the symbol  that indicates the primary nature of this traffic has been retained in the lower index.The "asterisk" introduced to the upper index means that this traffic is already equivalent Erlang traffic.In the case where primary traffic is Erlang traffic, we have  * () , =  () , , ( 2 Δ ) () , =  () , , and ΔV () , = 0.The EFPR parameters   can be determined on the basis of the equivalent random theory method (ERT) [2,3] that, for Engset traffic, is described in [8].The method will be generalized to include the particular case of Pascal traffic.The diagram of traffic replacement from Engset and Pascal traffic to equivalent Erlang traffic is presented in Figure 5. Average values and variances for Engset and Pascal traffic can be determined on the basis of the following dependencies:

Determination of the
(i) Erlang traffic: (ii) Engset traffic: Wireless Communications and Mobile Computing According to the ERT method, the average value  and variance  2 of traffic that overflows from PR with the capacity  to which Erlang traffic  is offered can be determined on the basis of Riordan formulas [3]: In the considered traffic replacement diagram (Figure 5), the resources with the capacity  = ΔV ()  , is offered equivalent Erlang traffic with the intensity  =  * () , .Traffic that overflows from these resources has the average value  =  ()  , and variance ( 2 Δ ) () , .Therefore, in the notation adopted in the article, Formulas ( 33) and ( 34) can be written in the following way: Formulas (35) and (36) allow the pair of parameters ( * () , , ΔV ()  , ) to be determined on the basis of known values of the pair of parameters ( ()  , , ( 2 Δ ) () , ) that, depending on considered type of traffic, are described by Formulas (30)- (32).At this particular point it is worthwhile to note the fact that the diagram of equivalent replacement of FPR   by EFPR   for Engset traffic offers a solution exclusively for negative values of the capacity ΔV ()  , in Formulas ( 35) and (36).

Determination of Parameters of Traffic That
Overflows from EFPR   .Traffic of class  that overflows from PR  is equivalent to traffic that overflows from EFPR   and will be characterized by two parameters: the average value of traffic intensity  ()  , and variance ( 2 ) () , .Since EFPR   are determined by a single-service Erlang model, then the parameters  ()  , and ( 2 ) () , can be determined on the basis of Riordan formulas (33) and (34) that, in the adopted notation, will be written in the following way: The peakedness factor  () , for traffic of class  that overflows from EFPR   is defined as the ratio of variance to the average value: Further on in the article, traffic that overflows from EFPR   will be characterized by the pair of parameters ( () , i ( 2 ) () , ).

Modeling of Secondary Resources with Adaptive Traffic and Threshold Compression
The parameters  () , and ( 2 ) () , of traffic that overflows from individual EFPR   are simultaneously the parameters for traffic offered to SR with the capacity  (0) AUs.In SR, traffic can also undergo the threshold compression mechanism.This means that, in exactly the same way as in the case of PR, for each call class  (0 <  ≤ ) the set  (0)  of thresholds { ,1 ,  ,2 , . . .,  ,  } is introduced individually, where the occupancy area that satisfies the condition 0 <  ≤  ,1 is the prethreshold area, whereas the occupancy area that satisfies the condition  , ≤  ,+1 is called the postthreshold area , where 1 ≤  ≤  (0)   .In each postthreshold area , the number of AUs allocated to service calls of class  is  (0) , , while the value of this parameter in the prethreshold area is  (0) ,0 .

Determination of the Occupancy Distribution in SR.
To model the system of secondary resources in this article, Hayward approach [10] is used.The approach is based on a division of SR parameters (traffic intensity and capacity) by the peakedness factor of offered traffic.Such an approach is used in [24] to model secondary resources composed of a single FAR and servicing a mixture of different classes of overflow traffic.In this section, Hayward approach is used to describe the characteristics of SR that is composed of a single MTS.As a result, the occupancy distribution and blocking probability in SR can be written, using the adopted notation, as follows: Wireless Communications and Mobile Computing 11 where  (0) , () is the conditional transition probability for a stream of class  that in the case of the distribution (41) can be determined in the following way: ,+1  (0) , 0 for the remaining .(42) In Formula (41), the peakedness factors  ()  , of traffic that overflows from PRs are defined by Formulas ( 38)- (40).The parameter  (0) is the so-called aggregate peakedness factor.The introduction of this approach results from a necessity, in compliance with Hayward's concept, to normalize the total capacity of the system of secondary resources  (0) / (0) to which an appropriate mixture of traffic, which overflows from each of the  of primary resources, is offered.The aggregate peakedness factor can be determined approximately on the basis of the weighted mean of the peakedness factor of an individual traffic classes offered to SR [24]: After a determination of the occupancy distribution in SR, the blocking probability for each class of calls in secondary resources can be determined:

Method of Modelling SR.
The models presented in Sections 3 and 4 allow a method for a calculation of the blocking probability and other characteristics in a multiservice overflow system with adaptive traffic in primary and secondary resources to be defined.The method can be presented in the following steps: (1) Determination of occupancy distributions [  ]  () (Formula ( 18)) and the blocking probability  () , (Formula ( 24)) for traffic streams of all classes in each PR , 1 ≤  ≤ .(2) Determination of the capacity V () , for each FPR   (Formulas ( 27)-( 29)).
(7) Determination of the blocking probability for traffic streams of all classes offered to SR (Formula ( 44)).

Comment.
It is possible to determine on the basis of the blocking probability other important QoS characteristics, such as the call loss probability.The loss probability in an overflow system for Erlang traffic is equal to the blocking probability.It has been proved in traffic theory, e.g., [13], that in a single-service Engset (Pascal) model the call loss probability is equal to the blocking probability in a system with identical capacity in which the number of traffic sources has been decreased (increased) by one source.This approach can be then used to approximately determine the call loss probability for Engset and Pascal traffic classes in multiservice systems.Therefore, the loss probability for Engset (Pascal) traffic classes can be determined on the basis of the blocking probability, assuming that the number of traffic sources of each Engset (Pascal) traffic class has been decreased (increased) by one source.

Numerical Examples
The proposed model of multiservice overflow system with adaptive traffic is an approximate one.In order to determine its accuracy, the results of analytical modelling have been compared with the simulation data obtained for the system described in Table 1.
The system under consideration is characterised in Table 1 by specifying the number of primary resources and their capacity, the capacity of the secondary resources, and the number of AUs required by particular traffic classes in prethreshold and postthreshold areas.It was assumed that each of primary resource was offered traffic of various classess in the following proportions:  1,0,  1,0, :  2,0,  2,0, : ⋅ ⋅ ⋅ = 1 : 1 : . ... We can notice that the PR no. 1 was offered three traffic classes (flows, services), with the demands equal to 1, 6, and 12 AUs, respectively.In the case of the PR no. 2, only two traffic classes were offered, demanding 3 and 11 AUs.The PR no. 3 and PR no. 4 were dedicated for servicing only a single traffic class.Such distribution of demands for particular resources can be treated as an example of allocating of separated resources (virtual resources, slices) to particular demands.The flows that cannot be serviced by dedicated primary resources are offered to the common secondary resources.In both types of resources the flows undergo threshold compression, according to the parameters specified in Table 1.The volume of resources admitted for flows in particular load areas were different in primary and secondary resources.
The results of blocking probabilities for all traffic classes in both primary and secondary resources are presented in Figures 6-9 and 10, respectively.In the case of the secondary resources, the results of blocking probability for traffic classes nos.3, 5, and 6 were the same since all these classes were admitted the same amount of AUs in the last threshold    (in the area of the highest load).In order to increase the readability of the Figure 10, the results for class 4 were omitted.
The results presented in Figures 6-10 indicate good accuracy of the proposed method, for both primary and secondary resources.In the proposed method, the errors within the area of lower loads mainly result from the fact that in Formula (41) the coefficient  (0) / (0) can take on noninteger values.In such a case, linear interpolation between the values ⌊ (0) / (0) ⌋ and ⌈ (0) / (0) ⌉ is applied in the model and this approximation is largely responsible for the decrease in accuracy of the proposed method in the area of low losses.The problem of noninteger values of the coefficients  (0) / (0)  in generalized Hayward's formula is discussed in [62].

Conclusions
This article proposes a model of multiservice traffic overflow system with adaptive traffic that undergoes the threshold compression mechanism in both primary and secondary resources.Both primary and secondary resources can be physical resources as well as virtual resources (e.g., slices).

Data Availability
The data used to support the findings of this study are included within the article.

Figure 1 :
Figure 1: Resource model with threshold compression for adaptive Erlang traffic for class  calls.

Figure 2 :
Figure 2: MTS for a single class and for   = 2.

Figure 5 :
Figure 5: Diagram of the replacement of FPR   by EFPR   .

Figure 6 :
Figure6: Blocking probability in primary resources (slice) no. 1 for traffic classes nos. 1, 2, and 3 from Table1.Traffic offered per single AU calculated for initial value of demanded AUs (before compression).

Figure 8 :
Figure8: Blocking probability in primary resources (slice) no. 3 for traffic class no.6 from Table1.Traffic offered per single AU calculated for initial value of demanded AUs (before compression).

Figure 9 :Figure 10 :
Figure9: Blocking probability in primary resources (slice) no. 4 for traffic class no.7 from Table1.Traffic offered per single AU calculated for initial value of demanded AUs (before compression).
) 2.3.Model of Resources with Threshold Compression for Adaptive Erlang, Engset, and Pascal Traffic.Consider a FAR in which the capacity is  AUs and to which  traffic classes from the set  are offered.The assumption is that   classes that belong to the set   are of Erlang type,   classes that belong to the set   are Engset traffic, and   classes that belong to the set   are Pascal traffic, while   +   +   =  and   ∪  ∪  = .Engset and Pascal traffic are state-dependent and depend on the state of the system, in particular on the number of Engset and Pascal calls that are already being serviced [31]:  , () =  , [ , −  , ()] ,  , () =  , [ , +  , ()] , where  ∈   , (15) where (i)  , () is average intensity of Engset traffic of class  in FAR that is in the occupancy state  AUs, (ii)  , () is average intensity of Pascal traffic of class  in FAR that is in the occupancy state  AUs, (iii)  , is average intensity of Engset traffic of class  generated by one free source:  , is the number of Pascal traffic sources of class .The parameters  , () and  , () are the average values of the number of serviced Engset calls of class  and Pascal calls of class  in FAR that are in the occupancy state  AUs.
(iv)  , is average intensity of Engset calls of class , generated by one free source, (v)  , is average service intensity for Engset calls of class , (vi)  , is average intensity of Pascal traffic of class  generated by one free source: (vii)  , is average intensity of Pascal calls of class  generated by one free source, (viii)  , is average service intensity for Pascal calls of class , (ix)  , is the number of Engset traffic sources of class , (x) [3]ameters of EFPR   .The next element in the decomposition of PR  is the replacement of FPR   by EFPR   .The need for such a replacement is related to a possibility to determine, further on in this article, the variance of traffic that overflows from EFPR   with the help of Riordan formulas[3].Since these formulas make it possible to determine variance exclusively in the case where offered traffic is Erlang traffic, then a replacement of FPR   by EFPR demands a replacement of Engset and Pascal traffic by equivalent Erlang traffic.Let us denote the variance of traffic of class  type  by ( 2 Δ ) () , .Equivalent Erlang traffic of  * () ,

Table 1 :
Description of the system with threshold compression in primary and secondary resources.The secondary resources are denoted by  = 0.
3 from Table 1.Traffic offered per single AU calculated for initial value of demanded AUs (before compression).Figure 7: Blocking probability in primary resources (slice) no. 2 for traffic classes nos. 4 and 5 from Table 1.Traffic offered per single AU calculated for initial value of demanded AUs (before compression).