About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

An Efficient Method for Performance Evaluation of Femto-Macro Overlay Systems

From

City University of Hong Kong1

University of Melbourne2

Networks Technology and Service Platforms, Department of Photonics Engineering, Technical University of Denmark3

Department of Photonics Engineering, Technical University of Denmark4

This paper considers a two-tier femto-macro overlay network architecture, where groups of femtocells are overlaid by macrocells. The capacity of the femtocells is limited, thus redirection of blocked femto calls to the overlaid macrocell is used as a QoS assurance strategy. Similar overflow approaches have been used in telephony; however, extension of this approach to capacity-constrained femto-macro overlay networks poses significant challenges due to the wide variety of bandwidth requirement of Internet services, the large number of femtocells overlaid by a macrocell, and the need for fast computations imposed by practical requirements of dynamic real-time resource allocation.

We propose a new computationally efficient numerical method for the loss probability approximation in such two-tier femto-macro overlay networks. The accuracy of the method is verified by exact Markov-chain solutions for small systems and by simulations for larger systems.

Language: English
Publisher: IEEE
Year: 2011
Pages: 1-6
Proceedings: IEEE International Conference on Communications 2011
Series: I E E E International Conference on Communications
ISBN: 1612842313 , 1612842321 , 161284233X , 161284233x , 9781612842318 , 9781612842325 and 9781612842332
ISSN: 19381883 and 15503607
Types: Conference paper
DOI: 10.1109/icc.2011.5962706

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis