System Overload and System Utilization — Myths and Realities
There is a myth flying in the air that you can reach very high system utilization and nothing will happen to a system. The intelligent response to any myth is to look at the circumstances at which the heralded phenomena took place and resist the temptation to over-generalize the effect. This paper is written with the intention to draw a line in the sand. To show under what conditions a system can be used without any overload protection and when more expensive overload protection solutions are more cost effective or even the only game in town. The efficiency of described overload protection algorithm is evaluated through the reduction in lost calls due to system overloads. An analysis of typical busy hour traffic helps to identify traffic and system parameters, which meet an overload protection objective.
KeywordsBuffer Size System Utilization Call Processing Handoff Call Leaky Bucket
Unable to display preview. Download preview PDF.
- 1.Harry Heffes and Kevin M. Ryan “Analysis of a Class of Overload Control Schemes for a Mobile Communication System”, Proceedings of the Applied Telecommunications Symposium, April 1998, Boston, pp. 47–56.Google Scholar
- 2.Chung-Ju Chang “Analysis of a Cutoff Priority Cellular Radio System with Finite Queuing and Reneging/Dropping”, IEEE/ACM Transactions on Networking, Vol. 2, No. 2, April 1994.Google Scholar
- 3.Shuichi Sumita and Shin-ichi Nakagawa “Performance Specification, Call-processing Capacity, and Overload Control for SPC Systems with Extremely High Peak Traffic”, ITC 14, Elsevier Science B. V., 1994.Google Scholar
- 4.Rudolf G. Schehrer “On a Cut-Off Priority Delay-Loss System with Three Types of Traffic and Overload Control System”, ITC 14 Elsevier Science B. V., 1994Google Scholar