Decreasing the Call Blocking Probability of Broadband IPTV Services in Stationary and Peak-hour Scenarios

In the provisioning of broadband Internet Protocol TV (IPTV) services, call blocking probability (CBP) denotes the ratio of failed user requests, which is one of the most important metrics on IPTV quality of experience (QoE). This paper aims to evaluate and further to decrease the end-to-end (E2E) CBP of IPTV services in both stationary and peak-hour scenarios. At first, we analyze a currently typical xDSL based IPTV delivery network architecture and its simplification. Then, a recently developed IPTV user behavior model is briefly presented. Next, a state-vector-based simulation model is proposed to evaluate the E2E CBP in an entire IPTV delivery network with tree topology. The simulation model is then applied to both stationary and peak-hour scenarios, and thereafter, a comparative simulation study demonstrates significant differences between the E2E CBPs evaluated in the two different scenarios. After that, we elaborate an extended TV channel admission control (TCAC) scheme to be applied in an entire IPTV delivery network. Simulation experiments illustrate the potential of our TCAC scheme to enhance the IPTV QoE by relatively decreasing the E2E CBP significantly (up to 25%), in both stationary and peak-hour scenarios.

[1]  Fernando M. V. Ramos,et al.  Constructing an IPTV Workload Model , 2009 .

[2]  Tim Morris BSc Multimedia Systems , 2000, Applied Computing.

[3]  E. Geraniotis,et al.  Tradeoff between blocking and dropping in multicasting networks , 1996, Proceedings of ICC/SUPERCOMM '96 - International Conference on Communications.

[4]  Seungjoon Lee,et al.  Modeling user activities in a large IPTV system , 2009, IMC '09.

[5]  Wang Kan-liang Critical Factors of Post Adoption Intention of Mobile Instant Messaging Service , 2010 .

[6]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[7]  Jorma T. Virtamo,et al.  Blocking of dynamic multicast connections in a single link , 1998, Broadband Communications.

[8]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[9]  Walter Willinger,et al.  Towards a Theory of Scale-Free Graphs: Definition, Properties, and Implications , 2005, Internet Math..

[10]  Robert Tappan Morris,et al.  DNS performance and the effectiveness of caching , 2001, IMW '01.

[11]  Ravi Vaidyanathan,et al.  IPTV service assurance , 2006, IEEE Communications Magazine.

[12]  Harry G. Perros,et al.  Call admission control schemes: a review , 1996, IEEE Commun. Mag..

[13]  Maria Kihl,et al.  Analysis and characterization of IPTV user behavior , 2009, 2009 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting.

[14]  Na Liu,et al.  The Study of Call Access Control Algorithm in Td-scdma System , 2009, 2009 First International Conference on Information Science and Engineering.

[15]  Kin K. Leung,et al.  An algorithm to compute blocking probabilities in multi-rate multi-class multi-resource loss models , 1994, Fifth IEEE International Workshop on Computer-Aided Modeling, Analysis, and Design of Communication Links and Networks.

[16]  Ali Esmaili,et al.  Probability and Random Processes , 2005, Technometrics.

[17]  Jorma Virtamo,et al.  Blocking probabilities of multi-layer multicast streams , 2002, Workshop on High Performance Switching and Routing, Merging Optical and IP Technologie.

[18]  Keith W. Ross,et al.  Multiservice Loss Models for Broadband Telecommunication Networks , 1997 .

[19]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[20]  Romeo Asiminei COMMUNICATION MODELS FOR THE STUDY OF MASS COMMUNICATION , 2011 .

[21]  Kwong-Sak Leung,et al.  Data mining of Bayesian networks using cooperative coevolution , 2004, Decis. Support Syst..

[22]  C. Laws,et al.  Optimization via trunk reservation in single resource loss systems under heavy traffic , 1997 .

[23]  Xi-Huai Wang,et al.  Hybrid particle swarm optimization with simulated annealing , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).

[24]  Wang Wei Empirical Study of Personality Effects on Instant Messaging Continuing Use , 2011 .

[25]  Venkatarama Krishnan,et al.  Probability and Random Processes: Krishnan/Probability and Random Processes , 2006 .

[26]  Malcolm R Leadbetter,et al.  Stationary and Related Stochastic Processes: Sample Function Properties and Their Applications , 1967 .

[27]  K. Samouylov,et al.  Blocking probabilities in multiservice networks with unicast and multicast connections , 2005, Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005..

[28]  Chen Hui-guang New Model and Implementation Mechanism of Mobile Instant Messaging Services , 2010 .

[29]  Massimo Gallo,et al.  ICP: Design and evaluation of an Interest control protocol for content-centric networking , 2012, 2012 Proceedings IEEE INFOCOM Workshops.

[30]  Pablo Rodriguez,et al.  Watching television over an IP network , 2008, IMC '08.

[31]  Jae-Hoon Kim On Delay-Bounded Multimedia Internet-Call Access Control in a WCDMA Common Channel , 2006, IEEE Transactions on Multimedia.

[32]  Jin Peng,et al.  Design and analysis on routing by hierarchical and flat names , 2011, 2011 6th International Conference on Pervasive Computing and Applications.

[33]  Bernd E. Wolfinger,et al.  Decreasing call blocking probability of broadband TV services in networks with tree topology , 2011, 2011 International Symposium on Performance Evaluation of Computer & Telecommunication Systems.

[34]  Xu Jia-pin Research on node localization based on particle swarm optimization for WSNs , 2009 .

[35]  Ramesh Nagarajan,et al.  Resource admission control in access networks , 2008, Bell Labs Technical Journal.

[36]  Yue Lu,et al.  E2E Blocking Probability of IPTV and P2PTV , 2008, Networking.

[37]  Junyu Lai,et al.  Decreasing call blocking probability of Broadband TV services by a channel access control scheme , 2010, International Congress on Ultra Modern Telecommunications and Control Systems.

[38]  A. Lansner,et al.  Bayesian neural networks with confidence estimations applied to data mining , 2000 .