Quality of RealTime Streaming
in Wireless
Cellular Networks
Stochastic Modeling and Analysis
Abstract
We present a new stochastic service model with capacity sharing and interruptions, appropriate for the evaluation of the quality of realtime streaming (e.g. mobile TV) in wireless cellular networks. It takes into account multiclass Markovian process of call arrivals (to capture different radio channel conditions, requested streaming bitrates and calldurations) and allows for a general resource allocation policy saying which users are temporarily denied the requested fixed streaming bitrates (put in outage) due to resource constraints. We develop general expressions for the performance characteristics of this model, including the mean outage duration and the mean number of outage incidents for a typical user of a given class, involving only the steadystate of the traffic demand. We propose also a natural class of leasteffortservedfirst resource allocation policies, which cope with optimality and fairness issues known in wireless networks, and whose performance metrics can be easily calculated using Fourier analysis of Poisson variables. We specify and use our model to analyze the quality of real time streaming in 3GPP Long Term Evolution (LTE) cellular networks. Our results can be used for the dimensioning of these networks.
I Introduction
Wireless cellular networks offer nowadays possibility to watch TV on mobile devices, which is an example of a realtime content streaming. This type of traffic demand is expected to increase significantly in the future. In order to cope with this process, network operators need to implement in their dimensioning tools efficient methods allowing to predict the quality of this type of service. The quality of realtime streaming (RTS) is principally related to the number and duration of outage incidents — (hopefully short) periods when the network cannot deliver to a given user in realtime the requested content of the required quality. In this paper we propose a stochastic model allowing for an analytic evaluation of such metrics. It assumes a traffic demand with different radio conditions of calls, and can be specified to take into account the parameters of a given wireless cellular technology. We develop expressions for several important performance characteristics of this model, including the mean time spent in outage and the mean number of outage incidents for a typical streaming call in function of its radio conditions. These expressions involve only stationary probabilities of the (free) traffic demand process, which is a vector of independent Poisson random variables describing the number of users in different radio conditions.
We use this model to analyze RTS in a typical cell of a 3GPP Long Term Evolution (LTE) cellular network assuming orthogonal intracell user channels with the peak bitrates (achievable when there are no other users in the same cell) close to the theoretical Shannon’s bound in the additive white Gaussian noise (AWGN) channel, with the extracell interference treated as noise. These assumptions lead to a radio resource constraint in a multirate linear form. Namely, each user experiencing a given signalto(extracell)interferenceandnoise ratio (SINR) requires a fixed fraction of the normalized radio capacity, related to the ratio between its requested and peak bitrates. All users of a given configuration (experiencing different SINR values) can be entirely satisfied if and only if the total required capacity is not larger than one. ^{1}^{1}1Recall that in the case of voice calls and, more generally, constant bitrate (CBR) calls the multirate linear form of the resource constraints has already proved to lead to efficient model evaluation methods, via e.g. KaufmanRoberts algorithm [1, 2]. Despite some fundamental similarities to CBR service, the RTS gives rise to a new model, due to the fact that the service denials are not definitive for a given call, but have a form of temporal interruptions (outage) periods.
In the above context of a multirate linear radio resource constraint, we analyse some natural parametric class of leasteffortservedfirst (LESF) service policies, which assign service to users in order of their increasing radio capacity demand, until the full capacity (possibly with some margin) is reached. The capacity margin may be used to offer some “lower quality” service to users temporarily in outage thus realizing some type of fairness with respect to unequal user radiochannel conditions. This class contains an optimal and a fair policy, the latter being suggested by LTE implementations.
In order to evaluate explicitly the quality of service metrics induced by the LESF policies we relate the mean time spent in outage and the mean number of outage incidents for a typical streaming call in given radio conditions to the distribution functions of some linear functionals of the Poisson vector describing the steady state of the system. We calculate the Fourier transforms of these functions and use a wellknown Fourier transform inversion method to obtain numerical values of the quantities of interest. We also study the mean throughput during a typical streaming call evaluating the expectations of the corresponding nonlinear functionals of the Poisson vector describing the steady state of the system via the Monte Carlo method.
Using this approach, we present a thorough study of the quality of RTS with LESF policies in the aforementioned Markovian setting. For completeness we present also some puresimulation results illustrating the impact of a non Poissonarrival assumption.
Let us now recollect a few related works on the performance evaluation of cellular networks. In early 80’s, wireless cellular networks were carrying essentially voice calls, which require constant bitrates (CBR) and are subject to admission control policies with blocking (at the arrival epoch) to guarantee these rates for calls already in service. An important amount of work has been done to propose efficient call admission policies [3, 4, 5]. Policies with admission conditions in the multirate linear form have been considered e.g. in [6, 7, 8].
Progressively, cellular networks started carrying also calls with variable bitrates (VBR), used to transmit data files. The available resources are (fairly) shared between such calls and when the traffic demand increases, the file transfer delays increase as well, but (in principle) no call is ever blocked. These delays may be evaluated analytically using multirate linear resource constraint in conjunction with multiclass processor sharing models; cf e.g. [9, 8].
Recently, users may access multimedia streaming services through their mobile devices [10]. They are provided via CBR connections, essentially without admission control, but they tolerate temporary interruptions, when network congestions occur. One may distinguish two types of streaming traffic. In realtime streaming (RTS) (as e.g. in mobile TV), considered in this paper, the portions of the streaming content emitted during the time when the transmission to a given user is interrupted (is in outage) are definitely lost for him (unless a “secondary”, lowerrate streaming is provided during these periods). In nonrealtime streaming (NRTS) (like e.g., videoondemand, YouTube, Dailymotion, etc), a user starts playing back the requested multimedia content after some initial delay, required to deliver and buffer on the user device some initial portion of it. If further transmission is interrupted for some time making the user buffer content drop to zero (buffer starvation) then the playback is stopped until some new required portion of the content is delivered. Several papers study the effect of the variability of the wireless channel on the performance of a single streaming call; see for e.g. [11], [12]. In [13] VBR transmissions and RTS are considered jointly in some analytical model, however the number and duration of outage periods are not evaluated. In [14] the tradeoff between the startup delay and the probability of buffer starvation is analyzed in a Markovian queuing framework for NRTS streaming.
We do not consider any cellload balancing; see [15] for some recent work on this problem in the video streaming context. Also, [16, 17] consider some admission control policies to guarantee nondropping of multimedia calls due to caller impatience and/or handoffs.
The remaining part of this paper is organized as follows. In Section II we will present our model for the evaluation of the quality of RTS in wireless cellular networks. Technical proofs of the results presented in this section are postponed to the Appendix, where they are given in a more general context. Section III specifies our model to be compliant with the LTE cellular networks specification and presents numerical results regarding the quality of RTS in these networks.
Ii Streaming in wireless cellular networks
In this section we present a new stochastic model of RTS in cellular networks.
Iia System assumptions
We consider the following scenario of multiuser streaming in a cellular network.
IiA1 Network layer
Geographically distributed users wish to obtain downlink wireless streaming of some (typically video) content, contacting base stations of a network at random times, for random durations, requesting some fixed streaming bitrates. We consider a unicast traffic (as opposed to the broadcast or multicast case), i.e.; the content is delivered to all users via private connections. Different classes of users (calls) need to be distinguished, regarding their radio channel conditions, requested streaming bitrates and mean streaming times. Each user chooses one base station, the one with the smallest pathloss, independently of the configuration of users served by this station. Thus, we do not consider any loadbalancing policy.
IiA2 Data layer — streaming policies
If a given base station cannot serve all the users present at a given time, it temporarily stops streaming the requested content at the requested rate to users of some classes, according to some given policy (to be described), which is supposed to preserve a maximal subset of served users. We call these (classes of) users with the requested bitrate temporarily denied in outage. The users in outage will not receive the part of the content which is emitted during their outage times (this is the principle of the RTS). We will also consider policies, which offer some “besteffort” streaming bitrates for some classes of users in outage, thus allowing for example to keep receiving the requested content but of a lower quality. Users, which are (temporarily) denied even this lower quality of service are called in deep outage.
IiA3 Medium access
In this paper we assume that users are connected to the serving antennas via orthogonal singleinputsingleoutput (SISO) channels allowing for the peakrate close to the theoretical Shannon’s bound in the additive white Gaussian noise (AWGN) model, with the (extracell) interference treated as noise.^{2}^{2}2Orthogonality of channels is an appropriate assumption for current LTE (Long Term Evolution) norm for cellular networks based on OFDMA, as well as for other multiple access techniques as FDA, TDMA, CDMA assuming perfect incell orthogonality, and even HDR neglecting the scheduler gain. We will also comment on how to model multipleinputmultipleoutput (MIMO) and broadcast channels.
IiA4 Physical layer
The quality of channel of a given user depends on the pathloss of the signal with respect to its serving base station, a constant noise, and the interference from other (nonserving) base stations. These three components determine its signaltointerferenceandnoise ratio (SINR). Both pathloss form the serving station and interference account for the distance and random propagation effects (shadowing). Our main motivation for considering a multiclass model is to distinguish users with different SINR values. In other words, even if we assume that all users require the same streaming times and rates, we still need a multiclass model due to (typically) different SINR’s values of users in wireless cellular networks.
IiA5 Performance characteristics
We will present and analytically evaluate performance of some (realistic) streaming policies in the context described above. We will be particularly interested in the following characteristics:

fraction of time spent in outage and in deep outage during the typical call of a given class,

number of outage incidents occurring during this call,

mean throughput (average bitrate) during such call, accounting for the requested bitrates and for the “besteffort” bitrate obtained during the outage periods.
IiB Model description
In what follows we describe a mathematical model of the RTS that is an incarnation of a new, more general, stochastic service model with capacity sharing and interruptions presented and analyzed in the Appendix IV. This is a single server model which allows to study the performance of one tagged base station of a multicellular network satisfying the above system assumptions. More details on how this model fits the multicell scenario will be presented in Section III.
IiB1 Traffic demand
Consider classes of calls (or, equivalently, users) characterized by different requested streaming bitrates , wireless channel conditions described by the signalto(extracell)interferenceandnoise ratio with respect to the serving basestation ^{3}^{3}3In this paper the interference is always caused only by nonserving base stations. and mean requested streaming times , .
We assume that calls of class arrive in time according to a Poisson process with intensity (number of call arrivals per unit of time, per base station) and stay in the system (keep requesting streaming) for independent times, having some general distribution with mean . ^{4}^{4}4All the results presented in this paper do not depend on the particular choice of the streaming time distributions. This property is often referred to in the queuing context as the insensitivity property. Different classes of calls are independent from each other. We denote by the number of calls of a given class requesting streaming from a given BS at time ; see Section A in the Appendix for a formal definitions of these variables in terms of arrival process and service times. Let ; we call it the (vector of) user configuration at time . The stationary distribution of coincides with the distribution of the vector of independent Poisson random variables with means , . We call the traffic demand (per base station) of class .
IiB2 Wireless resource constraints
Users are supposed to be offered the requested streaming rates for the whole requested streaming times. However, due to limited wireless resources, for some configuration of users , the requested streaming rates may be not achievable. Following the assumption of orthogonal AWGN SISO wireless channels (with the (extracell) interference treated as noise) available for users of a given station, we assume that the requested rates are achievable for all calls present at time if
(1) 
for some nonnegative vector , such that , where
(2) 
is the maximal (peak) bitrate of a user of class , whose channel conditions are characterized by . (The rate is available to a user of class if it is the only user served by the base station.) Here is the frequency bandwidth and (with ) is a coefficient telling how close a given coding scheme approaches the theoretical Shannon’s bound (corresponding to ); cf [18, Th .9.1.1]. ^{5}^{5}5It was also shown in [19] that the performance of AWGN multiple input multiple output (MIMO) channel can be approximated by taking values of . Another possibility to consider MIMO channel is to use the exact capacity formula given in [20]. Note that the assumption (1) corresponds to the situation, when users neither hamper nor assist each other’s transmission. They use channels which are perfectly separated in time, frequency or by orthogonal codes, nevertheless sharing these resources. ^{6}^{6}6From information theory point of view, the orthogonality assumption is not optimal. In fact, the theoretically optimal performance is offered by the broadcast channel model. It is known that in the case of AWGN broadcast channel the rates are (theoretically) achievable for the configuration if (and only if) there exists a vector , such that and where the classes of users are numbered such that ; cf [21, Eq. 6.29].
We can interpret the ratio between the requested and maximal bitrates as the resource demand of a user of class . Note that the configuration of users can be entirely served if and only if the total resource demand satisfies the constraint
(3) 
This is a multirate linear resource constraint.
IiB3 Service policy
If the requested streaming rates are not achievable for a given configuration of users present at time , then some classes of users will be temporarily put in outage at time , meaning that they will receive some smaller bitrates (whose values are not guaranteed and may depend on the configuration ). These smaller, “besteffort” bitrates may drop to 0, in which case we say that users are in deepoutage. Let us recall that the times at which users are in outage and deep outage do not alter the original streaming times; i.e. the streaming content is not buffered, nor delayed during the outage periods.
We will define now a parametric family of service polices for which classes with smaller resource demands have higher service priority. In this regard, in the remaining part of the paper we assume (without loss of generality) that the resource demands of users from different classes are ordered .
Leasteffortservedfirst policy
For a given configuration of users requesting streaming at time , leasteffortservedfirst policy with margin (LESF() for short) attributes the requested bitrates to all users in classes , where
(4) 
where is the indicator function of set and is a constant satisfying .
Remark II.1
The LESF policy is optimal in the following sense: given constraint (3) and the assumption that the classes with smaller resource demands have higher priority, this policy allows to serve the maximal subset of users present in the system. For the same reason any LESF policy with is clearly suboptimal. In order to explain the motivation for considering such policies, one needs to extend the model and explain what actually happens with classes of users which experience outage. In this regard, note that is the actual fraction of the server capacity consumed by the users which are not in outage. The remaining server capacity (which is not needed to serve users in classes ) can be used to offer some “lower quality” service (e.g. streaming with lower video resolution, etc) to the users in classes which are in outage. Note by (4) that the remaining server capacity under the policy LESF is at least
Hence, the server accepting the class as the leastpriority class being “fully” served, leaves enough remaining capacity to be able to make the same effort (allocate service capacity ) for all users in outage in classes whose service demand exceeds by no more than . These latter users will not have “full” required service (since this requires more resources, , for the full service) but only some “lower quality” service (to be specified in what follows). Consequently, one can conclude that policies LESF with , being suboptimal, ensure some fairness, in the sense explained above. Clearly the policy LESF (i.e., with ) is the most fair, in the sense that it reserves enough remaining capacity to offers the “lower quality” service for all users in outage (no deep outage). Thus, we will call LESF the LESF fair policy.
Besteffort service for users in outage
We will specify now a natural model for the “besteffort” streaming bitrates that can be offered for users in outage in association with a given LESF() policy. For denote
(5) 
The rates are achievable for the configuration under resource constraint (3). Note that users in classes such that do not receive any positive bitrate. We say, they are in deep outage. Finally, we remark that the service (5) is “resource fair” among users in outage but not in deep outage.
IiB4 Performance metrics
Configuration of users evolves in time, it changes at arrival and departure times of users. At each arrival or departure epoch the base station applies the outage policy to the new configuration of users to decide which classes of users receive requested streaming rates and which are in outage (or deep outage).
Let us introduce the following characteristics of the typical call (user) of class .

denotes the probability of outage at the arrival epoch for class . This is the probability that the typical call of this class is put in outage immediately at its arrival epoch.

denotes the mean total time spent in outage during the typical call of class .

denotes the mean number of outage incidents experienced during the typical call of class .
More formal definitions of these characteristics, as well as other system characteristics (as e.g. the intensity of outage incidents) is given in the Appendix. We also introduce two further characteristics related to the mean throughput obtained during the typical call of class .

Denote by the mean throughput during the typical call of class . This is the mean bitrate obtained during such a call, taking into account the bitrate when the call is not in outage and the besteffort bit rate obtained during the outage periods, averaged over call duration.

Let be the part of the throughput obtained during the outage periods of the typical call of class . This is the mean besteffort bitrate of such call averaged over outage periods.
IiC Model evaluation
IiC1 Results
We will show how the performance metrics regarding outage incidents and duration, introduced in Section IIB4, can be expressed using probability distribution functions of some linear functionals of the random vector of independent Poisson random variables with parameters , respectively. Recall that these random variables correspond to the number of calls of different classes present in the stationary regime of our streaming model.
Specifically, for given , and denote
(6) 
where for and .
The following results follow from the analysis of a more general model presented in the Appendix.
Proposition II.2
The probability of outage at the arrival epoch for user of class is equal to
(7) 
The mean total time spent in outage during the typical call of class is equal to
(8) 
The mean number of outage incidents experienced during the typical call of class (after its arrival) is equal to
(9) 
Note first that the functions defined in (6) allow one to represent the stationary probability that the configuration of users is in a state in which the LESF() policy serves users of class
In the general model described in the Appendix we denote this state by and its probability by . Thus . Moreover,
is the probability that the steady state configuration of users appended with one user of class is in the complement of the state , i.e., all users of class are in outage (meaning , where ). Thus the expression (7) follows from Proposition A.3. Similarly (8) follows from Proposition A.4 and (9) follows from Proposition A.5.
Regarding the throughput characteristics, we have the following result.
Proposition II.3
Proof of this proposition is given in the Appendix.
Remark II.4
Recall from (5) that the variable rates are obtained by the user of class when he is in outage, i.e., . They are nonnull, , only if . In the case of equal requested rates , the intersection of the two conditions and is equivalent to
(11) 
IiC2 Remarks on numerical evaluation
In order to be able to use the expressions given in (II.2) we need to evaluate the distribution functions . In what follows we show how this can be done using Laplace transforms. Regarding the throughput in outage , expressed in (10) as the expectation of a nonlinear functional of the vector , we will use Monte Carlo simulations to obtain numerical values for this expectation.
Denote by the Laplace transform of the function .
Fact II.5
We have
where for and .
Note that for given , the random variables are independent, of Poisson distribution, with parameters , respectively. The result follows from [22, Proposition 1.2.2] and a general relation .
The probabilities may be retrieved from using standard techniques. For example [23, with the algorithm implemented by Hollenbeck [24] in Matlab]. In what follows we present a more explicit result based on the Bromwich contour inversion integral. In this regard, denote (which is the Laplace transform of complementary distribution function ). Also, denote by the real part of the complex number .
Fact II.6
We have
(12) 
where is an arbitrary constant.
See [25].
Remark II.7
As shown in [25], the integral in (12) can be numerically evaluated using the trapezoidal rule, with the parameter allowing to control the approximation error. Specifically, for define
, and . Then . Finally, the (alternating) infinite series can be efficiently approximated using for example the Euler summation rule
with a typical choice , .
Remark II.8
The expression (9) for the mean number of outage incidents involves a sum of potentially big number of terms , , which are typically small, and which are evaluated via the inversion of the Laplace transform. Consequently the sum may accumulate precision errors. In order to avoid this problem we propose another numerical approach for calculating . It consists in representing equivalently to (9) as
(13) 
where
(14) 
Let and be fixed. Recall the definition of in (6) and note that the expression (14) may be written as
where . The above expression may be seen as the blocking probability for class in a classical multiclass Erlang loss system with the admission condition . Consequently, may be calculated by using the KaufmanRoberts algorithm [1, 2] and plugged into (13). Note that by doing this we still need to calculate however avoid summing of differences of these functions as in (9).
Iii Quality of realtime streaming in LTE
In this section we will use the model developed in Section II to evaluate the quality of RTS in LTE networks. This singleserver (base station) model will be used to study the performance of one tagged base station of a multicellular network under the following assumptions:

We assume a regular hexagonal lattice of base stations on a torus. This allows us to consider the tagged base station of the network as a typical one.

Homogeneous (in space and time) Poisson arrivals on the torus are marked by i.i.d. (across users and base stations) variables representing their shadowing with respect to different base stations. These variables, together with independent user locations determine their serving (strongest) base stations. A consequence of the independence of users locations and shadowing variables is that the arrivals served by the tagged base station form an independent thinning of the total Poisson arrival process to the torus and thus a Poisson process too. Uniform distribution of user locations and identical distribution of the their shadowing variables imply that the intensity of the arrival process to the tagged base station is equal to the total arrival intensity to the torus divided by the number of stations. Moreover, the distribution of the SINR of the typical user of the tagged base station coincides with the distribution of the typical user of the whole network.

The intensity of arrivals of some particular (SINR)class to the tagged base station is equal to the total intensity of arrivals to the tagged cell times the probability of the random SINR of the typical user being in the SINRinterval corresponding to this class.

We consider the “full interference” scenario, i.e., that all base stations emit the signal with the constant power, regardless of the number of users they serve (this number can be zero). This makes the interference, and hence the service rates, of users of a given base station independent of the service of other base stations (decouples the service processes of different base stations).
Iiia LTE model and traffic specification
IiiA1 SINR distribution
Recall that the main motivation for considering a multiclass model was the necessity to distinguish users with different radio conditions, related to different values of the SINR they have with respect to the serving base stations. In order to choose representative values of SINR in a given network and to know what fraction of users experience a given value, we need to know the (spatial) distribution of the SINR (with respect to the serving base station) experienced in this network (possibly biased by the spatial repartition of arrivals of streaming calls). This distribution can be obtained from realnetwork measurements, simulations or analytic evaluation of an appropriate spatial, stochastic model.^{7}^{7}7For this latter possibility, we refer the reader to a recent paper on Poisson modeling of real cellular networks subject to shadowing [26], as well as to [27], completed in [28], where the distribution of the the SINR in Poisson networks is evaluated explicitly. In this paper we will use the distribution of SINR obtained from the simulation compliant with the 3GPP recommendation in the socalled calibration case (to be explained in what follows). At present, assume simply, that we are given a cumulative distribution function (CDF) of the SINR expressed in dB, , obtained from either of these methods. In other words, represents the fraction of mobile users in the given network which experience the SINR (expressed in dB) not larger than .
Consider a discrete probability mass function
(15) 
with , . We define the class of users as all users having the SINR expressed in dB in the interval , and approximate their SINR by the common value . Clearly is the fraction of mobile users in the given network which experience the SINR close to . Hence, in the case of a homogeneous streaming traffic (the same requested streaming rates and mean streaming times, which will be our default assumption in the numerical examples) we can assume the intensity of arrivals of users of class to be equal to where is the total arrival intensity (per unit of time per serving base station) to be specified together with the CDF of the SINR.
CDF of the SINR for 3GPP recommendation
We obtain the CDF of SINR from the simulation compliant with the 3GPP recommendation in the socalled calibration case, (compare to [29, Figure A.2.21(right)]). More precisely, we consider the geometric pattern of BS placed on the hexagonal lattice. In the middle of each hexagon there are three symmetrically oriented BS antennas, which gives a total of 108 BS antennas. The distance between the centers of two neighboring hexagons is km. Each BS antenna is characterised by the following horizontal pattern , where is the angle in degrees, with , , and uses transmission power (including omnidirectional gain of ). The distanceloss model (corresponding to the frequency carrier 2GHz) is where is the distance in km. A supplementary penetration loss of 20dB is added. The shadowing is modeled as a lognormal random variable of mean one and logarithmic standard deviation of deviation 8dB, cf [30]. The noise power equals (which corresponds to a system bandwidth of 10MHz, a noise floor of 174dBm/Hz and a noise figure of 9dB). In order to obtain the empirical CDF of the SINR we generate 3600 random user locations uniformly in the network (100 user locations per hexagon on average). Each user is connected to the antenna with the strongest received signal (smallest propagationloss including distance, shadowing and antenna pattern) and the SINR is calculated. The obtained empirical CDF of the SINR is shown on Figure 1.
IiiA2 Link characteristics
3GPP shows in [31, §A.2] that there is a 25% gap between the practical coding schemes and the Shannon’s limit for the AWGN channel. Moreover, some of the transmitted bits are used for signaling, which induces a supplementary capacity loss of about 30% (see [32, §6.8]). This made us assume in (2). The system bandwidth is .
IiiA3 Streaming traffic
We assume that all calls require the same streaming rate and have the same streaming call time distribution. We split them into user classes characterized by values of the SINR falling into different intervals regularly approximating the SINR domain from to as explained in Section IIIA1. In our performance evaluation we will consider two values of the spatially uniform traffic demand: 900 and 600 Erlang/km. (All results presented in what follows do not depend on the mean streaming time but only on the traffic demand). Consequently, th class traffic demand per unit of surface is equal to, respectively, and , where are given by (15). Multiplying by the surface served by one base station equal to we obtain the traffic demand per cell, per class, equal to Erlang and Erlang, respectively, for the two studied scenario.
IiiB Performance evaluation
Assuming the LTE and traffic model described above, we consider now streaming policies LESF() defined in Section IIB3. Recall that in doing so, we assume that users are served by the antenna offering the smallest pathloss, and dispose orthogonal downlink channels, with the maximal rates depending on the value of the SINR (interference comes from nonserving BS) characterizing class . Roughly speaking, LESF() policy assigns the total requested streaming rate for the maximal possible subset of classes in the order of decreasing SINR, leaving some capacity margin to offer some “besteffort” streaming rates for (some) users remaining in outage. These streaming rates given by (5) depend on the current configuration of users and are nonzero for users with SINR within the interval , where is the minimal value of SINR for which users are assigned the total requested streaming rate; cf Remark II.4. In particular, LESF(), called the optimal policy, leaves no capacity margin for users in outage, while LESF(), called the fair one, offers a “besteffort” streaming rate for all users in outage at the price of assigning the full requested rate kbit/s to a smaller number of classes (higher value of SINR) ^{8}^{8}8The LESF fair policy seems to be adopted in some implementations of the LTE.. In what follows, we use our results of Section IIC to evaluate performance of these streaming policies in the LTE network model.
IiiB1 Outage time
Figure 3 shows the mean time of the streaming call spent in outage normalized by call duration, , evaluated using (8), in function of the SINR value characterizing class , for the traffic 900 Erlang/km and different policies LESF. Figure 3 shows the analogous results assuming traffic load of 600 Erlang/km. The main observations are as follows:

All LESF policies exhibit a cutoff behaviour: the fraction of time in outage drops rapidly from 100% to 0% when SINR transgresses some critical values. This cutoff is more strict for the optimal policy.

For the traffic of 900 Erlang/km, users with SINR are practically never in outage, when the optimal policy is used. The same holds true for users with SINR, when the fair policy is used.

When the traffic drops to 600 Erlang/km, these critical values of SINR decrease by and , respectively, for the optimal and the fair policy. Note that the fair policy is more sensitive to higher traffic load.
IiiB2 Number of outage incidents
Figure 5 shows the mean number of outage incidents per streaming call, evaluated using (9), in function of the SINR value characterizing class , for the traffic 900 Erlang/km and different policies LESF. (Recall that we assume the same streaming time distribution for all users, and hence making the expression in (9) depend only on the vector of traffic demand per class.) Figure 5 shows the analogous results assuming traffic demand of 600 Erlang/km. The main observations are as follows:

For all policies, the number of outage incidents (during the service) is nonzero only for users with the SINR close to the critical values revealed by the analysis of the outage times. Users with SINR below these values are constantly in outage while users with SINR above them never in outage.

More fair policies generate slightly more outage incidents. The worst values are 2 to 2.2 interruptions per call for the optimal policy, depending on the traffic value, and 2.4 to 3 interruptions per call for the fair policy.
Studying outage times and outage incidents we do not see apparent reasons for considering fair policies. This motivates our study of the besteffort service in outage.
IiiB3 The role of the “best effort” service
Figure 7 shows the fraction of time spent in deep outage in function of the SINR, assuming traffic 900 Erlang/km. These values should be compared to the fraction of time spend in outage (for convenience copied on Figure 7 from Figure 3). Recall, users in outage do not receive the full requested streaming rate (assumed 256kbit/s in our example), however they do receive some nonnull “best effort” rates given by (5), unless they are in deep outage — have SINR too small; cf Remark II.4. Considering users in outage but not in deep outage as “partially satisfied”, increasing fairness margin allows to (at least) partially satisfy users with decreasing SINR values. Obviously the level of the “partial satisfaction” depends on the throughput obtained in outage periods, which is our quantity of interest on Figure 7. It shows also two curves for all policies LESF assuming traffic 900 Erlang/km. The upper ones represent the mean total throughput realized during the service, normalized to its maximal value; i.e., , in function of the SINR value characterizing class . The fractions of this throughput realized during outage periods, , are represented by the lower curves.
Figures 7 and 7 teach us that the role of the LESF policies with may be twofold.

LESF policies with small values of , e.g. , improve “temporal homogeneity” of service with respect to the optimal policy, for users having SINR near the critical value. For example, a user having SINR equal to is served by the optimal policy during 80% of time with the full requested streaming rate (cf. Figure 7). However, for the remaining 20% of time it does not receive any service (deep outage, rate 0bits/s). The policy LESF offers to such a user 80% of the requested streaming rate during the whole streaming time (cf. Figure 7), with no deep outage periods (cf. Figure 7). The price for this is that a slightly higher SINR is required to receive the full requested streaming rate (at least 5dB, instead of 3dB for the optimal policy).

The fair policy LESF improves the spatial homogeneity of service. It leaves no user in deep outage, however a much larger SINRdB is required for not to be in outage (cf. Figure 7). Moreover, the throughput of all users in outage but not in deep outage is substantially reduced e.g. from 80% to 40% for SINRdB, with respect to some intermediate LESF policies (with ). These intermediate policies can offer an interesting compromise between the optimality and fairness.
IiiB4 Impact of a nonPoissonarrivals
Recall that the performance analysis of the model presented in this paper is insensitive to distribution of the requested streaming times. In this section we will briefly study the impact of a non Poissonarrival assumption. In this regard we simulate the dynamics of the model with deterministic interarrival times (with all other model assumptions as before) and estimate the mean fraction of time in outage and mean number of outage incidents for each class . For the comparison, as well as for the validation of the theoretical work, we perform also the simulation of the model with Poisson arrivals. The results are plotted on Figures 9, 9 and 11, 11. Observe first that the simulations of the Poisson model confirm the results of the theoretical analysis. Regarding the impact of the deterministic interarrival times a (somewhat expected) fact is that the optimal policy remains optimal regarding the fraction of time spent in the outage and the number of outage incidents. Another, less evident, observation is that the deterministic interarrivals (more regular than in the Poisson case) do not improve the situation for all classes of users. In fact, users with small values of the SINR have smaller fraction of time in outage under Poisson arrival assumption than in the deterministic one! This is different from what we can observe for the blocking probability for the classical Erlang’s loss model; cf e.g. [33, Figure 8]. Moreover, the deterministic arrivals increase the number of outage incidents for intermediate values of the SINR and decrease for extreme ones, especially with the fair policy. Concluding these observations one can say however, that the differences between Poisson and deterministic are not very significant and hence we conjecture that the Poisson model can be used to approximate a more realistic arrival traffic.
Iv Conclusions
In this paper, a realtime streaming (RTS) traffic, as e.g. mobile TV, is analyzed in the context of wireless cellular networks. An adequate stochastic model is proposed to evaluate user performance metrics, such as frequency and number of interruptions during RTS calls in function of user radio conditions. Despite some fundamental similarities to the classical Erlang loss model, a new model was required for this type of service, where the service denials are not definitive for a given call, but only temporal – having the form of, hopefully short, interruptions (outage) periods. Our model allows to take into account realistic implementations of the RTS service, e.g. in the LTE networks. In this latter context, several numerical demonstrations are given, presenting the quality of service metrics in function of user radio conditions.
[A general realtime streaming (RTS) model] In this section we will present a general stochastic model for realtime streaming. An instantiation of this model was used in the main body of the paper to evaluate the realtime streaming in wireless cellular networks. This model comprises Markovian, multiclass process of call arrivals and their independent, arbitrarily distributed streaming times. These calls are served by a server whose service capacity is limited. Depending on numbers of calls of different classes present in the system, the server may not be able to serve some classes of users. If such a congestion occurs, these classes are temporarily denied the service, until the next call arrival or departure, when the situation is reevaluated. These service denial periods, called outage periods, do not alter the call sojourn times in the system. Our model allows for a very general service (outage) policy saying which classes of users are temporarily denied the service due to insufficient service capacity. We will evaluate key characteristics of this model using the formalism of point processes and their Palm theory, often used in the modern approach to stochastic networking [34]. Specifically, we are interested in the intensity of outage incidents, the mean interoutage times and the outage durations of a given class, seen from the server perspective, as well as the probability of outage at the arrival epoch, mean total time in outage and mean number of outage incidents experienced by a typical user of a given class. The expressions developed for these characteristics involve only stationary probabilities of the (free) traffic demand process, which in our case is a vector of independent Poisson random variables. Recall that such a representation is possible e.g. for the well known ErlangB formula, giving the blocking probability in the classical (possibly multiclass) Erlang’s loss model. Indeed, our model can be seen as an extension of the classical loss model, where the losses (i.e., service denials) are not definitive for a given call, but only temporal — having the form of outage periods.
a Traffic demand
Consider classes of users identified with calls. We assume that users of class arrive in time according to a Poisson process ^{9}^{9}9The time instants are used only in the Appendix and should not be confused with denoting in the main stream of the paper (and in the proof of Proposition II.3 at the end of the Appendix) the mean throughput of user in class . with intensity and stay in the system for independent requested streaming times having some general distribution with mean . All the results presented in what follows do not depend on the particular choice of the streaming time distributions — the property called in the queueingtheoretic context insensitivity property. Denote by the process of arrival epochs and streaming times (call durations) of users of class . We assume that are independent across . Denote by the number of users of class present in the system at time and let ; we call it the (vector of) user configuration at time . The stationary distribution of coincides with the distribution of a vector of independent Poisson random variables with means , . We call the traffic demand of class .
We adopt the usual convention for the numbering of the arrival epochs . The same convention is used with respect to all point processes denoting some time epochs.
B Resource constraints and outage policy
For class , let a subset of user configurations be given, where , such that all users of class present in the configuration are served if and only if and no user of class is served (we say it is in outage) if . We call the th class (service) feasibility set. Denote by the probability that the stationary configuration of users is in th class feasibility set.
We assume that, upon each arrival or departure of a user, the system updates its decision and, for any class , it assigns the service to all users of class if the updated configuration of users is in . All users of any class for which the updated configuration is in will be placed in outage (at least) until the next user arrival or departure.
In what follows we will assume that no user departure can cause outage of any class of users i.e., switch a given configuration from to . (However a user departure may make some class switch from to .)
Denote by the number of users of class not in outage at time . Denote by the configuration of users not in outage at time .
C Performance metrics
In what follows we will be interested in the following characteristics of the model.
C1 Virtual system metrics
During its time evolution, the user configuration alternates visits in the feasibility set and its complement , for each class . We are interested in the expected visit durations in theses sets as well as the intensities (frequencies) of the alternations. More formally, for each given , we define the point process of exit epochs of from ; i.e., all epochs such that (with the convention ). These are epochs when all users of class present in the system (if any) have their service interrupted.
Denote by the duration of the th visit of the process in and by the duration of the th visit of the process in . We define for each class :

The intensity of outage incidents of class , i.e., the mean number of outage incidents of this class per unit of time
Obviously is also the intensity of entrance to the th class feasibility set .

The mean service time between two outage incidents of class

The mean outage duration of class
Note that the above metrics characterize a “virtual” quality of the service, since some visits in and may occur when there is no th class user in the system (in the latter case the outage of this class is not experienced by any user).
C2 User metrics
We adopt now a user point of view on the system. We define for each class :

The probability of outage at the arrival epoch for user of class

The mean total time in outage of user of class

The mean number of outage incidents experienced by user of class after its arrival
Note that eventual outage experienced at the arrival of a given user is not counted in . The mean total number of outage incidents (including possibly at the arrival epoch) is hence .
Appendix A Mathematical results
For a given class , denote by the unit vector having its th component equal to 1. Hence represents adding one user of class to the configuration of users . Denote by the probability under which is stationary and by the corresponding expectation. Recall that is the distribution of the stationary configuration of users (it corresponds to independent Poisson variables of mean ).
Aa General results
We present first results regarding the virtual system metrics. These results will be next used to evaluate the user metrics.
Lemma A.1
The intensity of outage incidents of class is almost surely equal to
Let be the point process counting the arrival times of users of all classes. By independence, is the Poisson point process of intensity . Then, by the ergodicity of the process and the fact that the exits from can take place only at some user arrival epoch we have by the Campbell’s formula [cf. e.g. 34, Equation (1.2.19)^{10}^{10}10with and ],
where designates the Palm probability associated to (which is, roughly speaking, the conditional probability given an arrival at time ). By PASTA (Poisson Arrivals See Time Averages) property [cf. 34, Equation (3.3.4)] the configuration of users under has distribution . Moreover, where is under independent of and takes value with probability . This completes the proof.
Lemma A.2
The mean service time between two outage incidents and the mean outage duration of class are almost surely equal to, respectively,
where is given in Lemma A.1.
First we prove the expression for . By ergodicity almost surely, where designates the expectation with respect to the Palm probability associated to , and ; [see e.g. 34, Equation (1.6.8) and Equation (1.2.27)]. Applying the mean value formula [see 34, Equation (1.3.2)^{11}^{11}11 with ] we get , which completes the proof of the expression for . For the other expression, note by the definition of the sequence and that almost surely,
which completes the proof.
Proposition A.3
The probability of outage at the arrival epoch for user of class is equal to
(16) 
almost surely.
By ergodicity we have , where designates the Palm probability associated to (arrival process of the users of class ). By PASTA property the configuration of users , just before arrival of the user of class at time , has distribution . Once the user enters the system, the users configuration becomes , whence the result.
Proposition A.4
The mean total time in outage of user of class is almost surely equal to
Again using the ergodicity of we can write
Denote by the process of configurations of users other than the user number 0 of class (which arrives at time under ). By Slivnyak theorem [see e.g. 22, Theorem 1.13] the distribution of the process under is the same as this of under . Using the fact that and are independent under with we obtain
which completes the proof.
Proposition A.5
The mean number of outage incidents experienced by user of class after its arrival is almost surely equal to
(17) 
Again using the ergodicity of we know that, almost surely,
Using the fact that and are independent under with