Академический Документы
Профессиональный Документы
Культура Документы
IN CELLULAR NETWORKS
PREPARED BY
ACHAL AGARWAL
2015B4A70436P
IN PARTIAL FULFILMENT OF
SUBMITTED TO
DR. RAKHEE
APRIL, 2017
TABLE OF CONTENTS
1. ACKNOWLEDGEMENTS 3
2. ABSTRACT 4
3. INTRODUCTION 5
5. SIMULATION 8
5.3.1. Algorithms 15
5.3.2. Results 16
6. CONCLUSION 19
7. REFERENCES 20
3
1. ACKNOWLEDGEMENTS
The success and final outcome of this project required a lot of guidance and
assistance. All that I have done till now is only due to such supervision and assistance
provided by Dr. Rakhee. I thank Dr. Rakhee for all this.
I would also like to thank the Department of Mathematics, BITS Pilani, for giving me
the opportunity to learn.
Moreover I would like to express my gratitude towards the college and all the driving
forces for the same, including the Director, Vice Chancellor and many others.
Last but not the least, I would like to thank my parents and friends for primarily their
emotional support and many other things to enable me to work on this project.
4
2. ABSTRACT
This project is based on queuing theory for wireless networks and studies the handoff
and new connection blocking rates. Various network schemes are studied and
implemented using approximate simulation models to know the reduction in blocking
rates achieved by them. Reservation schemes are examined over a wide range of
offered load. Then multi class traffic is studied and various schemes are analysed.
After studying the recent works, a new scheme is proposed and thoroughly analysed.
5
3. INTRODUCTION
A wireless network is as good as it’s call admission control scheme. A call admission
control scheme allows new connections to hosts for various services. Any call
admission control scheme must reduce blocking and aim to judiciously utilise
available resources for maximum welfare. At the same time, it should primarily
prioritise containing the handoff blocking rate within acceptable limits. Handoff
connections are those which get transferred or handed off to new base stations whilst
the user moves from one cell to another. A cell is a region wherein a single base
station provides connection to a network.
Pati’s guard channel policy is used and the results are compared. Further more,
network and simulation parameters are varied to test policy in different scenarios.
Handoff rate and Cell dwell time are important parameters to get a somewhat realistic
view and hence, a separate simulation was carried out to get these parameters using
the Random Waypoint Mobility model.
After analysing other such schemes, multi class traffic is incorporated in the model
and thoroughly studied. Various schemes are analysed, specifically the one provided
by Md. Sulamah. Thereafter another guard channel reservation scheme for multi class
traffic ism provided with detailed results and its convergence with respect to the
blocking and dropping probabilities are shown.
The analysis was carried out with different parameters spread over a wide range and
acceptable results were obtained. The random waypoint model designed before was
also incorporated for carrying out the thorough testing.
6
We model this problem to that of a typical Queuing Theory model. In each base
station controller, the channels are servers and the users in and around the nearby
cells constitutes the population.
As mentioned before, the call admission control scheme is a crucial aspect of any
wireless network. It controls the provision of services to the various users in the
network.
In this project, a distributed and adaptive, guard channel reservation scheme proposed
by Dr. Pati is used. This scheme is built upon the concept of guard channels, and it
imposes a hard constraint on the handoff call blocking probability. Guard channels
are channels reserved specifically for handoff calls and is not used for provisioning
new calls in the cell. It achieves optimal performance (i.e. maximum resource
utilisation with guaranteed Quality of Service) and has the ability to adapt
automatically to changes in network traffic.
The Markovian model for this scheme is as shown in Figure 1. This is provided to
estimate the number of guard channels in this scheme.
The complete model has been derived from Pati’s paper, please refer to the same for
intricate details of this model.
In the above and subsequent relations, the symbols carry their usual meanings.
7
Thus summing over all possible values of i, we can get P0 , given as follows:
Thereafter, our required parameter of interest, handoff call blocking probability can
be derived. This analytically solved expression can be contained within the required
limit. The probability is given as follows:
Now simulation is carried out with appropriate parameters to test this scheme.
8
5. SIMULATION
Simulation for the above described model was carried out. A few parameters were
taken from Pati’s publications but mobility parameters, the choice of which was not
reasoned clearly was taken after a separate simulation for the same.
Cell dwelling time and rate of handoff are two crucial parameters to simulate a call
admission control scheme. Incorrect choice of parameters may give false results and
hence nullifying the role of the simulation.
Mobility models help get us a rough estimate of these two parameters to directly use
in the main simulation. In this project, a Random Waypoint Mobility model is chosen.
Random Waypoint model is a commonly used synthetic model for mobility, e.g., in
Ad Hoc networks. It is an elementary model which describes the movement pattern
of independent nodes by simple terms as state below.
• Each node moves along a line from one waypoint to the next.
• The waypoints are uniformly distributed over the given convex area. In this case,
disks centred at the Base Station Controller with radius as the range of service
provision.
• At the start of each leg a random velocity, a random direction and a random
distance are each drawn from their respective distributions.
• Optionally, the nodes may have so-called "thinking times" when they reach each
waypoint before continuing on the next leg, where durations are independent and
identically distributed random variables.
After carrying out the simulation the results were used to compute the Cell Dwelling
time and Handoff rate, which will be used in the subsequent policy simulation.
Given below are sample outputs plotted on an X-Y connected plot to visualise the
randomness generated.
600
400
Movement of Host
200
Y Axis
0
-600 -400 -200 0 200 400 600
-200
-400
-600
X Axis
600
400
Movement of Host
200
Y Axis
0
-800 -600 -400 -200 Y
0 200 400 600 800 1000
-200
-400
-600
-800
X Axis
The physical coverage area is partitioned into a hexagonal mesh structure without any
overlapping meshes as shown in Figure 3. There are a total of 19 cells and the cell
marked 0 is considered for performance evaluation.
8 9 10
7 1 2 11
18 6 0 3 12
17 5 4 13
16 15 14
Discrete Event Simulation is used this time as it suits the purpose better. The events
are:
The parameter values used in the simulation experiment are replicated from Pati’s
model for comparison.
5.2.2. Results
After carrying out the simulation, the essential parameters were recorded and plotted
to estimate the required probabilities. They are shown in Figures 5 and 6.
12
The physical coverage area is partitioned just as in the previous model (as shown in
Figure 3). There are a total of 19 cells and the cell marked 0 is considered for
performance evaluation.
Discrete Event Simulation is used this time as it suits the purpose better. The events
are:
In our multi class model (K classes), we require threshold values for each class of
traffic along with K*K probabilities for the relation of each class with the others
which will give us the probability with which a new call of given class can use a
reserve channel. Finally we require the fixed probability which will determine
whether a handoff call of a higher priority can utilise guard channels of a lower
priority
The total simulation period and the reason are similar as the previous case. The
simulator built from scratch is modular, tuneable and multi threaded. Hence given a
powerful computer, better results can be obtained.
The results were collected for each class of traffic under various conditions and with
different parameters. The results were then analysed and compared with other
schemes for multi class traffic.
These figures show how the handoff call drop probability becomes stable and remains
below the targeted QoS as the model adapts to the traffic. This model also bounds the
new call blocking probability.
To keep our analysis simple, we discuss the case with 3 classes of traffic. For most
practical purposes, three classes of traffic is suitable as in a broad view we can
classify traffic into Real Time, Streaming and Background calls. Similar results are
expected for more classes due to symmetry in our model.
Handoff Threshold
This measure denotes the approximate percentage of handoff drops acceptable. There
is a proportional (not exact) correlation between this value and the the acquired call
drop percentage. The lower the threshold, the better (lower) are the acquired results
depending on the total channels.
Class 1 - 0.001
Class 2 - 0.02
Class 3 - 0.1
This measure denotes the call arrival rate (lambda). Here lambda is the mean value of
call arrival rate. This lambda is used as the parameter in the exponential distribution
to generate calls in a cell. As expected, the higher this value, the higher is the number
of new calls generating in the particular cell.
Class 1 - 0.8
Class 2 - 0.6
Class 3 - 0.2
This measure denotes the call handoff rate (lambda). The mean value of handoffs per
unit time distributed exponentially. As handoffs are sent to neighbouring cells, a
hand-in occurs in Cell 0 only when a handoff is generated in Cells 1,2,3,4,5,6 (refer
to Figure 3). This effect has a slow recursive flow along both in and out directions. As
expected, the higher this value in the neighbouring cells, the higher is the number of
handoffs generating in the particular cell (Cell 0 in our analysis).
Class 1 - 0.08
Class 2 - 0.005
Class 3 - 0.02
Class 1 - 0.008
Class 2 - 0.0055
Class 3 - 0.0014
5.3.1. Algorithms
There were newly devised algorithms for the multi class scheme to ensure
convergence for all classes of calls.
Provided below are the algorithms for all the basic events that take place in the
model. These use the thresholds as discussed in the previous section. The classes of
traffic are C1, C2, … CN. Where CN is of lowest priority
5.3.2. Results
After carrying out the simulation, the essential parameters were recorded and plotted
to estimate the required probabilities. They are shown in the figures below.
The data is shown for all the various classes of traffic (3). As the classes were
separated based on priority and our algorithms also utilise the priority hierarchy, it is
natural for the traffic of higher priority to attain lower blocking and dropping rates as
compared to other classes.
These figures show how the handoff call drop probability becomes stable and remains
below the targeted QoS as the model adapts to the traffic. This model also bounds the
new call blocking probability.
Based on the provided graphs, we see that the probabilities converge as the
simulation runs. The parameters involved high probability and high arrival rates
traffic of Class 1, hence, the dropping probability is not as good as expected but on
the whole the results are acceptable.
Briefly, the convergence rates for handoff call blocks are as follows:
Class 1 - 2.2%
Class 2 - 1.8%
Class 3 - 2.2%
19
6. CONCLUSION
This DAGCR scheme reserves channels to give priority to handoff calls and to
control new call admission into the network. Given that handoff calls have higher
priority than new calls to ensure customer satisfaction and retention, this proposed
adaptive algorithm can search automatically the optimal number of guard channels to
be reserved at a base station, and it can also adapt to changes in traffic conditions
such as changes in the call arrival rate. Thus, fixed CAC policies such as fixed guard
channel policies are less preferable in applications.
Having built an accurate and a modular simulator, this model can now be tested with
various mobility models and varying parameters. Thereafter, it can be compared with
other admission control schemes and improved upon.
In the conclusion of the interim report, there were a few points mentioned with
regards to the future scope of the project.
The model we have proposed has almost negligible overhead and makes no
assumption on the network, hence this can be applied on almost all the networks
which face the problem we are addressing.
20
7. REFERENCES
1. Kunz, G., Stoffers, M., Gross, J., & Wehrle, K. (2011). Runtime efficient event
scheduling in multi-threaded network simulation. In Proceedings of the 4th
International ICST Conference on Simulation Tools and Techniques, pp. 359-366.
3. Lin, X., Ganti, R., Fleming, P. and Andrews, J. (2013). Towards Understanding
the Fundamentals of Mobility in Cellular Networks. IEEE Transactions on
Wireless Communications, 12(4), pp.1686-1698.
8. Kim, K., & Choi, H. (2009). A Mobility Model and Performance Analysis in
Wireless Cellular Network with General Distribution and Multi-Cell
Model. Wireless Personal Communications, 53(2), pp 179-195.
9. Rejeb, S. B., Nasser, N., & Tabbane, S. (2014). A novel resource allocation
scheme for LTE network in the presence of mobility. Journal of Network and
Computer Applications, 46(1), pp 352-361.
10. Somagari, S. R., & Pati, H. K. (2012). An Analytical Model for Adaptive Multi-
Guard Channel Scheme for Multi-Class Traffic in Cellular Networks with
Reduced Handoff Drop Probabilities. Procedia Technology.