A MICRO-CELLULAR NETWORK ARCHITECTURE FOR TRANSMISSION OF PACKET DATA Izhak Rubin and Shervin Shambayati Electrical Engineering Department UCLA 58-1 15 Engineering IV Los Angeles, CA 90095 Abstract- Consider an area, such as a shopping mall, which is covered by a network of micro-cells. Assume a user entering this area to have a packet that he wishes to transmit during hidher residence time in the area. The user spends a limited period of time (system time) moving across the area while visiting through a number of cells. We consider a number of access control algorithms that regulate the transmission of user packets. Performance measures include: system throughput, user blocking probability (expressing the probability that the user is not able to transmit the packet) and the packet delay (for transmitted packets). We analyze and compare three access algorithms by considering an area that consists of three cells. The algorithms are differentiated by providing different access priorities to users based on their time left in the system. We can also modify the priority level to include differentiation between new arrivals and handoff users.

11. DESCRIPTION OF THE SYSTEM AND THE SERVICE ALOGR~HMS In the system under consideration new users arrive into a cell according to a Poisson arrival process. Each user has a single packet that it needs to transmit. Furthermore, when a user arrives, it can only wait a limited amount of time in the system to transmit its packet. This amount of time is called the system time and could either be deterministic or a random variable. The transmission channel in each cell is divided into frames of s slots each. A slot accommodates transmission of a single packet. The sojourn time of a user in a cell is equal to one frame. Users arrive into a cell at the beginning of a frame. If a user is successful in transmitting its packet in a cell, it leaves the system. If not, at the end of the frame it is handed off to a neighboring cell where it again requests to transmit its packet. The routing process is assumed to be Markovian, i.e., the probability that a user is handed off to a particular cell depends only on the cell that it has resided during the previous frame. A user is handed off continuously until either it is able to transmit its packet or until its targeted system time is reached. If a user is unable to transmit its packet within its system time it is assumed blocked. Each cell employs a central controller that regulates the transmission of packets during a frame according to a selected service policy. At the start of each frame, the controller announces the identity of the requesting users that are allocated transmission slots during the frame. Thus, up to s users are allowed to transmit their packets during a frame. In this paper six service policies are considered. The first three are as follows: Policy 0: Under this policy, if the number of users requesting service is greater than s, then s users are selected at random to transmit their packets. If the number of users requesting service is less than or equal to s then all users are allowed to transmit their packets. Policy 1: Under this policy, if the number of requesting users is greater than s, then s users with the most time left in the system are selected. If the number of users is less than or equal to s, then all users are served.

I. INTRODUCTION With the explosion of information technology no longer is the world of wireless limited to transmission of voice. New algorithms and applications are devised everyday for transmission of packet data in wireless environments. Among these are algorithms for transmission of documents, telemetry and images in environments such as business complexes, medical centers, schools and shopping malls [ 1][2][3]. In this paper we consider an area such as a shopping mall, which is covered by a micro-cellular network. A user arriving into this network has a packet that it wishes to transmit during its residence time in the area. A user spends a limited period of time (system time) moving across this area as it visits a number of cells. We consider three access control algorithms that regulate the transmission of user packets. These algorithms (access policies) are differentiated by providing different access priorities to users based on their time left in the system. We also modify the priority level to include differentiation between new arrivals and handoff users. In Section 11, the general architecture and the algorithms for transmission of packets are defined. In Section 111, results of simulations for a simple three-cell system are presented and methods to improve and modify the transmission algorithms are discussed. In Section IV conclusions are drawn. 0-7803-6596-8/00/$10.00 0 2000 IEEE

719

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 11, 2009 at 16:39 from IEEE Xplore. Restrictions apply.

3. Policy 2: Under this policy, if the number of requesting users is greater than s, then s users with the least time left in the system are selected. If the number of users is less than or equal to s, then all users are served. The other three algorithms are modifications of the three algorithms mentioned above. Under the modified policies, the cell controller establishes long-term targets for the fractional number of users that it wishes to serve. For this purpose, users that traverse the cell are divided into groups: a group of new arrivals (i.e., users that just entered the area at the cell) and a group of handoff users for each neighboring cell. For each such group, a targeted throughput ratio is established. Policy 3: Under this policy, if the number of users requesting service is greater than s, the cell controller calculates the number of users of each group that it wishes to serve during the frame. This calculation is based on the throughput ratio target levels mentioned above. Then within each group, the targeted number users are chosen at random. If the number of users is less than or equal to s all users are served. Policy 4: Under this policy, if the number of users requesting service is greater than s, the cell controller calculates the number of users of each group that it wishes to serve during the frame. This calculation is based on the throughput ratio target levels mentioned above. Then within each group, the targeted number users are chosen according to the most time left in the system first (Policy 1) algorithm. If the number of users is less than or equal to s all users are served. Policy 5: Under this policy, if the number of users requesting service is greater than s, the cell controller calculates the number of users of each group that it wishes to serve during the frame. This calculation is based on the throughput ratio target levels mentioned above. Then within each group, the targeted number users are chosen according to the least time left in the system first (Policy 2)

46

4

3:

i

26

!,:, a4 0 0

4

a

-ku-.)

Figure 2 Delay vs. Throughput,Three-Cell System, Mean System Time 10 Frames

algorithm. If the number of users is less than or equal to s all users are served. In the next section the results of simulations of these policies for a three-cell area system are provided.

111. SIMULATION RESULTS AND DISCUSSIONS To demonstrate the key features of the system regulated by the policies mentioned above we carry out performance analysis through a simulation process. A three-cell system, as shown in Fig. 1, is considered. In this system, a user that is being handed off from a cell has an equal chance to go to either of the neighboring cells. We set s=3, so that each cell has three slots per frame. For these simulations, both loading rates and the average system times were varied. The system time distributions that were considered were uniform, geometric and deterministic. Under uniform and geometrically distributed system times, the minimum system time is equal to 1 frame. We first obtain the delay-throughput performance under each policy for a fixed average system time of 10 frames. Two extreme cases were simulated. For the f i s t case, a system where only one of the cells is loaded with new arrivals was considered. For the second case, a system where all three cells are equally loaded with new arrivals was examined. The results for these simulations are plotted in Fig. 2. Note that the delay is defined as the packet system waiting time measured from the time the user arrives into the system to the time it starts its packet transmission, given this packet is allocated a transmission slot. If a user is served in the same frame that it arrives in, its delay is set to 0. Fig. 2 display several interesting characteristics of the system. First, for the same level of throughput the average delay for the system where only one cell is loaded with new arrivals is greater than that experienced in the case where all cells are equally loaded, for all Policies. This is due to the fact that in the first case all new arrivals come to a single cell and therefore there is a higher chance that a new arrival is not served immediately and is thus handed off.

Fig. 1. The Three-Cell System

720

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 11, 2009 at 16:39 from IEEE Xplore. Restrictions apply.

As Fig. 2 illustrates, the system time distribution of the users also affects the delay-throughput performance of the system. As seen from this figure, users served by Policies 0 and 1 under uniform and geometric system time distribution incur lower delays than they do under a deterministic system time distribution. A second set of simulations was performed to evaluate the potential of the modified service algorithms in Policies 3 through 5. In these simulations, we loaded the cells in the system asymmetrically with external arrivals. For cell 1, this loading was 5.1 Erlangs, for cell 2, 2.4 Erlangs and for cell 3, 1.5 Erlangs. We then used different mean system times and system time distributions to evaluate the performance of the system under each algorithm. The throughput ratios for each cell were selected according to the fractions prescribed in Table 1. The results for these simulations are shown in Figs. 3 and 4. Fig. 3 shows the average delay for different policies versus the average system time. Fig. 4 represents the blocking probability versus the average system time. Several observations are made from these figures. First, as was the case with Fig. 2, the performance under Policy 2 for these measures is similar for different system time distributions. Furthermore, under Policy 2 users experience the highest delay while incurring the lowest blocking probability. On the other hand, under Policy 1 users incur the highest blocking probability and the lowest delay. It is also observed that the modified service algorithm does not affect the performance features obtained under Policy 1. The blocking probabilities and delays for Policies 1 and 4 are comparable. The modified algorithm affects Policy 0 only when the system time distribution is deterministic. As one may expect, Policy 1 yields the highest blocking Probability and the lowest delay. We note that it gives preference to those users that can wait the longest, thus increasing the blocking probability. Policy 2 provides the best blocking performance since it gives

a

2

1 .o 0.8

Frac. Handoffs Cell 1 NIA 0.2

3

0.5

0.35

Cell

1

Frac. New Arrivals

Frac. Handoffs Cell 2 0.0 NIA

0.15

10

E

Frac. Handoffs Cell 3

0.0 0.0 NIA 0.01

J 1

10

A I I w S y t e m l h (W)

Fig. 3. Delay vs. Average System Time

721

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 11, 2009 at 16:39 from IEEE Xplore. Restrictions apply.

la,

1

used in cells that are lightly loaded externally to reduce the blocking probability. Policy 0 or Policy 5 maybe used for cells that are neither heavily loaded nor very lightly loaded externally to strike a balance between new arrivals and those users that have been in the system for a long time. Additional policies could also be considered for admission. For example, for the modified algorithms it is not necessary that users in each group (handoffs and new arrivals) be chosen for service according to the same policy. For example, for handoff users least time left in the system policy could be used while for new arrivals most time left in the system policy is applicable. Furthermore, these simulations did not focus on the effects of routing on the performance of the system. Future simulations will address this issue by measuring the sensitivity of the performance of the system to changes in the routing probabilities.

0.1

.

0.01

Syilem Time

7

,

1

o.ow1 1

10

100

A v r m p SyatrmTlm ( b m s )

Fig. 4. Blocking Probability vs. Average System Time

preference to those users that can wait the least amount of time for service. For Policy 2, the modified algorithm reduces the delay and increases the blocking probability. In general, blocking probability for Policy 5 (modified algorithm for Policy 2) is lower than other policies (except for Policy 2) and its delay is higher except for a deterministic system time. In the latter case the blocking probability and delay performance under Policy 5 is comparable to that under Policy 0. Note that the values given in Table I were selected without any attempt at optimization. Therefore, the performance of Policy 5 may become quite different when the ratios are chosen differently. Another observation is that the performance of Policies 0 and 3 are identical for geometric system time distribution. This is due to the fact that after a random selection from a group of users, the remaining users would have the same geometrically distributed system times due to the memoryless nature of the geometric distribution. Since the modified algorithm does not take into account the amount of time that users have left in the system, as far as system time is concerned, it is a random selection type algorithm. Therefore, on the average, Policy 0 yields the same performance as Policy 3. Figs. 3 and 4 also show the effects of mean service time on both the blocking probability and the delay. For all policies, as the mean system time increases, the blocking probability decreases and the average delay increases. This is due to the fact that a larger average system time offers a user more opportunities to request service. Note that these simulations did not exhaust all the interesting cases for the three-cell system under consideration. For example, of interest is a system in which different cells use different policies. This is especially the case when the system is very asymmetrically loaded. For example, Policy 1 maybe used for a cell that is very heavily loaded externally to reduce the overall delay of the system. Policy 2 may be

IV. CONCLUSIONS As seen from the results of the previous section, for the system under consideration, each Policy yields a characteristic performance behavior. In general, policies that give preference to users that have most time left in the system (Policies 1 and 4) yield higher blocking probability and lower delays. The user performance under these policies is affected by the routing topology, the external loading distribution and the system time distribution. Policies that give preference to those users with least time left in the system (Policies 2 and 5) lead to the lowest blocking probability and the highest delay values. Furthermore, the modified algorithms only produce significant performance difference for Policy 2. In addition, for a given average system time, these policies, in terms of mean delay and throughput performance, exhibit the same performance for different system time distributions. Under the leasttime-first policy (Policy 2) the user average delay is insensitive to the external loading distribution of the system when the system is heavily loaded. For all policies, as the average system time increases, for the same offered load, the average delay increases and the blocking probability decreases. The simulations that were performed were limited to the use of the same policy for all the cells in the system. Analyses will be carried out to evaluate the performance of the system under the use of different policies for different cells in the system. Also of interest for future studies is the impact on the system of routing patterns.

722

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 11, 2009 at 16:39 from IEEE Xplore. Restrictions apply.

ACKNOWLEDGMENT This work was supported by ARO research grant No. DAAG55-98-1-0338 and by University of California MICRO grant 98-131 and SBC Pacific Bell.

REFERENCES [l] 0 Spaniol, A. Fasbender, S . Hoff, J. Kaltwasser, J. Kassubek, “Impacts of Mobility on Telecommunication and Data Communication Netwroks,” IEEE Personal Communications, Vol. 2 No. 5, pp. 20-33, October 1995 [2] M. Umehira, M. Nakura, H. Sato, A. Hashimoto, “ATM Wireless Access for Mobile Multimedia: Concept and Architecture,” IEEE Personal Communications, Vol. 3 No. 5, pp. 39-48, October 1996 [3] D. Grillo, “Paving the Way to Third-Generation Mobile Systems in Europe,” IEEE Personal Communications, Vol. 5 No. 2, pp. 5 , April 1998

723

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 11, 2009 at 16:39 from IEEE Xplore. Restrictions apply.

A micro-cellular network architecture for transmission of ...

Mar 11, 2009 - Abstract- Consider an area, such as a shopping mall, which is covered by a network of micro-cells. Assume a user entering this area to have a packet that he wishes to transmit during hidher residence time in the area. The user spends a limited period of time (system time) moving across the area while ...

426KB Sizes 0 Downloads 260 Views

Recommend Documents

13. AN ARCHITECTURE FOR REALIZING TRANSMISSION FOR ...
AN ARCHITECTURE FOR REALIZING TRANSMISSION FOR 2_2 MIMO CHANNEL.pdf. 13. AN ARCHITECTURE FOR REALIZING TRANSMISSION FOR 2_2 ...

An Architecture for Anonymous Mobile Coupons in a Large Network
Nov 15, 2016 - services and entertainment [2]. .... credit/debit card payment (see also the next section). Note ... (ii) Executes online and hence must have.

An Architecture for Anonymous Mobile Coupons in a Large Network
Nov 15, 2016 - Journal of Computer Networks and Communications. Volume 2016 ..... maximum load for the 5 hours, the centralized service would need to be ...

architecture of network systems pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. architecture of ...

GROW-Net–A New Hybrid Optical Wireless Access Network Architecture
1. INTRODUCTION. Over the past several years Internet traffic has been ... Internet traffic has strained the existing ... PONs can reach the home (Fiber-to-the-Home, FTTH) or the curb ... the mesh network deals with 2 types of links: 1. AP-User.

an action-tuned neural network architecture for hand ...
architecture obtained by working on a synthetic data set is presented and discussed ..... dering software which reads sensor values and con- .... mart (contract n.

Modeling Netwo Modeling Network Architecture for Nigerian rk ... - IJRIT
The technological backwardness of most developing countries is unimaginable. It is common to find higher institution be it Polytechnics, Colleges of Education, Universities without any form of ICT application to learning or administration. This is wo

On Cloud-Centric Network Architecture for Multi ...
1. INTRODUCTION. As numerous cloud-based applications and services have been introduced for ... vices, network infrastructure and cloud services inherently.

Modeling Netwo Modeling Network Architecture for ...
Modeling network architecture in colleges of Education will greatly improve the standard of .... DEPARTMENT (Various departments were courses are offered.

A Data-Oriented (and Beyond) Network Architecture
1 Introduction. The DNS name resolution system is a fundamental part of today's ... The first Internet applications, such as file transfer and remote login, focused ...... define a simple and scalable interdomain multicast protocol. We now show ...

Cycloid: A constant degree P2P network architecture Team ... - RIT CS
Cycloid: A constant degree P2P network architecture. Team: Comfortably Dumb. Report 3 ... d . ○ Avg. number of hops, H = A + Cd where A and C are constants ...

A Programmer–Interpreter Neural Network Architecture ...
May 18, 2015 - A Programmer–Interpreter Neural Network Architecture for Prefrontal Cognitive Control. Francesco Donnarumma. ∗. Institute of Cognitive ...

GROW-Net–A New Hybrid Optical Wireless Access Network Architecture
standards, including Ethernet PON (EPON), Broadband. PON (BPON) and Gigabit PON (GPON) are Time. Division Multiplexing based, using one downstream ...

TreeP: A Tree Based P2P Network Architecture
This network architecture is called TreeP (Tree based P2P network architecture) and is based on a ..... Each peer maintains its routing table by exchanging data through its active connections. ..... Middleware Fabric for Grid-based Remote Visualizati

pdf-174\pictures-of-architecture-architecture-of-pictures-a ...
... apps below to open or edit this item. pdf-174\pictures-of-architecture-architecture-of-pictur ... tion-between-jacques-herzog-and-jeff-wall-moderated.pdf.

Transmission
The revised plan prioritizes existing infrastructure, getting solar energy online ... Trough solar power plants in California's Mojave Desert. Photo courtesy of.

3g mobile network architecture pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 3g mobile ...

what is network architecture pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. what is network architecture pdf. what is network architecture pdf.

telecommunication network architecture pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item.

Network-Adaptive Video Coding and Transmission - (AMP) Lab ...
1. INTRODUCTION. The technology for delivering ubiquitous high bandwidth multimedia services, such as voice with video, will soon become a reality.

wireless sensor network architecture pdf
wireless sensor network architecture pdf. wireless sensor network architecture pdf. Open. Extract. Open with. Sign In. Main menu. Displaying wireless sensor ...

wifi network architecture pdf
Loading… Page 1. Whoops! There was a problem loading more pages. wifi network architecture pdf. wifi network architecture pdf. Open. Extract. Open with.