Reliable Wireless Communication Network Design Considering Customized Multiple-Connectivity
全文
(2) Reliable Wireless Communication Network Design Considering Customized Multiple-Connectivity Chih-Hao Lin and Frank Yeong-Sung Lin Department of Information Management National Taiwan University Taipei, Taiwan, R.O.C. Email: d5725001@im.ntu.edu.tw. Abstract In this paper, we identify reliability issue for channelized wireless communication networks. Due to the time variance and unstable properties of wireless communications, customized multiple-connectivity wireless networks are necessary for many kinds of high-reliability communications. By introducing generic communication quality of service (QoS) assurance and concurrent multiple connectivity routing mechanism, we can design a realistic and reliable wireless network. We formulate a combinatorial optimization algorithm to develop a generic wireless system, which is a multiple-sectorization, power controllable, customized multiple-connectivity, and communication QoS assurance network. We integrate long-term channel assignment and sequential routing mechanisms to ensure communication grade of service (GoS) and improve spectrum utilization. The objective function of this formulation is to minimize the total cost of network system subject to configuration, capacity, k-connectivity, sequential homing, QoS and GoS constraints. The solution approach is Lagrangean relaxation with divide-and-conquer algorithms.. 1.
(3) I. INTRODUCTION Due to the rapid growth of wireless applications in the world, the reliability property is become a critical issue for any uninterrupted communication system. One promising technique to overcome spectrum unstable property is multiple-connectivity. By specifying location-based customized multiple-connectivity requirement, network designer must well deploy base stations (BSs) and arrange spectrum resource to ensure individual connectivity requirement concurrently [8]. Cellular systems are generally recognized as spectrum-efficient by increasing the frequency allocation, sectorizing the cells, and resizing the cells [4]. In this paper, we adopt several resource allocation mechanisms, consist of channel assignment, power control and cell configuration design issues, to optimize spectrum utilization of wireless systems. For modeling generic architecture of realistic networks, we allow each base station can be constructed by any number of smart antennas, whose radians and transmission powers can be adjusted as needed. Efficient spectrum utilization is one of paramount importance when designing high capacity cellular radio systems. The main idea behind channel assignment is to make use of radio propagation path loss characteristics and IF filter in order to minimize the carrier-to-interference ratio (CIR) and hence increase the radio spectrum reuse efficiency. In this paper, we integrate base stations (BSs) allocation, sectorization planning, channel assignment, and power control mechanisms to optimize frequency resource allocation problems. Efficient interference management aims at achieving acceptable carrier-to-interference ra-. 2.
(4) tio (CIR) in all active communication links and optimizing the system capacity. We accumulate co-channel interference (CCI), adjacent channel interference (ACI) and near channel interference (NCI) as total interference to evaluate communication QoS [2][7]. Furthermore, in order to ensure grade-of-service (GoS) and support real-time admission control, we pre-route each mobile terminal (MT) by location-based sequential homing mechanism. Sequential homing policies can cooperate with fixed channel assignment mechanism to arrange channel resource more efficiency and provide multiple-connectivity requirement [5][6]. We formulate the wireless network design and resource allocation problem as a combinatorial optimization problem, where the objective function is to minimize total cost of system subject to configuration, capacity, k-connectivity, sequential homing, QoS and GoS constraints. To the best of our knowledge, the proposed algorithm is the first attempt to consider the problem with whole factors jointly and formulate it rigorously. This kind of problems is by nature highly complicated and NP-complete. Thus, we apply the Lagrange relaxation approach and the subgradient method to solve this problem. The remainder of this paper is organized as follows. Section II provides the problem description, the notation definitions and problem formulation. In Section III, we adopt Lagrangean relaxation as our solution approach to deal with this problem. We also develop several algorithms to optimally solve dual problem. Finally, the summary of this paper is in Section IV.. 3.
(5) II. RELIABLE WIRELESS NETWORK DESIGN PROBLEM A. Problem Description In this chapter, we intend to establish a model to discuss an integrated wireless communication network design and resource allocation problem. We study how multi-configuration sectorization antennas, generic channel interference, and natural terrain-based radio propagation, will influence the performance of cellular system. Furthermore, we consider the effects of multiple-connectivity and sequential routing properties to enhance reliability of cellular networks. We develop a network design model to deal with BS installation, capacity allocation, channel assignment, power control, and sequential route problems. In order to satisfy the QoS level of requirement for each user in the network, we can adjust the configuration/sectorization of each BS, channel assignment policy, power level of each sector, and sequential homing policy of each MT to increase resource efficiency. The system parameters are divided into six parts: (1) BS information (e.g. candidate base station (BS) locations, available configuration types, capacity limitations, and downlink power levels), (2) MT information (e.g. traffic demand, connectivity requirement and location), (3) system parameters (e.g. carrier-to-interference ratio (CIR) requirement, receiver sensibility, voice activity and call blocking rate), (4) resource properties (e.g. number of available channels and NFD ratio), (5) cost functions (e.g. channel license, antenna capacity and BS sectorization cost) and (6) propagation environments (e.g. topographical and morphographical data).. 4.
(6) The objective of this formulation is to minimize the total cost of wireless communication network subject to: (1) capacity and configuration constraints of each BS, (2) generic channel interference and QoS constraints, (3) k-connectivity and sequential homing constraints, and (4) call blocking probability and receiver sensibility constraints for each MT. We develop several algorithms to determine total number of channels required, configuration/sectorization of each base station, transmission power of each sector, channel assignment plan of system, candidate homes of each MT, sequential homing policy, and average call blocking probability under k-connectivity constraints.. B. Notations Table 1. Notations for given parameters. Given Parameters Notation. Descriptions. A. The set of sector number A ⊂ { A0 , A1 , A2 , A3 , A4 , A5 }. T. The set of mobile terminals. C. The set of BSs in the system. M. The set of all kinds of sectorization and deployment types. St. The set of permutation for MT t which is integer value and S t = {1,2,..., K t }. W. Maximum number of available channels. G jam. An arbitrarily large number for Sector am of BS j. Kt. Connectivity requirement of MT t to connect with Kt candidate homes. Ltj. Path loss ratio of radio propagation between BS j and MT t. α. Voice activity. δ. Receiver sensitivity of each MT (in Watt). γ. Required CIR constraint. 5.
(7) λt. The mean traffic arrival rate of MT t ∈ T (in Erlang). βt. Required grade of service (GoS) of MT t. gj. Upper bound of aggregate traffic for Sector a m of BS j. n jam. Upper bound of channel number for Sector a m of BS j. pj. Upper bound of transmission power of Sector a m of BS j. B ts. Upper bound of call blocking probability for MT t on permutation s. B ts. Lower bound of call blocking probability for MT t on permutation s. F. Upper bound of total number of required channels for system. F. Lower bound of total number of required channels for system. d (n jam , g jam ). Blocking probability function for Sector am of BS j , which is a Erlang-B formula of traffic demand and available number of channels. NFD ratio which is formed as a function of the channel separation normalized to the. θ ( ∆i ). bit-rate ∆m. (. ∆ C n ja m. Configuration cost of BS sectorization type m. ). ∆F. Capacity cost function of equipments to assign n jam number of channels Spectrum frequency license fee Table 2. Notations descriptions for decision variables. Decision Variables. Notation. Descriptions. c jm. Decision variable of Sectorization type m for BS j. n jam. Number of channels assigned to Sector am of BS j. p jam. Effective isotropic radiated power (EIRP) of Sector am on BS j (in Watt). g jam. Aggregate flow on Sector am on BS j ∈ C (in Erlangs). k tjam. Decision function which is 1 if MT t can be served by Sector am of BS j and 0 otherwise. xtjam s. Homing decision variable which is 1 if Sector am of BS j is selected as the sth candidate. 6.
(8) path of MT t and 0 otherwise yijam. Decision variable for channel assignment for Sector am of BS j about Channel i. fi. Licensed channel Call blocking probability for the sth candidate homing policy for t which belongs to dis-. Bts. crete set Bts ∈ K ts = {0,0.01,0.02,..., B ts }. btjam. Blocking probability of Sector am on BS j which is referenced by MT t. C. Problem Formulation Objective function (IP1):. ∑ ∑ ∆ C ( n ja. Z IP 1 = min. j∈C a m ∈ A. m. )+. ∑ ∑ ∆ m c jm + ∑ ∆ F j∈C m ∈ M. i∈ F. (IP1). fi. subject to:. ∏ Bts ≤ β t. ∀t ∈ T. (1). ∀t ∈ T , s ∈ S t. (2). ∀t ∈ T , j ∈ C , am ∈ A. (3). ∀j ∈ C , am ∈ A. (4). ∀t ∈ T , i ∈ F , j ∈ C , am ∈ A. (5). ∀t ∈ T , j ∈ C , am ∈ A. (6). ∀t ∈ T , s ∈ S t. (7). ∀t ∈ T , j ∈ C , am ∈ A. (8). s∈S. ∑ ∑ xtja s btja m. j∈C am∈A. = Bts. m. d ( n jam , g jam ) = btjam s −1. s∈St . . ∑ λt ∑ xtja s ∏ Btk = g ja t∈T. p jam. γ≤. 2 Ltj. m. (y. k =1. ija m. ) (. ). + k tjam + 2 − y ijam − k tjam G jam. p j 'a ' ∑ ∑ L m j '∈C −{ j } a 'm ∈A tj '. ktjamδ ≤. m. ∑ y i ' j 'a 'm θ (| i − i ' |) i '∈F . p jam Ltj. ∑ ∑ xtja s = 1 j∈C a m ∈A. m. ∑ xtja s = k tja s∈S. m. m. 7.
(9) ∑ ∑ ktja. m. j∈C am∈A. ∑ yija. i∈F. m. ∑ (yija. a m ∈A. ≥ Kt. = n jam. m. ). + y ( i +1) jam ≤ 1. ∀t ∈ T. (9). ∀j ∈ C , a m ∈ A. (10). ∀i ∈ F , j ∈ C. (11). ∑ fi ≤ W. (12). i∈F. ∀i ∈ F , j ∈ C , am ∈ A. (13). ∀i ∈ F , j ∈ C , am ∈ A, m ∈ M. (14). ∀j ∈ C , a m ∈ A. (15). ∀j ∈ C. (16). ∀j ∈ C , m ∈ M. (17). yijam = 0 or 1. ∀i ∈ F , j ∈ C , am ∈ A. (18). xtjams = 0 or 1. ∀t ∈ T , j ∈ C , am ∈ A, s ∈ St. (19). ktjam = 0 or 1. ∀t ∈ T , j ∈ C , am ∈ A. (20). ∀i ∈ F. (21). ∀i ∈ F , j ∈ C , am ∈ A. (22). 0 ≤ p jam ≤ p jam. ∀j ∈ C , a m ∈ A. (23). 0 ≤ n jam ≤ n jam. ∀j ∈ C , a m ∈ A .. (24). yijam ≤ f i yijam ≤ c jm. p jam ≤ p jam × ∑ yijam i∈F. ∑ c jm = 1. m∈M. c jm = 0 or 1. f i = 0 or 1 y ( F +1) jam = 0. The objective function is to minimize the total cost of wireless communication networks, such as costs of (1) fixed installation cost of base station j, (2) capacity equipment cost, and (3) the spec-. 8.
(10) trum-licensing fee. These items are the major costs in involved in configuring a cellular network. Constraint (1) is the acceptable upper bound of call blocking probability requirement of each MT. Constraint (2) is for calculating the call blocking probability of MT t on the permutation s. Constraint (3) decomposes the call blocking probability of Sector j by introducing one additional notation btjam . Constraint (4) calculates the aggregate traffic for Sector j ∈ C under sequential routing effect. Constraint (5) ensures the CIR constraint for received radio QoS of every MT. Constraint (6) ensures receiver sensitivity of each MT t must be guarantee. Constraint (7) ensures at most one candidate homes of MT t can be select on permutation s. Constraint (8) enforces each candidate home must be selected on a permutation. Constraint (9) enforces the k-connectivity constraint of MT t. Constraint (10) calculates the total capacity of channels for each sector. Constraint (11) enforce adjacent channel must not be assigned to the same BS. Constraints (12) and (13) ensure the number of assigned channels is less than the total available channels. Constraint (14) ensures channel can be assigned only if this sector is deployed on BS j. Constraint (15) ensures transmission power can larger than zero only if we have assigned some channels on this sector. Constraint (16) enforces that only one sectorization type can be selected for each BS. Constraints (17) to (21) enforce the integer property of the decision variables c jm , y ijam , x tjam s , k tjam , and f i respectively. Constraint (22) limits boundary variable is not used. Constraints (23) and (24) enforce the feasible regions of decision variables p jam and n jam .. 9.
(11) III. SOLUTION APPROACH By using the Lagrangean Relaxation method [1], we can transform the primal problem (IP) into the following Lagrangean relaxation problem (LR) where Constraints (3), (4), (5), (8), (9), (10), (11), and (13) are relaxed:. A. Lagrangean Relaxation For a vector of Lagrangean multipliers, a Lagrangean relaxation problem of IP1 is given by optimization problem (LR1): 1 3 4 8 Z LR 1 (µ tja , µ 2ja m , µ tija , µ tja , µ t5 , µ 6ja m , µ ij7 , µ ija )= m m m m. min. ∑ ∑ ∆ C ( n ja j∈C a m ∈ A. +∑. ∑ ∑ µ tja1. j∈C am ∈A t∈T. +∑. m. +∑. (d (n. 3 ∑ ∑∑ µ tija. j∈C a m ∈A i∈F t∈T. m. m. )+. ∑ ∑ ∆ m c jm. ). ∑ ∑ µ tja4 ∑ xtja s − k tja. j∈C a m ∈A t∈T. m. ∑ ∆F. i∈ F. jam , g jam ) − btjam + ∑. p ∑ ∑ ( j 'a ' m j '∈C −{ j} a ' ∈A L tj ' m . m s∈S. +. j∈C m ∈ M. fi. . s −1. ∑ µ 2ja ∑ λt ∑ ( xtja s ∏ Btk ) − g ja m. j∈C am ∈A. t∈T. m. s∈S t. 1 p jam. ∑ y i ' j 'a ' θ (| i − i' |)) − γ ( 2 L. i '∈F. m. . − G jam )( y ijam + k tjam ) −. tj. 2G jam γ . 5 + ∑ ∑ µ 6jam ∑ y ijam − n jam µ K k + − ∑ ∑ ∑ t t tja m m j∈C a m ∈A t∈T i∈F j∈C am∈A. 8 y ijam − f i + ∑∑ µ ij7 ∑ yijam + y ( i +1) jam − 1 + ∑ ∑ ∑ µ ija m j∈C i∈F a m ∈A j∈C am∈A i∈F. (. k =1. m. ). (. ). (LR1). subject to: (1), (2), (6), (7), (12), (14), (15), (16), (17), (18), (19), (20), (21), (22), (23) and (24). 1 3 4 8 In this formulation, µ tja , µ 2ja m , µ tija , µ tja , µ t5 , µ 6ja m , µ ij7 , µ ija m m m m. are Lagrange multipliers and. 3 8 , µ t5 , µ ij7 , µ ija µ tija ≥ 0 are non-negative integers. To solve (LR1), we can decompose it into the following m. m. 10.
(12) four independent optimization sub-problems. Subproblem (SUB1): (related with decision variables Bts , btjam , and x tjam s ). Z SUB1 = min. . s −1. ∑ ∑ ∑ ∑ xtja s µ 2ja λt ∏ Btk + µ tja4 j∈C a m ∈A t∈T s∈St. m. m. k =1. m. − . ∑ ∑ ∑ µ tja1 j∈C a m ∈ A t∈T. m. btja m. (SUB1). subject to: (1), (2), (7), (19), and. ∑ xtja s ≤ 1 s∈S. m. B ts ≤ Bts ≤ B ts 0 ≤ btjam ≤ 1. ∀t ∈ T , j ∈ C , am ∈ A. (25). ∀t ∈ T , s ∈ S t , Bts ∈ K ts. (26). ∀t ∈ T , j ∈ C , a m ∈ A .. (27). Because multiplier µ 2jam is not required to be positive, this formulation is a signomial geometric programming problem, which is more complexity and difficult than polynomial programming one. For dealing with this problem more efficiency, we constrain decision variable Bts to a discrete limited set. K ts = {B ts , B ts + 0.01, B ts + 0.02, ..., B ts − 0.01, B ts } by introducing an additional Constraint (26) where notations B ts and B ts are a sensible lower bound and upper bound. According to experience, the upper bound B ts is determined by (1) a artificial threshold: limit the blocking probability to a sensible upper bound of blocking probability (i.e. 20%) or (2) a worst case value: calculate the worst-case blocking probability by duplicate all of traffic from all of users and route to all of candidate homes. The lower bound B ts can be determined by only routing the traffic of this MT to candidate home and than calculate the blocking probability. With loss generality, we introduce Constraint (25) that is implied from Constraints (8) and (20) to. 11.
(13) keep physical meaning of decision variable x tjam s . As the discrete property of x tjam s and Bts , we can exhaustively search for all possible values of x tjam s and Bts . For improving dual solution quality, we introduce an additional Constraint (27) to limit decision variable btjam in feasible region. Therefore, decision variable btjam can be determined by the following statements,. btjam. 1 1, if ∑ xtjam s = 0 and µtjam ≥ 0 s∈St 1 = 0, if ∑ xtjam s = 0 and µtja <0 m s ∈ S t Bts , if ∑ x tjam s = 1 s∈St . where the assignment purpose is to minimize the objective value under a given combinatorial situation of xtjam s and Bts . We can decompose this problem into |T| independent sub-problems. Each subproblem solves the following problem (SUB1t),. Z SUB 1 t = min. ∑ ∑ ∑ x tja j∈C a m ∈ A s∈ S t. s −1 2 4 µ λ B tk + µ tja − ∏ ja m t ms m k =1 . ∑ ∑ µ tja1 j∈C a m ∈ A. m. b tja m. subject to: (1), (2), (7), (19), (25), (26), and (27). We can solve each subproblem by the following steps. Step 1. Initial variable minValue=MAX_VALUE. Step 2. Select one feasible set of blocking probability values, which satisfy the feasible region defined by Constraints (1) and (26), and assign to temporary set tempSetB for each permutation. s ∈ S t = {1,2,..., K t }. .. Let. passedSector = {}. ,. and. remainingSector =. remainingSector = {all pairs of ( BSId , SectorId ) in the system} .. Step 3. Under a certain call blocking probability set, we arrange the homing decision variable tempX tjam s in ascending order of its coefficient Coef ( xtjam s ) by fixing permutation, where. 12.
(14) s −1. Coef ( x tja m s ) = µ 2ja m λ t ∏ tempB k =1. tk. 4 + µ tja . m. Step 4. For each permutation s ∈ S t = {1,2,..., K t } , we assign the smallest tempX tjam s to equal 1 if Sector ( j, a m ) belongs to set remainingSector . To satisfy Constraints (7) and (25), we remove this sector ( j, a m ) from set remainingSector and insert it into the other set passedSector .. Step 5. For each sector ( j, a m ) , we assign temp _ btjam to equal tempBts if Sector ( j, a m ) belongs 2 to set passedSector . We assign temp _ btjam to equal 1 if µ tja ≥ 0 and 0 otherwise. m. Step 6. Under. this. certain. tempSetB ,. calculate. ∑ ∑ ∑ tempX tja s × Coef ( xtja s ) − ∑ ∑ µ tja1 j∈C am∈A s∈St. m. m. j∈C am∈A. m. the. objective. value. by. tempMin =. temp _ btjam . If tempMin smaller than min-. Value, we assign xtjam s , btjam , Bts , and minValue to equal tempX tjam s , temp _ btjam , tempBts , and tempMin , respectively. Step 7. Go to Step 2 to exhaustively search other possible power set tempSetB .. Subproblem (SUB2): (related with decision variables g jam and n jam ). 1 Z SUB2 = min ∑ ∑ ∆C (n jam ) − µ 2jam g jam − µ 6jam n jam + ∑ µtja d (n jam , g jam ) m j∈C am∈A t∈T . (SUB2). subject to: (24) and 0 ≤ g jam ≤ g jam. ∀j ∈ C , a m ∈ A .. (28). We add a redundant Constraint (28) to improve dual solution quality. We decompose this problem into |C|×|A| independent sub-problems. Each subproblem solves the following problem (SUB2jam),. 13.
(15) 1 Z SUB2 jam = min∆C (n jam ) − µ 2jam g jam − µ 6jam n jam + ∑µtja d (n jam , g jam ) m t∈T. subject to: (24) and (28). Because decision variable n jam is a positive and limited integer, we can exhaustive search n jam. (. from zero to n jam . When give a certain value of n jam , the call blocking probability term d n jam , g jam. ). is. 1 ≥ 0 , problem Z SUB 2 jam becomes a convex a convex function of decision variable g jam . If multiple µ tja m. function. To minimize objective value, the optimal g jam can be found by using line search technique 1 (e.g. golden section method). Otherwise, if multiple µ tja < 0 , problem Z SUB 2 jam becomes a concave m. function and the optimal solution will occurs either g jam = 0 or g jam = g jam . The upper bound g jam. (. ). can be determined by function d n jam , g jam = b tjam where b tjam is an artificial probability threshold for MT t being blocked by its candidate home jam. Subproblem (SUB3): (related with decision variables c jm , k tjam , p jam , and y ijam ) Z SUB 3 = min. ∑ ∑ ∆ m c jm j∈C m ∈ M. −∑. ∑ ∑ k tja. j∈C am∈A t∈T. m. 4 p 3 µ tja + µ t5 + 1 ( jam − G ja ) ∑ µ tija m m m γ 2 Ltj i∈F . 3 3 µ tija G jam p jam µ tija p ja m m y − + m ∑ ∑ ijam ∑ γ Ltj 2γ Ltj j∈C am ∈A i∈F t∈T . +∑ +∑. ∑ ∑ yija. j∈C am ∈A i∈F. m. (µ. 6 jam. 8 + µ (7i −1) j + µ ij7 + µ ija m. . ∑ ∑ ∑ µ ti3' j 'a ' θ (| i '−i |) . j '∈C −{ j } a ' m∈A i '∈F. m. . ). (SUB3). subject to: (6), (14), (15), (16), (17), (18), (20), (23), and. ∑ yija. i∈F. m. ≤ n jam. µ 07 j = 0. 14. ∀j ∈ C , a m ∈ A. (29). ∀j ∈ C , a m ∈ A .. (30).
(16) Without loss generality, we add an additional constraint (29) to improve quality of solutions. To aggregate decision variable y ijam , we reformulate this subproblem by removing Constraint (22) and introducing an additional constraint (30). Constraints (16) and (17) ensure that there is only one kind of sectorization can be deployed for each BS. Furthermore, Constraints (14) and (15) enforce that only the sectors belong to selected configuration type can be assigned channels and transmission power. Therefore, we decompose this problem into |C| independent subproblems (SUB3j) and exhaustive search any kind of configuration c jm for each BS. After a temporary configuration tempC jm is determined, we can exhaustive search transmission power p jam from zero to p jam .. Under this certain configuration combined with c jm and p jam , the remaining decision variables are y ijam and k tjam . We can decompose the remaining problem into |A| subproblems (SUB3jam) as follows. 4 1 p jam 6 7 7 8 5 3 Z SUB 3 ja m = min − ∑ k tjam µ tja µ ( G ) µ + + − ∑ t jam tijam + ∑ y ijam µ jam + µ ( i −1) j + µ ij + µ ijam m γ 2 Ltj t∈T i∈F i∈F . (. 3 3 µ tija G jam p jam µ tija p ja m m + ∑ y ijam ∑ − + m γ Ltj 2γ Ltj i∈F t∈T . . ∑ ∑ ∑ µ ti3' j 'a ' θ (| i'−i |) . j '∈C −{ j } a 'm ∈A i '∈F. m. . ). (SUB3jam). subject to: (6), (14), (15), (18), (20), (29) and (30).. ( ). For simplicity purpose, we denote the coefficients of k tjam and y ijam as Coef k tjam. Coef ( y ijam ). respectively.. That. is. ( ). 1 p jam 4 5 3 Coef k tjam = µ tja + µ + ( − G jam ) ∑ µ tija t m m γ 2 Ltj i∈F. 15. and. and.
(17) 3 3 µ tija G jam p jam µ tija m m Coef ( y ijam ) = ∑ − + γ L 2 γ t∈T tj . . ∑ ∑ ∑ µ ti3' j 'a ' θ (| i'−i |) m. j '∈C −{ j } a ' m ∈A i '∈F. . + µ 6jam. + µ (7i−1) j. 8 + µ ij7 + µ ija . m. Therefore, we can arrange the contribution of each decision variable to minimize Subproblem (SUB3jam). We can solve this subproblem (SUB3jam) by the following steps. Step 1. Initial minValue=MAX_VALUE Step 2. For solving (SUB3), we select one type of sectorization configuration for each BS and assign the correspond variable tempC jm to equal one. Step 3. To solve (SUB3jam), we exhaust search any feasible transmission power level and assign to. ( j, a m ) .. temporary variable tempPjam for each Sector. Step 4. For homing purpose, we calculate Coef (k tjam ) for each Sector. ( j, a m ). and sort tempK tjam. in descending order of Coef (k tjam ) . Step 5. For minimizing objective value purpose, we assign. tempK tjam. to equal one if. Coef (k tjam ) ≥ 0 and Constraints (6) is feasible. Otherwise, we assign tempK tjam to become. zero.. (. Step 6. For channel assignment purpose, we calculate Coef y ijam. (. ). for each channel i and arrange. ). the channels in ascending order of Coef y ijam . Step 7. For minimizing objective value purpose, we assign tempYijam to one if Coef ( y ijam ) < 0 and. ∑ tempYija. i∈F. Step 8. Calculate. m. ≤ n jam . Otherwise, we assign tempYijam to zero. the. temporary. objective. 16. value. under. the. power. set. tempSetP. by.
(18) (. ). (. ). tempMin = ∑ tempYijam × Coef( yijam ) − ∑ tempK tjam × Coef(k tjam ) . If i∈F. t∈T. tempMin. smaller. than minValue, we assign c jm , k tjam , p jam , y ijam , and minValue to equal tempC jm , tempPjam , tempYijam , tempK tjam , and tempMin , respectively.. Step 9. If there is any possible power level has not been tried, go to Step 3 to exhaustively search other possible power tempPjam . Otherwise, go to Step 2 to try other configuration types.. Subproblem (SUB4): (related with decision variables f i ) Z SUB 4 = min. . ∑ f i ∆ F − ∑ ∑ µ ija8. i∈F. . j∈C a m ∈A. m. . (SUB4). subject to: (12), (21), and. F ≤ ∑ fi ≤ F .. (31). i∈F. According to experience, we intend to find the lower bound F and upper bound F of. ∑ fi. to. i∈F. improve efficiency and quality of both dual and primal solutions for this subproblem. Therefore, we enhance the effect of Constraint (12) by introducing additional Constraint (31). Upper bound F can be the smaller one between the capacity upper bound summation of every BS or the total available channels in the system. However, it is difficult to find tighter lower bound F in this subproblem. We develop a lemma for finding lower bound of required channels. We can solve this problem by the following algorithm. Step 1. Arrange the channels in ascending order of Coef ( f i ) = ∆ F − ∑. ∑ µ ija8. j∈C am ∈A. 17. m. ..
(19) ∑ fi ≤ F ,. Step 2. According to Constraint (31), if. i∈F. we assign f i to equal one. If F < ∑ f i ≤ F i∈F. and Coef ( f i ) ≤ 0 , we assign f i to equal one. Otherwise, we assign f i to equal zero.. B. The Dual Problem and the Subgradient Method According. to. the. weak. Lagrangean. duality. theorem. [GEOF. 1 3 4 8 3 8 , µ 2ja , µ tija , µ tja , µ t5 , µ 6ja , µ ij7 , µ ija µ tija ≥ 0 , Z D1 = max Z LR1 (µ tja , µ t5 , µ ij7 , µ ija m. m. m. m. m. m. m. m. ). 1974],. for. any. is a lower bound on Z IP1 .. The following dual problem (D1) is then constructed to calculate the tightest lower bound. Dual Problem (D1):. (. 1 3 4 8 Z D1 = max Z LR1 µ tja , µ 2jam , µ tija , µ tja , µ t5 , µ 6jam , µ ij7 , µ ija m m m m. ). subject to: 3 8 µ tija , µ t5 , µij7 , µ ija ≥0 m. m. In this dual problem, let a ( C × { A × [T × ( F + 2 ) + F + 2] + F }+ T )-tuple vector g be a subgradient 1 3 4 8 , µ 2ja m , µ tija , µ tja , µ t5 , µ 6ja m , µ ij7 , µ ija ) . In iteration k of the subgradient method of problem Z LR 1 (µ tja m m m m 1 3 4 8 , µ 2ja m , µ tija , µ tja , µ t5 , µ 6ja m , µ ij7 , µ ija ) is updated by π k +1 = [3], the multiplier vector π = (µ tja m m m m. π + t g . The step size t k. k. k. k. is determined by t = δ k. Z IPh 1 − Z D1 (π k ) g. k 2. , where Z IPh 1 is the primal objective. function value from a heuristic solution (an upper bound on Z IP1 ) and δ is a constant between zero and two.. 18.
(20) IV. CONCLUSION The proposed algorithm is the first attempt to consider the network design problem with whole factors jointly and formulate it rigorously. In this paper, we identify reliability issue of channelized wireless communications by introducing customized multiple-connectivity effect. The proposed algorithm not only designs a multiple-connectivity network but also guides to route MT among its candidate homes sequentially. Sequential routing mechanism can cooperate with fixed channel assignment to guide real-time admission control to improve GoS and maximize long-term revenues. Therefore, we integrate consider all of these problems together. By introducing generic interference and propagation model, we can adopt any kind of propagation prediction models or practical radio measurements to evaluate cell coverage and ensure communication QoS [9]. That is the other critical part for this system to assign channels more efficient and design a realistic wireless network, which is multiple-sectorization, power controllable, customized multiple-connectivity, and communication QoS/GoS assurance. We formulate a combinatorial optimization algorithm to deal with this problem by integrating long-term channel assignment and sequential routing mechanisms to ensure communication grade of service (GoS) and improve spectrum utilization. The objective function of this formulation is to minimize the total cost of network system subject to configuration, capacity, k-connectivity, sequential homing, QoS and GoS constraints. Because this problem is NP-complete, the solution approach we adopt is La-. 19.
(21) grangean relaxation. Due to the time variance and unstable properties of wireless communications, the proposed algorithm is helpful to design high-reliability wireless communication networks.. REFERENCES [1] M.L. Fisher, “The Lagrangian relaxation method for solving integer programming problems,” Management Science, vol. 27, pp. 1-18, 1981. [2] S. Golestaneh, H.M. Hafez, and S.A. Mahmoud, “The effect of adjacent channel interference on the capacity of FDMA cellular systems,” IEEE Transactions on Vehicular Technology, vol. 43, no. 4, 1994. [3] M. Held, P. Wolfe, and H. D. Crowder, “Validation of subgradient optimization”, Math. Programming, vol. 6, pp. 62-88, 1974. [4] C-H. Lin and F. Y-S. Lin, “Channel augmentation algorithm for wireless networks considering generic sectorization and channel interference,” Proc. IEEE MWCN, Brazil, 2001. [5] C-H. Lin and F. Y-S. Lin, “Admission Control Algorithm for wireless communication networks considering Adjustable Channel separation,” Proc. IEEE CCECE, Winnipeg, Canada, May 2002. [6] F. Y-S. Lin and C-T. Chen, “Admission control and routing algorithms for networks supporting the permanent virtual connection (PVC) service,” Proc. ISCOM, 1997. [7] P. Malm and T. Maseng, “Adjacent channel separation in mobile cellular systems,” Proc. IEEE VTC, vol. 2, 1997. [8] D. Saha, A. Mukherjee, and S. K. Dutta, “Design of computer communication networks under link reliability constraints,” Proc. Computer, Communication, Control and Power Engineering, TENCON '93, vol. 1, pp. 188-191, 1993. [9] S.R. Saunders, Antennas and Propagation for Wireless Communication systems, John Wiley & Sons, 1999.. 20.
(22)
數據
相關文件
To solve this problem, this study proposed a novel neural network model, Ecological Succession Neural Network (ESNN), which is inspired by the concept of ecological succession
The content of questionnaire contains five major categories provided by telecommunications industry, including fixed network communication service, mobile
The purpose of this thesis is to propose a model of routes design for the intra-network of fixed-route trucking carriers, named as the Mixed Hub-and-Spoke
This study will use BIM, Web-base, RFID, Wireless Network, ER Model, Database and Information Technology environment to develop “Electronic Building Construction
The purpose of this paper is to achieve the recognition of guide routes by the neural network, which integrates the approaches of color space conversion, image binary,
The main objective of this system is to design a virtual reality learning system for operation practice of total station instrument, and to make learning this skill easier.. Students
proposed a greedy algorithm to utilize the Divide-and-Conquer technique to obtain near optimal scheduling while attempting to minimize the size of total communication messages
This paper presents an integrated wireless network, rapid response to the three components of the Code (QRCode) and smart phones, build a low -cost "smart public bike