• 沒有找到結果。

Quasi-static channel assignment algorithms for wireless communications networks

N/A
N/A
Protected

Academic year: 2021

Share "Quasi-static channel assignment algorithms for wireless communications networks"

Copied!
4
0
0

加載中.... (立即查看全文)

全文

(1)

Quasi-static Channel Assignment Algorithms

for Wireless Communications Networks

Frank Yeong-Sung Lin

Department of Information Management National Taiwan University, Taipei, Taiwan, R.O.C.

T e l : +886-2-363-8423 Fax: +886-2-758-4773 Email: yslin@im.ntu.edu.tw

Abstract

Quasi-static channel assignment algorithms for wireless communications networks are proposed and examined in this paper. More specifically, for (i) a given number of available channels (ii) locations of the cells and co-channel interference relations among the cells and (iii) channel requirement of each cell, we attempt to find a feasible channel assignment policy on a quasi-static basis to satisfy the channel requirement for each cell without using the same channel for any adjacent cell pair to avoid co-channel interference. This satisfiability algorithm can also be applied with the concept of bisecting search to minimize the number of total channels required. This channel assignment problem can be considered as a multi-coloring problem. We specify an integer programming formulation of the problem, which leads to the development of an efficient and effective channel assignment heuristic. In the computational experiments, the proposed algorithm calculates optimal solutions for test networks with up to 100 cells in minutes of CPU time on a PC.

1. Introduction

One of the fundamental issues in wireless communications

is how to allocate the limited bandwidth available among various cell sites. This is referred to as the channel assignment (or allocation) problem. Although various dynamic channel assignment schemes [1,2,3,4,5] have been proposed (to increase the channel efficiency due to mobility and unbalanced traffic demands), the majority of current systems still employ static assignment schemes due to simplicity of implementation and ease of operation. In this paper, we consider quasi-static channel assignment algorithms. The term quasi-static refers to the fact that the algorithm can be used to re-assign channels on a periodic basis such as daily/hourly to take into account day-to-day/hour-to-hour variation of the traffic demands. In such a system, a set of nominal channels is assigned to each cell (perhaps daily/hourly based on expected traffic demands of the next day/hour), and the same set of channels is reused some “co-channel reuse distance” away. Once the channels are assigned, the operation of the system is the same as the static channel assignment system where an arriving call can only be served by the nominally assigned channels. If all the nominal channels are in use, new calls are blocked.

Most existing channel assignment methods are for hexagonal network structures [6,7,8,9,10,11,12,13], but real wireless communications networks may be far from such regular configurations. Another algorithm design

objective considered in this paper is therefore to develop a generic methodology for arbitrary network structures (co-channel interference relations among cells). However, the known optimal channel assignment strategies for regularly structured networks can be used to evaluate the solution quality of the algorithm proposed in this paper.

The channel assignment problem can be considered as a multi-coloring problem in a graph [ 141. This problem can also be described as an optimization problem with the objective function to minimize the total no. of colors used so that no two adjacent nodes (nodes with a direct link in between) have any same color. In this paper, we consider the latter problem description for the purpose of better evaluating the effectiveness of the proposed algorithm.

In general, the problem of finding an optimal channel assignment policy is NP-complete. As such, to take into a c c o u n t c o m p u t a t i o n t i m e constratints, instead of attempting to solve the problem optimally we would propose an efficient and effective heuristic algorithm to solve the problem, specially targeted for a quasi-static application. This algorithm design criteria, however, may not be met by a number of existing algorithms.

In this paper, we formulate the problem as an integer programming problem where the objective function is the minimization of the total number of channels required subject to co-channel interference constraints among the cells and the channel requirement constraints for individual cells (to have the call blocking probability of each cell no greater than a given performance objective). This formulation can be used for an integer programming package for optimally solving a small-scale problem and to facilitate the development of an efficient and effective heuristic algorithm for solving large-scale problems. In the proposed solution procedure, a cost function associated with the assignment of each channel i to a cell j with respect to another cell k is introduced. In each round of the solution procedure, an upper limit of the channels available is specified. The proposed algorithm then iteratively adjusts the cost functions, based upon which the channels are assigned. This process is repeated until either a feasible solution is found or a pre-specified number of iterations is exceeded. In the former case, the upper limit of the channels available is reduced, while in the latter case, the upper limit of the channels available is augmented. Then a new round is initiated until no improvement of the total number of channels required is possible.

In computational experiments, the proposed algorithm is tested on a no. of networks with the no. of cells ranging

(2)

from 5 to 100. For all the test cases where the optimal solutions are known, the proposed algorithm calculates such optimal solutions in minutes of CPU time on a PC. 2. Problem Formulation

Let L = {1,2,...,n} be the set of the cells in the wireless communications network. Let F = {1,2,...fi be the set of the available channels of the system. Let ci be the channel requirement of Cell j and let Ajk be the indicator function which is 1 if Cell j and Cell k shall not use the same channel (due to co-channel interference) and 0 otherwise.

Let XQ bc a decision variable which is 1 if Channel i is assigned to Cell i and 0 otherwise, and let yi also be a decision variable which is 1 if Channel i is assigned to any cell and 0 otherwise. Then the channel assignment problem for wireless communications networks can be formulated as the following integer programming problem.

2,

=llil&

i d

sl.lbjecttoI

(xv +x&l,,

I 1

Vii’,jEL, kd

(1)

v

EL

(2)

&F X@ = Oorl

Vi EF, j EL (3)

.xg 5 yi

Vi EF, j EL (4)

yi =

Oorl

Vi& (5)

The objective function is to minimize the total no. of channels required. Constratint (1) requires that Cell j and Cell k not use the same channel when the corresponding intrerference indicator function Ajk is 1. Constratint (2) requires that the total no. of channels assigned to each channel i be no less than its channel requirement cj Constraint (4) requires that when channel i is assigned to any Cell j then yi shall be 1. Constratints (3) and (5) are integer constratints for the channel assignment variables.

The above channel assignment problem is NP-complete, and therefore we do not expect to develop an efficient optimal algorithm for large-scale problems. Instead, an efficient heuristic algorithm is developed and presented in the following section.

3. Solution Procedure

In this section, algorithms for solving the channel assignment problem for wireless communications networks are presented. Two approaches based upon relaxation are first considered. These approaches also provide lower bounds on the optimal objective functions value of (IP). Then another primal algorithm is proposed.

Two relaxation approaches are possible to solve (IP). The first is linear programming relaxation where the integer constraints (3) and (5) are relaxed into 0 I xii I 1 and 0 I yi I 1, respectively. From an observation of the

435

linear relaxation of (IP), which is referred to as (IP’), the following lemma is established.

Lemma 1: The optimal objective function value of (IP’) is

maxj,L cj In addition, for multiple cells, in an optimal solution to (IP’), x0 andyi are either 0 or 0.5.

Two implications are drawn from Lemma 1. First, from the second part of Lemma 1, an algorithm based upon linear programming relaxation in conjunction with a rounding scheme may not be effective. Second, from the first part of Lemma 1, the lower bound calculated by linear programming relaxation is typically loose. This lower bound can at least be raised to the generalized maximum clique defined as the maximum cligue where the weight of each node, instead of 1, is changed to the corresponding number of channels required.

The second relaxation approach is Lagrangean relaxation. In applying this approach, a number of complicating constraints of (IP) are first identified. They are then multiplied by Lagrangean,multipliers and added to the objective function. This process is referred to as dualizing the complicating constraints. We choose to dualize Constraints (1) and (4), and construct the following Lagrangean relaxation problem (LR).

a(Y’)=~~+~~~[(‘~+~~-‘l

+~v#(x,-X)

jd isF

&*r% v75’EL

(9

isF

xy. =

Oal wEF,vEL (7)

J$ = oa.1 wi. (s)

(LR) can be decomposed into 2 independent and easily solvable subproblems where only the y decision variables are involved in the first subproblem and only the x decision variables are involved in the second subproblem.

According to the weak Lagrangean duality theorem, for any (u,v) 20, Zo(u,v) is a lower bound on ZIP. T h e following dual problem (D) is then constructed to calculate the tightest lower bound.

Z, = ;ax& Z&v>. ( D ) To solve Problem (D), the subgradient method is applied.

It can be shown that in this problem the best lower bound calculated by using Lagrangean relaxation is equal to that calculated by using linear relaxation. As discussed previously, the lower bounds are typically loose.

To obtain primal feasible solutions, it is possible to use solutions to the Lagrangean relaxation problems. More precisely, at each iteration of solving the dual problem, a Lagrangean relaxation problem is solved. If the x decision variables calculated satisfy the constraints in the primal problem, then a primal feasible solution is found.

(3)

Otherwise, modification on such infeasible primal solutions can be made to obtain primal feasible solutions.

From computational experiments the approach of Lagrangean relaxation is shown to be ineffective in calculating primal feasible solutions. However, the procedure to solve the second subproblem in each Lagrangean relaxation problem sheds light on the development of a primal algorithm, Algorithm A.

In Algorithm A, a cost function p(ij,k) associated with the assignment of each channel i to a cellj with respect to another cell k is introduced. In each round of the solution procedure, an upper limit of the channels available is specified. Algorithm A then iteratively adjusts the cost functions based upon which the channels are assigned. This process is repeated until either a feasible solution is found or a pre-specified number of iterations is exceeded. In the former case, the upper limit of the channels available is reduced, while in the latter case, the upper limit of the channels available is augmented. Then a new round is initiated until no improvement of the total number of channels required is possible.

A number of characteristics of Algorithm A are described below. First, when a violation of the co-channel interference constraint for Channel i and cell pair Q,k) is identified, p(ij,k) wherej > k is augmented. This is for the purpose to increase cost(i,j), the cost of assigning Channel i to Cell j, in the next iteration so that Channel i may b e deselected by Cell j. If both p(ij,k) and p(i,kj) are augmented, then Channel i may also be deselected by Cell

k, which would result in an undesired oscillation on the

channel assignment. This is why only p(ij,k) where j > k is augmented. However, also from the computational experiments, it is observed that the introduction of randomization of the cost augmentation, specially for large networks, would enhance the efficiency of the algorithm. More specifically, with a given probability, we also augment p(i,kj) besides p(ij,k). This has an effect of increasing the stability of the algorithm.

Second, the increment (step size) of p(ij,k) at each iteration when needed is another important algorithmic parameter. Two criteria are chosen. First, the sequence converges to 0. This is for fmer tuning of p(ij,k)‘s when the algorithm proceeds. Second, the series diverges. This is to avoid stall of the algorithm. A possible selection of the step sizes to satisfy the above two criteria is al(b + c x the iteration counter) where a, band c are constants.

Third, it is frequently observed that in the course of the execution of the proposed algorithm, only a small number of co-channel interference constraints are violated, referred to as the “degree of violation”, for a given set ofp(ij,k)‘s. In such a case, it is often more efficient to directly adjust the channel assignment of those cells involved in the constraint violation by explicit enumeration. In the computational experiments, we observe that it is efficient to invoke this explicit enumeration procedure for the degree of violation no greater than 8.

Algorithm A:

436

Step 1. Initialization.

l(a). Set the threshold of explicit enumeration, v, to a pre-specified value.

l(b). Set the maximum number of iterations performed, IV, to a pre-specified value. l(c). Set the randomization parameter, q, to a

pre-specified value.

l(d). Set the iteration counter, counter, to 1.

Step2.p(ij,k)=lViEF,jEL,kEL.

step 3. cost(ij) = ZkeL p(ij,k) x Ajk V i E F, j E L. xv = 0

V i E F,j E L.

Step 4. For each j in L, sort cost(ij)‘s in an increasing order. Choose the channel(s) associated with the first cj element(s) of the sorted list and set the corresponding xv to 1.

Step 5. Check the feasibility of the solution calculated in Step 4. If it is feasible, stop; otherwise, calculate the degree of violation.

Step 6. If the degree of violation I v, adjust the channel assignment of the involved cells using exhaustive search. If a feasible solution is found, stop. Step 7. Adjust cost(ij).

7(a). If (XV + Xjk) Ajk > 1, then p(ij,k) = p(ij,k) +

ll(counrert1) for j > k; otherwise, go to Step 8.

7(b). With probability specified by q, p(ij,k) =

p(ij,k) + ll(counter+l) forj < k.

Step

8. If

counter equals A4, stop; otherwise, counter =

counter + 1 and go to Step 3.

4.

Computional Experiments

In this section, computional experiments on Algorithm A are reported. In the experiments, v is set to 8, q is set ot 0.1 and M is set to 10000. Two sets of experiments are performed on a PC to test the efficiency and effectiveness of Algorithm A.

The fast set of experiments are perfrormed on a no. of irregular networks. The co-channel interference relations of the first test network are shown in Figure 1, and the channel requirement of each cell is shown in Table 1. From an observation of the test network, the generalized maximun clique is 19, which is the total no. of channels required for Cells B, E, F and I in Figure 1. This is clearly a lower bound on the totoal no. of channels required for the network. When the no. of available channels is specified to be 19, Algorithm A calculates a feasible solution in a few seconds. Another experimtnt is performed on the same network where the channel requirement of each cell is 1. When the no. of available channels is specified to be 4, which is the min. no. of channels required, Algorithm A calculates a feasible solution in less than one second.

The second irregular network has 12 nodes. The co-channel interference relations are shown in Figure 2. Consider the case where each cell requires c channel(s). Algorithm A calculates a feasible solution in a few seconds when 3xc channels are available for 1 I c < 10.

The third irregular network is shown in [ 151. It has 22 nodes and requires at least 18 channels to satisfy the

(4)

demand and the co-channel interference constraints. Algorithm A calculates a feasible solution in a few seconds when the no. of available channels is specified to be 18.

The next irregular network considered is shown in Figure 3. The channel requirement of each cell is shown in Table 2. It is observed that for such a network with unbalanced load, the following mechanism can enhance the efficiency and effectiveness of Algorithm A. This mechanism is to calculate a generalized maximum clique and fix the channel assignments for the corresponding cells. From an observation of the network, a lower bound on the total number of channels required for the network calculated by the generalized maximum clique is 165. This is the total number of channels required for Cells F, L and

M in Figure 4. When the number of available channels is

specified to be 165, Algorithm A calculates a feasible channel assignment in minutes.

The second set of experiments are performed on a number of nxn regular networks (of hexagonal structures) where n ranges from 4 (16 cells) to 10 (100 cells). If all cells require the same number of channels c, then it is clear that at least 3xc channels are required to satisfy the demand and the co-channel interference constraints. Algorithm A calculates a feasible solution for each test case in a few seconds when the minimum number of required channels are given.

References

[II

PI

[31

[41

PI

161

[71

S. Engel and M. M. Peritsky, “Statistically-optimum Dynamic Server Assignment in Systems with Interfering Servers,” IEEE Trans. on Veh. Technol., vol. VT-22, no. 4, Nov. 1973.

T. J. Kahwa and N. D. Georganas, “A Hybrid Channel Assignment Scheme in Large-scale, Cellular-structured Mobile Communication Systems,” IEEE Trans. on Commun., vol. COM-26, no. 4, Apr. 1978.

S. M. Elnoubi, R. Singh, and S. C. Gupta, “A New Frequency Channel Assignment Algorithm in High Capacity Mobile Communication Systems,” IEEE Trans. on Veh. Technol., vol. VT-31, no. 3, Aug.

1982.

M. Zhang and T. P. Yum, “Comparisons of Channel-assignment Strategies in Cellular Mobile Telephone Systems,” IEEE Trans. on Veh. Technol., vol. VT-38, no. 4, Nov. 1989.

J. C. Chuang and N. R. Sollenberger, “Performance of Autonomous Dynamic Channel Assignment and P o w e r C o n t r o l f o r TDMA/FDMA W i r e l e s s Access,” IEEE JSAC, vol. 12, no. 8, Oct. 1994.

Papavassiliou, L. Tassiulas, and P. Tandon, “Meeting QOS Requirements in a Cellular Network with Reuse Partitioning,” IEEE JSAC, vol. 12, pp.

1389-1400, 1994.

S. Kim and S. L. Kim, “A Two-Phase Algorithm for Frequency Assignment in Cellular Mobile Systems,” IEEE Trans. on Veh. Technol., vol. 43, pp. 542-548, 1994.

437

PI

PI

VOI

Pll

WI

El31

Cl41

[151

H. Jiang and S. S. Rappaport, “CBWL: A New Channel Assignment and Sharing Method for Cellular Communication Systems,” IEEE Trans. on Veh. Technol., vol. 43, pp. 3 13-321, 1994.

P. T. H. Chan, M. Palaniswami, and D. Ever&, “Neural Network-Based Dynamic Channel Assignment for Cellular Mobile Communication Systems,” IEEE Trans. on Veh. Technol., vol. 43, pp. 279-287, 1994.

L. J. Cimini, Jr., G. J. Foschini, C.-L. I, and Z. Miljanic, “Call Blocking Performance of Distributed Algorithms for Dynamic Channel Allocation in Microcells,” IEEE Trans. on Commun., vol. 42, pp. 2600-2607, 1994.

M. Zhang and T.-S. P. Yum, “Comparisons of Channel-Assignment Strategies in Cellular Mobile Telephone Systems,” IEEE Trans. on Veh. Technol., vol. 38, pp. 21 l-215, 1989.

W. Yue, “Analytical Methods to Calculate the P e r f o r m a n c e o f a Cellular Mobile Radio Communication System with Hybrid Channel Assignment,” IEEE Trans. on Veh. Technol., vol. 40, pp. 453-460, 1991.

R. J. McEliece and K. N. Sivarajan, “Performance Limits for Channelized Cellular Telephone Systems,” IEEE Trans. on, Information Theory, vol. 40, pp. 21-34, 1994.

W. K. Hale, “Frequency Assignment: Theory and Applications,” Proc. IEEE, vol. 68, pp. 1497-1514,

1980.

J. A. Silvester, “Perfect Scheduling in Multi-hop Broadcast Networks,” Proc. ICCC, Sep. 1982.

Cell A B C D E F G H I J

ci 1 2 5 4 8 4 6 5 3 4 3

Table 1 Channel demand for the test network in Figure 1

C e l l A B C D E F G H I J K L M N O P Q R S T U

Cj 10 13 8 31 15 36 57 81 8 15 18 5217728 13 15 8 25 8 8 8

Table 2 Channel demand for the test network in Figure 3

Figure 1 Interference relations of a lo-node network

Figure 2 network

數據

Table 2 Channel demand for the test network  in Figure 3

參考文獻

相關文件

 If I buy a call option from you, I am paying you a certain amount of money in return for the right to force you to sell me a share of the stock, if I want it, at the strike price,

In particular, we present a linear-time algorithm for the k-tuple total domination problem for graphs in which each block is a clique, a cycle or a complete bipartite graph,

Reading Task 6: Genre Structure and Language Features. • Now let’s look at how language features (e.g. sentence patterns) are connected to the structure

The aim of the competition is to offer students a platform to express creatively through writing poetry in English. It also provides schools with a channel to

3: Calculated ratio of dynamic structure factor S(k, ω) to static structure factor S(k) for &#34;-Ge at T = 1250K for several values of k, plotted as a function of ω, calculated

• Definition: A max tree is a tree in which the key v alue in each node is no smaller (larger) than the k ey values in its children (if any). • Definition: A max heap is a

A convenient way to implement a Boolean function with NAND gates is to obtain the simplified Boolean function in terms of Boolean operators and then convert the function to

• If we know how to generate a solution, we can solve the corresponding decision problem. – If you can find a satisfying truth assignment efficiently, then sat is