• 沒有找到結果。

Survivability and performance optimization of cellular DS-CDMA networks considering recovery decision of base stations

N/A
N/A
Protected

Academic year: 2021

Share "Survivability and performance optimization of cellular DS-CDMA networks considering recovery decision of base stations"

Copied!
6
0
0

加載中.... (立即查看全文)

全文

(1)

Proceedings of the 2004 IEEE

Taipci, Taiwan. March 21-23, 2004

International Conference on Networking. Sensing Control

Survivability and Performance Optimization of Cellular

DS-CDMA Networks Considering Recovery Decision of

Base Stations

Kuo-Chung Chu' and

Frank

Yeong-Sung Lint

Department

of

Information Management

National Taiwan University, Taipei,

Taiwan

'd5725003@im.ntu.edu.tw

tyslm@m.ntu.edu.tw

Abstract

-

In this paper, we analyze the network

survivabiliry in

CDMA

networks considering that base stations may fail. A survivable network is modeled as mathematical optimization problem. The objective is to minimize the total blocking traflc. We apply Lagrangean relaxation as a solution approach and analyze results on call blocking rate, service rate, as well as CPU time. Experiments illustrate that the recovery of base stations is a key factor to reducing call blocking rate for the smaller base station number and f o r the system in the heavy loading. Time consumed for increasing the base station number is mare significant than it for increasing the mobile user number.

Keywords: Base station recovery, Lagrangean relaxation, mathematical modeling, network survivability, performance evaluation, quality of service.

1

Introduction

Theoretically, CDMA provides no upper l i t of available channels, but its capacity is bound with quality of service (QoS) constraint. Chahers and Solman [l] identify three impacts of mobility on QoS, including link

type, movement, and mobile devices impacts. A typical infkstmcmre of cellular network consists of a number of components, including base stations ( B S ) , base station controllers (BSC), mobile switching centers (MSC), home location registers ( E R ) and visiting location registers

(VLR), signaling system 7 (SS7), public switched telephone networks (PSTN), high-capacity

trunks,

etc. In the entire system, the base station which directly communicates with mobile

users

is a critical

facility.

If

more base stations are deployed, there is a greater possibility of failure. A number of issues related to reliability and survivability of wireless and mobile networks are identified 121.

To

analyze the impact of inhsmcture component failures, a scalable approach to modeling and simulating the reliability and Survivability of wireless networks is presented [3]. Even though that

spare part is an alternative to tackle the problem of components failure, some natural disasters such as floods

and earthquakes as well as some human factors, may crash the base station. Thus, part of the users may he out of

service so that overall QoS will degrade. In terms of operation, if =me base stations can be properly recovered,

it enhances QoS and provides survivable service. Accordingly, base station recovery is one of the most important approaches to minimizing total system call

blocking rate.

To

the best of our howledge, intensive researches have been conducted on planning of cost minimization both for general wireless survivable networks (41, and for DS-CDMA networks [SI, but they focus on long-term planning problem. Actually, network monitoring/servicing to identify and to alleviate potential failures in state of system operation is more important. Although performance comparison of FH-CDMA and DS-CDMA for wireless survivable networks is discussed [6], relatively little work has been attempted to tackle the overallcall blocking problem in conjunction with recovery decision of base station. The remainder of this paper is organized as follows. In Section 2, a mathematical problem formulation of survivable networks is proposed. Section 3 presents a solution approach to the problem based on Lagrangean relaxation. Section 4 illustrates the computational experiments. Finally, Section 5 concludes

this paper.

2 Network

Survivability

and

2.1 Problem description

Performance Modeling

A basic approach to provisioning survivability and to reducing the impact of base station failures is recovery by redundant resources or mobile base stations. An alternative is overlaying architecture by adjusting transmission power of all availabldworkable base stations. Figure 1 illustrates an example which consists of four base stations (BSO-BS3) and eight mobile users (MO-M7). There are two mobile users covered by each base station. In Figure l(a), all base stations work normally (no failure) in power radius R. M 2 and MS is served by BSl and BS2,

respectively. Figure 1@) is a case of both BSI and BS2 failures. Thus, BSO and BS3 adjust power with R ' to serving M 2 and MS, respectively. However, if some of

failed base stations are to be recovered, it must be a complicated decisions. Figure l(c) and (d) is alternative to recovering one of failed base stations BS2 and BS3,

(2)

respectively. Also, power of available base stations BSO and BS3 is adjusted. Network survivability considering recovery decision of failed base stations, e.g. recovering N

of M failed base statons C(M,N), is a combinational optimization problem. A number of assumptions, including perfect power control, reverse link perfectly separated fbm the forward link, without considering fading and forward link, are given. In terms of call blocking analysis, some complicated scenarios lie new, re-homing, outbound, handover calls are not dealt with.

2.2 Performance indicators

About the performance issues of wireless conunnnications, Snow et al. [ 2 ] identify outage index taking into account both m a g n i t u d d e number of customers being influenced, and duratiow-the amount of time that service being impacted. Besides, the index focuses on two service components: registration blocking (I& when the customer is unable to initially register with the wireless network system; and call blocking (IcR). failures to call setup from registered customers. Based upon both

IRB

and ICB, the following induces two performance indicators to be analyzed in this research, say service rate and call blocking rate. The detailed description of the two performance indicators is as follows,

( 1 ) Service rate (RS): No matter what causes the base stations to fail, power adjustment of availabldworkable base stations (inkgating partial fixed base stations) is conducted. Some mobile users originally covered by the base stations are probably still out of service.

This

out-of- service results in registration blocking,

( 2 ) Call blocking rare (Rd: The call blocking

probability (PB) of mobile users is expressed by Erlang's

B formulaP, = B ( g , c ) , where g is aggregate traffic, c is available channel resources. Thus, call blocking rate is R, = g

.

P,

= g . B(g, c ) . Actually, in the survivable environmenf

PB

can be M e r decomposed into two cases, a) PB = B ( g , c ) , where g is aggregate flow of total users covered by workable base stations, and c is overall available channels; b)

P,

= B(g',c') = 1, where g' is aggregate flow of lost traffic (out of service), and c' is zero since the system does not allocate any channels.

2.3 Performance modeling

= (1- I=).

The network survivability is formulated as a following mathematical optimization problem

(IP)

that the objective is to minimize the total call blocking rate of overall system, wbicb is the sum of average blocking in the coverage and lost traffic (9'). Notations used to modeling the problem are listed in the Table 1. Even though the call blocking probability, B, of Erlang's B formula, is nondifferentiable with respect to e, and nonconvex with respect tog, but the

(C) (d)

Figure 1. An example of network survivability ; (a) normal case;

(b) BSl and BS2 failures with BSO and BS3 power adjushnent ; (c) BS2 recovery with BSO power adjustment ; (d) BS1 recovery

with BS3 power adjustment

call blocking rate, Le. g J . B,, is a convex function of g,

rather than B, alone [7].

5

= M i n x g,B,(g,,c,)+g'

(W

,sa. subject to:

s

c, 5 M , O S r s R , B , k , , c , ) s

P,

z,, = 0 or 1 f , = O o r l cJ E

z'

V j € B" V j e B"(1) V j e B " ( 2 ) Vjjs B",fjs T(3) V t € T(4) 'Vje B , f e T ( 5 ) Vjje B(6)

(7)

V j c B" ( 8 ) Vr, E U,, j € B"(9) V j c B"(10) V j E B " , f € T(11) V j E B(12) (13)

(3)

Constraint ( I ) ensures that each traffic demand is

served by a base station in the required QoS. Constraint (2) checks aggregate flow of each base station jeB". Constraint (3) requires that a mobile user must be in the

coverage of a base station before it is to be served by that base station. Constraint (4) is to guarantee that each mobile user can be homed to no more than one base station. Constraint ( 5 ) ensures that h , = l only if

4

63 si =1 in each of two cases, a) base station j is failed (s,=l) and to be fixed ~ = l ) ; b) base station j is good (s,=O) and no fix is needed ~ = O ) . Constraint (6) ensures that the decision variable of S i n g base stations is set to 1 only if s,=l.

Constraint (7) guarantees that total number of k e d base stations is less than predefined threshold U. Constraint (8) is to ensure that the number of users who can be active at the same time in a base station is no greater than upper bound

Mp

Constraint (9) is to ensure that transmission power radius of each base station j e B " is between 0 and Rp Constraint (10) requires that a base station serves its slave mobile users under pdefined threshold of call blocking probability. Constraints (11) and (12) are to enforce the binary property of the decision variables. Finally, constraint (13) denotes the integer property of decision variables for channel allocation.

3 Solution

Approach

3.1

Lagrangean relaxation

The approach to solving the problem

(IP)

is Lagmngean relaxation

[SI

[9], which includes the procedures that relax complicating com+~aints, multiply the relaxed constraints by corresponding Lagrangean multipliers, and add them to the primal objective function. Based on above procedures, we transform the primal optimization problem @) into the following Lagrangean relaxation problem

(LR)

where Constraints (l), (2), (3),

(5). (6) are relaxed. Furthermore, LR can be decomposed into three independent subproblems: 1) channel assignment, power control subproblem and capacity management subproblem; 2) admission control subproblem; 3) base station recovery subproblem.

I \ \

subject to: (4), (7)-(13),

Table 1. Description of notation

...

B

F

The set of base s t a t i m

The set of failed base stations. Fc B

Predefined &hold of total

fixed

base stations Thesetoffixed basestatom, F k F, I F + U Tbe set of available base stations, B kB-F

Thesetofworkablebasestations, B'=BCIF'

The amificial base station to carry the rejected d when decides to reject the call

Tbe set of mobile usm

Call blacking probability in base staton j , j E B

Upper bound on the number of usm that can active at the same time at base station j, j E B

Upper bound on the m - i o n p o w radius of base statan j, jt R

lhreshold of call blocking probability for each base station

i P R

,,,--

T h e number of users who can be active at the same time in

the base station j, js R

Transmission power radius of base station j, j € B

The set of hansmission radius of base station j A m g a t e flow at base shtion j, je E"

q

6

g,

The p " ~

ihat

a base Stanon received h m a mobile user that IS homed to the base smon wth perfect power control

Ihe energy that BS received

Asmallnumber

E6

Nmd Total nose

G Thepmcessmggnm NO The background nom

a vo~uactlv~tyfactor

7 Attenuationfaclor

1,

D,,

The M cr e q m e n t of mobile statlon r(m Erlang), I 1

D a m bchvcen bare &on land moblle user I

0, Distanccbetwgnbasestationjandj'

'I'

'''

Coverage indicator function which ir 1 ifmabile user ,can be served by base station jand 0 oth&,p B

Granting decision -able which is 1 if mobile w rI is serviced by base station J and 0 othawlse, p B

Initial indicator function of base station s, 4 which is 1 if base station is failure and 0 othawise

Decision vsnable of fixlns failed base station je R m not, which is 1 if broken base station is fixed and 0 otkrwix

Exclusive-or ofJand sj expressed by ( l - m l - s,)

A

s,

(I) channel assignment, power control, and capacity

management subproblem related to c,

,

r,

,

and g , I

(4)

E

- d g +"'((") ---(- ~ ,"'I d N o N,,,,

i , i

subject to: (8) (9) (IO) (13)

Problem (SUBI) can be decomposed into lB'1

subproblems since the value of

5

and e, is discrete and limited. To get an optimal solution, we just exhaustively search for all possible combinations ofc,

, 5

and g,

.

(2) admission control subproblem: related to z,,

subject to: (4) and (11).

In (SUBZ), tlie second term &&TIxAt is a constant, total aggregate traffic in the system, which can be dropped and added back to the optimal value. Then (SUBZ) can be decomposed into IB'Ixl TI independent subproblems for each I,, = (v;,D,, +(v: -l)A,) where j t B " and teT. To get the minimal value of problem (SUBZ), we assign either z,, = 1 for the minimal value of I,, , or zJ, = O otherwise.

(3) base sfafion recovery subproblem: related to f,

z

,

,

,

=

mince

(- (1 -

r,N

- s,) -

r,

. s,)

IST 1'"

subject to: (7), (12).

In(SUB3),thesecondtenn c ( ( c v : , - v i ) s , - c v : , )

is a constant that can be calculated easily. Then, let k, = C v : , ( l - Z s , ) + v : so . that

(SUB3)

can be decomposed into IBI independent subproblems for each

k,

. To get a minimal value of problem (SUB3), we assign

either f, = 1 for first

14

minimal value of k, (for constraint

(7))

at most, or f , = 0 otherwise.

,'a n T - 7

I F T

3.2 Lagrangean

dual

problem

and

subgradient method

According to the weak Lagrangean duality theorem [IO], for any (v:,v:,,v;,,v:)20 and v:

,

the objective value of Z,(v,,v,, v,,, v,,, vi) is a lower bound on Z,. Based on Problem (LR), the following dual problem @) is constructed to calculate the tightest lower bound.

1 1 1 4 1

Table 2. Given parameters

No(atlon Value YNo 7 db EboVtao, 6 db

4

1 20 T 4 G 15625 0. i n Z , = m a

z,(.I,,

(, <,,

v:,,

@)

subject to: (d,,

{,,

v:,, <) 2 0 and

4

.

Then, a suhbgadient method is applied to solving the dual problem. Let the vector S be a subgradient of

Z D ( ( , $ , < , , v ; , , $ ) at($,(,$,,v;,,<). In iteration k of subgradient optimization procedure, the multiplier vector

II is updated byz"' = n * + t ' S ' , in which 'f is a step s u e dete&ed by = 6 (Zip - Z,

(='))/I1

s'

112

,

where

z',

is an upper bound on the primal objective function value after iteration k, and 6 is a constant where0 S 6

<

2 .

3 3 Getting primal feasible solutions

This

research applies both Lagrangean relaxation and subgradient method to solving the problem of network survivability and performance modeling. The procedure is to get a better primal feasible solution in the process of iteratively solving dual problem. We develop

an

algorithm A to geaing primal feasible solutions, it needs to be checked if solutions satisfy all constraints relaxed before.

[Algorifhm A ]

Step 1.Check QoS constraint (1) for each base station j. Adjust the transmission power radius r j down if the QoS constraint is still violated, or go to Step 2 otherwise.

Step 2. Compute the aggregate traffic flow g, of each base station j based on the transmission power radius r j

determined in Step I .

Step 3.Check. the call blocking constraint B, (g, , c,) 5

P,

. Assign the available channel e, up to meet the call blocking requirements

4

if the call blocking constraint is still violated, or go to Step 4 otherwise.

Step 4. Adjust the transmission power radius r j to the extent for just far enough to cover all mobile users in each base station j.

Step 5. Calculate the whole blocking h;lffic in the system that is based upon the decision variables, including e , , 5 , g,

,

and z,, , solved in previous

steps. Step 6 . End algorithm.

(5)

4 Computational Experiments

4.1 Experimental

environment

Parameters are given in Table 2. Algorithm implementation and platform running on is coded in C and is PC with INTELm P4-1.6GHZ CPU, respectively. We evaluate the algorithm for 5 cases of base station number

(BS #) - 40,80, 120, 160,200, and 6 cases of mobile user number (MU #) - 500, 1000, 1500, 2000, 2500, 3000. Locations of BS as well as MU are generated in uniform distribution. The number of failed base stations

(14)

is given to onetenth of total base stations. BS recovery ratios (BSRR) are given to 0.00, 0.25, 0.50, 0.75. The limit of iterations for Lagrangean relaxation approach is 1000, and the improvement counter is 25. The parameter 6 adopted in the subgradient method is initialized to be 2 and halved when the dual objective function value does not improve for 25 iterations. Besides, predefined threshold of call blocking probability for each base station is given with

P,

=0.03.

4.2 Performance

analysis

The analysis focuses on Mu # =3000, depicted in Figure 2, and BS # =ZOO, depicted in Figure 3, comparing with a number of BS and MU, respectively. Experiments calculate with all near-optimal solutions in gap less than 0.001%. Experimental results include call blocking rate (upper bound of

Zm),

service rate, and CPU time.

( I ) Call blocking rate(RB): In case of MU # 3000,

RB

is insignificant difference among a number of BS, Figure 2(a). In case of BS # 200, Figure 3(a), it is a montonically increasing function of MU #. The number of MU significantly affects

b.

To analyze the impact of BSRR on RB, for each of increasing

RB

calculated is compared with normal case (no

BS

failure). In Figure 2@), the case of MU # 3000, increasing

Rs

is varied from 15% to 71% in case of BS # 40, while it is in the range from 10% to

44% in case of BS # 200. BSRR is a key factor lo reducing

Rs

f o r small number of BS. In Figure 3@), the case of BS # 200, the maximum of increasing RB is up to 27% in case of MU # 500, while the increasing is varied from Yh to

44%

in case of both MU # 1500 and MU # 3000. BSRR is the more important factor to reducing RB when the system is in the heavy loading.

(2) Service rate&): Obviously,

&

is a montonically increasing function of BSRR. However, it is insignificant impacts of BSRR on & in all cases of BS # and MU # in Figure 2(c) and Figure 3(c), respectively. No matter which case is calculated,

&

is in the range from 0.92 to 0.98.

(3) CPU time: Time consumed is to run Lagrangean relaxation procedure up to 1000 iterations. All experiments are converged in less than 1000 iterations. Since the survivability analysis focues on avaible base stations, the more

BSRR

is required, the more CPU is consumed. Also, it is a increasing function of MU # and BS #. In case of Mu # 3000, Figure 2(d), CPU consumed is from 8 to 16 seconds in the smallest BS # 40, while it

calculates with 209 to 556 seconds in the largest BS # 200.

In case of BS # 200, Figure 3(d), CPU consumed is from 57 to 117 seconds in the smallest MU # 500, while it calculates with 209 to 556 seconds in the largest MU #

3000. Time consumed is more significant when the number of BS is increasing than Mu is increasing.

5 Conclusions

This

paper investigates the survivability problem of DS-CDMA networks. Network survivability network is modeled as performance optimization problem, failures and recovery decisions of base stations are considered as well. Proposed model in conjunction with developed algorithm recovers some of the failed base stations to guarantee sustainable services as well as to assure quality of service. Experiments illustrate that the recovery of base stations is

a

key factor to reducing call blocking rate for the smaller number of BS as well as the system in the heavy loading. Time consumed is more significant when the number of BS is increasing than MU is increasing. Based on the proposed approach, we believe that a more flexible and comprehensive model can further be considered to decide where mobildptable base stations should be allocated in dynamic user requirements.

References

D. Chalmers and M. Sohnan, “A survey of quality of service in mobile computing environments,” BEE Communication3 Surveys, ZQuarter, 1999, pp. 2-10. A.P. Snow, U. Varshney, and A.D. Malloy, “Reliability and survivability of wireless and mobile networks,” IEEE Computer, vol. 33, Issue: 7, pp. 49 -55, July 2000.

N. Dimitriou, G. Sfikas, and R. Tafazolli, “Call admission policies for

m,”

in Proc. IEEE VTG vol. 2, pp. 1420-

1424,2000.

F. Y . 4 . Lin and C.-Y. LQ “Integrated planning and management of survivable wireless communications networks,” in Proc. APCC/OECC, vol. 1, pp. 541 -544,

1999.

KuoChung’Chu, Frank Yeong-Sung Lin, and Shih-Ha0 Lee, rntergrated planning and capacity management of

survivable DS-CDMA networks”, accepted for publication, IEEE ICNSC, Taipei, Taiwan, March 21-23,2004.

S. Chuprun, C.S. Bergstrom, “Comparison of FWCDMA and DSICDMA for Wireless survivable networks,” in Proc.

IEEE GLOBECOM vol. 3, pp.1823 -1827,1998.

K. R Krihm, ‘The convexity of loss rate in an E r h g

loss system and sojourn in an Erlang delay system with

respect to arrival and service rates,” IEEE Trans on

Communicotiom, 38-9, pp. 1314-1316, Sep. 1990.

A. M. Geoffrion, “Lagrang& relaxation and its use in integer programming”, Math Programming Study, vol. 2,

pp. 82-114, 1974.

M. L. Fisher, “The Lagrangian relaxation method for

solving integer programming problems”, Management

Science, vol. 27, pp.1-18, 1981. ..

[lo] H. Held, P. Wolfe and H. D. Crowder, “Validation of subgradient optimization”, Math. Programming, vol. 6, pp. 62-88. 1974.

(6)

6 NORMAL

+

BSRR=0.75 & BSRR=O.50

+

BSRR=0.25

+

BSRR=O.OO

I

(b) Increasing call blocking rate compared with normal case. (a) Call blocking rate with respective to BSRR.

+

BSRR=0.25

-+

BSRR=O.OO + BSRR=0.75 4 BSRR=0.50

*

BSRR=0.25

+

BSRR=O.OO 40 80 120 160 200 BS #

I

x u 40 80 120 160 200 -, BS #

-

(b) Increasing call blocking rate compared with normal case

-0-NORMA.L +BSRR=0.75 4 BSRR=0.50

t BSRR=0.25 + BSRR=O.OO

500 IO00 1500 2000 2500 3000 M u #

(a) Call blocking rate with respective to BSRR.

t BSRR=0.75 4 BSRR=0.50 t BSRR=0.25 + BSRR=O.OO 50 r

c z

:o 500 1000 I500 2000 2500 3000 2 u MlllY 4- NORMAL if- BSRR=0.25 -h- BSRR=O.OO t BSRR=0.75 4 BSRR=0.50

(c) Service rate with respective to BSRR. (c) Service rate with respective to BSRR

(d) CPU time consumed with respective to BSRR. Figure 2. Experiment results of MU=3000

compared with a number of BS

+NORMAL +BSRR=0.75 --ctBSRR=0.50 +BSRR=O.25 +BSRR=O.OO B

-

200 500 1000 1500 2000 2500 3000 M u #

(d) CPU time consumed with respective to BSRR. Figure 3. Experiment results of BS=200

數據

Figure  1.  An  example  of  network  survivability  ;  (a)  normal  case;
Table  1.  Description  of  notation
Figure  2. Experiment results of MU=3000  compared with a number  of  BS

參考文獻

相關文件

The Performance Evaluation for Horizontal, Vertical and Hybrid Schema in Database Systems.. -A Case Study of Wireless Broadband

Although much research has been devoted to the pedestrian walking speeds for various pedestrian characteristics and environmental characteristics, little information

This study aimed to establish the strength models of High-Performance Concrete (HPC) using Nonlinear Regression Analysis (NLRA), Back-Propagation Networks (BPN) and

Therefore the existing transportation system has not been considering the characteristics of female users.This is an original study trying to investigate the differences

This project integrates class storage, order batching and routing to do the best planning, and try to compare the performance of routing policy of the Particle Swarm

[2] Baba N., Inoue N., Asakawa H., Utilization of neural networks and GAs for constructing reliable decision support systems to deal stocks, IJCNN 2000 Proceedings of

Krishnamachari and V.K Prasanna, “Energy-latency tradeoffs for data gathering in wireless sensor networks,” Twenty-third Annual Joint Conference of the IEEE Computer

C., 2004b, The Market Microstructure and Relative Performance of Taiwan Stock Index Futures a Comparison of the Singapore Exchange and The Taiwan Futures Exchange, Journal of