A novel load balancing scheme for the tele-traffic hot spot problem in cellular networks

Size: px
Start display at page:

Download "A novel load balancing scheme for the tele-traffic hot spot problem in cellular networks"

Transcription

1 Wireless Networks A novel load balancing scheme for the tele-traffic hot spot problem in cellular networks Sajal K. Das Sanjoy K. Sen and Rajeev Jayaram Center for Research in Wireless Computing Department of Computer Sciences University of North Texas P.O. Box Denton TX USA We propose a dynamic load balancing scheme for the tele-traffic hot spot problem in cellular networks. A tele-traffic hot spot is a region of adjacent hot cells where the channel demand has exceeded a certain threshold. A hot spot is depicted as a stack of hexagonal Rings of cells and is classified as complete if all cells within it are hot. Otherwise it is termed incomplete. The rings containing all cold cells outside the hot spot are called Peripheral Rings. Our load balancing scheme migrates channels through a structured borrowing mechanism from the cold cells within the Rings or Peripheral Rings to the hot cells constituting the hot spot. A hot cell in Ring i can only borrow a certain fixed number of channels from adjacent cells in Ring i + 1. We first propose a load balancing algorithm for a complete hot spot which is then extended to the more general case of an incomplete hot spot. In the latter case by further classifying a cell as cold safe cold semi-safe or cold unsafe a demand graph is constructed which describes the channel demand of each cell within the hot spot or its Peripheral Rings from its adjacent cells in the next outer ring. The channel borrowing algorithm works on the demand graph in a bottom up fashion satisfying the demands of the cells in each subsequent inner ring until Ring 0 is reached. A Markov chain model is first developed for a cell within a hot spot the results of which are used to develop a similar model which captures the evolution of the entire hot spot region. Detailed simulation experiments are conducted to evaluate the performance of our load balancing scheme. Comparison with another well known load balancing strategy known as CBWL shows that under moderate and heavy tele-traffic conditions a performance improvement as high as 12% in terms of call blockade is acheived by our load balancing scheme. 1. Introduction In view of the remarkable growth of the mobile communication users and the still very limited radio frequency spectrum allocated to this service by the FCC Federal Communications Commission the efficient management and sharing of the spectrum among numerous users become an important issue. This limitation means that the frequency channels have to be reused as much as possible in order to support the many thousands of simultaneous calls that may arise in any typical mobile communication environment. Thus evolved the concept of cellular architecture [15] which is conceived as a collection of geometric areas called cells typically hexagonal-shaped each serviced by a base station BS located at its center. A number of cells or BS s are again linked to a mobile switching center MSC which acts as a gateway of the cellular network to the existing wire-line networks like PSTN ISDN any LAN-WAN based networks or even the Internet. A base station communicates with the mobile stations or users through wireless links and with the MSC s through wired links. The model of such a system is shown in figure 1. Since frequency channels are a scarce resource in cellular mobile networks many schemes have been proposed to assign frequencies to the cells with a goal to maximize the frequency reuse. These can be broadly classified as fixed This work is partially supported by a grant from Nortel Wireless Technology Richardson TX and Texas Advanced Research Program grant TARP Figure 1. System model of a cellular mobile architecture. [ ] dynamic [ ] and flexible [1823] assignment strategies. In a fixed assignment FA scheme a set of channels is permanently allocated to each cell which can be reused in another cell sufficiently distant such that the co-channel interference is tolerable. Such a pair of cells is called cochannel cells. In one type of FA scheme clusters of cells called compact patterns are formed by finding the shortest distance between two co-channel cells [15]. Each cell within a compact pattern is assigned a different set of frequencies. The advantage of an FA scheme is its simplicity but the disadvantage is that if the number of calls exceeds the number of channels assigned to a cell the excess calls are blocked. Variants of an FA scheme generally use channel borrowing techniques [81119] in which a channel is borrowed from one of the neighboring cells in case of J.C. Baltzer AG Science Publishers

2 326 S.K. Das et al. / Tele-traffic load balancing blocked calls provided that it does not interfere with the existing calls. In a dynamic assignment DA scheme there is a global pool of channels wherefrom channels are allocated on demand. A channel assignment cost function is computed and the channel with the minimum cost is assigned. For example a channel can be selected for allocation from the global pool if it allows the minimum number of cells in which that channel will be locked. Flexible or hybrid channel assignment schemes combine the concepts of both fixed and dynamic schemes whereby there is a fixed set of channels for each cell but channels are also allocated from a global pool in case of shortage. While the motivation behind all of the preceding channel assignment strategies is the better utilization of the available frequency spectrum with the consequent reduction of the call blocking probability in each cell relatively few of them [371113] deal with the problem of non-uniformity of teletraffic demand in different cells which may lead to a gross imbalance in the system performance. An example might be the downtown area of a city consisting of a cluster of adjacent cells where the tele-traffic load can be very high for most part of the day. It is desirable that the system should be able to cope up with such traffic overloads in certain cells. We will designate those cells as hot where the tele-traffic demand exceeds a certain threshold value. A region consisting of multiple adjacent hot cells will be called a hot spot. A cell which is not hot will be denoted as cold. Fixed assignment schemes by themselves are unable to handle the hot spot problem [11] as the number of channels assigned to each cell cannot be changed although they usually perform better under heavy traffic conditions than dynamic schemes. On the other hand dynamic assignment schemes are expected to cope better with tele-traffic overloads to a certain extent but on high demands the computational overheads deceive the purpose of the scheme. Flexible schemes will face the same problem as they are basically reduced to dynamic schemes on high channel demand presumably after the fixed channel sets get exhausted Our contribution In this paper we propose a dynamic load balancing scheme employing channel borrowing technique to cope up with the problem of tele-traffic overloads in hot spots. We denote a particular cell within a hot spot as the center cell. Then the hot spot can be conceived as a stack of hexagonal Rings around the center cell such that each Ring consists of at least one hot cell among other classes of cells like cold safe cold unsafe and cold semi-safe. A hot spot with only hot cells is called complete otherwise it is incomplete. In our load balancing approach a hot cell in Ring i borrows channels from its adjacent cells in Ring i+1 to ease out its high channel demand. This structured lending mechanism decreases excessive co-channel interference and borrowing conflicts which are prevented through channel locking in other schemes. Also the number of channels to be borrowed by each cell will be predetermined by its class and its position in the hot spot. With the help of a simple and efficient construction of a demand graph unused channels are migrated from the cold cells within or in the periphery of the hot spot to the hot cells constituting the hot spot. Assuming a fixed channel assignment scheme is available to start with we have proposed a channel migration scheme through borrowing between cells of adjacent rings such that all the hot cells are provided with the required number of channels to cope up with their tele-traffic overloads. A discrete Markov model for a cell in our system incorporating load balancing is also proposed and another similar model is developed to capture the evolution of a hot spot region. Extensive simulation experiments are carried out to evaluate the performance of our scheme. A comparison with the CBWL scheme reveals that under moderate and severe tele-traffic demand the total number of blocked calls is reduced by as much as 12% in our scheme. A preliminary version of this paper appeared in [4]. The rest of the paper is organized as follows. Section 2 describes previous work related to load balancing in the context of the channel assignment problem. Section 3 classifies the cells and regions. The proposed channel borrowing algorithms for complete and incomplete hot spots are described in sections 4 and 5 respectively. Detailed performance analysis for a complete hot spot is laid down in section 6 where discrete Markov models for a cell and a hot spot are also developed. Section 7 gives the simulation results and Section 8 concludes the paper. 2. Channel assignment schemes with load balancing In this section we outline three methods [31113] proposed in the literature to include load balancing as one of the major criteria in the channel assignment strategy Directed retry The directed retry scheme due to Eklundh [7] assumes that the neighboring cells overlap and some of the users in the overlapping region are able to hear transmitters from the neighboring cells almost as well as in their own cell. If there is a channel request from a user and there is no free channel then the subscriber is requested to check for the signal strength of the transmitters in the neighboring cells. If a channel from a neighboring cell with adequate signal strength is found the call is set up using that channel. Otherwise the call attempt fails. To improve this scheme Karlsson and Eklundh [13] proposed to incorporate load sharing by treating subscribers differently based on whether they are able to hear more than one transmitter. Whenever the base station finds more than a certain number of voice channels occupied it requests the users to check for the quality of the channels in the neighboring cells. If some of the users report that they are able

3 S.K. Das et al. / Tele-traffic load balancing 327 to receive transmission from neighboring cells adequately well a search for free channels begins in those cells and an attempt is made to move as many subscribers to those cells as possible. There is no concept of borrowing channels from neighboring cells but subscribers are simply moved from one cell to another by the process of hand-off. Ifno subscriber finds an adequate channel to setup or switch a call to the base station tries to find a free channel in the original cell or let the call proceed as usual. Although this load sharing scheme increases the number of potential channels to a certain extent the main disadvantages are the increased number of hand-offs and the co-channel interference. Also since a user has to be in the bordering regions of neighboring cells in order to be a potential candidate for a hand-off it puts a severe constraint on the efficacy of the algorithm to share load. The bordering region of two cells can be very small which reduces the probability that a sufficient number of users can be found in those regions to carry the load over to the neighboring cells in case of a drastic increase of the channel demand in a cell as might happen in the so called hot cells defined in section Channel Borrowing Without Locking CBWL In the CBWL scheme Jiang and Rappaport [11] proposed to use channel borrowing when the set of channels in a cell gets exhausted but to use them under reduced transmission power. This is done to avoid interference with the other co-channel cells of the lending cell using the same frequency. Channels can be borrowed only from adjacent cells in an orderly fashion. The set of channels in a particular cell is divided into seven groups. One group is exclusively for the users in that cell while each of the six other groups caters for channel requests from one of the neighboring cells. If the number of channels in a channel-group is exhausted a subscriber using one of the channels can be switched to an idle channel in another group thereby freeing up one in the occupied group. Since borrowed channels are transmitted at low power not all users within range are capable of receiving them. If such a user finds all the channels occupied an ordinary user occupying a regular channel can handover its channel to the former while itself switching over to a borrowed channel if available. This particular variant involving reassignment is called CBWL-R. The CBWL scheme has some advantages over the fixed and flexible assignment schemes since channel utilization is increased without locking. But one serious drawback of the reduced power transmission strategy is that not all users are in the right zone all the time for borrowing channels if the need arises. Also since only a fraction of the channels in all the neighboring cells is available for borrowing this coupled with the previous drawback can seriously degrade the system performance in case of high tele-traffic demand. For example if there is a hot spot where a hot cell is surrounded by six other hot cells whose channel sets are exhausted then the CBWL scheme performs very poorly for the hot cell in the center because no channel will be available for borrowing. The limitation on the number of channels available for borrowing places severe restriction on the system performance if some of the neighboring cells are hot Load Balancing with Selective Borrowing LBSB The problems mentioned in the directed retry with load balancing or the CBWL scheme are magnified when the channel demand is very high as in a hot cell. The LBSB scheme recently proposed by Das et al. [3] attempts to alleviate these problems by selectively borrowing channels by a cell before the available channel set is exhausted. A cell is classified as hot if its degree of coldness defined as the ratio of the number of available channels to the total number of channels allocated to that cell is less than or equal to some chosen threshold value. Otherwise the cell is cold. The LBSB scheme proposes to migrate a fixed number of channels from certain cold cells to a hot one according to a channel borrowing algorithm which can be implemented either as a centralized scheme [3] or a distributed scheme [5]. A channel assignment strategy is used in each cell by classifying the users into three broad types new departing and others and forming different priority classes of channel demands from these three types of users. Local and borrowed channels are assigned according to the priority classes. The main disadvantage of the directed retry scheme is that it makes load balancing a function of the number of users in the overlap region between two cells. If the number of such users is low proper load balancing is not achieved. However the LBSB approach achieves almost perfect load balancing in the sense that not only the overloaded cells get the neccessary number of channels but also the increase in load in the form of decreasing number of channels is shared evenly by multiple underloaded cells. The CBWL scheme on the other hand performs poorly for hot spots whereas LBSB performs equally well for all types of hot cell distribution. The disadvantage of LBSB is its computation-intensive nature as it performs user classification in a cell and computes the optimal lender cell at every stage of the load balancing algorithm. Our objective in this paper is to propose a new load balancing scheme based on structured channel borrowing mechanism between cells of adjacent rings which is not as computation-intensive as in [3] yet achieves almost perfect load balancing and eliminates the drawbacks of both the directed retry and the CBWL schemes i.e. performs equally well under all types of traffic conditions and load distribution in the cells within a given region. 3. Classification of cells and regions The high level architecture of our load balancing scheme is as in figure 1. To recall a given geographical area con-

4 328 S.K. Das et al. / Tele-traffic load balancing sists of a number of hexagonal cells each served by a base station communicating with the mobile users via wireless links. A group of base stations are served by a mobile switching center. The MSC s are connected through fixed wire-line networks and also act as gateways between the wire-line and wireless networks. Assuming that each cell is allocated a fixed set of C channels let us now classify the cells and regions as follows. Broadly a cell can be classified as either hot or cold. A cold cell can again be classified as cold safe cold semisafe or cold unsafe as defined in section Definition of a hot cell A cell is classified as hot or cold according to its degree of coldness defined as number of available channels d c = total number of channels number of available channels =. C If d c h whereh>0 is a fixed threshold parameter that particular cell is hot otherwise it is cold. Typical values of h are etc. and determined by the average call arrival and termination rates and also by the channel borrowing rates from other cells. The usefulness of the parameter h is to keep a subset of channels available so that even when a cell reaches the hot state an originating call need not be blocked. When a cell reaches a hot state it merely serves as a warning that the available resource i.e. the channel set in that cell has reached a critical point and migration of resources is neccessary to mitigate the pressure arising due to a sudden traffic explosion. With this distinction between hot and cold cells let us now define a hot spot region Definition of a hot spot Two cells are said to be adjacent if they have a common edge. A set S of hot cells marked as H is said to form a hot spot if any cell in S is adjacent to at least another cell in S. Figure 2 shows an example of a hot spot in a cellular network. Let us introduce the concept of a Ring. We first select a center cell for the hot spot. A preferable way to make the selection might be to compute the diameter δ of the hot spot which can be defined as the maximum cell distance between any pair of cells in the hot spot. The cell lying at a distance of δ/2 from either end of the two farthest cells yielding the diameter is selected as the center cell. Now consider the center cell and the hexagonal rings of cells around it. If the center cell itself is hot we call it Ring 0. Otherwise the ring of cells nearest to the center cell containing at least one hot cell is denoted as Ring 0. We define Ring i i>0 as the ring of cells containing at least one hot cell at a cell distance i from Ring 0 and further away from the center cell. Note that if a hot spot consists of n Rings then all the Rings have to be contiguous by definition. In the example of figure 2 there are four Rings numbered as and 3 consisting of and 4 hot cells respectively. The first ring of cells outside the hot spot containing all cold cells is called the First Peripheral Ring the next such ring is called the Second Peripheral Ring and so on. So we distinguish between two types of hexagonal structures one type called Rings containing at least one hot cell and the other type called Peripheral Rings containing no hot cell at all. While referring to both of them we use the generic term ring. Henceforth the center cell will be called ring 0 and a Ring or a Peripheral Ring at a cell distance i from the center will be called ring i. If ν i denotes the number of cells in ring i then for the hexagonal geometry { 1 i = 0 ν i = 6i i>0. Let H n denote a hot spot whose outermost Ring is ring n. Then H 0 is equivalent to a single hot cell. The total number of cells in H n is given by n N n = ν i + 1 = 3nn i=0 A hot spot H n is said to be complete if it contains N n hot cells. Otherwise it is defined as incomplete. Clearly for a complete hot spot Ring 0 always happens to be the center cell. Also the number of cells in the First Peripheral Ring of a complete hot spot H n is ν n+1 = 6n A new load balancing scheme The underlying idea behind our load balancing strategy is the migration of channels between cells through channel borrowing mechanism in order to satisfy the channel demand of overloaded hot cells. Channel migration takes place between a borrower and a lender cell. Unlike the LBSB scheme [3] the borrower hot cell does not have the opportunity to select its lender from among all the cold cells in its compact pattern. A hot cell in Ring i ofacomplete hot spot can borrow channels only from its adjacent cells in Ring i + 1 or the First Peripheral Ring if Ring i isthe outermost Ring of the hot spot. This structured borrowing mechanism reduces the amount of co-channel interference between the borrower cell and the co-channel cells of the lender using the borrowed channel. Thus the number of cells is at most two in which the borrowed channel needs to be locked. Also a certain number X of channels is needed by each hot cell to relieve the excess traffic demand. The estimation of X is detailed in section 4.2 and is similar to the method used in our LBSB scheme. A hot cell in Ring i should borrow sufficient number of channels so that not only can it satisfy its own demand X but also cater for the channel demand from adjacent

5 S.K. Das et al. / Tele-traffic load balancing 329 Figure 2. A hot spot region shown as a collection of hexagonal rings. hot cells in Ring i 1. Note that only local channels of a cell are lended on demand to adjacent cells in the next inner ring. After borrowing channels from adjacent cells a ring i cell reassigns the borrowed channels by intra-cellular handoff to some of the users to release sufficient number of local channels to meet the demand of ring i 1 cells. In this way each Ring of cells caters for the channel demand of overloaded cells in the next inner Ring as well as within itself borrowing channels from the immediate outer Ring. The hot cells in the last Ring of the hot spot borrow channels from the cold cells in the First Peripheral Ring Assumptions The base station transmitter of each cell has the capability of transmitting any of the frequencies of the available spectrum. A channel borrow implies locking the same in the lender cell transmitter and unlocking it in the borrower cell transmitter. Due to the structured borrowing mechanism used in our load balancing scheme the borrowed channel needs to be locked in at most two cells. This will not significantly affect the system performance even under heavy load. All cells in the First Peripheral Ring are able to provide the required number of channels to the hot spot without exhausting their channel set or becoming hot themselves. If this is not true channels are borrowed from multiple Peripheral Rings and the algorithm adopted is the same as in the more general case of an incomplete hot spot see section 5. For the general case of an incomplete hot spot having cold cells along with hot ones a cold cell is further classified as cold safe cold unsafe and cold semi-safe. Cold unsafe cold semi-safe or hot cells in ring i need to borrow channels from adjacent cells in ring i + 1 the number of channels borrowed being different for different classes. A cold safe cell does not need to borrow any channel. A demand graph is constructed describing the number of channels required by the cells in a ring from their neighbors in the next outer ring. It can be shown that the channel borrowing algorithm for a complete hot spot described next is equivalent to the demand graph approach presented in section Number of channels retained by a hot cell Let us define a parameter d avg c called the average degree of coldness of a cell which is computed as the arithmetic mean of the d c s of all the cells over a certain period of time. In general d avg c is the degree of coldness which every hot cell tries to achieve through channel migration from cold cells. Therefore we can estimate the number X of channels a particular hot cell needs to retain assuming that the number of available channels in that cell is h C. Since retention of X channels by a hot cell leads to an increase in the number of its available channels by the same margin we get yielding d avg c = h C + X C X = davg C c h Channel borrowing for a complete hot spot Starting from the center cell all the cells along any of the six emanating chains of hexagons will be called corner cells. Each ring except ring 0 will then contain exactly six corner cells. The cells between two corner cells in a ring are called non-corner cells. For example ring 1 contains

6 330 S.K. Das et al. / Tele-traffic load balancing Figure 4. Channel lending in the complete hot spot H 4. Arrows indicate migration of channels from lender to borrower cells. Figure 3. Way to fix the coordinates of a cell within a hot spot. no non-corner cells ring 2 contains 6 ring 3 contains 12 andsoon. Every ring is a repetitive pattern of a corner cell and a fixed number of non-corner cells constituting what will be called a cell array. Ring 1 is composed of six such arrays where each array consists of only a single corner cell. Ring 2 is again composed of six arrays each array consisting of a corner and a non-corner cell. In general ring i is composed of six cell arrays each of which consists of a single corner cell and i 1 non-corner cells. Our load balancing scheme for a complete hot spot does not differentiate between corner or non-corner cells of different cell arrays within a ring. However for the more general case of an incomplete hot spot we will use a different convention of addressing the cells which will be described later. Referring to figure 3 all the corner cells in a particular ring i of a complete hot spot will have the same coordinate i 0. Moving in the anti-clockwise direction along ring i from one corner cell to the next the coordinate of the jth non-corner cell in a cell array will be i j. The coordinates repeat for the other cell arrays. Hence in a complete hot spot H n the coordinate of any cell except the center is given by i j where 1 i n and 0 j i 1. The coordinate 0 0 is assigned to the center cell. A cell with coordinate i j will be denoted by C ij Enumeration of channel borrow demand Consider a complete hot spot H n which is hexagonal region of cells containing n+1 Rings but containing no cold cell in any of the Rings within it. Figure 4 shows a complete H 4. The total channel demand of all the cells from Ring 0 to Ring i for 0 i n ofh n is {3ii }X which according to our channel borrowing protocol must be provided by the 6i + 1 cells in ring i + 1. If each cell in ring i + 1 can lend l i+1 channels to adjacent hot cells in ring i then {3ii }X l i+1 =. 3 6i + 1 Let us now derive the expressions for channel demand i.e. the number of channels to be borrowed by a cell in Ring i of a complete hot spot from its adjacent cells in ring i + 1. For this purpose let us consider the example of figure 4 and trace the channel bargain lending-borrowing between the cells starting from Ring 0 to Ring 3 and the First Peripheral Ring. Putting i = 0 in equation 3 we obtain l 1 = 1 6X implying that each of the six cells in Ring 1 lends 1 6X channels to the center cell thereby satisfying its demand of X channels. Since each of the Ring 1 cells require X channels themselves therefore it will borrow 1 6 X + X = 7 6X channels from adjacent cells in Ring 2. We make use of the following two facts. Fact 1. Any corner respectively non-corner cell in ring i has three respectively two adjacent cells in ring i + 1. Fact 2. Any corner respectively non-corner cell in ring i can lend channels to its only one respectively two adjacent corner cell in ring i 1. Since all the cells in Ring 1 are corner cells each of them can borrow channels from three adjacent cells in Ring 2. Putting i = 1 in equation 3 we obtain l 2 = 7 12X. Each cell in Ring 2 can lend 7 12X channels to adjacent cells in Ring 1. A borrower cell C 10 in Ring 1 requires 7 6 X channels and it has three adjacent lenders in Ring 2 one corner cell C 20 and two non-corner cells one belonging to the same cell array as C 20 and another to an adjacent

7 S.K. Das et al. / Tele-traffic load balancing array. Cell C 20 lends all it can i.e. 12X channels to the only borrower cell C 10 while the remaining channel demand 7 6 X 7 12 X = 7 12 X of C 10 is satisfied by equal contributions from the other two non-corner lender cells. Since all the cells in Ring 1 are corner cells the same distribution is applicable to all of them. We propose the following convention of channel borrowing for the corner cells in every Ring. Proposition 1. A cell C i0 will borrow the whole amount offered by its adjacent corner cell C i+10 in ring i + 1and the remaining channel demand will be satisfied by equal contributions from its two other adjacent non-corner cells in ring i + 1. Now each of the Ring 2 cells requires X channels themselves and hence will borrow 7 12 X + X = X channels from adjacent cells in Ring 3. Let us find out what each cell in Ring 3 has to offer. Putting i = 2 in equation 3 we obtain l 3 = 19 18X. Proceeding similarly to the case for i = 1 a corner cell C 20 in Ring 2 will borrow l 3 channels from its adjacent corner cell C 30 in Ring 3 and 1 4 l 3 channels each from its two adjacent non-corner cells in the same ring one of which is C 31 and belongs to the same cell array as C 30. Note that C 31 has another adjacent cell C 21 in Ring 2. It lends its remaining 3 4 l 3 borrowable channels to C 21 which in turn requires another 3 4 l 3 channels to fulfil its demand of X = 3 2 l 3 channels and thus borrows from its other adjacent cell C 32 in Ring 3. Next Ring 3 has one corner and two non-corner cells. This is the last Ring of our hot spot and its cells borrow channels from the adjacent cold cells of the First Peripheral Ring. Equation 3 still applies to each cell in the First Peripheral Ring giving l 4 = 37 24X. Proceeding as above it can be shown that a corner cell C 30 in Ring 3 borrows l 4 channels from a corner cell in the First Peripheral Ring and 1 6 l 4 channels from two adjacent non-corner cells in the same ring. The non-corner cell C 31 borrows 5 6 l 4 and 3 6 l 4 channels from the adjacent cells C 41 and C 42 respectively in the First Peripheral Ring. The other non-corner cell C 32 borrows 3 6 l 4 and 5 6 l 4 channels from the adjacent cells C 42 and C 43 respectively in the First Peripheral Ring. Now it is easy to derive the generalized expressions for the number of channels borrowed by a hot cell in Ring i from adjacent cells in Ring i + 1. Recall that {3ii }X l i+1 = 6i + 1 is the number of channels that each cell in Ring i + 1 can lend to the adjacent cells in Ring i. The following lemma holds for a complete hot spot. Lemma 1. a A corner cell C i0 in ring i will borrow l i+1 channels from its adjacent corner cell C i+10 and l i+1 /2i channels from each of its two adjacent non-corner cells in ring i + 1. b A non-corner cell C ij in ring i will borrow 1 2j 1 2j + 1 l i+1 and l i+1 2i 2i channels from its adjacent non-corner cells C i+1j and C i+1j+1 respectively. From the viewpoint of a lender cell the generalized expressions for the number of channels lended is as follows: Lemma 2. a A corner cell C i0 in ring i will lend all of its l i lendable channels to its adjacent corner cell C i 10 in ring i 1. b A non-corner cell C ij will lend 2j 1 2i 1 l i and 1 2j 1 l i 2i 1 channels to the adjacent cells C i 1j 1 and C i 1j in ring i 1. The channel borrowing algorithm is straightforward for a complete hot spot H n. Each cold cell in the First Peripheral Ring lends l n+1 channels to adjacent cells in Ring n each of which in turn retains X channels and lends l n channels to adjacent cells in Ring n 1 and so on until Ring 0 is reached. When the channel borrowing algorithm terminates the number of available channels in all the cells within the hot spot will be increased exactly by X. If all cells in the First Peripheral Ring are not capable of lending the required l n+1 channels then channels are borrowed from the other Peripheral Rings using the method described in the next section. 5. Channel borrowing for an incomplete hot spot In this section we propose to further classify a cold cell into three subclasses which will lead to a general channel borrowing algorithm for cells in an incomplete hot spot. Since a complete hot spot is a special case of an incomplete hot spot where all the cells are hot any channel borrowing algorithm for an incomplete hot spot can be used for the complete hot spot as well as for Peripheral Rings. Fixing any one of the six emanating chains of corner cells as the reference chain the coordinate of such a corner cell is i 0 if it belongs to ring i. Moving in the anti-clockwise direction along ring i from the corner cell C i0 the coordinate of the jth cell will be i j. Here we distinguish between the cell arrays since the same set of coordinates cannot be assigned to cells within different cell arrays.

8 332 S.K. Das et al. / Tele-traffic load balancing Table 1 Cell classification in incomplete hot spot. Cell position Class Conditions Corner cold safe N avail d avg c C andn avail d 1 X>hC cold semi-safe does not exist cold unsafe N avail <d avg c C orn avail d 1 X hc hot N avail hc Non-corner cold safe N avail d avg c C andn avail d 2 + d 3 X>hC cold semi-safe N avail d avg c C andn avail {maxd 2 d 3 }X hc and N avail d 2 + d 3 X hc cold unsafe N avail <d avg c C orn avail {mind 2 d 3 }X hc hot N avail hc 5.1. Classification of cold cells We will classify a cold cell into three groups cold safe cold semi-safe and cold unsafe according to the demands of the adjacent cells of the next inner ring and the number of channels available within the cell denoted as N avail. The definitions will be different for each class depending on whether the cell is corner or non-corner. Consider first a cold corner cell C ij in ring i having a channel demand d 1 X where d 1 is given as w or w figures 5vii x depending on whether its adjacent cell in ring i 1 is hot or cold. From section 4.3 3ii w =. 6i Let w represent the demand from a cold cell i.e. w will assume different values for different classes of cold cells. On the other hand let the channel demands for a noncorner cell in ring i be denoted as d 2 X and d 3 X.Thend 2 is represented by a or a depending on whether the demanding cell is hot or cold a will assume different values for the different classes of coldness. Similarly d 3 can assume the values b or b as in figures 5i vi. Here a = 2j 1{3ii 1 + 1} 12ii 1 and b = 1 2j 1 3ii i 1 6i The detailed classification of the cells and the associated conditions are specified in table 1. The intuition behind the classification and the channel lending-borrowing protocol followed by each class of cells is described below. 1. A corner cell is termed cold unsafe if its channel availability falls below the average or it does not have enough channels to satisfy the demand d 1 X without itself becoming hot. Such a cell borrows d 1 X channels from its three adjacent neighbors in the next outer ring and lends them entirely to its neighboring cell in the next inner ring. 2. A corner cell is termed cold safe if it has sufficient number of channels to satisfy the demand of its adjacent cells without itself changing state. Hence a cold safe cell does not need to borrow any channel. 3. A non-corner cell is classified as cold unsafe if its channel availability is less than average or it does not have enough available channels to cater for the minimum of the two demands d 2 X and d 3 X without itself becoming hot. Such a cell borrows d 2 + d 3 X channels from its adjacent cells in the next outer ring and lends the whole of it without retaining any for itself. 4. A non-corner cell is in the cold semi-safe state if its channel availability is more than average and it has enough available channels to satisfy the maximum demand out of d 2 and d 3 but does not have enough to satisfy both. Such a cell will lend channels from its available channel set to the adjacent cell with the minimum channel demand {mind 2 d 3 }X. This kind of lending strategy guarantees that the available channel set will not be reduced to the threshold value hc in the worst case after channels are lended. To cater for the channel demand of the other adjacent cells a cold semi-safe cell acts like a cold unsafe cell i.e. it borrows the requisite channels from adjacent cells in the next outer ring only to lend them to the demanding cell. 5. A non-corner cell is termed cold safe if it has sufficient number of channels to satisfy the demand of its adjacent cells without itself changing state. A cold safe cell does not need to borrow any channel Modification of channel demands Figure 5 shows the channel demand of a ring i cold cell from adjacent cells in ring i+1 which is a function of its class and the demand from its adjacent cells in ring i 1. Figure 5i shows the case for a complete hot spot where both cells in ring i 1 are hot. Thus the coefficients a b c and d can be exactly computed as shown in section 4.2. For the other classes of cells in ring i our objective is to determine the coefficients c d etc. refer to figures 5ii vi in terms of the known coefficients and the modified channel demands a and b from ring i 1 cells whenever applicable.

9 S.K. Das et al. / Tele-traffic load balancing 333 Rewriting equation 4 as follows: 1 + mina b 1 + mina b c 1 X + d 1 X { maxa b } X = 0 8 Figure 5. Channel demand graphs for corner and non-corner cells. In the case of corner cells figure 5vii shows the situation for a complete hot spot where the ring i 1 cell is hot. The coefficients w e f and g are then determined as in section 4.2 and our objective is to determine the modified demands e f g etc. refer to figures 5viii x in terms of these known parameters and the modified demand w whenever applicable Non-corner cells of types hot cold unsafe and cold semi-safe With respect to figure 5i the channel demand equation for a hot non-corner cell in ring i whose adjacent cells in ring i 1 are also hot is given by cx + dx ax bx = X. 4 The channel demand equation for a cold unsafe non-corner cell in ring i whose adjacent cells in ring i 1 are hot figure 5ii is given by c X + d X ax bx = 0. 5 Rewriting equation 4 as follows: c 1 1 X + d 1 1 X ax bx = 0 6 we get c = c 1 1 and d = d 1 1. The channel demand equation for a cold semi-safe noncorner cell in ring i whose adjacent cells in ring i 1are hot figure 5v is given by c iv X + d iv X { maxa b } X = 0. 7 we get and c iv = c 1 d iv = d mina b 1 + mina b. Similarly it can be shown that c = c 1 a + b a + b c = c a + b a + b c v = c 1 a + b a + b d = d 1 a + b a + b d = d a + b a + b 1 + mina b d v = d 1 a + b a + b 1 + mina b Corner cells of types hot and cold unsafe The channel demand equation for a hot corner cell in ring i whose adjacent cells in ring i 1 are also hot is given as ex + fx + gx hx = X. 9 Proceeding in a similar manner as in the case of non-corner cells it can be shown that refer to figures 5vii x e 1 = e 1 e = e 1 h h e = e h h f 1 = f 1 f = f 1 h h f = f h h g = g 1 1.

10 334 S.K. Das et al. / Tele-traffic load balancing g = g 1 h h g = g h h 5.3. Channel demand graph Figure 6. Channel demand graph for an incomplete hot spot. Initially a channel demand graph is constructed based on the demand and class of each cell in the hot spot and Peripheral Rings. A demand graph is a layered graph with the uppermost layer representing the Ring 0 of the hot spot and each subsequent layer consists of nodes representing cells in the next outer ring until we reach a Peripheral Ring consisting only of cold safe cells which form the lowermost layer of the demand graph. Thus this graph spans all the Rings of the hot spot as well at least one of its Peripheral Rings. Let ring i correspond to the layer j of the demand graph. Then there is an edge between a node u in layer j and a node v in layer j + 1ifthereis channel demand from the ring i cell corresponding to node u to the ring i + 1 cell corresponding to node v. The edge weight is given by demandu v/x. Hence the lowermost layer of the demand graph consists only of cells in the cold safe state which do not have any channel demand. Section 5.2 discussed that given the channel demands towards a cell in ring i in an incomplete hot spot we can. find exactly how the channel demands of ring i cells from adjacent ring i + 1 cells are modified with respect to the same demands if it belonged to a complete hot spot. The construction of the demand graph involves computing these modified demands for the cells in a layer by layer fashion such that the uppermost layer consists of nodes representing the hot cells of Ring 0. Let us assume that the uppermost layer contains the center cell itself. The demands from each of its six adjacent cells in ring 1 is 1 6XwhereX is the demand in the center cell. Depending on this demand and the channel availability these six cells are classified as hot cold safe cold unsafe or cold semi-safe and thus form the second layer of nodes in the demand graph. The demands of the ring 1 cells from ring 2 cells can now be computed as laid down in section 5.2 which lead to the classification of the ring 2 cells. In this way the demand graph is constructed in a top down fashion. The construction of the demand graph terminates when a ring consisting only of cold safe cells is reached. An example of an incomplete hot spot and its demand graph is shown in figure 6. For simplicity the edge weights are not shown in this figure. Next consider the case when the center cell does not constitute the uppermost layer of the demand graph i.e. the center cell is not hot. Then the uppermost layer consists of nodes representing the hot cellss of the ring j say

11 S.K. Das et al. / Tele-traffic load balancing 335 nearest to the center cell and containing at least one hot cell. To compute the channel demand of the hot cells in ring j from the adjacent cells in ring j + 1 we proceed as earlier for non-corner hot cells in ring j and obtain c vi = c 1 a + b d vi = d 1 a + b. 10 Similarly for corner hot cells in ring j we obtain e iv w = e 1 f iv w = f 1 11 g iv w = g 1. Let us now sketch the channel borrowing algorithm. After the channel demand graph for the incomplete hot spot is constructed the borrowing algorithm works in a bottom up fashion starting from the lowermost layer of the demand graph. These cold safe cells lend the necessary amount of channels to adjacent nodes in the next higher layer to satisfy the edge demands. This brings all the cells in this layer to the cold safe state and they are now ready to lend channels to nodes in the next higher layer and so on. The algorithm continues till the uppermost layer of the demand graph is reached. At the end all the cells in the hot spot will have their channel demands fulfilled and thereby will be in the cold state. 6. Performance modeling We develop two discrete time Markov models one for a complete hot spot and the other for a cell within the hot spot. The Markov model for a cell is developed first and some of the analytical results obtained are then used to develop another model capturing the evolution of a complete hot spot. The model can be extended easily to the case of incomplete hot spot Markov chain model of a cell Our Markov chain model of a cell in a complete hot spot captures the channel availability pattern in that cell with respect to discrete time intervals see figure 7. Let the stochastic process describing this Markov chain take up the discrete set of values {n: 0 n C} where n denotes the number of available channels in the cell and C is the total number of channels allocated to that cell initially. The process is said to be in state S i if n = i. Assume that the call arrival process in the cell is Poisson with rate λ. Let the call termination process be also Poisson with parameter µ. These are valid assumptions so far as the normal telephone calls are concerned. If a cell is in any one of the states S i for0 i hc then it is a hot cell. From now on hc will be interpreted as hc. When the cell enters the state S hc+1 from S hc it becomes a cold cell from a hot one and remains in the cold state as long as it is in one of the states S i where hc + 1 i C. By definition a cell is in state S i if the number of available channels is i or the numberof channels in use is C i. Hence the cell will make a state transition from S i to S i+1 whenever any one of C i ongoing simultaneous calls terminate. This implies that the forward state transition probability from S i to S i+1 is given as C iµ. Someof these forward transition probabilities are shown in figure 7. The reverse transition will take place whenever there is a new call arrival implying that the probability is given as λ. Also there can be a discrete increase of X the number of channels to be retained by a hot cell in the number of available channels of the cell in hot state when the load balancing algorithm runs. We assume that this increase in the number of channels can take place with a constant probability µ from any of the states S i 0 i hc which accounts for the forward arcs from S i to S i+x in figure 7. In the next subsection we will describe a method to estimate the value of µ. Let us now compute the steady state probability Π i for state S i of the Markov chain. It is evident from figure 7 that the balance equations are not identical for all the states. We can actually partition the whole chain into four subchains and derive the limiting probabilities of the states within each subchain in terms of the limiting probability Π 0 of the state S 0. The subchains are defined as Subchain-1: consists of the states S i for 0 i hc Subchain-2: consists of S i forhc + 1 i X 1 Subchain-3: consists of S i forx i hc + X Subchain-4: consists of the remaining states. The recursive balance equation for a state S i Subchain-1 is given by Π i 1 C i + 1µ + Π i+1 λ = Π i C iµ + µ + λ 12 where the boundary cases are { Π0 i = 0 Π i = Cµ+µ 13 λ Π 0 i = 1. To solve for the closed form expression for Π i we apply a geometric transform G-transform to equation 12. The G-transform of Π i is given as GΠ i = Gz = Π i z i. i=0 By the shifting and scaling properties of G-transform we have r 1 GΠ i+r = z Gz r Π j z j and GiΠ i = z dgz dz j=0 = zg z in

12 336 S.K. Das et al. / Tele-traffic load balancing Figure 7. Markov model for a cell in a complete hot spot. respectively. Using the initial conditions of Π i given in equation 13 the following linear first order differential equation is solved for Gz: G z + Cz2 C + + z + µz 2 Gz = Π 0 1 z z 2 14 where = λ/µ and = µ /µ. The expression for the steady state probability for Subchain-1 is obtained by taking the inverse transform of Gz as Π i = Π 0 C i! j k=1 C i =0 C +i i j=0 + i k i+i j C i i j m m=1 where 1 i hc. The derivation details of the steady state probabilities will henceforth be omitted. Interested readers are requested to refer to [4]. Equation 12 can be used to derive the steady state probability Π hc+1 of S hc+1 in terms of Π hc whichin turn is given by equation 15. Let Π hc+1 = η 1 Π hc.the values of Π hc and Π hc+1 are the boundary cases for the recursive balance equation for Π i in case of Subchain-2 and given by Π i 1 C i + 1µ + Π i+1 λ = Π i λ + C iµ. 16 Proceeding in a similar manner as in the case of Subchain-1 we obtain Π i = Π 0 [A {η 1 1 C } { i k C + j k + k=1 j=1 }] i 1 k C + j k 1 17 k=1 j=1 where hc + 1 i X 1and { } A = 1 i 1 k C + j k k=1 j=1 1 1 i +j i e j! i i 1 i k! k j Z i Z {0} + 1 e i Z j Z j j! 1 2i + 1 2i + 1 k 2 2i +1 k. 18 Here Z is the set of positive integers and the variables i j i j will assume certain discrete values from Z such that the following two conditions are satisfied. 1 i and j will assume those integer values satisfying the equation k = i + i + j C for0 k i. 2 i and j will assume those integer values satisfying the equation k = C +2i j i+1 for 0 k 2i +1. Henceforth wherever A will be used it is assumed that A is given as in equation 18 satisfying the above conditions. Using equation 16 the boundary cases for the recursive solution for the steady state probabilities of Subchain-3 can be derived as in the case of Subchain-2. Let Π X = η 2 Π X 1. The recursive balance equation for Π i in Subchain-3 is given as Π i 1 C i + 1µ + Π i X µ + Π i+1 λ = Π i C iµ + λ. 19 Note that Π i X forx i hc + X are the steady state probabilities of Subchain-1. Hence the G-transform of Π i X is equal to the G-transform of Π i for 0 i hc which is derived earlier. Let A l denote the same expression as A with the parameter C replaced by the variable l. Substituting GΠ i 0 i hc for GΠ i X X i hc+x and proceeding similar to the cases of Subchain-1 and Subchain-2 we obtain { i k C + j k Π i = Π 0 [Aη 2 C + i 1 k k=1 j=1 k=1 j=1 C + j k 1 } + 1 l=0 η 3 A l l! ] 20 where X i hc + X and C C +i j + i k + 1 η 3 = i i =0 j=0 k=1 l i j m C+i j l. 21 m=1

13 S.K. Das et al. / Tele-traffic load balancing 337 Let the boundary cases for the recursive solution for the steady state probabilities of Subchain-4 be Π hc+x and Π hc+x+1 = η 4 Π hc+x derived from equations 20 and 19 respectively. Then the steady state probability Π i for Subchain-4 will have the same expression as that for Subchain-2 with η 4 replacing η 1. Hence Π i = Π 0 [A {η 4 1 C } { i k C + j k + i 1 k k=1 j=1 C + j k 1 }] k=1 j=1 22 for hc + X + 1 i C. Using equations and the fact that C i=0 Π i = 1 we first derive the expression for Π 0. Expressions for the steady state probabilities Π i wherei>0 are then derived in terms of Π 0. Two important performance metrices for our load balancing algorithm are the probability of call blockade in a cell and the probability of a cell being hot. The steady state probability Π 0 gives the call blocking probability of a cell. The probability of a cell being hot is given by p h = hc Π i i=0 = Π 0 [1 + j k=1 hc i=1 1 C i! C C i =0 + i k + 1 i +i j=0 1 i+i j ] C i i j m + 1. m= Estimation of the probability µ Let us consider a cell in Ring j of a complete hot spot. By our channel borrowing strategy µ is the probability that sufficient number of channels are available in the system excluding the part of the hot spot from Ring 0 to Ring j to meet the channel demand D = {3jj }X. Let H j denote the set of cells forming Rings 0 to j and H j is the complement set. A cell will only be able to lend channels if it is in the cold safe state. If N avail i bethe number of available channels in cell i of the system this implies that the actual number of channels available in the system for lending purpose is A = N avail i Hj hc + 1. i H j Thus µ = Prob[A D] = Prob [ total number of available channels D + ] Hj hc + 1. To compute µ let us consider the evolution of the entire system in the time period between two successive runs Figure 8. Markov model of the system between two runs of the load balancing algorithm. of the load balancing algorithm assuming that the system contains M cells. By assumption the call arrival and termination processes in each cell i are Poisson and denoted as λ i and µ i respectively. Applying results from queueing theory the call arrival and termination processes for the entire system are also Poisson with the rates λ = M i=1 λ i and µ = M i=1 µ i respectively. Our system can then be modeled as an M/M/k/k queue with state S i = i where 0 i MC is the total number of available channels in the system see figure 8. From known queueing theoretic results the steady state probability of S i for such a birth and death Markov chain is given by where Π 0 = Π i = λ /µ i Π 0 23 i! [ MC l=0 ] 1 λ /µ l. l! Thus the expression for the transition probability µ can be derived as µ = Prob [ total number of available channels D + Hj hc + 1 ] D+ H j hc+1 1 = 1 Π i i=0 where Π i is given by equation Markov chain model for a complete hot spot This is a simple birth and death Markov chain as shown in figure 9. Let the stochastic process describing this Markov chain take up the discrete set of values {n: 0 n N} where n denotes the number of Rings in the hot spot and N M denotes the maximum number of rings which a hot spot can contain in an area of M cells. The stochastic process is said to be in state S i if n = i. Let us compute the forward transition probability P i 1i from state S i 1 to S i where i 1. In a complete hot spot this gives the probability that all the cells in Ring i 1 are hot. Since there are 6i 1 cells in Ring i 1 for i>1 and only one cell in Ring 0 we have { ph i = 1 P i 1i = p 6i 1 24 h 1 <i N.

14 338 S.K. Das et al. / Tele-traffic load balancing Figure 9. Markov model for a complete hot spot. Similarly the reverse transition probability P ii 1 from state S i to S i 1 denotes the probability that all cells in Ring i 1 are cold. Hence { 1 ph i = 1 P ii 1 = 1 p h 6i <i N. The steady state probability Π i of the state S i is obtained by solving the recurrence Π i = thus yielding { ph 1 p h Π 0 i = 1 ph 1 p h 6i 1Πi 1 1 <i N 26 Figure 10. Blocking probability versus size of the hot spot. ph 3ii 1+1 Π i = Π p h The probability Π i gives the steady state probability that the hot spot consists of i Rings. 7. Simulation experiments Simulation experiments are carried out emulating a real time cellular mobile environment in an urban area. For example the downtown area of the city is chosen as the hot spot while the suburbs comprise the outer rings of cells. A considerable reduction in the blocking probability of the system with load balancing is observed as compared to the system without load balancing. Also the performance of our scheme is compared with the CBWL channel borrowing without load balancing scheme proposed in the literature. In our simulation model call arrivals and terminations are modeled as Poisson processes with rates λ and µ respectively and time is equivalent to the number of iterations. A fixed channel assignment scheme with an initial allocation of C channels per cell is assumed. The hot spot density and the number of rings comprising the hot spot are variable Performance results Impact of size and density of hot spot The goal of this experiment is to measure the stability of our load balancing scheme under most severe tele-traffic demands. For this we define a parameter called spot density sd varying which we can control the number of hot cells in the hot spot. For example sd = 0.1 gives only 3 hot cells in a 4 Ring hot spot while sd = 0.5 gives16 and sd = 0.9 gives 32 hot cells in the same hot spot. The size of the hot spot is varied by the number of rings that Figure 11. Blocking probability for various call arrival rates. comprise hot cells. For this particular run the spot density was fixed at sd = 0.5 and the size was varied. The total size of the system was 100 rings. It is observed from figure 10 that the percentage reduction of blocked calls attains a maximum of 62.50% with a very small hot spot number of rings = 10 and a minimum of 14.38% with almost the entire system being a hot spot number of rings = 90. Hence under very high tele-traffic demand there is still about 15% improvement in system performance with the introduction of load balancing Impact of call arrival rate This experiment evaluates the performance of the load balancing strategy under various call generation rates. With a low call generation rate of λ = 0.1 the average percentage reduction in the number of blocked calls is 85.9%. With a very high call generation rate of λ = 0.9 the performance of the algorithm suffers but still an improvement of about 7% is observed as compared to the system without load balancing.

15 S.K. Das et al. / Tele-traffic load balancing 339 borrower cell and the co-channel cells of the lender. Detailed analytical modeling of the system with our load balancing scheme captured certain useful performance metrices like call blocking probability the probability of a cell being hot and the evolution of the hot spot size. Exhaustive simulation experiments are carried out to validate that our load balancing algorithm is robust under severe load conditions. Comparison of our scheme with the CBWL strategy demonstrates that under moderate and even very high load conditions a performance improvement of as high as 12% in terms of call blockade is achievable with our load balancing scheme. Figure 12. Comparison of our scheme with CBWL and no load balancing Comparison with CBWL The proposed load balancing scheme is compared with the CBWL scheme [11]. In [3] we observed that CBWL outperforms every other existing load balancing scheme under moderate tele-traffic load while under heavy load only LBSB Load Balancing with Selective Borrowing performs better. Hence CBWL is chosen as the most suitable candidate for comparison with our new load balancing scheme in this paper. Figure 12 compares the performance of our scheme with CBWL with respect to the call blocking probability for various call arrival rates. The results show that our scheme performs better than CBWL both for moderate and high tele-traffic loads in the system. This is expected because in case of a dense hot spot the interior cells tend to starve in the CBWL channel assignment scheme. Our scheme adopts a layered structured approach of channel migration from the exterior cold cells to the interior cells of the hot spot region. Performance improvements over a scheme without load balancing are 12% for our scheme and 7% for CBWL for a high arrival rate of 0.9 whereas for an arrival rate of 0.3 the improvements are 95.3% for our scheme and 98.7% for CBWL. 8. Conclusions In this paper we proposed a load balancing strategy for the tele-traffic hot spot problem in cellular networks. A hot spot is viewed as a stack of hexagonal rings of cells and is termed complete if all the cells within it are hot. We first propose a load balancing scheme for a complete hot spot and then extend it to the general case of incomplete hot spots. Load balancing is achieved by a structured borrowing mechanism whereby a hot cell can borrow a fixed number of channels depending on its relative position within the hot spot only from adjacent cells in the next outer ring. In this way unused channels are migrated into the hot spot from its peripheral rings. The structured borrowing mechanism also reduces the amount of interference between the References [1] L.J. Cimini Jr. and G.J. Foschini Distributed algorithms for dynamic channel allocation in microcellular systems in: IEEE Vehicular Technology Conf pp [2] D.C. Cox and D.O. Reudink Increasing channel occupancy in large scale mobile radio systems: dynamic channel reassignment IEEE Transactions on Vehicular Technology 22 November [3] S.K. Das S.K. Sen and R. Jayaram A dynamic load balancing strategy for channel assignment using selective borrowing in cellular mobile environment in: Proceedings of ACM/IEEE Conference on Mobile Computing and Networking Mobicom 96 New York November 1996 pp ; Wireless Networks [4] S.K. Das S.K. Sen and R. Jayaram A structured channel borrowing scheme for dynamic load balancing in cellular networks in: Proceedings of 17th IEEE International Conference on Distributed Computing Systems Baltimore MD May 1997 pp [5] S.K. Das S.K. Sen R. Jayaram and P. Agrawal An efficient distributed channel management algorithm for cellular mobile networks in: Proceedings of IEEE International Conference on Universal Personal Communications ICUPC San Diego CA October [6] M. Duque-Anton D. Kunz and B. Ruber Channel assignment for cellular radio using simulated annealing IEEE Transactions on Vehicular Technology 42 February [7] B. Eklundh Channel utilization and blocking probability in a cellular mobile telephone system with directed retry IEEE Transactions on Communications 344 April [8] S.M. Elnoubi R. Singh and S.C. Gupta A new frequency channel assignment in high capacity mobile communication systems IEEE Transactions on Vehicular Technology 313 August [9] K.K. Goswami M. Devarakonda and R.K. Iyer Prediction-based dynamic load-sharing heuristics IEEE Transactions on Parallel and Distributed Systems 46 June [10] D. Hong and S.S. Rappaport Traffic model and performance analysis for cellular mobile radio telephone systems with prioritized and non-prioritized hand-off procedures IEEE Transactions on Vehicular Technology 35 August [11] H. Jiang and S.S. Rappaport CBWL: A new channel assignment and sharing method for cellular communication systems IEEE Transactions on Vehicular Technology 432 May [12] T.J. Kahwa and N.D. Georganas A hybrid channel assignment scheme in large scale cellular structured mobile communication systems IEEE Transactions on Communications 264 April [13] J. Karlsson and B. Eklundh A cellular mobile telephone system with load sharing an enhancement of directed retry IEEE Transactions on Communications 375 May [14] W.C.Y. Lee Elements of cellular mobile radio systems IEEE Transactions on Vehicular Technology 35 May [15] V.H. Macdonald Advanced mobile phone service: The cellular concept Bell System Technical Journal 58 January

16 340 S.K. Das et al. / Tele-traffic load balancing [16] E. Del Re R. Fantacci and G. Giambene Handover and Dynamic channel allocation techniques in mobile cellular networks IEEE Transactions on Vehicular Technology 442 May [17] K.N. Sivarajan R.J. McEliece and Ketchum Dynamic channel assignment in cellular radio in: IEEE Vehicular Technology Conf. November 1990 pp [18] J. Tajima and K. Imamura A strategy for flexible channel assignment in mobile communication systems IEEE Transactions on Vehicular Technology 37 May [19] S. Tekinay and B. Jabbari Handover and channel assignment in mobile cellular network IEEE Communication Magazine November [20] M.H. Willebeek-LeMair and A.P. Reeves Strategies for dynamic load balancing on highly parallel computers IEEE Transactions on Parallel and Distributed Systems 49 September [21] Z. Xu and P.B. Mirchandani Virtually fixed channel assignment for cellular radio-telephone systems: a model and evaluation in: IEEE International Conference on Communications Chicago [22] K.L. Yeung and T.S.P. Yum The optimization of nominal channel allocation in cellular mobile systems in: IEEE International Conference on Communications [23] M. Zhang and T.S. Yum Comparisons of channel assignment strategies in cellular mobile telephone systems IEEE Transactions on Vehicular Technology 38 November Sajal K. Das received the B.Tech. degree in 1983 from Calcutta University the M.S. degree in 1984 from the Indian Institute of Science Bangalore and the Ph.D. degree in 1988 from the University of Central Florida Orlando all in computer science. Currently he is an Associate Professor of Computer Sciences at the University of North Texas Denton the Director of the Center for Research in Parallel and Distributed Computing and also the founder of the Center for Research in Wireless Computing CReW at UNT. He is a recipient of the Cambridge England Nehru Scholarship in 1986 Honor Professor Awards from UNT in 1991 and 1997 for best teaching and scholarly research and Developing Scholars Award in 1996 from UNT for outstanding research. Dr. Das has been a Visiting Scientist at the Slovak Academy of Sciences in Bratislava Slovakia and the Council of National Research in Pisa Italy. He has also been a Visiting Professor at the Indian Statistical Institute Calcutta. His current research interests include cellular communication and mobile computing parallel algorithms and data structures and distributed simulation. Dr. Das has published over 100 research papers in these areas in journals and refereed conference proceedings. He serves on the Editorial Boards of the Journal of Parallel and Distributed Computing Academic Press Parallel Processing Letters World Scientific Pub. and the Journal of Parallel Algorithms and Applications Gordon and Breach. He has been a Program Committee member of numerous international conferences and is the General Co-Chair of the International Symposium on Modeling Analysis and Simulation of Computer and Telecommunication Systems MASCOTS 98. Dr. Das is also a member of the IEEE and the ACM. das@cs.unt.edu URL: Sanjoy K. Sen received his bachelor s degree in electronics and telecommunications engineering from Jadavpur University India in 1991 M.S. and Ph.D. degrees in computer science from the University of North Texas Denton TX in 1995 and He is a recipient of the Chancellor s Graduate Fellowship from UNT in Between 1991 and 1993 he was involved with Siemens Telematik India Ltd. as a senior projects engineer in the switching hardware division. His current research interests include mobile computing and communications location management channel assignment call admission and control Quality-of- Service mobile data multiprocessor computer architecture distributed systems parallel discrete event simulation. Dr. Sen is a student member of the IEEE Communications Society Upsilon Pi Epsilon and was the vice-president of the Computer Sciences Graduate Student Association at UNT. joy@cs.unt.edu sanjoy@nortel.ca Rajeev Jayaram received the bachelor s degree in computer science and engineering from the Bangalore University India in Until 1994 he worked on formal models for distributed systems at the Indian Institute of Science Bangalore. Since spring 1995 he has been a graduate student at the University of North Texas Denton working on wireless networks and mobile computing. Currently he is working as a software engineer in the wireless communications division of Ericsson Inc. in Richardson TX. His current research interests include channel assignment call admission and control Quality-of-Service provisioning in mobile computing and also distributed systems and networking. Mr. Jayaram is a student member of the IEEE Communications Society. jayaram@cs.unt.edu

Location management Need Frequency Location updating

Location management Need Frequency Location updating Lecture-16 Mobility Management Location management Need Frequency Location updating Fig 3.10 Location management in cellular network Mobility Management Paging messages Different paging schemes Transmission

More information

Introductory Concepts

Introductory Concepts Chapter 1 Introductory Concepts 1.1 Introduction Communication is one of the integral parts of science that has always been a focus point for exchanging information among parties at locations physically

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed

More information

Basic Network Design

Basic Network Design Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies

More information

8. Cellular Systems. 1. Bell System Technical Journal, Vol. 58, no. 1, Jan 1979. 2. R. Steele, Mobile Communications, Pentech House, 1992.

8. Cellular Systems. 1. Bell System Technical Journal, Vol. 58, no. 1, Jan 1979. 2. R. Steele, Mobile Communications, Pentech House, 1992. 8. Cellular Systems References 1. Bell System Technical Journal, Vol. 58, no. 1, Jan 1979. 2. R. Steele, Mobile Communications, Pentech House, 1992. 3. G. Calhoun, Digital Cellular Radio, Artech House,

More information

Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse

Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Abstract - Cellular frequency reuse is known to be an efficient method to allow many wireless telephone

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular

More information

System Design in Wireless Communication. Ali Khawaja

System Design in Wireless Communication. Ali Khawaja System Design in Wireless Communication Ali Khawaja University of Texas at Dallas December 6, 1999 1 Abstract This paper deals with the micro and macro aspects of a wireless system design. With the growing

More information

1 Location Management in Cellular

1 Location Management in Cellular 1 Location Management in Cellular Networks JINGYUAN ZHANG Abstract In a cellular network, a service coverage area is divided into smaller areas of hexagonal shape, referred to as cells. The cellular concept

More information

GSM Frequency Planning with Band Segregation for the Broadcast Channel Carriers

GSM Frequency Planning with Band Segregation for the Broadcast Channel Carriers GSM Frequency Planning with Band Segregation for the Broadcast Channel Carriers F. Galliano (1), N.P. Magnani (1), G. Minerva (1), A. Rolando (2), P. Zanini (3) (1) CSELT - Via G. Reiss Romoli, 274 - Torino

More information

A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System

A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System Young Sil Choi Email: choiys@mobile.snu.ac.kr Illsoo Sohn Email: sohnis@mobile.snu.ac.kr Kwang Bok Lee Email: klee@snu.ac.kr Abstract

More information

Enhancement of QoS in Mobile Network through Channel Allocation using Software Agents

Enhancement of QoS in Mobile Network through Channel Allocation using Software Agents www.ijcsi.org 407 Enhancement of QoS in Mobile Network through Channel Allocation using Software Agents Nitin Muchhal 1, Swapnil Jain 2, Yogesh Sharma 3 1 Department of Electronics and Communication, Sagar

More information

Cell Planning in GSM Mobile

Cell Planning in GSM Mobile Cell Planning in Mobile JALAL JAMAL HAMAD-AMEEN M.Sc, College of Engineering, Electrical Engineering Dept. Salahaddin University, Erbil, IRAQ E-mail : jalal3120002000@yahoo.com Abstract: Cell planning

More information

Παρουσιάσεις για το Μάθημα Ασύρματων και Κινητών Τηλεπικοινωνιών του ΔΜΠΣ στο ΕΚΠΑ

Παρουσιάσεις για το Μάθημα Ασύρματων και Κινητών Τηλεπικοινωνιών του ΔΜΠΣ στο ΕΚΠΑ Παρουσιάσεις για το Μάθημα Ασύρματων και Κινητών Τηλεπικοινωνιών του ΔΜΠΣ στο ΕΚΠΑ hstellakis@gmail.com Αθήνα, 2015 1 PART I Introduction to Wireless Communications 2 What is Wireless? Wireless operations

More information

Introduction Ericsson Handheld Telephone 1341-B

Introduction Ericsson Handheld Telephone 1341-B Ericsson Handheld Telephone 1341-B 2 Contents General 5 The Mobile Telephone Network 6 Base Station and Cell 7 Radio Channels 7 Radio Coverage 8 Transmission Control and Communication 9 Quality Control

More information

Competitive Analysis of On line Randomized Call Control in Cellular Networks

Competitive Analysis of On line Randomized Call Control in Cellular Networks Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

The design objective of early mobile radio systems was to achieve a large coverage

The design objective of early mobile radio systems was to achieve a large coverage 03_57_104_final.fm Page 57 Tuesday, December 4, 2001 2:17 PM C HAPTER 3 The Cellular Concept System Design Fundamentals The design objective of early mobile radio systems was to achieve a large coverage

More information

Figure 1: cellular system architecture

Figure 1: cellular system architecture Question 1: (30 marks) Consider a FDM cellular system with 120 cites, a frequency reuse factor of N=12, and 900 overall two-way channels. Omni-directional antennas are used: Figure 1 shows some of the

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Frequency Assignment in Mobile Phone Systems

Frequency Assignment in Mobile Phone Systems Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany MARTIN GRÖTSCHEL Frequency Assignment in Mobile Phone Systems ZIB-Report 00-58 (Dezember 2000) Frequency Assignment

More information

Mobile Tracking and Resource Reservation Scheme for Cellular Networks

Mobile Tracking and Resource Reservation Scheme for Cellular Networks Mobile Tracking and Resource Reservation Scheme for Cellular Networks Subbiah Shenbagaraman, B. Prabhakaran, S. Venkatesan Department of Computer Science, University of Texas at Dallas, Richardson, USA,

More information

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of

More information

The Cellular Engineering Fundamentals

The Cellular Engineering Fundamentals Chapter 3 The Cellular Engineering Fundamentals 3.1 Introduction In Chapter 1, we have seen that the technique of substituting a single high power transmitter by several low power transmitters to support

More information

Flexible mobility management strategy in cellular networks

Flexible mobility management strategy in cellular networks Flexible mobility management strategy in cellular networks JAN GAJDORUS Department of informatics and telecommunications (161114) Czech technical university in Prague, Faculty of transportation sciences

More information

Chapter 2 Cellular System

Chapter 2 Cellular System Chapter 2 Cellular System 2.1Introduction In the older mobile radio systems, single high power transmitter was used to provide coverage in the entire area. Although this technique provided a good coverage,

More information

Labeling outerplanar graphs with maximum degree three

Labeling outerplanar graphs with maximum degree three Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics

More information

PERFORMANCE AND EFFICIENCY EVALUATION OF CHANNEL ALLOCATION SCHEMES FOR HSCSD IN GSM

PERFORMANCE AND EFFICIENCY EVALUATION OF CHANNEL ALLOCATION SCHEMES FOR HSCSD IN GSM Generol Conference (Port B) PERFORMANCE AND EFFICIENCY EVALUATION OF CHANNEL ALLOCATION SCHEMES FOR HSCSD IN GSM Dayong Zhou and Moshe Zukerman Department of Electrical and Electronic Engineering The University

More information

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper

More information

ENGN4536 Mobile Communications

ENGN4536 Mobile Communications ENGN4536 Mobile Communications Dr Thushara Abhayapala Department of Engineering Faculty of Engineering & Information Technology Australian National University thushara@faceng.anu.edu.au http://www.webct.anu.edu.au

More information

Assignment Strategies for Mobile Data Users in Hierarchical Overlay Networks: Performance of Optimal and Adaptive Strategies

Assignment Strategies for Mobile Data Users in Hierarchical Overlay Networks: Performance of Optimal and Adaptive Strategies IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 5, JUNE 2004 849 Assignment Strategies for Mobile Data Users in Hierarchical Overlay Networks: Performance of Optimal Adaptive Strategies

More information

How To Understand The Gsm And Mts Mobile Network Evolution

How To Understand The Gsm And Mts Mobile Network Evolution Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

How performance metrics depend on the traffic demand in large cellular networks

How performance metrics depend on the traffic demand in large cellular networks How performance metrics depend on the traffic demand in large cellular networks B. B laszczyszyn (Inria/ENS) and M. K. Karray (Orange) Based on joint works [1, 2, 3] with M. Jovanovic (Orange) Presented

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Deployment of Multi-layer TDMA Cellular Network with Distributed Coverage for Traffic Capacity Enhancement

Deployment of Multi-layer TDMA Cellular Network with Distributed Coverage for Traffic Capacity Enhancement Deployment of Multi-layer TDMA Cellular Network with Distributed Coverage for Traffic Capacity Enhancement Jérôme Brouet, Patrick Charrière, Vinod Kumar* Armelle Wautier, Jacques Antoine** *Alcatel, Corporate

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 11, November 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automated

More information

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

A Novel Approach for Load Balancing In Heterogeneous Cellular Network A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1

More information

Impact of Satellites on UMTS Network

Impact of Satellites on UMTS Network Impact of Satellites on UMTS Network R J Finean, D Polymeros, A El-Hoiydi, F da Costa, M Dinis, A Saïdi, B Vazvan BT 1, OTE, Ascom, IT, IT, Alcatel CRC, Nokia Abstract: UMTS will appeal to the existing

More information

Lecture 1. Introduction to Wireless Communications 1

Lecture 1. Introduction to Wireless Communications 1 896960 Introduction to Algorithmic Wireless Communications Lecture 1. Introduction to Wireless Communications 1 David Amzallag 2 May 25, 2008 Introduction to cellular telephone systems. How a cellular

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM Lecture overview History of cellular systems (1G) GSM introduction Basic architecture of GSM system Basic radio transmission parameters of GSM Analogue cellular systems 70 s In the early 70 s radio frequencies

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

A survey on Spectrum Management in Cognitive Radio Networks

A survey on Spectrum Management in Cognitive Radio Networks A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,

More information

Inter-Cell Interference Coordination (ICIC) Technology

Inter-Cell Interference Coordination (ICIC) Technology Inter-Cell Interference Coordination (ICIC) Technology Dai Kimura Hiroyuki Seki Long Term Evolution (LTE) is a promising standard for next-generation cellular systems targeted to have a peak downlink bit

More information

Establishing a Mobile Conference Call Under Delay and Bandwidth Constraints

Establishing a Mobile Conference Call Under Delay and Bandwidth Constraints Establishing a Mobile Conference Call Under Delay and Bandwidth Constraints Amotz Bar-Noy Computer and Information Science Department Brooklyn College, CUNY, New York Email: amotz@sci.brooklyn.cuny.edu

More information

Forced Low latency Handoff in Mobile Cellular Data Networks

Forced Low latency Handoff in Mobile Cellular Data Networks Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN Hendessi@cc.iut.ac.ir

More information

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology

More information

Inter-cell Interference Mitigation Reduction in LTE Using Frequency Reuse Scheme

Inter-cell Interference Mitigation Reduction in LTE Using Frequency Reuse Scheme International Journal of Scientific and Research Publications, Volume 5, Issue 8, August 2015 1 Inter-cell Interference Mitigation Reduction in LTE Using Frequency Reuse Scheme Rupali Patil 1, R.D.Patane

More information

Efficient Network Marketing Strategies For Secondary Users

Efficient Network Marketing Strategies For Secondary Users Determining the Transmission Strategy of Cognitive User in IEEE 82. based Networks Rukhsana Ruby, Victor C.M. Leung, John Sydor Department of Electrical and Computer Engineering, The University of British

More information

MA651 Topology. Lecture 6. Separation Axioms.

MA651 Topology. Lecture 6. Separation Axioms. MA651 Topology. Lecture 6. Separation Axioms. This text is based on the following books: Fundamental concepts of topology by Peter O Neil Elements of Mathematics: General Topology by Nicolas Bourbaki Counterexamples

More information

4-5 Limiting the Holding Time in Mobile Cellular Phone Systems During Disasters

4-5 Limiting the Holding Time in Mobile Cellular Phone Systems During Disasters 4-5 Limiting the Holding Time in Mobile Cellular Phone Systems During Disasters Call demand suddenly and greatly increases during major disasters, because people want to check on their families and friends

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98

Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98 Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide

More information

Load Balancing. Load Balancing 1 / 24

Load Balancing. Load Balancing 1 / 24 Load Balancing Backtracking, branch & bound and alpha-beta pruning: how to assign work to idle processes without much communication? Additionally for alpha-beta pruning: implementing the young-brothers-wait

More information

VOICE OVER WI-FI CAPACITY PLANNING

VOICE OVER WI-FI CAPACITY PLANNING VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited

More information

How To Understand The Performance Of A Cell Phone Network

How To Understand The Performance Of A Cell Phone Network Survivability Analysis for Mobile Cellular Networks David W. Tipper *, Chalermpol Charnsripinyo *, Hyundoo Shin * Teresa A. Dahlberg ** * Department of Information Science and Telecommunications, University

More information

DYNAMIC RADIO RESOURCE MANAGEMENT IN GSM/GPRS USING SCALABLE RESOURCE ALLOCATION TECHNIQUE

DYNAMIC RADIO RESOURCE MANAGEMENT IN GSM/GPRS USING SCALABLE RESOURCE ALLOCATION TECHNIQUE DYNAMIC RADIO RESOURCE MANAGEMENT IN GSM/GPRS USING SCALABLE RESOURCE ALLOCATION TECHNIQUE Seok Y Tang, Shyamalie Thilakawardana and Rahim Tafazolli Mobile Communications Research Group Centre for Communications

More information

Performance Analysis of a Telephone System with both Patient and Impatient Customers

Performance Analysis of a Telephone System with both Patient and Impatient Customers Performance Analysis of a Telephone System with both Patient and Impatient Customers Yiqiang Quennel Zhao Department of Mathematics and Statistics University of Winnipeg Winnipeg, Manitoba Canada R3B 2E9

More information

Hello viewers, welcome to today s lecture on cellular telephone systems.

Hello viewers, welcome to today s lecture on cellular telephone systems. Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

On Frequency Assignment in Cellular Networks

On Frequency Assignment in Cellular Networks On Frequency ssignment in ellular Networks Sanguthevar Rajasekaran Dept.ofISE,Univ. offlorida Gainesville, FL 32611 David Wei Dept. of S, Fordham University New York, NY K. Naik Dept. of S, Univ. of izu

More information

GSM System Architecture

GSM System Architecture Intersystem Operation and Mobility Management David Tipper Associate Professor Graduate Program in Telecommunications and Networking University it of Pittsburgh Telcom 2700 Slides 6 http://www.tele.pitt.edu/tipper.html

More information

MULTIHOP cellular networks have been proposed as an

MULTIHOP cellular networks have been proposed as an 1206 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 7, SEPTEMBER 2004 On the Throughput Enhancement of the Downstream Channel in Cellular Radio Networks Through Multihop Relaying Jaeweon

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Voice Service Support over Cognitive Radio Networks

Voice Service Support over Cognitive Radio Networks Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,

More information

Chapters 1-21 Introduction to Wireless Communication Systems

Chapters 1-21 Introduction to Wireless Communication Systems Chapters 1-21 Introduction to Wireless Communication Systems Yimin Zhang, Ph.D. Department of Electrical & Computer Engineering Villanova University http://yiminzhang.com/ece8708 Yimin Zhang, Villanova

More information

ADSL part 2, Cable Internet, Cellular

ADSL part 2, Cable Internet, Cellular ADSL part 2, Cable Internet, Cellular 20 June 2016 Lecture 12 20 June 2016 SE 428: Advanced Computer Networks 1 Topics for Today ADSL Cable Internet Cellular Radio Networks 20 June 2016 SE 428: Advanced

More information

Multiple Access Techniques

Multiple Access Techniques Chapter 8 Multiple Access Techniques Multiple access techniques are used to allow a large number of mobile users to share the allocated spectrum in the most efficient manner. As the spectrum is limited,

More information

Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8

Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8 Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain

More information

Revision of Lecture Eighteen

Revision of Lecture Eighteen Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses

More information

Narrowband and Broadband Access Technologies

Narrowband and Broadband Access Technologies Computer Networks and Internets, 5e Chapters 12 and 16 Access and Interconnection Technologies (slidesets abridged/combined) By Douglas Comer Modified from the lecture slides of Lami Kaya (LKaya@ieee.org)

More information

Performance modelling of hierarchical cellular networks using PEPA

Performance modelling of hierarchical cellular networks using PEPA Performance Evaluation 50 (2002) 83 99 Performance modelling of hierarchical cellular networks using PEPA J.M. Fourneau, L. Kloul, F. Valois Laboratoire PRiSM, Université de Versailles, 45, Av. des Etats-Unis,

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals.

Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals. Cellular System Rajat Chugh, Parag Jasoria, Tushar Arora, Nitin Ginotra and Vivek Anand V Semester, Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas, Farukhnagar,

More information

Offline sorting buffers on Line

Offline sorting buffers on Line Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

More information

Modeling and Performance Analysis of Telephony Gateway REgistration Protocol

Modeling and Performance Analysis of Telephony Gateway REgistration Protocol Modeling and Performance Analysis of Telephony Gateway REgistration Protocol Kushal Kumaran and Anirudha Sahoo Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay, Powai,

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Assessment of Cellular Planning Methods for GSM

Assessment of Cellular Planning Methods for GSM Assessment of Cellular Planning Methods for GSM Pedro Assunção, Rui Estevinho and Luis M. Correia Instituto das Telecomunicações/Instituto Superior Técnico, Technical University of Lisbon Av. Rovisco Pais,

More information

Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study

Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study 216 Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study Dr Basil M Kasasbeh, Applied Science University,

More information

A Network Simulation Tool to Generate User Traffic and Analyze Quality of Experience for Hybrid Access Architecture

A Network Simulation Tool to Generate User Traffic and Analyze Quality of Experience for Hybrid Access Architecture A Network Simulation Tool to Generate User Traffic and Analyze Quality of Experience for Hybrid Access Architecture Oscar D. Ramos-Cantor, Technische Universität Darmstadt, oscar.ramos@nt.tu-darmstadt.de,

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

Admission Control for VoIP Traffic in IEEE 802.11 Networks

Admission Control for VoIP Traffic in IEEE 802.11 Networks Admission Control for VoIP Traffic in IEEE 802.11 Networks Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: sgarg@avaya.com Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: mkappes@avaya.com

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

Implementation of Mobile Measurement-based Frequency Planning in GSM

Implementation of Mobile Measurement-based Frequency Planning in GSM Implementation of Mobile Measurement-based Frequency Planning in GSM Comp.Eng. Serkan Kayacan (*), Prof. Levent Toker (**) (*): Ege University, The Institute of Science, Computer Engineering, M.S. Student

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS

SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS SECTION 2 TECHNICAL DESCRIPTION OF SYSTEMS 2.1 INTRODUCTION Access equipment consists of injectors (also known as concentrators), repeaters, and extractors. injectors are tied to the backbone via fiber

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Priority Based Hard Handoff Management Scheme for Minimizing Congestion Control in Single Traffic Wireless Mobile Networks

Priority Based Hard Handoff Management Scheme for Minimizing Congestion Control in Single Traffic Wireless Mobile Networks Priority Based Hard Handoff Management Scheme for Minimizing Congestion Control in Single Traffic Wireless Mobile Networks Biswajit Bhowmik Department of Computer Science & Engineering Bengal College of

More information

Subscriber Maximization in CDMA Cellular Networks

Subscriber Maximization in CDMA Cellular Networks CCCT 04: INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS, AND CONTROL TECHNOLOGIES 234 Subscriber Maximization in CDMA Cellular Networks Robert AKL Department of Computer Science and Engineering

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information