Traffic Control by Influencing User Behavior

Similar documents
Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover

Chapter 1. Introduction

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

SMS Roaming Service and SMS Interworking Service

MODELING OF SYN FLOODING ATTACKS Simona Ramanauskaitė Šiauliai University Tel ,

Radio Resource Allocation in GSM/GPRS Networks

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Roulette Wheel Selection Model based on Virtual Machine Weight for Load Balancing in Cloud Computing

CURRENT wireless personal communication systems are

Big Data Collection and Utilization for Operational Support of Smarter Social Infrastructure

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS

Improved Passenger Services for Local Existing Railways Uchibo Line Transportation Management System (Operation Control and Passenger Services)

REPEATABILITY ENHANCEMENTS OF TRAFFIC SIMULATOR BY INTRODUCTION OF TRAFFIC FLOW COMPENSATION METHODS

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

Call Center Metrics: Glossary of Terms

How To Understand The Performance Of A Cell Phone Network

SMS-Based Alert Notification for Credit Applications Queuing Systems

Stochastic Processes and Queueing Theory used in Cloud Computer Performance Simulations

Evaluation of traffic control policy in disaster case. by using traffic simulation model

Transport Layer Protocols

The Analysis of Dynamical Queueing Systems (Background)

LOAD BALANCING AND ADMISSION CONTROL OF A PARLAY X APPLICATION SERVER

CALL CENTER PERFORMANCE EVALUATION USING QUEUEING NETWORK AND SIMULATION

Multi-agent System Learning Support Software with Fighting Games

Simulation of Call Center With.

Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming

The Joint Distribution of Server State and Queue Length of M/M/1/1 Retrial Queue with Abandonment and Feedback

Telephone Traffic Queues in a Customer Call Center. A Thesis. Presented for the. Master of Science Degree. The University of Tennessee at Chattanooga

Network Design Performance Evaluation, and Simulation #6

Process simulation. Enn Õunapuu

BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

How To Share Bandwidth On A Diffserv Network

From Big Data to Smart Data How to improve public transport through modelling and simulation.

A MODEL OF OPERATIONS CAPACITY PLANNING AND MANAGEMENT FOR ADMINISTRATIVE SERVICE CENTERS

How To Balance In A Distributed System

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

one Managing your PBX Administrator ACCESSING YOUR PBX ACCOUNT CHECKING ACCOUNT ACTIVITY

Enterprise Application Performance Management: An End-to-End Perspective

An Approach to Load Balancing In Cloud Computing

CHAPTER 3 CALL CENTER QUEUING MODEL WITH LOGNORMAL SERVICE TIME DISTRIBUTION

Analysis of Delayed Reservation Scheme in Server-based QoS Management Network

Exponential Approximation of Multi-Skill Call Centers Architecture

Chapter 3 ATM and Multimedia Traffic

CS556 Course Project Performance Analysis of M-NET using GSPN

There are a number of factors that increase the risk of performance problems in complex computer and software systems, such as e-commerce systems.

Network Virtualization Server for Adaptive Network Control

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.

Research Methods & Experimental Design

Performance advantages of resource sharing in polymorphic optical networks

High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC

VoIP Session Capacity Expansion with Packet Transmission Suppression Control in Wireless LAN

A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

Waiting Times Chapter 7

Petri Net Simulation and Analysis of Network Management Based on Mobile Agent Technology

Scheduling Algorithms for Downlink Services in Wireless Networks: A Markov Decision Process Approach

Protocol Data Units and Encapsulation

Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1

A MPCP-Based Centralized Rate Control Method for Mobile Stations in FiWi Access Networks

Mobile Service Level Management System

Wireless LAN Concepts

Performance Modeling of an Apache Web Server with Bursty Arrival Traffic

Periodic Capacity Management under a Lead Time Performance Constraint

media kit 2014 Advertise Global Mobile Ad Network

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

SAP CRM Campaign Automation

Drop Call Probability in Established Cellular Networks: from data Analysis to Modelling

Voice Service Support over Cognitive Radio Networks

Deployment of express checkout lines at supermarkets

Rule-based Traffic Management for Inbound Call Centers

QUEUING THEORY. 1. Introduction

Is Truck Queuing Productive? Study of truck & shovel operations productivity using simulation platform MineDES

Process Data: a Means to Measure Operational Performance and Implement Advanced Analytical Models

Examining Self-Similarity Network Traffic intervals

EPISODE: AN EXTREME PROGRAMMING METHOD FOR INNOVATIVE SOFTWARE BASED ON SYSTEMS DESIGN AND ITS PRACTICAL STUDY

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Switch Fabric Implementation Using Shared Memory

Contents. Specialty Answering Service. All rights reserved.

PART III. OPS-based wide area networks

Inter-Cell Interference Coordination (ICIC) Technology

Load Testing and Monitoring Web Applications in a Windows Environment

MTAT Business Process Management (BPM) Lecture 6 Quantitative Process Analysis (Queuing & Simulation)

Basic Queuing Relationships

Load Balancing in cloud computing

Performance Comparison of low-latency Anonymisation Services from a User Perspective

When to Leverage Video as a Platform A Guide to Optimizing the Retail Environment

Transcription:

Traffic Control by Influencing User Behavior We examined a means of influencing user behavior to reduce the number of repeated calls by providing information to users and controlling the traffic before it flows into the network, and analyzed the traffic characteristics by modeling repeated calls. This research was conducted jointly with the Takahashi laboratory (Professor Yoshitaka Takahashi), Faculty of Commerce, Waseda University. Noriteru Shinagawa, Akira Miura, Shigeru Kaneda and Yoshikazu Akinaga 1. Introduction Traffic generation in mobile networks is heavily dependent on user behavior because the users move around with their terminals. For example, at a special event such as a fireworks display or football game, the people will congregate in a specific place and may try to make calls, generating unpredictable excessive traffic, leading to network congestion. When the users cannot get through due to congestion, they tend to make call requests repeatedly (repeated calls), which aggravates the network congestion further and in the worst case might even cause the network functions to break down. In order to avoid situations where services cannot be provided due to excessive load on the network equipment, controlling the traffic is an important issue. Currently, mobile network operators control the traffic by restricting the users communication demands (calls) forcefully by imposing calling restrictions or similar at congestion. However, when such methods are applied, the users lose the opportunities to use the services and the user satisfaction level may be decreased. To solve this problem, we examined a new traffic control method that attempts to influence user behavior before the traffic flows into the network. This effect is achieved by guiding the users to collaborate by providing information to them when the traffic is too heavy to control solely by network control methods. We call this new method traffic control by influencing user behavior [1]. This method aims to improve the opportunities of the users to use communication services by effectually controlling the number of repeated calls and ultimately increase the users satisfaction level. Moreover, for the benefit of network construction, operation and management, it is of great importance to take repeated calls into consideration when understanding the traffic characteristics of the network. For this reason, we evaluated the effects of repeated calls on the network performance. 2. Traffic Control by Influencing User Behavior 2.1 Concept We can consider three ways of controlling traffic before it flows into the network: balancing the distribution of traffic inflow between locations in the network (geographical balancing), balancing the time at which the traffic flows into the network (time balancing), and reducing the volume of traffic. We thus examined the following methods for traffic control that can be achieved by influencing user behavior. 1) Changing the communication place (move) The network system encourages the users to move to a location where there is spare capacity available. This balances the traffic geographically. 2) Changing the communication time (wait) The network system encourages the users to wait for a while until the network has spare capacity available. This balances the traffic in time. 3) Changing the communication medium (change media) The network system encourages the users to switch to a different communication medium, for example, from voice call to text message. This reduces the traffic volume. The relationship between traffic control and methods of influencing the users is shown in Figure 1. The traffic control by influencing user behavior is based on 34

NTT DoCoMo Technical Journal Vol. 7 No.4 Purpose of traffic control Geographical balancing Time balancing Reduction in traffic Method of influencing the users (1) Change in communication place (2) Change in communication time (3) Change in communication medium Move Wait Change media (from voice call to text message) Figure 1 Relationship between traffic control and methods of influencing user behavior the idea of controlling the traffic by notifying the users about system conditions and proposing better ways to communicate. As the users are made aware of the system conditions, deterioration of customer satisfaction can be prevented. It is still left up to the free judgment of the users whether or not they choose to follow the proposals from the system. The information notified to the users can include system information such as the present and estimated future network load conditions. It may also include recommended places and times where communication is possible, as well as alternative media through which the users can attempt to communicate. If only the system information is sent, the users may not take the actions the operator expects, as the behavioral patterns of the users after receiving the information vary, and thus the expected traffic control may not be achieved. Nonetheless, users are able to know the system conditions, which is considered to be effective in preventing the deterioration of customer satisfaction. If recommendations are sent and the mobile terminal functions can be controlled upon obtaining agreements from users, it would be easier to obtain the expected effects from the traffic control. 2.2 Overview of Control Scheme The sequence of events when implementing traffic control by influencing user behavior is explained below. First, when the communication system receives a connection request, it judges whether or not it is necessary to guide the users based on the current radio resource usage rate and other information. When the system guides the users, it sends the users guidance messages. These guidance messages contain information encouraging the users either to change the communication place, time or media. Upon receiving a guidance message, the user can judge whether or not to follow the guidance. When the user decides to follow the guidance, the user behaves as recommended (move, wait or change media) and requests a connection again. Depending on the spare communication resources, the call request may then be accepted or rejected. 2.3 Evaluation of Traffic Control by Influencing User Behavior We evaluated the effects of the traffic control by influencing user behavior using a method called multi-agent simulation. Multi-agent simulation is a method where multiple individual subjects (agents) that behave and make decisions autonomously are defined on a computer, and the global states resulting from the decisions each agent makes are observed. We have defined the users as agents and developed models of their behavior (movement, communication, and reaction to the guidance). The developed simulator is able to display and check the present position and communication status (standby/calling) of all the users existing in the simulation. Moreover, it allows observing status changes of various evaluation metrics (e.g., blocking probability) in realtime. In other words, it is possible to measure not only macroscopic results but also transient changes of status over time. Figure 2 shows the simulation screen. As a specific example, we selected a fireworks display for the simulation scenario. In this scenario, users move from a station in the vicinity of the fireworks site to the destination, and after the event is over, they walk back to the station. The blocking probability was evaluated for the two cases: the case in which our traffic control (influencing the users to move, wait, or change media) is applied, and the case in which no control is applied in a series of events from before the opening to the end- 35

ing of the fireworks display. The blocking Realtime display of evaluation metrics probability is determined as the number of blocked calls divided by the number of call attempts (including repeated calls). The simulation encompassed 2,500 individual agents (users). Each agent was set to make random calls independently at intervals of 2,000 to 5,000 seconds on average in order to generate traffic. In other words, we set the average number of call requests per second for all the users as a whole in the simulator to 0.5 to 1.25 requests per second to generate traffic enough to represent congested condition. Then, we observed changes in the characteristics Layout of base stations/train stations Zoomed view of agents mobility by changing the volume of traffic Figure 2 Simulation screen (degree of congestion). We set realistic values for the average holding time and interval between repeated 1.0 calls, 100 seconds and 15 seconds, respectively. Moreover, the average holding time at changing media was set to 1/10 of 0.8 No influence Move Wait Change media the normal time, i.e., 10 seconds. Figure 3 shows the blocking 0.6 probability characteristics obtained from the simulations. The results show that all the proposed methods of traffic control tend to decrease the blocking probability compared to the case 0.4 0.2 where no control is applied. In particular, recommending to Change media results in a dramatic improvement when the 0.0 0.5 1.0 1.5 traffic volume is large (high network load). On the other hand, Move and Wait are not so effective in the high load situation Traffic volume (average number of call requests per second) Figure 3 Blocking probability characteristics in terms of reducing the blocking probability. As a conse- quence of the lower blocking probability generated by our traffic control, the users can benefit from increased access to the this reason, we developed a model of the repeated call phenomenon and analyzed the traffic characteristics quantitatively. communication services. Repeated calls generated while influencing the user behaviors are complicatedly distributed and thus difficult to analyze. For this reason, it is important to understand the effects of repeated calls on the network performance evaluation quantitatively beforehand in order to design and operate such a system. 3.1 Theoretical Analysis Conventional methods of traffic analysis taking repeated calls into account have mainly been addressing the question of how much the blocking probability (evaluated using the Erlang- B formula) in a complete group loss system grows due to the presence of repeated calls. That is, the focus was on determining 3. Characteristics of Repeated Call Traffic To construct, operate and manage an information communication network, it is important to understand the effects of repeated calls, which facilitate congestion, quantitatively. For how high the extension of arrival ratio in the Poisson process should be set. Moreover, loss communication systems that include Markovian repeated calls have also been modeled and analyzed [2], but the models obtained are not suited for numerical calculation. Blocking probability 36

NTT DoCoMo Technical Journal Vol. 7 No.4 Arrival from outside the system (average arrival interval) Server group (service time) Yes Reattempt queue (average reattempt interval) Generation of repeated calls All servers are in use? Repeat calls? Yes To reattempt queue (ratio of reattempt) In this research, we incorporated the user behaviors in our model, whose calls were blocked from accessing services but do not wish to give up; these users are placed in a reattempt queue and wait for some time interval before repeating their service request (Figure 4). To analyze the results of this behavior, it is necessary to take into account reattempt queue and reattempt interval distribution (distribution of waiting time in the reattempt queue). The conditions we assumed in the analysis are shown below. The users calls arrive at the system independently and the interval of arrival follows an exponential distribution with parameter. If all servers (channels) are used, the users attempt repeated calls. The number of repeated calls varies depending on the user (and may, depending on the conditions, even vary for the same user). If the users are blocked from accessing a server, they repeat calls with a constant probability(0 1). The interval of repeating calls depends on the user and follows an exponential distribution with parameter. The service time when a user accesses to a server successfully (communication time) depends on the user and follows an exponential distribution with parameter µ. Using the model outlined above and obtaining the blocking probability and average waiting time by applying Little s formula * as well, we propose a new calculation method suited for numerical calculation [3]. No No Give up and exit the queue (ratio of giving up 1 ) Figure 4 Repeated call model Service completed 3.2 Simulation Analysis In conventional research, repeated calls meant redials where people would manually dial numbers again. For this reason, the reattempt interval was analyzed as an exponential distribution. Presently, however, it is possible to repeat calls using redial functions implemented in the terminals. Moreover, when the traffic is controlled by influencing user behavior, the characteristics of repeated calls vary depending on the method of influencing user behavior and become complicated. In the theoretical analysis, we assumed an exponential distribution for the reattempt interval distribution. However, when examining equipment design and traffic control, it is useful to estimate the influence of the reattempt interval distribution on the system performance by clarifying the effects on traffic characteristics by differences of reattempt interval distribution which is one of the user behaviors. For this reason, we evaluated the characteristics through simulation for four cases where the reattempt interval distribution is set to be an exponential distribution, a uniform distribution, 2-stage Erlang distribution and 2-stage hyper exponential distribution. As a result, it was found that the blocking probability (the ratio of customers giving up and withdrawing from the redial queue) does not depend on the reattempt interval distribution [3]. In other words, it became clear that it is necessary to measure the average reattempt interval as far as design, control and operation are conducted based only on the blocking probability, but it is not necessary to obtain any other statistical information. 4. Conclusion This article provided an overview of a traffic control method that relies on influencing user behavior by providing guiding information to them and investigated its effects. Characteristics of repeated calls which cause a congestion was also introduced. In the future, we intend to study how the customer satisfaction level can be quantified based on subjective evaluation using questionnaires, as well as methods for modeling the users communication activities. Moreover, we plan to further examine specific methods of influencing users, such as contents and delivery means of information to users, and evaluating them from the perspective of customer satisfaction. * Little s formula: If the arrival rate of user calls to a system is denotedand the average number of users waiting in the system denoted L, then the average waiting time from the time calls arrive at a system until processing is completed, W, is given by the relation W=L/. 37

References [1] S. Kaneda, Y. Akinaga, N. Shinagawa and A. Miura: Traffic Control by Influencing Users Behavior in Mobile Networks, The 19th International Teletraffic Congress, in Proc. 6a, pp.583 592, Aug. 2005. [2] K. Udagawa and E. Miwa: A Complete Group of Trunks and Poissontype Repeated Calls which Influence It, The IEICE Transactions, Vol. 48, No. 10, pp.40 49, 1965 (in Japanese). [3] A. Takahashi, Y. Takahashi, S. Kaneda, Y. Akinaga and N. Shinagawa: The Robustness of Blocking Probability in a Loss System with Repeated Customers, Proc. ICETE2005, Vol. II, pp. 60 65, Oct. 2005. 38