Study of Guard-Channel-Based Call Admission Control Schemes for 4G Cellular Networks Faisal Iradat Center for Computer Studies, Institute of Business Administration, Karachi firadat@iba.edu.pk Dr. Sayeed Ghani Center for Computer Studies, Institute of Business Administration, Karachi sghani@iba.edu.pk Abstract The success of next generation mobile and wireless networks will significantly depend on the performance of Call Admission Control (CAC) schemes which contributes to the overall network performance. Due to the limited availability of resources, mobility of users, and quality of service (QoS) provisioning for applications whose demand and nature are highly heterogeneous, CAC schemes now play a more central role in QoS provisioning for next generation mobile and wireless networks such as 3G, B3G, WLAN, WiMAX and others. In this paper, we briefly review existing CAC schemes and examine the analytical methods employed by these schemes for computing new/handoff call blocking/dropping probabilities. The normalized approach for determining the new/handoff call blocking/dropping probabilities for the NewCall Bounding Scheme is further investigated in terms of the expected number of new/handoff call packets in the system in steady state. A performance comparison of these techniques is carried out via simulation and compared with analytical results. On the basis of this study we also suggest that the performance evaluation of an “effective holding time” approach of the guard-channel (GC) based CAC scheme be reexamined/addressed in a 4G cellular network. This is due to the higher efficiency and lower computational complexity of the said approach, as compared to other traditional and normalized approaches to the guard channel based CAC schemes. I. Introduction With the rapid advancement in the next generation of mobile and wireless networks, future telecommunication networks are targeted at providing a rich set of new wireless data and multimedia services along with the support of traditional voice service. The designers of these telecommunication networks face significant challenges due to the strict quality of service (QoS) requirements. These challenges are further exasperated due to the typical mobile and wireless issues such as limited availability of resources, user mobility, fading, shadowing, noise etc. In order to cope with these challenges, the next generation of wireless technologies will have to incorporate radio resource management (RRM) mechanisms that efficiently utilize the available resources. RRM plays a critical role in the provisioning of QoS in wireless systems. The performance of these schemes in turn affects the overall network performance. Many researchers have proposed several radio resource management techniques but later on discovered through analysis and simulation that a sub area within RRM, called call admission control (CAC) is to be addressed more critically than RRM [1,2]. 1 Traditionally arriving new/handoff calls are either accepted or denied access to the network by the CAC scheme based on call handoff dropping probability or cell overload probability [3]. A CAC scheme controls the amount of traffic entering the network by either managing the number of call connections into the network or reducing the overall network load thus enabling the network to provide the desired QoS to new/handoff call connections. Various CAC schemes have been proposed in the past for different types of networks. Following are some of the prominent schemes that have been proposed for 3G, beyond 3G (B3G) and Asynchronous Transfer Mode (ATM) networks. For cellular networks such as 3G and B3G systems, several CAC schemes have been proposed such as the distributed call admission control [3], handoff density [4], two-dimensional Markov approximation approach [5], Hoeffding Bounds [6], Tangent at Peak [7], Tangent at Origin [7], Measure CAC[7], and Aggregated traffic envelops [7] in order to reduce the call handoff probability or cell overload probability. Whereas Non-statistical allocation, Peak bandwidth allocation, and statistical allocation call admission control schemes have been proposed for Asynchronous Transfer Mode (ATM) networks [8]. In the above networks, CAC schemes are only concerned with accepting or rejecting calls based on QoS requirements. On the other hand in upcoming wireless infrastructures such as the 4G ubiquitous wireless systems, there will be heterogeneous wireless access networks such as wireless local area network (WLAN), wireless metropolitan area network (WiMAX) etc. Congestion control techniques for these sort of wireless systems are expected to be far more complex than traditional cellular network systems in the sense that the proposed CAC scheme should now be capable of also selecting the best access network and at the same time supporting QoS requirements and user mobility. For such heterogeneous networks, several solutions have recently been studied such as the WLAN voice manager [9], ranking schemes [2], call admission and rate control scheme (CARC) [10], Distributed Call Admission Control scheme for non-uniform traffic [11], thinning schemes [12], Differentiated Treatment to Multimedia Traffic at Link Layer Framework [13], Dynamic Programming Based Approach in Polynomial Time [14], and Stable Dynamic CAC (SDCA) [15] for call admission control purposes. Future telecommunications networks such as the 4G cellular networks aim to provide differentiated services such as traditional voice, data, and multimedia with the desired QoS to service providers. From the call management perspective, in such type of networks normally handoff calls are assigned higher priority over new calls as call dropping (which occurs when the network is unable to provide resources to a call for it to be handed off to another cell) is more intolerable to mobile users than call blocking. Handoff priority-based CAC schemes is the area where most of the recent research on CAC for wireless networks has been studied in depth in the recent past as compared with other schemes discussed previously [5,12,16,17]. In this paper we explore these CAC schemes briefly and examine the analytical methods employed by these 2 schemes for computing new / handoff call blocking / dropping probabilities. The normalized approach for determining the new/handoff call blocking/dropping probabilities for the New-Call Bounding Scheme is further investigated in terms of the expected number of new/handoff call packets in the system in steady state [En(L) & Eh(L)]. Finally, suggest that the performance evaluation of the “effective holding time” approach of the guard-channel based CAC scheme be reexamined / addressed in a 4G cellular network. The rest of this paper is organized as follows. In Section II we briefly present the different Guard-Channel (GC) schemes. Next, in section III we study the performance of the New-Call Bounding Scheme in detail. Results of simulation and analysis are presented in this section. In section IV we review the “effective holding time” approach of the guard-channel based CAC scheme. Finally section V summarizes our findings and discusses future research areas. II. Brief Overview of Guard-Channel Based CAC Schemes In a wireless mobile / cellular network environment, call dropping is more intolerable than call blocking from the mobile users aspect. As a result most of the CAC schemes proposed, give higher priority to handoff calls than to news calls. Handoff priority-based CAC schemes proposed in [5,12,16,17], are classified in two broad categories, as described below. 1. Guard Channel (GC) schemes: In guard channel based schemes some channels are reserved for handoff calls. Following are the four different types: New Call Bounding Scheme [5]: In the new call bounding scheme, a threshold is enforced on the number of new calls accepted into the cell. If the number of new calls in a cell is less than a threshold K than a new call will be admitted. Cutoff Priority Scheme [18,19,20]: In the cutoff priority scheme, new calls are admitted only if the number of busy channels is less than a threshold m. Fractional GC Scheme [17]: This is also called as the Thinning Scheme, in which new calls will be selectively blocked when the cell traffic increases. More specifically, new calls are admitted with probability i when the number of busy channels is i. Based on this probability a new call is either admitted or blocked. By assigning different values to i this scheme can be reduced to the cutoff priority scheme [17] that has been discussed earlier. As this scheme is quite similar to cutoff priority scheme, it will not be presented in detail, in this paper. n c 1 h q(c 1) cq(c) h n c=1,….,C (1) Here q(c) denotes the equilibrium channel occupancy probability when exactly c channels are occupied in a cell and h , h and n , n are the arrival and departure rates for handoff calls and new calls respectively. c is the number of occupied channels in a cell. Rigid Division Based Scheme [21]: In this scheme all channels are divided into two groups: one for common calls and the other for handoff calls. This scheme does not efficiently utilize the available resources and mentioned for reference only. 3 2. Queuing Priority (QP) schemes: In these schemes if channels are free than calls will be accepted. When all channels are busy either new calls are queued and the handoff calls are blocked, or new calls are blocked and handoff calls are queued, or all arriving calls are queued with certain rearrangements in the queue [22,23,24,25,26]. These schemes are restrictive to the GC schemes presented earlier [17]. Secondly, they cannot be compared with other GC schemes as the protocol is quite different [17]. In recent research [5,17] the above mentioned GC based CAC schemes were examined using the Markov chain models. In a traditional circuit switched network, the one-dimensional Markov chain model was used under the assumption that all arrivals are modeled as Poisson and the channel holding time and channel residence time are modeled as exponential with predetermined channel bandwidth [27,28]. However with the rapid evolution of cellular networks, the Markov chain model used for obtaining blocking/dropping probabilities for new/handoff calls becomes more complex as the new and handoff calls may have different average holding times and worse, different distributions. This problem may be solved with use of multidimensional Markov chain model but these suffers from the curse of dimensionality thus making them much more complex as compared with the onedimensional Markov chain models [29]. Many researchers attacked this problem with the assumption that the channel holding times for new/handoff calls are identically distributed with the same average values. However this assumption is inappropriate as new and handoff calls may have quite different distributions and average holding times [30,31]. To avoid such complexities associated with multidimensional Markov chain models, approximations have been used that have high accuracy and low computational complexity with the condition that the approximation is based on a onedimensional Markov chain model with exponentially distributed holding times for new / handoff calls however with different average values [5,17]. III. Performance of New Call Bounding Scheme using Simulation and Analysis In this section we will briefly discuss the performance of the new call bounding scheme using the traditional and the normalized analytical methods proposed in [5,17]. The assumptions made are that the arrival process of the new/handoff calls are modeled as Poisson, and the average channel holding times are different, and are exponentially distributed. Resulats of a simulation written in C++ are given and compared to analytical results as well. In the traditional approach, the blocking/dropping probabilities are derived for new/handoff calls with the assumption that the new/handoff calls have the same average values and channel holding time distributions. This system is approximated as one-dimensional Markov chain model with a fixed channel holding time for the total cell traffic [5]. In the normalized approach [5], the results are improved by normalizing the average service times for new/handoff calls to unity rather than equal average channel holding time. The performance of the new call bounding 4 scheme is discussed as follows: As presented earlier in section II, if we use the call admission control scheme given in section II for the new call bounding scheme, Handoff calls (n2) we get the following transition diagram (Fig. 1) which is modeled by a two-dimensional Markov chain model (Please refer to appendix A for nomenclature). New Calls (n1) Fig. 1. State transition diagram for the new call bounding scheme (Source [5]) The steady state probability p(n1, n2) can be determined as given below (2) by solving the global balance equations from the state transition diagram as shown in Fig. 1. n1 and n2 represents new calls and handoff calls. p(n1 , n2 ) Where n nn hn 1 2 n1! n2! p(0,0) (2) n and h h represents the n h traffic intensities for new/handoff calls (please refer to appendix A for nomenclature). Due to the inherent complexity associated with the two-dimensional Markov chain model, in the normalized approach the new/handoff calls blocking/dropping a probabilities ( nb and a nh ) are determined under the assumption that the service rate of new/handoff calls equals to 1 (please refer to appendix B for blocking/dropping probabilities of the new call bounding scheme for the normalized approach) [5,17]. Whereas, the traditional approach uses fixed average channel holding time av for total cell traffic is given by: 1 n 1 h 1 n h (3) av n h n n h h n h 1 1 By replacing and in the formulas for n h new/handoff call blocking/dropping probabilities of the normalized approach (please refer to appendix B for blocking/dropping probabilities of the new call bounding scheme for the normalized approach) we get the traffic intensities for new/handoff calls in the resulting onedimensional Markov chain model for the traditional approach (please refer to appendix B for blocking/dropping 5 probabilities of the new call bounding scheme for the traditional approach). In order to compare the normalized versus traditional approaches a simulation was also conducted, written in C++. The simulation made the same assumptions as noted above for traffic and call admission control. Results of the simulation and analytical expressions are discussed below. When the new call bounding scheme is investigated under fixed handoff holding times and varying new call holding times (K=15, C=30, 1/λn=30, 1/µn=changes from 200 to 600, 1/λh=30, 1/µh=450), it is apparent from Fig. 2 that the traditional approach overestimates the normalized approach when handoff call traffic load is higher than new call traffic load whereas the traditional approach underestimates handoff call blocking probability of the normalized approach as shown in Fig. 3. Figure 4 shows the graph of average number of new/handoff calls in a cell in steady state for different new call traffic loads ( n ). Fig. 4. Average number of New/Handoff calls in a cell in steady state * * N and T denotes the Normalized and Traditional Approaches, n and h denote new/handoff, S and A denote Simulation / Analytical On the other hand when the new call bounding scheme is investigated under varying handoff holding times and fixed new call holding times (K=20, C=30, 1/λn=30, 1/µn=300, 1/λh=30, 1/µh= changes from 100 to 1200), it is observed from Fig. 5 and Fig. 6 that the new call blocking probability and handoff call blocking probability are similar in value. This makes sense because due to the heavy traffic load incurred from handoff calls the new calls will not be able to reach a bound. However, the traditional approach is close but not the same as the normalized approach. . Figure 7 shows the graph of average number of new/handoff calls in a cell in steady state for different handoff traffic loads ( h ). Fig. 2. New call blocking probability in the new call bounding scheme* Fig. 5. New call blocking probability in the new call bounding scheme * Fig. 3. Handoff call blocking probability in the new call bounding scheme* 6 chain model. All that is required is a better approximation method. Fig.6. Handoff call blocking probability in the new call bounding scheme * N and T denotes the Normalized and Traditional Approaches, n and h denotes new/handoff, S and A denotes Simulation / Analytical * In the “effective holding time approach”, equation (1) is simplified by replacing the average holding times for new/handoff calls with the average channel holding time for the total traffic also referred to as average 1 effective channel holding time . In this eff case we would replace 1 eff rather than 1 avg 1 n N and T denotes the Normalized and Traditional Approaches, n and h denotes new/handoff, S and A denotes Simulation / Analytical * Review of the “effective holding time” approach of the guardchannel based CAC scheme From the results presented in the previous section we can determine that the normalized approach performs better than the traditional approach [17]. However in order to further improve the results while keeping the complexity low, a new approach called the “effective holding time approach” was proposed which produced better results when compared with the existing approaches discussed earlier [17]. IV. To keep the computational complexity low it is useful to reduce the two-dimensional Markov chain model to a one-dimensional 1 h with as in the traditional approach. We cannot use the Fig. 7. Average number of New/Handoff calls in a cell in steady state * and 1 avg average since the average channel holding times for total cell traffic have different blocking probabilities for new / handoff calls. The 1 average is obtained from the idea eff proposed in [29] which is also referred to as the knapsack problem approach (please refer to appendix B for locking/dropping probabilities of the cutoff priority scheme for the “effective holding time” approach) [17]. In order to evaluate the performance, the numerical results obtained from this scheme i.e. the “effective holding time approach” was compared with those obtained from the existing traditional approach, normalized approach, and the direct approach. The exact method that is used for determining the actual values of a multidimensional Markov chain model using the “LU decomposition” is referred to as the direct approach [17]. Through the comparison (Fig. 8 and Fig. 9) it was observed that the traditional approach and normalized approaches deviate significantly from the direct and the “effective holding time approach”. The 7 “effective holding time approach” results are very close to the actual results obtained from the direct method and seem as the best fit as a future GC based CAC scheme for wireless network. Fig. 8. New call blocking probability in the effective holding time approach [17]. call blocking probability in the effective holding time approach [17]. Fig. 9. Handoff In summation, the traditional approach overestimates whereas the normalized approach underestimates the direct approach. V. Summary and Future Work In this paper we critically reviewed existing guard-channel based CAC schemes proposed in [5,17] in order to determine the approach that gives more accurate results when compared with other approaches. It was learnt that the two-dimensional Markov chain model solves the problem when the average channel holding times for the new and handoff calls are significantly different. However as the dimensions of the Markov chain model increase due to distinct traffic type’s e.g. video, voice, and packetized data, the computational complexity increases and at times becomes virtually impossible to analyze exactly due to, the asymmetric nature of the states in a Markov chain transition diagram. Hence it was noted that it is useful to attempt reducing/approximating the two-dimensional Markov chain model with a one-dimension Markov chain model. All GC scheme approximate a twodimensional Markov chain model with a one-dimensional Markov chain model using different approaches referred to as the traditional approach, normalized approach, and the effective holding time approach. It has been shown that the “effective holding time approach” outperforms the traditional and normalized approaches in terms of accuracy and low computational complexity. Hence in order to evaluate CAC schemes for a 4G network environment, which will require handling of multiclass services we suggest that the “effective holding time” approach be used and further studied. References [1] Hossam Ahmed, “Call Admission Control in wireless Networks: A Comprehensive Survey”, IEEE Communications Survey & Tutorials, Volume 7, No. 1, First Quarter 2005. [2] Robert Achieng and H. Anthony Chan, “A QoS Enabling Queuing Scheme for 4G Wireless Access Networks”, ACM – IWCMC, July 2006. [3] M. Naghshineh, and M. Schawrtz, “Distributed Call Admission Control in Mobile/Wireless Networks”, International Symposium on Personal Indoor Mobile Radio Communications, IEEE, September 1995. [4] Q. Gao and A. Acampora, “Performance Comparison of Admission Control Strategies for Future Wireless Networks”, Proc. IEEE wirelss Communication and Network Conference, WCNC2002, vol. 1, Mar. 2002, pp. 317-21. 8 [5] Y. Fang and Yi Zhang, “Call Admission Control Schemes and Performance Analysis in Wireless Mobile Networks”, IEEE Trans. Veh. Technol., Vol 51, no. 2, pp. 371-382, Mar. 2002. [6] G. Razzano and A. Curcio, “Performance Comparison of Three Call Admission Control Algorithms in a Wireless Ad Hoc Network”, Proc. Int’l Conf. Commun. Tech. (ICCT 2003), vol. 2., Apr. 2003, pp. 1332-36. [7] L.Breslau and S. Jamin, “Comments on the Performance of Measurement-Based Admission Control Algorithms”, Proc. IEEE INFOCOM 2000, vol. 3, Mar. 2000, pp. 1233-41. [8] H. G. Perros, and K. M. Elsayed, “Call Admission Control Schemes: A review”, IEEE Communications Magazine, Nov. 1996, vol. 34., no. 11, pp. 82-91. [9] Yi Qian, Qingyang Hu, Hsiao-Hwa Chen, “A Call Admission Control Framework for Voice over WLANS”, IEEE wireless communications, February 2006. [10] H. Zhai, X. Chen, and Y. Fang, “A Call Admission and Rate Control Scheme for Multimedia Support over IEEE 802.11 Wireless LANs”, QSHINE 04, 2004. [11] J. Kim, E. Jeong, and J. Cho, “Call Admission Control for Non-uniform Traffic in Wireless Networks”, Electronic letters, January 2000. [12] Y. Fang, “Thinning Schemes for Call Admission Control in Wireless Networks”, IEEE transactions on Computers, Vol. 52, No. 5, May 2003. [13] R. Jayaram, S. K. Das, S. K. Sen, “A Call Admission and Control Scheme for Quality of Service (QoS) Provisioning in Next Generation Wireless Networks”, Baltzer Journal, 2000. [14] S. Ganguly, B. Nath and N. Goyal, “Optimal Bandwidth reservation Schedule in Cellular Networks”, IEEE INFOCOM 2003, 2003. [15] S. Wu, K. Wong, and B. Li, “A Dynamic Call Admission Policy with Precision QoS Guarantee using Stochastic Control for Mobile Wireless Networks”, IEEE Transactions on Networking, Vol 10, No. 2, April 2002. [16] I. Katzela and M, Naghshineh, “Channel assignment schemes for cellularmobile telecommunication systems: A comprehensive survey”, IEEE Personal Commun., vol. 3, pp. 1031, June 1996. [17] A. Yavuz and C. M. Leung, “Computationally efficient method to evaluate the performance of GuardChannel-Based call admission control in cellular networks”, IEEE Trans. on Veh. Techno.., vol. 55, no. 4, July 2006. [18] R. A. Guerin, “Queuing–blocking system with two arrival streams and guard channels,” IEEE Trans. Commun., vol. 36, no. 2, pp. 153–163, Feb. 1988. [19] D. Levine, I. Akyildiz, and M. Naghshineh, “A resource estimation and call admission algorithm for wireless multimedia networks using the shadow cluster concept,” IEEE/ACM Trans. Netw., vol. 5, no. 1, pp. 1–12, Feb. 1997. [20] C. Oliveira, J. B. Kim, and T. Suda, “An adaptive bandwidth reservation scheme for high-speed multimedia wireless networks,” IEEE J. Sel. Areas Commun., vol. 16, no. 6, pp. 858–874, Aug. 1998. [21] M. D. Kulavaratharasah and A. H. Aghvami, “Teletraffic performance evaluation of microcell personal communication networks (PCN’s) with prioritized handoff procedures,” IEEE Trans. Veh. Technol., vol. 48, no. 1, pp. 137–152, Jan. 1999. 9 [22] R. A. Guerin, “Queuing–blocking system with two arrival streams and guard channels,” IEEE Trans. Commun., vol. 36, no. 2, pp. 153–163, Feb. 1988. [23] E. D. Re, R. Fantacci, and G. Giambene, “handover queuing strategies with dynamic and fixed channel allocation techniques in low earth orbit mobile satellites systems”, IEEE Transc. Commun., vol. 47, no. 1, pp. 89-102, 1999. [24] C. H. Yoon and C. K. Un, “Performance of personal portable radio telephone systems with and without guard channels”, IEEE J. Select. Areas Commun., vol. 11, no. 6, pp. 911-917, 1993. [25] C. Chang, C. J. Chang, and K. R. Lo, “Analysis of a hierarchical cellular system with reneging and dropping for waiting new calls and handoff calls,” IEEE Trans. Veh. Technol., vol. 48, no. 4, pp. 1080–1091, Jul. 1999. [26] V. K. N. Lau and S. V. Maric, “Mobility of queued call requests of a new call queuing technique for cellular systems,” IEEE Trans. Veh. Technol., vol. 47, no. 2, pp. 480–488, May 1998. [27] R. Guerin, “Equivalent capacity and its application to bandwidth allocation in high-speed networks,” IEEE J. Sel. Areas Commun., vol. 9, no. 7, pp. 968– 981, Sep. 1991. [28] Q. Ren and G. Ramamurthy, “A realtime dynamic connection admission controller based on traffic modeling, measurement, and fuzzy logic control,” IEEE J. Sel. Areas Commun., vol. 18, no. 2, pp. 184–196, Feb. 2000. [29] A. Gersht and K. J. Lee, “A bandwidth management strategy in ATM networks,” GTE Laboratories, Waltham, MA, 1990. Tech. Rep. [30] Y. Fang and I. Chlamtac, “Teletraffic analysis and mobility modeling for PCS networks,” IEEE Trans. Commun., vol. 47, no. 7, pp. 1062–1072, Jul. 1999. [31] Y. Fang, I. Chlamtac, and Y. B. Lin, “Channel occupancy times and handoff rate for mobile computing and PCS networks,” IEEE Trans. Comput., vol. 47, no. 6, pp. 679–692, Jun. 1998. Appendix – A C Number of channels in a cell. c Number of occupied channels in a cell. K Threshold for new call bounding scheme. m Threshold for the cutoff priority scheme. Arrival rate for new calls. n h 1 n Arrival rate for handoff calls. Average channel holding time for new calls. 1 h Average channel holding time for handoff calls. 1 eff Average effective channel holding time. n h Traffic intensities for new calls. Pnb Phb Blocking probability for new calls. Traffic intensities for handoff calls. Dropping probability for handoff calls. a nb P Blocking probability for new calls from the normalized approximation. Phba Dropping probability for handoff calls from the normalized approximation. Pnbt Blocking probability for new calls from the traditional approximation. Phbt Dropping probability for handoff calls from the traditional approximation. Pnbeff Blocking probability for new calls from the effective holding time approximation. Phbeff Dropping probability for handoff calls from the effective holding time approximation. Admission probability for new calls in i fractional guard channel (GC) scheme q (c ) Equilibrium occupancy probability. q (c ) Approximate equilibrium occupancy probability. 10 Appendix – B 1. New Call Bounding Scheme Normalized Approach nK hK C K Pnba K! K 1 n2 ! n2 0 n1 0 K hC n 1 1 n1! (C n1 )! n1 C n1 n hn n2 0 2 n! n ! n1 0 K Pnba nn nn 1 2 hC n n ! (C n )! 1 n1 0 1 K 1 n1 C n1 n 1 n2 h n! n ! n1 0 1 n2 0 2 Traditional Approach n n n ( n h ) av n h n h n ( n h ) av n h Replace the given traffic intensities in the equations for normalized approach (new call bounding approach) given above (1.1) to get the probabilities for the traditional approach. 2. Effective Holding Time Approach C 1 n . j .q ( j ) Pnbeff 1 j 0C n .q ( j ) j 0 C 1 Phbeff 1 . .q ( j ) j 0 C h j .q ( j ) j 0 h 11