Neuro-fuzzy admission control in mobile communications systems

Size: px
Start display at page:

Download "Neuro-fuzzy admission control in mobile communications systems"

Transcription

1 University of Wollongong Thesis Collections University of Wollongong Thesis Collection University of Wollongong Year 2005 Neuro-fuzzy admission control in mobile communications systems Raad Raad University of Wollongong Raad, Raad, Neuro-fuzzy admission control in mobile communications systems, PhD thesis, School of Electrical, Computer and Telecommunications Engineering, University of Wollongong, This paper is posted at Research Online.

2 NOTE This online version of the thesis may have different page formatting and pagination from the paper copy held in the University of Wollongong Library. UNIVERSITY OF WOLLONGONG COPYRIGHT WARNING You may print or download ONE copy of this document for the purpose of your own research or study. The University does not authorise you to copy, communicate or otherwise make available electronically to any other person any copyright material contained on this site. You are reminded of the following: Copyright owners are entitled to take legal action against persons who infringe their copyright. A reproduction of material that is protected by copyright may be a copyright infringement. A court may impose penalties and award damages in relation to offences and infringements relating to copyright material. Higher penalties may apply, and higher damages may be awarded, for offences and infringements involving the conversion of material into digital or electronic form.

3 6. Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 6.1. Outline In the previous two chapters multi-service mobile networks with fixed bandwidth reservation were studied. One conclusion that was made was that as cells get smaller, bandwidth reservation becomes less effective in guaranteeing better performance for handover connections. In this chapter, connection admission control and adaptive bandwidth reservation using fuzzy logic is investigated. In Section 6.2 fuzzy logic is used heuristically to design an adaptive bandwidth reservation scheme that modifies the amount of bandwidth reserved depending on the handover rate. In Section 6.3 fuzzy logic is then applied to the admission control problem where the velocity of the mobile terminal as well as the bandwidth available (in surrounding cells) are taken into account before a connection is admitted. 152

4 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Adaptive Fuzzy Bandwidth Reservation As discussed in earlier chapters, handover call blocking is more undesirable from a user s point of view than new call blocking. Hence, the handover grade of service (GoS) should be kept under certain constraints. One method that has was investigated in Chapters 4 and 5 was fixed bandwidth reservation. Fixed bandwidth reservation is simple but is not adaptive to the network conditions. To guarantee a certain GoS, a network designer has to dimension each cell for the maximum network load. To maintain the performance of handover blocking, adaptive bandwidth reservation could be used. Adaptive bandwidth reservation attempts to modify the bandwidth being reserved in the cell to meet handover blocking probability constraints. For example, more bandwidth is reserved when the handover rate into a cell increases. There are different proposals for implementing adaptive bandwidth reservation. One is to make certain assumptions about the entire network, derive an approximate model and implement the model in a controller. [NAG1996] for example, has proposed such a method. In most cases simplifying assumptions have to be made in order to make the problem tractable (as was done in Chapters 4 and 5), namely that cell dwell and call holding times are exponentially distributed and that the arrival processes of both new and handover calls are poissonian. While these assumptions hold for larger cells, this may not be true as the cell sizes shrink down. In fact studies in [CHL1995] and [ZAN1996] show that lognormal and gamma distributed call holding and dwell times apply when cells become micro or pico-cellular. Fuzzy logic gives a methodology for numerically designing control systems that seem complex and intractable. In this chapter we propose the use of an adaptive

5 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 154 fuzzy reservation (AFR) scheme to control the amount of reserved bandwidth based on the measured handover rate into a cell. Fuzzy logic allows the design of the controller to be individually adaptable to a particular cell and hence has the potential of allowing better utilisation of bandwidth under particular conditions. In this section, a fuzzy logic controller is designed heuristically and then further refined. Using the design process as in [LIN1996], Figure 6.1 shows the formal design of the Fuzzy Logic Admission Controller based on the data collected from the cellular network simulations. Input Data from External Source Fuzzy Algorithm Design Data Output Data to external world Figure 6.1. Formal design of Fuzzy Logic Admission Controller. The design data in the Figure 6.1 was generated from a simulation of a cellular network. The new call rate was kept constant, while the handover rate was increase and the blocking probability of handover calls was measured. This is also carried out for different values of the number of reserved channels. The design data was then used to generate and modify membership functions. These membership functions in effect stored the design data in a form that can be applied when an input is received that falls within the design range. In this case the input signal is the handover call rate, and the output signal is the number of

6 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 155 channels that have to be reserved in order to maintain the handover blocking probability. This is clearly shown in Figure 6.1 as the top and bottom states. The Fuzzy Algorithm at the heart of the Fuzzy Logic Admission Controller is shown in the three IF-THEN rules that were initially chosen. The rules dictate how the different membership functions interact to come to the final output signal. These rules were arrived at through trial and error. Three rules were found to be insufficient to represent the data set and eventually more rules were added to better represent the design data, which is to adapt the number of reserved channels to the handover rate. The Fuzzy interference engine or algorithm is shown is more detail in Figure 6.2. More detailed examples of how the calculations are done are shown in Chapter 3. Step 1: Input Data Processing Step 2: Fuzzification Input Data Step 3: Left Hand Computation. (AND operations) Fuzzy Inference Step 4: Right Hand Computation. (OR operations) Output Data Step 5: Output Data Processing Figure 6.2. The Fuzzy Inference Engine.

7 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 156 A fuzzy logic controller was designed with one input and one output. The input and output are the handover rate into the cell and the amount of bandwidth to reserve, respectively. Figures 6.3 and 6.4 show the input and output membership functions of the initial design. Here it is assumed that the new connection load remains constant while handover load into a cell is allowed to vary (hence the single input). Each variable has three membership functions. The handover rate is either: Low, Normal or High and the capacity (to reserve) is either: Low, Moderate or High. Hence the fuzzy logic rules for this case are: IF (handover rate is Low) THEN (capacity reserved is Low). IF (handover rate is Normal) THEN (capacity reserved is Moderate). IF (handover rate is High) THEN (capacity reserved is High). Figure 6.5 shows the amount of bandwidth that needs to be reserved as the handover rate increases (i.e. it is the output of the fuzzy rules stated above when applied to the membership functions in Figures 6.3 and 6.4). The parameters for this simulation were chosen heuristically based on extensive knowledge of the network simulation. The figure shows that there are plateaus around the decision points (where the handover rate goes from Low to Moderate to High). This gives fuzzy logic a more stable performance than other schemes when the input data is being measured from the real world and entered into the system. For instance, there are going to be variations and inaccuracies in the measured data. Hence there has to be a significant shift in the input conditions to bring about a change in the output result. The handover rate has to shift an appropriate value before the decision is made to shift the amount of bandwidth to reserve.

8 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Low Normal High Degree of membership Handover rate (calls/sec) Figure 6.3. Membership functions of the input handover rate. 1 Low Moderate Degree of membership High Capacity (% of Total) Figure 6.4. Membership functions of the reserved capacity. The designed fuzzy logic controller was used in a simulation and tested for the required GoS requirements. In the simulation, it was assumed that the cell dwell time is 100 seconds, the new call holding time is 100 seconds and both are assumed to be exponentially distributed. The simulated cellular network was assumed to have a ring structure and hence made handover implementation simpler without compromising the results. All the simulations were run independently until the error between separate runs was less than 5%. The measured data (the handover rate into a cell) was exponentially smoothed before being used as an input to reduce the noise due to the short sampling rate, which was 180 seconds. The sampling period was picked based on the handover rate so that a meaningful value could be obtained, while at the same time being short enough to be able to react to fast changing conditions.

9 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Capacity (Fraction) Handover rate (calls/sec) Figure 6.5. The reserved capacity versus the handover rate. The initial design (stated above) did not meet the required GoS in the simulation. The GoS was set at for handover calls, (this probability is the highest value that is acceptable from a user s point of view and most service providers aim for or lower). The reason for the initial design not being able to meet the GoS constraint is that the amount of bandwidth being reserved in the High state was not sufficient. A more accurate representation of the process was required and hence more membership functions were added. Figures 6.6 and 6.7 show the new membership functions for the handover rate and the capacity to reserve. This number of membership functions came about through trial and error. This is a weakness of fuzzy logic in some respects, but a neuro-fuzzy approach is implemented in Chapter 7 which allows the automatic determination and training of the fuzzy sets. Figure 6.8 shows the resulting reservation output for all handover inputs. The figure shows that the plateaus are still evident but have been reduced in width as more membership functions were added.

10 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 159 Mod High High Very High 1 Low Normal Extremely High 0.8 Degree of membership Extremely Very High Handover rate (calls/sec) Figure 6.6. The new input membership functions for handover rate. moderate Modhigh high llow Very high Extremely High Extremely very high Degree of membership Capacity (Fraction of Total) Figure 6.7. The output membership functions of the modified fuzzy logic contoller design Reserved Bandwidth (Fraction 0.04 of Total) Handover rate (calls/sec)

11 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 160 Figure 6.8. The output of fuzzy logic reservation with 1 input obtained from the modified fuzzy logic controller design. The new and handover connection blocking results are shown in Figure 6.9. The figure shows that the modified fuzzy logic controller is able to maintain the handover call blocking rate at by reserving the appropriate amount of bandwidth based on the measured handover rate in the simulation. The results in Figure 6.9 are also compared to the fixed bandwidth reservation case where a fixed amount of bandwidth is reserved to maintain a better handover blocking rate. In this case the fixed amount of reservation is 30kb/sec. The figure shows that for a new call arrival rate of 0.82 calls/sec, the performance of fixed bandwidth reservation has been optimized for this set of conditions by producing a new call blocking rate of 0.02 and a handover call blocking rate of Hence the adaptive fuzzy reservation (AFR) is being compared against the best possible fixed bandwidth reservation scheme (FR3 in Figure 6.9). In the fixed reservation case the handover blocking probability deteriorates to an unacceptable level once the handover rate increases. A further comparison of the AFR scheme and fixed bandwidth reservation is made through a cost factor. In this case the cost factor is calculated through the following equation: C = P + 10P n This cost factor C gives a weighting of 10 for each dropped handover call, where P n is the new call blocking probability and P h is the handover blocking probability. Figure 6.10 shows that as the load increases, the AFR significantly outperforms the most optimal fixed reservation scenario. h

12 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Blocking Probability AFR new call blocking AFR handover call blocking FR3 new call blocking FR3 handover call blocking New Call load in call/sec Figure 6.9. New and handover blocking probabilities obtained from a network simulation using the modified fuzzy logic controller (AFR) AFR FR Cost New Call load in call/sec Figure Cost Comparisons of Adaptive Reservation and Fixed Bandwidth Reservation.

13 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Velocity Based Fuzzy Logic Admission Control In Section 6.2, fuzzy logic-based dynamic bandwidth reservation was investigated. The results indicated that the GoS performance of handover connections can be maintained under dynamically changing conditions. In Section 6.2 only the new call rate was used as an input to the fuzzy controller. In this section, the objective is to determine whether by adding more information to the fuzzy logic controller it is possible to improve this performance further. Here, terminal velocity and congestion conditions in surrounding cells are taken into account before a connection is admitted to the network. By combining the velocity and bandwidth variables, the system is inherently taking into account the handover rate. (Recall from earlier chapters that the handover rate is dependent on the mean cell dwell time and mean call holding time. The velocity, in combination with the cell size is used to determine the mean cell dwell time). The main advantage of considering velocity as a separate input is that a group of fast moving or slow moving terminals can be separated out using the fuzzy controller Velocity Based Admission Control A new fuzzy admission controller (FAC) that is based on three inputs: the current available bandwidth in the cell, the bandwidth availability in the next cell (the cell the mobile is most likely to handover to) and the velocity of the mobile terminal is thus proposed. The main objective of the FAC is to reject new connection attempts from mobile terminals that are likely to require many handovers when the current cell or neighboring cells are in a congested state. The idea is that a more accurate decision can be made about admission once this information is available.

14 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 163 The advantage of using fuzzy logic for such a scheme is quickly evident. By simply stating the IF THEN rules, the fuzzy logic admission controller is implemented. It would have been difficult to relate inputs such as velocity and bandwidth in an analytical sense (but it is possible with the admission boundary changing as a function of velocity and available bandwidth). However, it is also evident from Table 6.1 (which shows that 27 rules are needed to achieve the desired results) that fuzzy logic suffers from scalability problems and the number of rules grows exponentially as the number of inputs increases. The membership functions for the bandwidth availability in the current cell and in the next cell are shown in Figures 6.11 and 6.12, respectively. They were chosen in the following manner. Each variable has 3 membership functions: bandwidth being Available, Congested and Not Available. Both variables have the same membership functions but Figure 6.12 shows a zoomed-in view of the last two membership functions. The speed variable has 5 membership functions: Stationary, Slow, Average, Fast and Very Fast as shown in Figure For the output decision which is to accept or reject the call, there are four membership functions, Reject, Weakly Reject, Weakly Accept and Accept, which are shown in Figure The reason for having 4 membership functions for the output is that it allows a smoother transition between the Reject and Accept decisions than if only two membership functions were present. Table 6.1. The Fuzzy Rule Set for Fuzzy Admission Control. 1. If (Current Bandwidth is No Bandwidth) then (Decision is Reject) (1) 2. If (Current Bandwidth is congested) and (Next Bandwidth is Available) and (Speed is Very Fast) then (Decision is Accept) (1) 3. If (Current Bandwidth is congested) and (Next Bandwidth is Available) and (Speed is Fast) then (Decision is Accept) (1) 4. If (Current Bandwidth is congested) and (Next Bandwidth is Available) and (Speed is Average) then (Decision is Accept) (1) 5. If (Current Bandwidth is congested) and (Next Bandwidth is Available) and (Speed is Slow) then (Decision is Accept) (1) 6. If (Current Bandwidth is congested) and (Next Bandwidth is Available) and (Speed is Stationary) then (Decision is Weakly Accept) (1)

15 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks If (Current Bandwidth is congested) and (Next Bandwidth is congested) and (Speed is Stationary) then (Decision is Weakly Accept) (1) 8. If (Current Bandwidth is congested) and (Next Bandwidth is congested) and (Speed is Slow) then (Decision is Weakly Accept) (1) 9. If (Current Bandwidth is congested) and (Next Bandwidth is congested) and (Speed is Average) then (Decision is Weakly Accept) (1) 10. If (Current Bandwidth is congested) and (Next Bandwidth is congested) and (Speed is Fast) then (Decision is Weakly Accept) (1) 11. If (Current Bandwidth is congested) and (Next Bandwidth is congested) and (Speed is Very Fast) then (Decision is Weakly Accept) (1) 12. If (Current Bandwidth is congested) and (Next Bandwidth is No Bandwidth) and (Speed is Very Fast) then (Decision is Reject) (1) 13. If (Current Bandwidth is congested) and (Next Bandwidth is No Bandwidth) and (Speed is Fast) then (Decision is Weakly Reject) (1) 14. If (Current Bandwidth is congested) and (Next Bandwidth is No Bandwidth) and (Speed is Average) then (Decision is Weakly Accept) (1) 15. If (Current Bandwidth is congested) and (Next Bandwidth is No Bandwidth) and (Speed is Slow) then (Decision is Accept) (1) 16. If (Current Bandwidth is congested) and (Next Bandwidth is No Bandwidth) and (Speed is Stationary) then (Decision is Accept) (1) 17. If (Current Bandwidth is Available) and (Next Bandwidth is Available) then (Decision is Accept) (1) 18. If (Current Bandwidth is Available) and (Next Bandwidth is congested) and (Speed is Stationary) then (Decision is Accept) (1) 19. If (Current Bandwidth is Available) and (Next Bandwidth is congested) and (Speed is Slow) then (Decision is Accept) (1) 20. If (Current Bandwidth is Available) and (Next Bandwidth is congested) and (Speed is Average) then (Decision is Accept) (1) 21. If (Current Bandwidth is Available) and (Next Bandwidth is congested) and (Speed is Fast) then (Decision is Weakly Accept) (1) 22. If (Current Bandwidth is Available) and (Next Bandwidth is congested) and (Speed is Very Fast) then (Decision is Weakly Reject) (1) 23. If (Current Bandwidth is Available) and (Next Bandwidth is No Bandwidth) and (Speed is Very Fast) then (Decision is Reject) (1) 24. If (Current Bandwidth is Available) and (Next Bandwidth is No Bandwidth) and (Speed is Fast) then (Decision is Weakly Reject) (1) 25. If (Current Bandwidth is Available) and (Next Bandwidth is No Bandwidth) and (Speed is Average) then (Decision is Weakly Accept) (1) 26. If (Current Bandwidth is Available) and (Next Bandwidth is No Bandwidth) and (Speed is Slow) then (Decision is Accept) (1) 27. If (Current Bandwidth is Available) and (Next Bandwidth is No Bandwidth) and (Speed is Stationary) then (Decision is Accept) (1) The membership functions for the current and next cell bandwidth are generalized bell curves, while the membership functions for speed and the output decision are bell curves. Generalised bell curves have the same characteristic slopes as the bell curve but could take on a higher variance. This suits the amount of bandwidth better as this covers a wider range of values of available bandwidth than the standard bell curve. The standard bell curve is more

16 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 165 suited to the speeds where it is expected that different velocity classes of mobile vehicles have velocities that follow a bell curve. No Bandwidth 1 Available Congested 0.8 Degree of membership Current Bandwidth Figure Membership Functions of Current Bandwidth ( in number of channels) No Bandwidth 1 Available Congested 0.8 Degree of membership Next Cell Bandwidth Figure Membership Functions of Bandwidth Availability in the Next Cell (in Number of Channels).

17 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 166 Stationary Slow Average Fast Very Fast Degree of membership Speed Figure Membership Functions of Speed (km/h). Reject 1 Weakly Reject Weakly Accept Accept 0.8 Degree Of membership Decision Figure Membership Functions of the Output Decision.

18 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks The Fuzzy Rule Set The complete fuzzy rule set for the FAC was shown earlier in Table 6.1. While there are many rules (27 in all), only a few of then are critical. These are related to the Reject and Weakly Reject membership functions of the output decision. The critical set of rules is shown in Table 6.2. These include i) when either of the current cells have congestion conditions (i.e. they are using the last 5% of the available bandwidth) and the speed is fast or very fast then weakly reject. ii) when there is no bandwidth available in the next cell, and the speed is very fast then reject the connection. These rules were arrived at heuristically. Table 6.2. The critical set of rules. 12. If (Current Bandwidth is congested) and (Next Bandwidth is No Bandwidth) and (Speed is Very Fast) then (Decision is Reject) (1). 13. If (Current Bandwidth is congested) and (Next Bandwidth is No Bandwidth) and (Speed is Fast) then (Decision is Weakly Reject) (1). 22. If (Current Bandwidth is Available) and (Next Bandwidth is congested) and (Speed is Very Fast) then (Decision is Weakly Reject) (1). 23. If (Current Bandwidth is Available) and (Next Bandwidth is No Bandwidth) and (Speed is Very Fast) then (Decision is Reject) (1). 24. If (Current Bandwidth is Available) and (Next Bandwidth is No Bandwidth) and (Speed is Fast) then (Decision is Weakly Reject) (1) The Admission Control Surface The next four figures show the admission surface of the fuzzy admission controller. The admission surface indicates the output of the fuzzy controller. A higher value indicates that the connection is more likely to be admitted. Figure 6.15 shows the admission surface when bandwidth is available in the next cell (it was set to 50% of the total bandwidth in this example). Here the 50% value is chosen as a demonstration only to show what the admission surface would look

19 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 168 like when half the bandwidth is available. The figure shows that all connections are accepted except for the case when bandwidth is not available in the current cell. Figure 6.16 shows the admission surface when 95% of the bandwidth in the next cell is in use. Since the boundary for accepting or rejecting is chosen to be 5% of the total bandwidth, in this case the same admission surface is obtained as in Figure However, the results in Figure 6.16 show that mobile terminals traveling at high speed have a lower admission value than those traveling at lower speeds. Figure 6.17 shows the admission surface when the bandwidth usage in the next cell is in the congested state (97% of bandwidth is unavailable). The figure shows that as speeds exceed the 100 km/h, most connections are being rejected. It also shows that there is an error when the current bandwidth is 99 channels- it is still allowing connections to be made. This error was later corrected as the membership functions of the admission controller were tuned. The error is shown here to highlight another potential problem with heuristically designing a fuzzy logic controller. The outputs have to be carefully inspected to make sure that they display the correct behavior. In Chapter 7, a neuro-fuzzy approach is used which relies on collected data to build the fuzzy controller and hence significantly reduces these types of errors. Figure 6.18 shows that when no bandwidth is available in the next cell, blocking of connections occurs past the 60 km/h mark. In Figures , the decision output is a value between 0 and 10. The values simply indicate, how correct a decision is, but in this case, any value that is greater than 5 is considered as admit and reject is used otherwise. A hard limit was obtained here to get a better indication of the blocking probabilities, but the range of values from the admission surface (0 to 10) can be utilized to make a fuzzy admission decision. For example, this value could be used to admit the connection but with reduced bandwidth based on the admission value.

20 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 169 Current Bandwidth (Channels) Speed (km/h) Figure Admission Surface Obtained when Bandwidth in the Next Cell is Available. Current Bandwidth (Channels) Speed (km/h) Figure Admission Surface Obtained when Bandwidth in the next Cell is Nearly Congested.

21 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 170 Speed (km/h) Current Bandwidth (Channels) Figure Admission Surface Obtained when Bandwidth in the Next Cell is Congested. Figure Admission Surface Obtained when Bandwidth in the Next Cell is Not Available.

22 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Simulation Results for Velocity Based Admission Control The ring network simulation similar to the one used in Section was used. However this time instead of having a cell dwell time generated by an exponential distribution, mobile terminals belong to a certain speed category. Each speed category has a mean value and follows a Gaussian distribution. Once a mobile terminal commences a connection at a particular speed that speed is kept constant for the duration of the connection. It is assumed that this velocity is accurately measured and passed on to the fuzzy admission controller. Velocity can be measure through the assistance of Global Positioning System (GPS) or through signal strength measurements over time. Using the fuzzy connection admission controller (FCAC) in the simulation, results for the new and handover call blocking probabilities were obtained. Figure 6.19 shows these results compared to the case when fixed bandwidth reservation is used (in this case 1 channel is reserved). The results show that better new call blocking is obtained when using FCAC at the expense of obtaining worse handover call blocking. FCAC is able to perform a similar function as fixed bandwidth reservation (by allowing handover calls to have a lower handover blocking probability). An advantage of FCAC is the ability to allow more control over the admission process (in this case the system is discriminating against mobile terminals that are going fast when congestion conditions are present). This obviously leads to issues about fairness when congestion conditions arise. However it may be argued that to recover from congestion conditions more quickly one needs to reduce the load into the congested cell and in effect that is what the FCAC is doing.

23 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks FCAC Blocking Probability 10-2 Fixed Reservation 10-3 FCAC new calls FR1 new calls FCAC handover calls FR1 handover calls Call Arrival Rate (calls/sec) Figure Blocking Probabilities for Fuzzy Connection Admission Control (FCAC) and Fixed Reservation with 1 Channel Reserved (FR1). Recall that the results obtained in Chapter 5 indicated that reserving more bandwidth when the handover rate is high compared to new call rate did not yield significantly better performance for handover traffic. To determine whether the FCAC designed in this section can outperform fixed bandwidth reservation the fuzzy logic controller was tested for a range of cell sizes. The results are shown in Figure The arrival rate is kept constant at 0.85 calls/sec and the mobile terminals velocity mix is kept the same for both the FCAC and FR1. The following velocity mix was used: 10% stationary, 20% slow, 50% average, 10% fast and 10% very fast. The results in Figure 6.20 show that the FCAC has very good new call blocking performance across the entire cell size range shown. FR1 has better performance in terms of handover blocking for larger cells but as the

24 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 173 cell size gets smaller and especially below the cell size of 100m, performance of the FCAC is the same as that of the fixed reservation case. Hence as the cell size gets smaller, the FCAC has the same handover performance but has a better new call blocking performance. This can be interpreted as the FCAC having better utilization performance than fixed bandwidth reservation for small cell sizes FCAC new calls FR1 new calls FCAC handover calls FR1 handover calls Blocking Probability FCAC Cell size (m) Figure Blocking Probability for Different Cell Sizes. While this result might look interesting, it is not significant as not reserving any bandwidth at all will result in similar handover blocking performance (as the cell size is reduced), while at the same time having lower new call blocking performance (equal to handover blocking probability). Hence, while the FCAC might outperform fixed bandwidth reservation for small cell sizes, in fact, at the same load, not having any reserved bandwidth is better for this case (when the cell size is small). As a result, a conclusion can be made that while FCAC can provide better control over admission (differentiation at different velocities) it does not significantly outperform fixed bandwidth reservation. The next section

25 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 174 looks at the dynamic behavior of the FCAC and fixed bandwidth reservation, while the subsequent sections deals with the utilization issues of the FCAC Dynamic Performance of FCAC and Fixed Reservation To further check if any advantage is obtained when the FCAC is used instead of fixed bandwidth reservation (FR), dynamic behavior of used bandwidth in one of the cells in the network was obtained for both cases. Figure 6.21(a) and 6.21(b) show the used bandwidth over time for FR1 (Fixed Reservation with 1 channel reserved) and the FCAC, respectively. A general observation between the two graphs does not show any major difference in behavior. Results show that there are sharp rises towards blocking states over short periods of time. The only difference is that when the FCAC is used, the almost cyclic peaks and troughs are more frequent than when using FR1. Used bandwidth in FR1 tends to stay close to blocking states for longer periods than when the FCAC scheme is used Utilization Study of FCAC and Fixed Reservation In this section the utilization performance of the FCAC and FR is examined. The aim is to determine which scheme can accept a higher load while maintaining the GoS constraints. For this case a new call blocking probability of 0.01 and a handover call blocking probability of were used as GoS constraints. Through simulation the highest loads were determined that satisfied the GoS constraints for different cell radii. Figure 6.22 shows the performance of FCAC11 to FCAC14 against the results obtained for FR0 to FR3. FCAC11 to FCAC14 are the original FCAC with value adjustments made to the membership functions. FR0 to FR3 are fixed bandwidth reservations of 0 channels to 3 channels respectively.

26 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Used Capacity (kb/sec) C lo c k ( s e c o n d s ) (a) Used Capacity (kb/sec) C lo c k ( s e c o n d s ) (b) Figure Dynamic Behavior of FR1(a) and FCAC (b). Figure 6.22 shows that the best load results are obtained by using fixed bandwidth reservation optimized to the particular cell conditions. The best result obtained by the FCAC matched FR2 when the cell size is small (less than 200m). The reason for the FCAC achieving better results when the cell size is small is that the predictions made about the cell dwell time through the velocity input are more accurate as the cell gets smaller and suffer as the cell gets larger. Utilization is held down by the handover blocking constraint and hence the new call blocking probabilities in most of the cases were better than the desired GoS constraints. The corresponding new call blocking probabilities are shown in Figure The figure shows that better results for new call blocking are

27 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 176 obtained by the FCAC against FR2. Again, the conclusion can be made that there is no significant advantage in using the FCAC in this case. Highest load of new calls(calls/sec) FR0 FCAC11 FR1 FR2 FCAC12 FCAC14 FCAC13 FR Cell Radius (m) Figure Optimized Loads for the Constraints of Handover Blocking of and New Call Blocking of 0.01.

28 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 177 New call blocking probability 10-2 FR0 FR1 FR2 FR3 FCAC11 FCAC12 FCAC13 FCAC Cell radius (m) Figure New call blocking probabilities for various FCAC and FR cases Utilization Study of FCAC and FR with Variable Load In the previous section the mobile network was homogenous with all cells having the same conditions. In this section the performance of the FCAC in the cellular network as a whole is studied. The FCAC was tested when congestion conditions exist in the cellular network but only in particular cells. As a special case, every 20 minutes, each cell has a probability of either being in a congested state or being in a normal state. For this simulation, the probability of being in a congested state is 0.1 and the probability of being in a normal state is 0.9. Hence, 10% of cells in the network would be experiencing congestion conditions, while the other 90% are operating at normal loads. The aim is to compare the two admission control schemes (FCAC and fixed bandwidth reservation) under congestion conditions.

29 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 178 Figure 6.24 shows that the fuzzy logic controller appears to outperform fixed bandwidth reservation when the cell radius is small. The reason for this is that predictions about handover using the fuzzy logic controller are more accurate when the cell size is small. The figure shows the maximum new connection rate before the blocking constraints are exceeded. Figure 6.25 shows that the new call blocking probability appears to be always better for the FR2 and Figure 6.26 shows that the handover blocking probability appears to be consistently better for the FCAC than FR2. While the results for the FCAC show some improvement over fixed bandwidth reservation, the values are small and insignificant to be considered as an advantage over fixed reservation. Maximum New Call Arrival rate (calls/sec) FR2 FCAC Cell Radius (km) Figure Maximum new call load while maintaining constraints of new call blocking of 0.01 and handover call blocking of with a congestion variation of 20%.

30 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks New Call Blocking Probability FR2 FCAC Cell Radius (km) Figure The new call blocking probability (corresponding to the results in Figure 6.24). Handover Call Blocking Probability FR2 FCAC Cell Radius (km) Figure handover call blocking probability (corresponding to the results in Figure 6.24).

31 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Conclusion In this chapter, fuzzy logic was studied in the context of the mobile network. A fuzzy logic controller was designed and simulated to perform adaptive bandwidth reservation. A simple fuzzy logic controller was designed which took into account a dynamically changing handover rate, while assuming the arrival rate remained constant and its performance was investigated and compared to Fixed bandwidth reservation (Section 6.2). The results produced were encouraging but a problem was identified in correctly tuning the fuzzy logic controller to the desired constraints. This problem is pursued in the next chapter where a Neuro- Fuzzy controller is developed. A fuzzy logic controller which considered both terminal velocity and bandwidth being used in surrounding cells was designed, investigated and compared to fixed reservation (Section 6.3). The results showed that the fuzzy controller is able to match the results that fixed bandwidth reservation achieved under static conditions (i.e. the new and handover connection loads are constant) while being able to dynamically guarantee a minimum handover blocking probability (which fixed bandwidth reservation can not achieve) and at the same time giving the network designer more control over the admission policy into the network. Whilst the Fuzzy controller did not out-perform the fixed bandwidth reservation schemes (in terms of utilization), it is clear that it is adaptive to velocity and bandwidth availability in surrounding cells, whilst the fixed reservation scheme is not. In the next chapter the fuzzy controller is replaced by a Neuro-Fuzzy controller that facilitates better performance as more information about the network is made available.

Neuro-fuzzy admission control in mobile communications systems

Neuro-fuzzy admission control in mobile communications systems University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 Neuro-fuzzy admission control in mobile communications systems

More information

Neuro-fuzzy admission control in mobile communications systems

Neuro-fuzzy admission control in mobile communications systems University of Wollongong Thesis Collections University of Wollongong Thesis Collection University of Wollongong Year 25 Neuro-fuzzy admission control in mobile communications systems Raad Raad University

More information

DEFINITION OF SUITABLE SIMULATION SCENARIOS FOR DYNAMIC INVESTIGATIONS IN CELLULAR NETWORKS WITH STEAM

DEFINITION OF SUITABLE SIMULATION SCENARIOS FOR DYNAMIC INVESTIGATIONS IN CELLULAR NETWORKS WITH STEAM DEFINITION OF SUITABLE SIMULATION SCENARIOS FOR DYNAMIC INVESTIGATIONS IN CELLULAR NETWORKS WITH STEAM Holger Pampel Enrico Jugl Lucent Technologies Network Systems GmbH Thurn-und-Taxis Strasse 10 90411

More information

Congestion control in TCP

Congestion control in TCP Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed

More information

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for

More information

An Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks

An Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks An Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks Hong Bong Kim Telecommunication Networks Group, Technical University of Berlin Sekr FT5 Einsteinufer 25 1587 Berlin Germany

More information

Two-dimensional Totalistic Code 52

Two-dimensional Totalistic Code 52 Two-dimensional Totalistic Code 52 Todd Rowland Senior Research Associate, Wolfram Research, Inc. 100 Trade Center Drive, Champaign, IL The totalistic two-dimensional cellular automaton code 52 is capable

More information

Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination

Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination Richard Kershaw and Bhaskar Krishnamachari Ming Hsieh Department of Electrical Engineering, Viterbi School

More information

Robust Multi-class Signaling Overload Control for. Wireless Switches

Robust Multi-class Signaling Overload Control for. Wireless Switches Robust Multi-class Signaling Overload Control for Wireless Switches J. Pinheiro C. Loader, T. LaPorta, S. Kasera, M. Karaul, A. Hari 1 Novartis Pharmaceuticals jose.pinheiro@pharma.novartis.com Bell Labs

More information

OPTIMIZING A VIDEO PREPROCESSOR FOR OCR. MR IBM Systems Dev Rochester, elopment Division Minnesota

OPTIMIZING A VIDEO PREPROCESSOR FOR OCR. MR IBM Systems Dev Rochester, elopment Division Minnesota OPTIMIZING A VIDEO PREPROCESSOR FOR OCR MR IBM Systems Dev Rochester, elopment Division Minnesota Summary This paper describes how optimal video preprocessor performance can be achieved using a software

More information

WIRELESS/MOBILE networking is one of the strongest

WIRELESS/MOBILE networking is one of the strongest IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 53, NO. 3, MAY 2004 835 An Integrated Adaptive Bandwidth-Management Framework for QoS-Sensitive Multimedia Cellular Networks Sungwook Kim and Pramod K. Varshney,

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

IEEE 1588 PTP clock synchronization over a WAN backbone

IEEE 1588 PTP clock synchronization over a WAN backbone Whitepaper IEEE 1588 PTP clock synchronization over a WAN backbone A field study comparing PTP clock synchronization accuracy against GPS external time reference in a live production WAN environment Contents

More information

3 Graphical Displays of Data

3 Graphical Displays of Data 3 Graphical Displays of Data Reading: SW Chapter 2, Sections 1-6 Summarizing and Displaying Qualitative Data The data below are from a study of thyroid cancer, using NMTR data. The investigators looked

More information

Reinforcement Learning for Adaptive Routing of Autonomous Vehicles in Congested Networks

Reinforcement Learning for Adaptive Routing of Autonomous Vehicles in Congested Networks Reinforcement Learning for Adaptive Routing of Autonomous Vehicles in Congested Networks Jonathan Cox Aeronautics & Astronautics Brandon Jennings Mechanical Engineering Steven Krukowski Aeronautics & Astronautics

More information

Christos Papadopoulos

Christos Papadopoulos CS557: Measurements Christos Papadopoulos Adapted by Lorenzo De Carli Outline End-to-End Packet Dynamics - Paxon99b Wireless measurements - Aguayo04a Note: both these studies are old, so the results have

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

A Call Admission Protocol for Wireless Cellular Multimedia Networks

A Call Admission Protocol for Wireless Cellular Multimedia Networks A Call Admission Protocol for Wireless Cellular Multimedia Networks Mokhtar A. Aboleaze Dept. of Computer Science and Engineering York University Toronto, ON. Canada aboelaze@cs.yorku.ca Fadi A. Aloul

More information

Annex 10 - Summary of analysis of differences between frequencies

Annex 10 - Summary of analysis of differences between frequencies Annex 10 - Summary of analysis of differences between frequencies Introduction A10.1 This Annex summarises our refined analysis of the differences that may arise after liberalisation between operators

More information

3 Graphical Displays of Data

3 Graphical Displays of Data 3 Graphical Displays of Data Reading: SW Chapter 2, Sections 1-6 Summarizing and Displaying Qualitative Data The data below are from a study of thyroid cancer, using NMTR data. The investigators looked

More information

3 Nonlinear Regression

3 Nonlinear Regression CSC 4 / CSC D / CSC C 3 Sometimes linear models are not sufficient to capture the real-world phenomena, and thus nonlinear models are necessary. In regression, all such models will have the same basic

More information

Distributed Fault-Tolerant Channel Allocation for Cellular Networks

Distributed Fault-Tolerant Channel Allocation for Cellular Networks 1326 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 7, JULY 2000 Distributed Fault-Tolerant Channel Allocation for Cellular Networks Guohong Cao, Associate Member, IEEE, and Mukesh Singhal,

More information

Chapter 5. Track Geometry Data Analysis

Chapter 5. Track Geometry Data Analysis Chapter Track Geometry Data Analysis This chapter explains how and why the data collected for the track geometry was manipulated. The results of these studies in the time and frequency domain are addressed.

More information

Analytical Modeling of Parallel Systems. To accompany the text ``Introduction to Parallel Computing'', Addison Wesley, 2003.

Analytical Modeling of Parallel Systems. To accompany the text ``Introduction to Parallel Computing'', Addison Wesley, 2003. Analytical Modeling of Parallel Systems To accompany the text ``Introduction to Parallel Computing'', Addison Wesley, 2003. Topic Overview Sources of Overhead in Parallel Programs Performance Metrics for

More information

ON THE VELOCITY OF A WEIGHTED CYLINDER DOWN AN INCLINED PLANE

ON THE VELOCITY OF A WEIGHTED CYLINDER DOWN AN INCLINED PLANE ON THE VELOCITY OF A WEIGHTED CYLINDER DOWN AN INCLINED PLANE Raghav Grover and Aneesh Agarwal RG (Grade 12 High School), AA (Grade 11 High School) Department of Physics, The Doon School, Dehradun. raghav.503.2019@doonschool.com,

More information

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links Network Working Group Request for Comments: 1046 W. Prue J. Postel ISI February 1988 A Queuing Algorithm to Provide Type-of-Service for IP Links Status of this Memo This memo is intended to explore how

More information

Non-Parametric Modeling

Non-Parametric Modeling Non-Parametric Modeling CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Introduction Non-Parametric Density Estimation Parzen Windows Kn-Nearest Neighbor

More information

MINI-PAPER A Gentle Introduction to the Analysis of Sequential Data

MINI-PAPER A Gentle Introduction to the Analysis of Sequential Data MINI-PAPER by Rong Pan, Ph.D., Assistant Professor of Industrial Engineering, Arizona State University We, applied statisticians and manufacturing engineers, often need to deal with sequential data, which

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

Memory-Link Compression Schemes: A Value Locality Perspective

Memory-Link Compression Schemes: A Value Locality Perspective Memory-Link Compression Schemes: A Value Locality Perspective Martin Thuresson, Lawrence Spracklen and Per Stenström IEEE Presented by Jean Niklas L orange and Caroline Sæhle, for TDT01, Norwegian University

More information

White paper ETERNUS Extreme Cache Performance and Use

White paper ETERNUS Extreme Cache Performance and Use White paper ETERNUS Extreme Cache Performance and Use The Extreme Cache feature provides the ETERNUS DX500 S3 and DX600 S3 Storage Arrays with an effective flash based performance accelerator for regions

More information

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem Congestion Control Andreas Pitsillides 1 Congestion control problem growing demand of computer usage requires: efficient ways of managing network traffic to avoid or limit congestion in cases where increases

More information

User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey

User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey Hamid Beigy and M. R. Meybodi Computer Engineering Department Amirkabir University of Technology Tehran, Iran {beigy, meybodi}@ce.aut.ac.ir

More information

A New Call Admission Control scheme for Real-time traffic in Wireless Networks

A New Call Admission Control scheme for Real-time traffic in Wireless Networks A New Call Admission Control scheme for Real-time traffic in Wireless Networks Maneesh Tewari and H.S. Jamadagni Center for Electronics Design and Technology, Indian Institute of Science, Bangalore, 5612

More information

Identifying Layout Classes for Mathematical Symbols Using Layout Context

Identifying Layout Classes for Mathematical Symbols Using Layout Context Rochester Institute of Technology RIT Scholar Works Articles 2009 Identifying Layout Classes for Mathematical Symbols Using Layout Context Ling Ouyang Rochester Institute of Technology Richard Zanibbi

More information

Automatic Machinery Fault Detection and Diagnosis Using Fuzzy Logic

Automatic Machinery Fault Detection and Diagnosis Using Fuzzy Logic Automatic Machinery Fault Detection and Diagnosis Using Fuzzy Logic Chris K. Mechefske Department of Mechanical and Materials Engineering The University of Western Ontario London, Ontario, Canada N6A5B9

More information

End-to-End Mechanisms for QoS Support in Wireless Networks

End-to-End Mechanisms for QoS Support in Wireless Networks End-to-End Mechanisms for QoS Support in Wireless Networks R VS Torsten Braun joint work with Matthias Scheidegger, Marco Studer, Ruy de Oliveira Computer Networks and Distributed Systems Institute of

More information

Rise-Time Enhancement Techniques for Resistive Array Infrared Scene Projectors

Rise-Time Enhancement Techniques for Resistive Array Infrared Scene Projectors Rise-Time Enhancement Techniques for Resistive Array Infrared Scene Projectors Greg Franks a, Joe LaVeigne a, Kevin Sparkman a, Jim Oleson a a Santa Barbara Infrared, Inc., 30 S. Calle Cesar Chavez, #D,

More information

SUPPORT OF HANDOVER IN MOBILE ATM NETWORKS

SUPPORT OF HANDOVER IN MOBILE ATM NETWORKS SUPPORT OF HANDOVER IN MOBILE ATM NETWORKS Péter Fazekas fazekasp@hit.hit.bme.hu Tel: (36) 1-463-3256 Fax: (36) 1-463-3263 Department of Telecommunications Pázmány Péter sétany 1/D Polytechnic University

More information

IPv6-based Beyond-3G Networking

IPv6-based Beyond-3G Networking IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless

More information

Chapter 15 Introduction to Linear Programming

Chapter 15 Introduction to Linear Programming Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of

More information

Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach

Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach Suriti Gupta College of Technology and Engineering Udaipur-313001 Vinod Kumar College of Technology and Engineering Udaipur-313001

More information

Part 1: Calculating amplitude spectra and seismic wavelets

Part 1: Calculating amplitude spectra and seismic wavelets Geology 554 Environmental and Exploration Geophysics II Generating synthetic seismograms The simple in-class exercise undertaken last time illustrates the relationship between wavelet properties, interval

More information

Lotus Sametime 3.x for iseries. Performance and Scaling

Lotus Sametime 3.x for iseries. Performance and Scaling Lotus Sametime 3.x for iseries Performance and Scaling Contents Introduction... 1 Sametime Workloads... 2 Instant messaging and awareness.. 3 emeeting (Data only)... 4 emeeting (Data plus A/V)... 8 Sametime

More information

Adaptive Waveform Inversion: Theory Mike Warner*, Imperial College London, and Lluís Guasch, Sub Salt Solutions Limited

Adaptive Waveform Inversion: Theory Mike Warner*, Imperial College London, and Lluís Guasch, Sub Salt Solutions Limited Adaptive Waveform Inversion: Theory Mike Warner*, Imperial College London, and Lluís Guasch, Sub Salt Solutions Limited Summary We present a new method for performing full-waveform inversion that appears

More information

FMA901F: Machine Learning Lecture 3: Linear Models for Regression. Cristian Sminchisescu

FMA901F: Machine Learning Lecture 3: Linear Models for Regression. Cristian Sminchisescu FMA901F: Machine Learning Lecture 3: Linear Models for Regression Cristian Sminchisescu Machine Learning: Frequentist vs. Bayesian In the frequentist setting, we seek a fixed parameter (vector), with value(s)

More information

X. A Relevance Feedback System Based on Document Transformations. S. R. Friedman, J. A. Maceyak, and S. F. Weiss

X. A Relevance Feedback System Based on Document Transformations. S. R. Friedman, J. A. Maceyak, and S. F. Weiss X-l X. A Relevance Feedback System Based on Document Transformations S. R. Friedman, J. A. Maceyak, and S. F. Weiss Abstract An information retrieval system using relevance feedback to modify the document

More information

Performance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks

Performance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks Performance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks Izhak Rubin and Runhe Zhang Abstract We introduce Unmanned Vehicles (UVs) to aid the operation of the mobile

More information

How Much Logic Should Go in an FPGA Logic Block?

How Much Logic Should Go in an FPGA Logic Block? How Much Logic Should Go in an FPGA Logic Block? Vaughn Betz and Jonathan Rose Department of Electrical and Computer Engineering, University of Toronto Toronto, Ontario, Canada M5S 3G4 {vaughn, jayar}@eecgutorontoca

More information

An Efficient Resource Allocation Protocol for Multimedia Wireless Networks

An Efficient Resource Allocation Protocol for Multimedia Wireless Networks International Journal of Advanced Trends in Computer Science and Engineering, Vol.2, No.1, Pages : 178-182 (213) Special Issue of ICACSE 213 - Held on 7-8 January, 213 in Lords Institute of Engineering

More information

A Geostatistical and Flow Simulation Study on a Real Training Image

A Geostatistical and Flow Simulation Study on a Real Training Image A Geostatistical and Flow Simulation Study on a Real Training Image Weishan Ren (wren@ualberta.ca) Department of Civil & Environmental Engineering, University of Alberta Abstract A 12 cm by 18 cm slab

More information

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:

More information

EECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson

EECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson EECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson 1.0 Introduction Distributed real-time process control, from a network communication view, involves

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Adaptive QoS Platform in Multimedia Networks

Adaptive QoS Platform in Multimedia Networks Adaptive QoS Platform in Multimedia Networks Mahmoud Sherif, Ibrahim Habib, Mahmoud Naghshineh, and Parviz Kermani CUNY Graduate School and Department of Electrical Engineering The City College of New

More information

Reliable Multicast in Mobile Networks

Reliable Multicast in Mobile Networks Reliable Multicast in Mobile Networks Pasi Tiihonen and Petri Hiirsalmi Lappeenranta University of Technology P.O. Box 20 FIN-53851 Lappeenranta, Finland, {Pasi Tiihonen, Petri Hiirsalmi}@lut.fi Key words:

More information

Solving Traveling Salesman Problem Using Parallel Genetic. Algorithm and Simulated Annealing

Solving Traveling Salesman Problem Using Parallel Genetic. Algorithm and Simulated Annealing Solving Traveling Salesman Problem Using Parallel Genetic Algorithm and Simulated Annealing Fan Yang May 18, 2010 Abstract The traveling salesman problem (TSP) is to find a tour of a given number of cities

More information

Optimizing the Parameters of Handover in LTE using SON System by Handling Mobility Robustness

Optimizing the Parameters of Handover in LTE using SON System by Handling Mobility Robustness Optimizing the Parameters of Handover in LTE using SON System by Handling Mobility Robustness G K Venkatesh PhD Scholar Jain University, Chickballapur, India Dr.P.V.Rao Prof. Dept. of ECE Rajarajeshwari

More information

Character Recognition

Character Recognition Character Recognition 5.1 INTRODUCTION Recognition is one of the important steps in image processing. There are different methods such as Histogram method, Hough transformation, Neural computing approaches

More information

AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems

AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems Alan Burns, James Harbin, Leandro Indrusiak, Iain Bate, Robert Davis and David Griffin Real-Time Systems Research Group

More information

Multiagent Traffic Management: An Improved Intersection Control Mechanism PRESENTED BY: PATRICIA PEREZ AND LAURA MATOS

Multiagent Traffic Management: An Improved Intersection Control Mechanism PRESENTED BY: PATRICIA PEREZ AND LAURA MATOS Multiagent Traffic Management: An Improved Intersection Control Mechanism PRESENTED BY: PATRICIA PEREZ AND LAURA MATOS Outline Introduction The Original System Improving the Original Model Protocol Intersection

More information

Assignment 10: TCP and Congestion Control Due the week of November 14/15, 2012

Assignment 10: TCP and Congestion Control Due the week of November 14/15, 2012 Assignment 10: TCP and Congestion Control Due the week of November 14/15, 2012 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for

More information

Lotfi Zadeh (professor at UC Berkeley) wrote his original paper on fuzzy set theory. In various occasions, this is what he said

Lotfi Zadeh (professor at UC Berkeley) wrote his original paper on fuzzy set theory. In various occasions, this is what he said FUZZY LOGIC Fuzzy Logic Lotfi Zadeh (professor at UC Berkeley) wrote his original paper on fuzzy set theory. In various occasions, this is what he said Fuzzy logic is a means of presenting problems to

More information

1 - Local smoothness analysis

1 - Local smoothness analysis Jarek Rossignac Although a smooth planar curve J may be represented in a variety of ways, representations based on polyloops are popular in computer graphics. The vertices of the polyloop L may be viewed

More information

STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks

STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks David R. Choffnes & Fabián E. Bustamante Department of Computer Science, Northwestern University www.aqualab.cs.northwestern.edu

More information

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Sergey Gorinsky Harrick Vin Technical Report TR2000-32 Department of Computer Sciences, University of Texas at Austin Taylor Hall

More information

CONTRIBUTION TO THE INVESTIGATION OF STOPPING SIGHT DISTANCE IN THREE-DIMENSIONAL SPACE

CONTRIBUTION TO THE INVESTIGATION OF STOPPING SIGHT DISTANCE IN THREE-DIMENSIONAL SPACE National Technical University of Athens School of Civil Engineering Department of Transportation Planning and Engineering Doctoral Dissertation CONTRIBUTION TO THE INVESTIGATION OF STOPPING SIGHT DISTANCE

More information

The State of the American Traveler TM

The State of the American Traveler TM The State of the American Traveler TM MOBILE EDITION Fall 2018 Volume 30 The Mobile Edition THIS FALL EDITION of The State of the American Traveler TM continues our ongoing exploration of travelers use

More information

Capacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands

Capacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands Capacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands Utility networks are going through massive transformations towards next

More information

3 Nonlinear Regression

3 Nonlinear Regression 3 Linear models are often insufficient to capture the real-world phenomena. That is, the relation between the inputs and the outputs we want to be able to predict are not linear. As a consequence, nonlinear

More information

METAL OXIDE VARISTORS

METAL OXIDE VARISTORS POWERCET CORPORATION METAL OXIDE VARISTORS PROTECTIVE LEVELS, CURRENT AND ENERGY RATINGS OF PARALLEL VARISTORS PREPARED FOR EFI ELECTRONICS CORPORATION SALT LAKE CITY, UTAH METAL OXIDE VARISTORS PROTECTIVE

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

Traffic Management Tools for ATM Networks With Real-Time and Non-Real-Time Services

Traffic Management Tools for ATM Networks With Real-Time and Non-Real-Time Services Traffic Management Tools for ATM Networks With Real-Time and Non-Real-Time Services Kalevi Kilkki Helsinki University of Technology e-mail: kalevi.kilkki@hut.fi Abstract This presentation considers some

More information

Small Cells as a Service rethinking the mobile operator business

Small Cells as a Service rethinking the mobile operator business Small Cells as a Service rethinking the mobile operator business Mats Eriksson, CEO Arctos Labs Scandinavia AB -02-18 1 Executive summary Mobile operators (MNOs) face a huge challenge in meeting the data

More information

A revolutionary visual security and analytics solution

A revolutionary visual security and analytics solution A revolutionary visual security and analytics solution Vodafone Digital Buildings vodafone.com/iot/security The future is exciting. Ready? It s time to take visual surveillance to the next level Increasing

More information

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Leased Line Charge Control

Leased Line Charge Control October 2012 Frontier Economics 1 RE-ALLOCATION OF COMMON COSTS Ofcom s proposals for the next are set out in the consultation issued in July 2012. The cost modelling includes a re-allocation of fixed

More information

Call Admission Control in IP networks with QoS support

Call Admission Control in IP networks with QoS support Call Admission Control in IP networks with QoS support Susana Sargento, Rui Valadas and Edward Knightly Instituto de Telecomunicações, Universidade de Aveiro, P-3810 Aveiro, Portugal ECE Department, Rice

More information

TRAVELTIME TOMOGRAPHY (CONT)

TRAVELTIME TOMOGRAPHY (CONT) 30 March 005 MODE UNIQUENESS The forward model TRAVETIME TOMOGRAPHY (CONT di = A ik m k d = Am (1 Data vecto r Sensitivit y matrix Model vector states the linearized relationship between data and model

More information

Promoting the Use of End-to-End Congestion Control in the Internet

Promoting the Use of End-to-End Congestion Control in the Internet Promoting the Use of End-to-End Congestion Control in the Internet IEEE/ACM Transactions on ing, May 3 1999 Sally Floyd, Kevin Fall Presenter: Yixin Hua 1 About Winner of the Communications Society William

More information

Effects of PROC EXPAND Data Interpolation on Time Series Modeling When the Data are Volatile or Complex

Effects of PROC EXPAND Data Interpolation on Time Series Modeling When the Data are Volatile or Complex Effects of PROC EXPAND Data Interpolation on Time Series Modeling When the Data are Volatile or Complex Keiko I. Powers, Ph.D., J. D. Power and Associates, Westlake Village, CA ABSTRACT Discrete time series

More information

Performance of relational database management

Performance of relational database management Building a 3-D DRAM Architecture for Optimum Cost/Performance By Gene Bowles and Duke Lambert As systems increase in performance and power, magnetic disk storage speeds have lagged behind. But using solidstate

More information

DIGITAL IMAGE ANALYSIS. Image Classification: Object-based Classification

DIGITAL IMAGE ANALYSIS. Image Classification: Object-based Classification DIGITAL IMAGE ANALYSIS Image Classification: Object-based Classification Image classification Quantitative analysis used to automate the identification of features Spectral pattern recognition Unsupervised

More information

Flow-start: Faster and Less Overshoot with Paced Chirping

Flow-start: Faster and Less Overshoot with Paced Chirping Flow-start: Faster and Less Overshoot with Paced Chirping Joakim Misund, Simula and Uni Oslo Bob Briscoe, Independent IRTF ICCRG, Jul 2018 The Slow-Start

More information

Hao Wang 1, Dave Laurenson 1, and Jane Hillston 2

Hao Wang 1, Dave Laurenson 1, and Jane Hillston 2 A General Performance Evaluation Framework for Network Selection Strategies in 3G-WLAN Interworking Networks Hao Wang 1, Dave Laurenson 1, and Jane Hillston 2 1 Institute for Digital Communications 2 Laboratory

More information

Ranking Algorithms For Digital Forensic String Search Hits

Ranking Algorithms For Digital Forensic String Search Hits DIGITAL FORENSIC RESEARCH CONFERENCE Ranking Algorithms For Digital Forensic String Search Hits By Nicole Beebe and Lishu Liu Presented At The Digital Forensic Research Conference DFRWS 2014 USA Denver,

More information

Performance Evaluation of Non-Intrusive Methods for Traffic Data Collection. Kamal Banger, Ministry of Transportation of Ontario

Performance Evaluation of Non-Intrusive Methods for Traffic Data Collection. Kamal Banger, Ministry of Transportation of Ontario Abstract Performance Evaluation of Non-Intrusive Methods for Traffic Data Collection Kamal Banger, Ministry of Transportation of Ontario Nancy Adriano, P.Eng., Ministry of Transportation of Ontario For

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

Estimating Parking Spot Occupancy

Estimating Parking Spot Occupancy 1 Estimating Parking Spot Occupancy David M.W. Landry and Matthew R. Morin Abstract Whether or not a car occupies a given parking spot at a given time can be modeled as a random variable. By looking at

More information

Reporting Mesh Statistics

Reporting Mesh Statistics Chapter 15. Reporting Mesh Statistics The quality of a mesh is determined more effectively by looking at various statistics, such as maximum skewness, rather than just performing a visual inspection. Unlike

More information

Stop-and-Go Service Using Hierarchical Round Robin

Stop-and-Go Service Using Hierarchical Round Robin Stop-and-Go Service Using Hierarchical Round Robin S. Keshav AT&T Bell Laboratories 600 Mountain Avenue, Murray Hill, NJ 07974, USA keshav@research.att.com Abstract The Stop-and-Go service discipline allows

More information

Welfare Navigation Using Genetic Algorithm

Welfare Navigation Using Genetic Algorithm Welfare Navigation Using Genetic Algorithm David Erukhimovich and Yoel Zeldes Hebrew University of Jerusalem AI course final project Abstract Using standard navigation algorithms and applications (such

More information

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Clemson University TigerPrints All Theses Theses 8-2014 A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Raihan Hazarika Clemson University, rhazari@g.clemson.edu Follow

More information

QoS and Mobility in Multicast/Broadcast Services (MBSs) in Mobile WiMAX Systems

QoS and Mobility in Multicast/Broadcast Services (MBSs) in Mobile WiMAX Systems Asia Future Internet Mobile/Wireless School QoS and Mobility in Multicast/Broadcast Services (MBSs) in Mobile WiMAX Systems Ji Hoon Lee, Taekyoung Kwon*, and Yanghee Choi Seoul National University Sangheon

More information

1.4.3 OPERATING SPEED CONSISTENCY

1.4.3 OPERATING SPEED CONSISTENCY Geometric Design Guide for Canadian oads 1.4.3 OPEATING SPEED CONSISTENCY The safety of a road is closely linked to variations in the speed of vehicles travelling on it. These variations are of two kinds:

More information

Efficient Buffering in Reliable Multicast Protocols

Efficient Buffering in Reliable Multicast Protocols Efficient Buffering in Reliable Multicast Protocols Oznur Ozkasap, Robbert van Renesse, Kenneth P. Birman, Zhen Xiao Dept. of Computer Science, Cornell University 4118 Upson Hall, Ithaca, NY 14853 {ozkasap,rvr,ken,xiao}@cs.cornell.edu

More information

Digital Image Processing. Prof. P. K. Biswas. Department of Electronic & Electrical Communication Engineering

Digital Image Processing. Prof. P. K. Biswas. Department of Electronic & Electrical Communication Engineering Digital Image Processing Prof. P. K. Biswas Department of Electronic & Electrical Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 21 Image Enhancement Frequency Domain Processing

More information

CHAPTER 3 AN OVERVIEW OF DESIGN OF EXPERIMENTS AND RESPONSE SURFACE METHODOLOGY

CHAPTER 3 AN OVERVIEW OF DESIGN OF EXPERIMENTS AND RESPONSE SURFACE METHODOLOGY 23 CHAPTER 3 AN OVERVIEW OF DESIGN OF EXPERIMENTS AND RESPONSE SURFACE METHODOLOGY 3.1 DESIGN OF EXPERIMENTS Design of experiments is a systematic approach for investigation of a system or process. A series

More information

Review of the Robust K-means Algorithm and Comparison with Other Clustering Methods

Review of the Robust K-means Algorithm and Comparison with Other Clustering Methods Review of the Robust K-means Algorithm and Comparison with Other Clustering Methods Ben Karsin University of Hawaii at Manoa Information and Computer Science ICS 63 Machine Learning Fall 8 Introduction

More information