Printer Friendly

Guard channel based call admission control schemes in hierarchical mobile IPv6 networks.

1. Introduction

Recent research has intensively focused on the next generation wireless networks that will meet the increasing demand for services with higher data rate and for enhanced multimedia applications, such as video phones and video streaming. Instead of developing an all new network, the next generation wireless networks strive to seamlessly integrate existing multiple heterogeneous networks and make modification of protocol and signaling schemes as few as possible. But there are a number of challenges that must be addressed to enable compressive Quality of Service (QoS) and mobility support. Networks should be able to support seamless handover to maintain a high quality of enhanced multimedia applications. Otherwise, packet losses occurring during handover will degrade QoS. [1] Thus mobility management is a key requirement for the next generation wireless networks.

Since the next generation networks will be unified networks based on IP architecture, the design of IP-based mobility management schemes becomes necessary. The IETF Mobile IPv6(MIPv6) [3] and its extension were proposed for efficient mobility management. Hierarchical Mobile IPv6 (HMIPv6) [4] manages the mobility of a Mobile Node (MN) using both a router located in the MN's home domain (Home Agent, HA), and a router located in a domain visited by the MN (Mobility Anchor Point, MAP). Local movements of the MN are hidden from the outside of the visited domain. The HMIPv6 can reduce the amount of signaling and improve the performance of handover latency. Although much research [5,6,7] focus on modified Mobile IP to get better efficient performance, there are few research papers to discuss admission control scheme when considering handover and mobility management.[2].

The HMIPv6 is to reduce the number of messages sent by a mobile node (MN) over a wireless link while maintaining an optimal route to the mobile node. The HMIPv6 mobile nodes send one binding message to a Mobility Anchor Point (MAP) located in the visited network. MAP is essentially a local Home Agent (HA) for the MN and the MN will maintain two IP addresses--one is the on-link CoA (LCoA) and the other is the regional CoA (RCoA).Whenever the MN enters into a domain, it first registers with MAP after receiving a router advertisement that includes a MAP option. In the process of binding update, the MN acquires a RCoA on that MAP's link. After that, the MN uses this address to register with its HA and all the Correspondent Nodes (CNs). As long as the MN moves only inside that MAP' s domain, the movement remains transparent to the nodes (including its HA) outside the domain. Only the LCoA changes which the MN informs only to the MAP entity. The IPv6 packets, sent from CN to the MN, reach the MAP first and consequently, the MAP tunnels the packet to the MN' s LCoA. The MN' s outgoing traffic is tunneled to the MAP in a manner identical to the tunneling of outgoing packets to the HA.

CAC in wireless networks has been receiving a great deal of attention during the last two decades and the central role that CAC plays in QoS provisioning in terms of the signal quality, call blocking and dropping probabilities, packet delay and loss rate, and transmission rate. In the first and second generation of wireless systems, the CAC schemes have been developed for a single service environment. In the third generation (3G) wireless systems, multimedia services such as voice, video, data, and audio are offered with various QoS profiles. It is anticipated that different access technologies will coexist in future wireless networks. Henceforth, next generation wireless networks will encompass 3G wideband CDMA (WCDMA) cellular systems; wireless local area networks(WLAN) such as the IEEE 802.11 family and HIPERLAN; digital video broadcasting (DVB); and broadband wireless access metropolitan area networks (MAN), such as IEEE 802.16. Therefore, CAC have to be revised to deal with the anticipated new composite radio wireless environment. [9,14]

In wireless mobile networks, as the cell size becomes smaller, handoffs become more frequent. To provide QoS guarantees to the mobile users, call admission control schemes must be carefully designed. Good CAC schemes have to balance the new call blocking and the handoff call blocking in order to provide the desired QoS requirements. If there is an ongoing call in one place, it may have potential impact on the resource usage in another place in the future. The concept of influence curve is introduced to characterize such influence that an ongoing call exerts on the adjacent cells. Since the channel reservation can be adjusted dynamically, mobility-based call admission control schemes can be designed to provide QoS in the wireless networks. [10,15]

The guard band policy (GCP), proposed in [11], keeps a certain amount of channels to handoff calls only while the rest of the channels can be shared by both new calls and handoff calls. Hence, handoff calls are given higher priority over new calls, and as a result the reduction in the handoff probability comes at the expense of higher blocking rate. Therefore, the guard band (number of channels) reserved for handoff calls must be properly chosen as a tradeoff between new call blocking probability (Pb) and handoff dropping probability (Pd).

It has been shown in [12] that the guard band policy can minimize a linear objective function of Pb and Pd. An enhanced version of guard channel policy, called fractional guard channel policy (FGCP), has been proven to be optimal in minimizing Pb with a hard constraint on Pd and minimizing the number of needed channels with a hard constraint on both Pb and Pd. In FGCP, a new call is admitted by a probability p which is a decreasing (or, more accurately, non-increasing) function of the cell state (i) defined as the number of occupied channels, while a handoff call is admitted as long as there is a free channel.

Limited FGCP (LFGCP) is shown to be more effective than the basic guard band policy in minimizing Pb and the number of needed channels while holding the constraint on Pd [12]. In the LFGCP, there are three possible admission probabilities for new calls (1, [beta], 0) where [beta] < 1. The first value (unity) is used as long as the cell state (i) is less than T. The second value is used when the cell state (i) is equal to T. The third value is used when the cell state (i) is greater than T where T is a design parameter.

It is evident that CAC should be introduced to Mobile IP-based network to guarantee the QoS for users. To handle mobility and handoff issues, we develop a reference architecture that implements a hierarchical access networks for mobile users. We consider the HMIPv6 based CAC schemes in the mobile networks. The rest of paper is organized as follows: Section 2 presents our HMIPv6 based CAC schemes. The simulation architecture and result discussion are described in section 3 and 4, respectively. Finally, section 5 concludes this paper.

2. The HMIPv6 based CAC schemes

Some of the mobility based CAC schemes that require extensive knowledge of the system parameters, such as user mobility which is challenging to obtain, moreover they sacrifice the scarce radio resources to satisfy the deterministic QoS bounds. The HMIPv6 extension headers can be combined with well-known CAC schemes, and the impacts of terminal mobility to the network performance will be discussed. The proposed method only requires few modifications on MAP functionality and slight change in binding update (BU) message formats.

The guard channel schemes described in section 1 are expanded to combine with the mobility information. A new call or a handoff call is identified from the new registered or updated HMIPv6 BU messages. The MN's movement can be predicted by observing the variation of MN's position in a fixed period. In Figure1, a new flag C is added in HMIPv6's BU message format, it provides the movement recording of MNs to future calculation in the MAP. The M flag is defined in HMIPv6, it indicates MAP registration. When a MN registers with the MAP, the M and A flags must be set to distinguish this registration form a BU being sent to the HA or a CN. An optional flag N indicates a lower hierarchical MAP registration in the mobile networks. When C is set, M and N should be set in the MAP.

[FIGURE 1 OMITTED]

In Figure 2, the lower hierarchy MAPs will cover many Access Routers (ARs) that locate far from the default MAP. When a MAP receives a BU from a MN, it will look up its binding cache at first. If there is no record, it will inform other MAPs. If there are no records in all MAPs, the call is identified as a new call. Because the IPv6 supports piggyback, the above procedure can use data messages to reduce the overhead of IPv6 headers.

The operation procedure of the MAP is shown in the Figure 3. When a MAP receives a BU with C flag set, it records the current registration time ([t.sub.i-2]), next times' registration time ([t.sub.i.1]),and next two times' registration time(ti). The MAP also calculates [T.sub.1] = [t.sub.i] - [t.sub.i-1], [T.sub.2] = [t.sub.i-1] - [t.sub.i-2]. The value of [T.sub.2] and [T.sub.1] represent MN's cell residency time in the current and next handoff cells. We define [T.sub.th] as the critical threshold residency time. If both [T.sub.1] and [T.sub.2] are smaller than [T.sub.th], this call is recognized as a higher- mobility MN. The MAP uses MN' LCoA to identify which AR serves to the MN, and calculates the number of higher-mobility MNs and all MNs. The above procedure can reveal the MN density in the ARs and future movement patterns.

[FIGURE 2 OMITTED]

[FIGURE 3 OMITTED]

The mobility information is combined with GCP, FGCP, and LFGCP to three proposed CAC schemes. It is evident that a high mobility MN needs much more capacity. When the number of high mobility MN is larger than a certain ratio, the capacity of the cell will be exhausted. The ratio of higher-mobility MNs is define to be:

The ratio of higher - mobility MNs

= (the total number of higher-mobility MNs in the cell)/ (the total number of MNs in the cell) (1)

The parameter "nuth" is defined as the threshold of the ratio of higher-mobility MNs, the parameter "adjust" as reserved capacity, and the parameter "adjust_1" as random adjustable value. Three mobility based CAC schemes are proposed in this section, and the complete description of these schemes is in the following.

2.1. Mobile IPv6 based guard channel policy (MBGCP)

The operation procedure of MBGCP is shown in the Figure 4. When a call comes in the MAP, this call can be identified a new call or a handoff call from the new registered or updated HMIPv6 BU messages. If it is a handoff call, it will be accepted or dropped by checking the free capacity of the service cell. If the call is accepted, the registration time and the total number of MNs in the cell are recorded. Then this call is identified as a higher-mobility MN or not, and the total number of higher-mobility MNs in the cell are recorded. The formula (1) is used to calculate the ratio of higher-mobility MNs.

The procedure described below will be used to adjust the value of the parameter "adjust": If the ratio of higher-mobility MNs in the adjacent cells are all smaller than the parameter "nuth", the parameter "adjust" of the center cell will change to "gc"(guard channel). If any cell's ratio of higher-mobility MNs is large than " nuth", the " adjust" of the center cell will change to 0. If it is a new call, the capacity of the service cell should minus the " adjust" value. The remainder of the procedure is same as the handoff call except that new call doesn't need to record the number of the higher-mobility MN.

2.2. Mobile IPv6 based fractional guard channel policy (MBFGCP)

The operation procedure of MBFGCP is shown in the Figure 5. The ratio calculation of higher-mobility MNs and the main procedure are same as in MBGCP. But MBFGCP will not reserve fixed capacity (gc) to a handoff call, it will use [beta] to identify the priority of a new call and a handoff call. The parameter [beta] is defined as same as in GFCP. The parameter " adjust_1 " will be b or 0.

If the ratio of higher-mobility MNs in the adjacent cells are all smaller than "nuth", the parameter " adjust_1 " of the center cell will change to b (0 < b <1). Then [beta] will be set according the residual capacity of the cell. If it is a new call, the capacity of the service cell should be checked at first. If there is enough capacity, we use probability of [beta] to accept a call or reject a call. The following procedure is the same as the handoff call except that a new call doesn't need to record the number of the higher-mobility MN. The value curve of [beta] with respect to the occupied capacity is shown in Figure 6.

2.3. Mobile IPv6 based limited fractional guard channel policy (MBLFGCP)

The operation procedure of MBFGCP is shown in the Figure 7. The MBLFGCP combines MBGCP and MBLGCP, as same as the LFGCP combines GCP and LGCP.

[FIGURE 6 OMITTED]

3. Simulation Model and Description

The simulation model is shown in the Figure 8. The hierarchy of HMIPv6 is limited to one hop, and it is prohibited to selecting more than one MAP and forcing packets to be sent from the higher MAP down through a hierarchy of MAPs. Here, we used two levels of MAPs due to the following reasons:

3.1.1 The mapping of [RCo.sub.Alevel_1] and [RCoA.sub.top] is maintained when MN moves in the same

[MAP.sub.level_1] domain. Only LCoA will change. The handover latency will not increase very much.

3.1.2 We do not impose any constraints on the location of MAPs and ARs, and we assume that MNs can decide to bypass any levels of hierarchy if appropriate.[13]

When a MN registers with the [MAP.sub.top], the M flag must be set. When a MN registers with the different [MAP.sub.level_1], the N and M flag must be set. If the movement is in the same MAP level_1, the N flag must be set. When a BU message with M and N flag sent to [MAP.sub.level_1], this BU message will be forwarded to [MAP.sub.top].

The simulation parameters are shown in Tablel. The parameters [T.sub.th1] and [T.sub.th2] are the critical threshold residency time of MNs with velocities 60km/hr and 40km/hr, respectively. The [T.sub.th] was defined in section 3. Because MNs will not always move in a straight line, we use these thresholds ([T.sub.th1] and [T.sub.th2]) as references to adjust the value of [T.sub.th]. We assume that MNs are going to stop if [T.sub.2] < [T.sub.th1] and [T.sub.1] > [T.sub.th2]; MNs slow down to a medium speed if [T.sub.2] < [T.sub.th1] and [T.sub.th1]<T1< [T.sub.th2]; MNs keep in high speed if [T.sub.2] < [T.sub.th1] and [T.sub.1] < [T.sub.th1]. When l000 calls entered every cell, the simulation terminated. The numerical results took average of l0 times of simulation.

Pd = handoff dropping calls/all calls in an AR (2)

Pb = new blocking calls/all calls in an AR (3)

Pb & d = dropping or blocking calls/all calls in an AR (4)

4. Performance Evaluation and Simulation Results

4.1. GCP vs. MBGCP (guard channel=1)

We compared blocking and dropping probabilities Pb(GCP), Pd(GCP), Pb(MBGCP) and Pd(MBGCP) under different [T.sub.new-call] (average arrival time of new call) and different "nuth" (the threshold of the ratio of high frequent handover MNs). Some of the simulation results are in shown in Figure 9. There is a tradeoff between increased Pb and decreased Pd according to the different values of the parameter "nuth".

When the number of handoff is small, MNs have higher probability to be with higher-mobility ratio > 0.9. Therefore, Pd increases due to that the parameter "adjust" often equal to zero. When "nuth" is 0.96, we find that the decreasing ratio of Pb is larger than the increasing ratio of Pd. When the arrival rate of new calls is higher (e.g. [T.sub.new-call] is 2.5), the MBGCP has similar Pb and Pd performance with GCP. We also find that the MBGCP has the most obvious performance improvement when [T.sub.new-call] is 3.5.

[FIGURE 9 OMITTED]

The Pb&d in different schemes is shown in Figure 10. The GCP has the higher Pb&d due to the reservation channels, and the "uncontrolled" scheme has the lower Pb&d. The MBGCP's Pb&d increases when the value of the parameter "nuth" increases. Many calls are blocked when the guard channel is free, and some of the system resource is wasted. We defined the ratio of blocking calls in full loads = (blocking calls in full loads / all blocking calls in an AR). The value of the ratio due to overloading is shown in Figure 11. We find that the lower "nuth" can reduce the probability of the new call blocking and limit the handoff dropping probability.

[FIGURE 10 OMITTED]

[FIGURE 11 OMITTED]

4.2. GCP vs. MBGCP (guard channel=2)

Because as the number of the guard channel increases, Pd will decrease and Pb will increase. GCP can keep Pd to a low range, but increase Pb. According to Figure12, the benefits of MBGCP are more obvious when the number of the guard channel increases. Because GCP let hand off calls more smooth with the sacrifice of accepting new calls, we see the benefit of the MBGCP.

[FIGURE 12 OMITTED]

4.3. FGCP vs. MBFGCP

FGCP has been described in section 2, a new call is admitted by a probability [beta] which is a decreasing function of occupied capacity; a handoff is accepted if there are free channels. We set b to be 0.04 as shown in Figure 13. Some of the simulation results are in shown in Figure 14 and Figure 15. When the "nuth" is small (e.g."0.8"), the curves of Pb and Pd approach to "uncontrolled". When the resident time ([T.sub.dwell]) is short, [beta] becomes small due to the nearly full loading. Because the probability of admitting new calls is low, FGCP let Pb unnecessarily increase when the guard channel is free. The MBFGCP obviously let Pb decrease. We can find that the MBFGCP can make better utilization of resources than the FGCP.

[FIGURE 13 OMITTED]

[FIGURE 14 OMITTED]

4.4. LFGCP vs. MBLFGCP (guard channel=2)

We set b to be 0.3, gc = 1, [beta] = 1-((0.3/50) x (50-1))=0.706, and gc=2, [beta] = 0.712. According to Figure.16 and Figure 17, we can find that the MBLFGCP can make better utilization of resources than other CAC schemes. Because the LFGCP has combined the advantage of the GCP and the FGCP, it's hard to find the improvement opportunity from MBLGCP. The difference between the MBLGCP and the LFGCP is not obvious as the difference between the MBGCP and the GCP. We find that the performance of the MBLGCP is still slightly better than the LGCP.

[FIGURE 15 OMITTED]

[FIGURE 16 OMITTED]

[FIGURE 17 OMITTED]

4.5. MBGCP vs. MBFGCP vs. MBLFGCP

We assume that the parameters of each CAC scheme are selected to achieve the optimized performance. The comparison of Pb (blocking probability) under these CAC schemes is shown in Figure 18. The MGCP will reject any new call when the parameter "adjust" equals to "gc" and the number of free channels is 1 or 2. The MBFGCP uses [beta] to do admission control of new call, so Pb of the MBFGCP is far lower than the MBGCP. The MBLFGCP uses [beta] to do admission control when the "adjust_1 " equals to b. The Pb of the MBLFGCP is lower than that of the MBGGCP except when the average residence time is smaller than 40 second. The comparison of Pd (dropping probability) under these CAC schemes is shown in Figure 19. Because only the handoff call can be accepted when the parameter "adjust" equals to "gc" and the number of free channels is 1 or 2, the MBGCP can get the lowest Pd at the sacrifice of much increasing Pb. While both Pb and Pd are took into consideration together, Pd is only slightly different under the CAC schemes. Because Pb of the MBLFGCP is much lower than that of the MBFGCP and MBGCP, the MBLFGCP should be the best solution among these CAC schemes.

5. Conclusion and Future Work

In this paper, we extend HMIPv6 Binding Update message to support CAC schemes. These CAC schemes can reduce the probability of the handoff dropping and cell overload, and limit the new call blocking probability. We focus on network layer handoff here, and assume linker layer handoff has been under control. In future work, we will enhance the threshold adjustment procedure so that our CAC schemes can accommodate themselves to the drastic changes of mobility patterns in the heterogeneous mobile networks. The usage scenarios can be applied to many mobile broadband wireless access networks.

[FIGURE 18 OMITTED]

[FIGURE 19 OMITTED]

[FIGURE 4 OMITTED]

[FIGURE 5 OMITTED]

[FIGURE 7 OMITTED]

References

[1] Farhan Siddiqui, Sherali Zeadally, "Mobility management across hybrid wireless networks:Trends and challenges", Computer Communications, 9 September 2005

[2] D. Bruneo, L. Paladina, M. Paone, A. Puliafito," Call Admission Control in Hierarchical Mobile Networks", Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), Pages: 780-785

[3] D. Johnson, C. Perkins, J. Arkko, "Mobility Support in IPv6", TETF RFC3775, June 2004

[4] H. Soliman, C. Castelluccia, K. El Malki, L. Bellier, "Hierarchical Mobile IPv6 Mobility Management (HMIPv6)", IETF RFC, 4140 August 2005

[5] I. Akyildiz, J. Xie,S. Mohanty, "A survey of mobility management in next-generation all-IP-based wireless systems", IEEE Wireless Communication., vol.11, no.4, pp.16-28, Aug. 2004.

[6] J. Chow,G. Garcia, "Macro-and Micro-mobility Handoffs in Mobile IP Based MBWA Network", Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE Volume 6, 29 Nov.-3 Dec. 2004 Page(s):3921 -3925 Vol.6

[7] A.K.M. M. Hossain,K. Kanchanasut, "A Handover Management Scheme for Mobile IPv6 Networks", Page(s): 43-48 ICCCN.20, 2005

[8] H. Soliman, "Mobile IPv6: Mobility in a wireless internet ", Addison-Wesley. 2004

[9] M. H. AHM, "Call admission control in wireless networks: a comprehensive survey", IEEE Communications Surveys and Tutorials, vol. 7, no. 1, 1st Quarter 2005, pp. 50-69. 5.

[10] J. Hou and Y. Fang, "Mobility-based call admission control schemes for wireless mobile networks," Wireless Communications And Mobile Computing, Vol. 1, pp. 269-282, 2001

[11] D. Hong and S. S. Rappaport, "Traffic model and performance analysis for cellular mobile radio telephone systems with prioritized and nonprioritized handoff procedures," IEEE Trans. On Vehicular Technology, Vol. 35, No. 3, pp. 77-92, Aug. 1986.

[12] R. Ramjee, R. Nagarajan and D. Towsley, "On Optimal Call Admission Control in Cellular Networks," INFOCOM. Fifteenth Annual Joint Conference of the IEEE Computer Societies. Networking the Next Generation. Proceedings IEEE, Vol. 1, pp. 43-50, Mar 1996.

[13] C. Castelluccia.," HMIPV6: A hierarchical mobile IPv6 Proposal," ACM Mobile Comput. Commun. Rev., vol.4, no.1, pp48-59,2000

[14] E.A. Yavuz and V.C.M. Leung, Computationally efficient method to evaluate the performance of guard-channel-based call admission control in cellular networks, IEEE Transactions on Vehicular Technology, 55, 1412-1424, 2006.

[15] Y Zhang, H Hu, M Fujise, Resource Mobility and Security Management in Wireless Networks and Mobile Communications, CRC Press, 2007.

Shun-Fang Yang (1) and Jung-Shyr Wu (1)

(1) Department of Communication Engineering, National Central University, No.300, Jung-da Rd., Jung-li City, Taoyuan, 32054 Taiwan 945403004@cc.ncu.edu.tw
Table 1. The parameters are defined in the simulation

Cell Radius                             250m

Capacity of a cell                       50

The Average Arrival time of        4.5, 3.5, 2.5s
the New cells ([T.sub.new_call])

The Average Residency time of          24~606
the Calls ([T.sub.dwell])

The Average Service time of             450s
the Call ([T.sub.life_time])

The Average Arrival time of             20s
the Call from other networks

[T.sub.tb1]                             30s

[T.sub.tb2]                             45s
COPYRIGHT 2010 Kohat University of Science and Technology
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2010 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Author:Yang, Shun-Fang; Wu, Jung-Shyr
Publication:International Journal of Communication Networks and Information Security (IJCNIS)
Geographic Code:1USA
Date:Aug 1, 2010
Words:4122
Previous Article:Mesh networks planning: optimization with multi-hop interference.
Next Article:Broadband cognitive radio transmission based on sub-channel sensing and NC-OFDM.
Topics:

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters