GSM Wirelesscourse
GSM Wirelesscourse
by
Ankit Chopra
A thesis
submitted to the Victoria University of Wellington
in fulfilment of the
requirements for the degree of
Master of Engineering
in Network Engineering.
iii
iv
Contents
1 Introduction 1
1.1 Cellular Wireless Networks . . . . . . . . . . . . . . . . . . . 1
1.1.1 Challenges in Cellular Networks . . . . . . . . . . . . 5
1.1.2 Issue of Non-Uniform User Distribution . . . . . . . . 6
1.2 Thesis Objective . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.3 Thesis Contributions . . . . . . . . . . . . . . . . . . . . . . . 8
1.4 Thesis Organization . . . . . . . . . . . . . . . . . . . . . . . . 9
2 Related Work 11
2.1 Load Balancing in Cellular Networks . . . . . . . . . . . . . . 11
2.1.1 Channel Assignement Schemes . . . . . . . . . . . . . 11
2.1.2 Dynamic Load Balancing Schemes . . . . . . . . . . . 12
2.1.3 Schemes based on Association Control . . . . . . . . 14
2.1.4 Relay Assisted Traffic Transfer Schemes . . . . . . . . 15
2.2 Load Balancing in Wireless Local Area Networks . . . . . . . 17
2.3 Recent Research Work . . . . . . . . . . . . . . . . . . . . . . 18
2.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3 System Model 21
3.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.1.1 Preamble Sequences . . . . . . . . . . . . . . . . . . . 21
3.1.2 Fairness in Wireless Networks . . . . . . . . . . . . . 23
3.2 Utilizing Preamble Sequences for Load Balancing . . . . . . 25
v
vi CONTENTS
7 Conclusion 69
CONTENTS vii
8 Future Work 71
viii CONTENTS
List of Figures
ix
x LIST OF FIGURES
xi
xii LIST OF TABLES
List of Abbreviations
AP Access Point
AMC Adaptive Modulation and Coding
ASN Access Network
Autocorr Autocorrelation
BS Base Station
CAZAC Constant Amplitude Zero Autocorrelation Waveform
CDMA Code Division Multiple Access
CBWL Channel Borrowing Without Locking
CBWLCR CBWL with Channel Rearragement
CBWLnR CBWL without Channel Arrangement
CSN Connectivity Service Network
DCA Dynamic Channel Assignment
FCA Fixed Channel Assignment
FDMA Frequency Division Multiple Access
FFT Fast Fourier Transform
HCA Hybrid Channel Assignment
LBSB Load Balancing with Selective Borrowing
LFSR Linear Feedback Shift Register
MACA Mobile Assisted Call Admission
MCN Multihop Cellular Networks
MLS Maximum Length Sequences
MS Mobile Station
MSCD MS Cell Decision
xiii
xiv LIST OF TABLES
Introduction
The popularity of wireless communication has made great gains over the
past two decades as witnessed by the widespread adoption of Wireless
Local Area Networks (WLANSs), cellular networks, and worldwide in-
teroperability for microwave access (WiMAX) [3]. Users of these wireless
access networks expect the highest quality, reliability, and ease of access
to high-speed services. In terms of mobile communications, cellular net-
works have been a dominant player in the recent years and stands as the
focus of our research in this thesis.
1
2 CHAPTER 1. INTRODUCTION
The channels assigned to a cell are generally used either for voice or for
control. A voice channel is used for an actual conversation, whereas a
control channel is used for setting up conversations. Both voice and con-
trol channels are further divided into downlink and uplink (forward or
reverse). A forward channel is used to carry traffic from the BS to the MS,
and a reverse channel is used to carry traffic from the MS to the BS. The
channels assigned to a cell are shared by MSs located in the cell.
Every MS in the network has a home, which is the MTSO where the
mobile user originally subsribed for wireless services and this location is
stored in it. If an MS moves out of the home MTSO area, it is roaming. A
roaming MS is required to register for services in the MTSO visited. An MS
needs to be authenticated first before it can get any service by the network.
The process of making a call is as follows. The MS first requests for service
using a reverse control channel in the current cell. The request then needs
to be granted, by the MTSO, a pair of voice channels assigned for the call,
4 CHAPTER 1. INTRODUCTION
one for receiving and one for transmitting. Making a call to an MS is a little
more complex, however. The call is first routed to the home MTSO or the
visited MTSO if it is roaming. The MTSO needs to know the cell in which
the MS is currently located. Here, the concept of location management
comes in to locate the residing cell of an MS. Once the MTSO knows the
residing cell of the MS, a pair of voice channels assigned in the cell for the
call.
If a call is in progress when the MS moves into a neighboring cell, the MS
needs to get a new pair of voice channels from the BS to the neighboring
cell so the call can be continued. This process is known as handoff.
• Larger Coverage Area : The concept of dividing the land area into
cells and strategically placing base stations in them, results in a larger
coverage area as compared to other alternate solutions and is a sig-
nificant feature of cellular networks.
1.1. CELLULAR WIRELESS NETWORKS 5
• Reduced Cost : Although the cost of deploying the BSs and setting up
the network is substantial, taking into account the advantages that
cellular networks offer over alternate solutions, the cost of operation
is much less considering its use in the long term.
• The dead spot problem : Although, mobile users are within the com-
munication range of the BS, there are still some areas where coverage
is not available at all. These areas are often referred to as dead spots
such as indoor environments and underground areas like basements.
• The problem of hot spots : Due to the limited capacity, mobile users
6 CHAPTER 1. INTRODUCTION
tend to experience higher call blocking, i.e., call requests are denied,
in dense areas known as hot spots, such as downtown areas and
amusement parks . This is because of the fact that, in hot spots, there
are more mobile users than the number of available channels.
• Minimize the traffic load variances to achieve load balancing : The main
goal, as stated forehand, is to develop schemes that consider not only
the conventional metric RSSI for user association, but also the traffic
load or congestion at the BS, allowing users to make a more intel-
ligent decision on which BS to associate with. This would result in
minimizing the variation in traffic load to achieve a well-balanced
network in terms of load.
• Maximize Jain’s fairness to achieve fairness among the mobile users : Fair-
ness is a major criteria in evaluating how well the resources are be-
ing shared among the users equally. Therefore, our schemes should
yield good results under popular fairness measures such as max-min
fairness and proportional fairness and evaluation indexes like Jain’s
fairness index.
Related Work
11
12 CHAPTER 2. RELATED WORK
one of the main advantages of such a scheme along with frequency reuse
maximization, as opposed to the other schemes which have complex pro-
cedures [2].
The second one is the dynamic channel assignment (DCA) strategy, in
which voice channels are not permanently allocated to the cells [2][5][6][7].
Everytime a call request is made, the serving base station requests a chan-
nel from the MSC, instead. The switch then allocates a channel to the re-
questing cell following an algorithm that takes into account the likelyhood
of future call blocking within the cell, the frequency of use of the candi-
date, the reuse distance of the channel, and other cost functions. Although
DCA schemes improve the call blocking probability of the system sub-
stantially, for high traffic intensity, the computational load on the system
increases greatly.
The third type is hybrid channel assignment (HCA), which is a blend
of the concepts of fixed and dynamic channel assignement schemes. This
basically means, there are channels in a global pool for use in case there is
a shortage, in addition to the fixed set of channels assigned to each cell [8].
To conclude, although the objective of all the schemes is better utiliza-
tion of the available channels, causing reduced call blocking probability,
most of the schemes do not consider the non-uniformity of channel de-
mand, which is the variation of channel demand from time to time and/or
area to area.
which borrowed channels can be used (this area is limited due to reduced
transmission power over the borrowed channels) are granted service us-
ing a borrowed channel. However, in CBWLCR, even if the new call re-
quest is not in the channel-borrowing area, it can still get service if there is
at least one active user within the channel-borrowing area. In this case, the
active user will borrow a channel from a neighboring cell and start trans-
mission at a reduced power and the channel released by that user will be
assigned to the new user requesting service.
In selective channel borrowing [11], load balancing is achieved by a
structured borrowing mechanism where a hot cell can borrow a fixed num-
ber of channels only from adjacent cells in the next outer ring. In this way,
unused channels of the cold cells are moved to the hot spot area. This
mechanism reduces the amount of interference between the borrower cell
and the co-channel cells of the lender.
In directed retry scheme, the traffic load is shared in the overlap of
the neighbouring cells. In this, there is no concept of borrowing channels
from the neighboring cells, however, the subscribers who can communi-
cate with more than one base station are moved from the congested cell to
a neighboring cell [12].
In the hierarchical macrocell overlay system with microcells and over-
laid macrocells [14], high traffic areas are covered by microcells while over-
laying macrocells cover low-traffic areas and provide overflow groups of
channels for clusters of microcells. In other words, the excess traffic of
the microcells is served by the overlaying macrocells. As a consequence,
macrocell overlays inherently achieve dynamic load balancing by trans-
ferring the otherwise blocked microcell users to the macrocells.
cells, as the load of the BS is not considered. This often causes the entire
network to be under-utilized.
To combat this, several studies [15]-[21] have proposed a variety of as-
sociation metrics instead of using the RSSI as the sole association criteria.
These metrics typically consider factors such as, the number of users cur-
rently associated with a BS, and the bandwidth that a new user will be
able to get if it is associated with a BS [15]-[16]. Balachandran et al. [17]
proposed to associate a user with the AP that can provide a minimal band-
width required by the user. If there exist many such APs, the one with the
strongest signal strength is selected.
Velayos et al. [18] introduced a distributed load balancing architecture
where the load of an AP is defined as the aggregated downlink and uplink
traffic through the AP. Kumar et al. [19] proposed an association selection
algorithm which is based on the concept of proportional fairness to bal-
ance between throughput and fairness. Most of these work heuristically
determine only the association of newly arrived users with some excep-
tions [20] [21] . Tsai and Lien [20] proposed to reassociate users when the
total load exceeds a certain threshold or the bandwidth allocated to users
drops below a certain threshold. An on-line scheme that periodically op-
timizes the user-AP association has also been proposed [21].
Recently, there has been a lot of interest in the usage of relays and relay-
ing techniques to expand coverage and capacity in cellular networks. Re-
searchers have looked at the problem of load balancing from the perspec-
tive of relaying and have proposed schemes to induce user handoff’s from
heavily loaded cells into adjacent cells that may be lighly loaded.
iCAR [35] and PARCelS [36] were the first two load balancing schemes
introduced for balancing the load among cells through relaying. In iCAR,
low cost limited mobility, ad-hoc relay stations (ARSs) are placed in hot
16 CHAPTER 2. RELATED WORK
spots for relaying traffic out of the hot spots. This strategy is still costly
and not flexible enough to handle the highly dynamic load situation in
3G networks. PARCelS uses mobile nodes for relaying. When a BS is
congested, mobile nodes search best routes to other non-congested cells.
Route information is forwarded to BSs for selection. This strategy requires
considerable routing overhead in mobile nodes and does not take advan-
tage of the presence of powerful BSs. In addition, both schemes do not
take into account the load balancing among relaying nodes which could
greatly affect the load balancing performance.
Some other schemes have also been introduced to increase the capacity
in cellular networks with the schemes based on the same idea and differ-
ing only in implementation.
Mobile Assisted Call Admission (MACA) [23], is a dynamic load balanc-
ing scheme proposed to improve call blocking probability performance
in cellular networks with the idea of forwarding the excess traffic of a
”hot” cell to its ”cooler” neighboring cells via mobile agents in the net-
work. For the purpose of forwarding the call, either relay channel can be
used, in-band (i.e., cellular band) channel or out-of-band (i.e., ISM-band
or any other band other than cellular band) channel. In the case of in-band
MACA, a portion of the fixed channels assigned to each cell is saved for
forwarding calls. Whereas, in out-of-band MACA, the mobile agents use
channels from a frequency band other than the cellular band such as the
ISM-band to forward calls.
In Multihop Cellular Networks (MCN) [22], the range of the BSs and mo-
bile devics are reduced and mobile users within the same cell are able to
communicate with each other over multi-hops, and on the other hand,
mobile users in different cells need to forward their traffic via BSs. The
objective in this scheme is to increase the capacity of the cellular network
by replacing single-hop communication with multi-hop between the BSs
and mobile users.
2.2. LOAD BALANCING IN WIRELESS LOCAL AREA NETWORKS 17
Figure 2.2: Cell breathing (decrease in coverage area with increase in sub-
scribers)
2.4 Summary
In this chapter, a brief overview of the all the load load balancing schemes
proposed for cellular networks, was presented. We discussed the various
channel assignment schemes which allocate the channels to cells using dif-
ferent strategies with the aim of maximizing the utilization of the available
channels for an increase in capacity and performance.
We talked about the dynamic load balancing schemes, wherein the ca-
pacity is increased via dynamic load/traffic transfer among cells. A brief
note on load balancing schemes based on association control is also pre-
sented, in which, several schemes have been proposed that use different
metrics to associate users with BSs in addition to the conventional RSSI-
based association.
Schemes based on relay assisted traffic transfer are also discussed which
use relays and relaying techniques to expand coverage and capacity. We
have also presented load balancing schemes designed for WLANs, where
the cell size is dynamically changed for load balancing, a phenomina called
as cell breathing, along with schemes relying on transmit power to induce
user handoffs into cells which are comparatively less loaded.
Finally, recent research work into load balancing using preamble sequences
was presented with its features and limitations. In the next chapter, we
present our system model, where we present our concept of load balanc-
ing using preamble sequences.
20 CHAPTER 2. RELATED WORK
Chapter 3
System Model
3.1 Definitions
21
22 CHAPTER 3. SYSTEM MODEL
cal copy of itself produces a peak at the origin. The definitions of auto-
correlation and cross-correlation are defined subsequently. Applications
of PN sequences include signal synchronization, navigation, radar rang-
ing, random number generation, spread-spectrum communications, mul-
tipath resolution, cryptography, and signal identification in multiple-access
communication systems [39].
In the design of the preamble, the following must be taken into con-
sideration. The preamble sequence for cellular systems should have a low
peak-to-average power ratio (PAPR), which is is the ratio of peak signal
power to the average signal power used for estimating the backoff re-
quired for an radio-frequency/microwave power amplifier to exhibit ac-
ceptable intermodulation distortion. Along with this, it should also pos-
sess good (low) cross-correlation and (impulse-like) auto-correlation char-
acteristics all with the aim of serving well for the purpose of cell iden-
tification, time and frequency synchronization and channel measurement.
Well-known preamble sequences for cellular systems include PN sequence,
Gold sequence, and CAZAC sequence [46].
Various pseudo random codes are generated using LFSR (Linear Feed-
back Shift Register). The generator polynomial governs all the characteris-
tics of the generator. For a given generator polynomial, there are two ways
of implementing LFSR. Galois feedback generator uses only the output bit
to add (in Galois field) several stages of the shift register and is desirable
for high speed hardware implementation as well as software implementa-
tion.
The other one is the Fibonacci feedback generator which can generate
several delays of sequences without any additional logic. Shift-register
sequences having the maximum possible period for an r-stage shift reg-
ister are called maximal length sequences or m-sequences. A primitive gen-
erator polynomial always yields an m-sequence. The maximum period of
an p-stage shift register can be proven to be 2p − 1. The m-sequences has
three important properties, i.e., balance property, run-length property and
3.1. DEFINITIONS 23
where n is the time index, k is the bit register position, and + represents
modulo-2 addition. As MLS are periodic and shift registers cycle through
every possible binary value (with the exception of the zero vector), regis-
ters can be initialized to any state, with the exception of the zero vector.
Polynomial Interpretation
A polynomial over GF(2) can be associated with the linear feedback shift
register. It has degree of the length of the shift register, and has coefficients
that are either 0 or 1, corresponding to the taps of the register that feed
the xor gate. For example, the polynomial corresponding to Figure 3.1 , is
x4 +x1 + 1. A necessary and sufficient condition for the sequence generated
by a LFSR to be maximal length is that its corresponding polynomial be
primitive.
Once the sequences have been sorted, we link the load information to
the value of the metric associated with the preamble sequence. This is
done by mapping the sequences to BSs according to the metric values and
the load experienced by the BS. This implies, for a highly loaded BS b, the
corresponding metric defined on b’s preamble sequence → −p b , would have
a higher value and for a relatively lightly loaded BS, the value would be
small.
We consider the following preamble configurations towards the design
of our schemes:
→
−0
• A sequence p formed by repetition of a part of a preamble sequence
on autocorrelation forms a number of peaks in the autocorrelation
26 CHAPTER 3. SYSTEM MODEL
Figure 3.3: At central controller the metric is the number of peaks in the
auto-correlation plot.
RSSIstrongest
α= =1 (3.1)
RSSInextstrongest
From this limiting case onwards, when r > 1, larger areas near the
boundary are considered for load balancing. Additionally, the conven-
tional RSSI based cell selection can be invoked by setting r = 0, when
28 CHAPTER 3. SYSTEM MODEL
the algorithm skips the load balancing steps and adopts the conventional
method using RSSI since α is always positive.
Thus, when r = 0, the condition for α < 0 will never be satisfied as can
be seen later in the MSCD AutoCorr and MSCD CrossCorr algorithms,
and can be better understood from Figure 3.5 above.
For the illustration purpose, we in this thesis, consider the IEEE 802.16e/Mobile
3.3. SYSTEM MODEL 29
WiMAX system. Figure 3.6 shows the network architecture of WiBro (Wire-
less Broadband) system, which is a Korean version of Mobile WiMAX.
The WiBro network is composed of MSs, access network (ASN) and
connectivity service network (CSN). Among the network components, a
WiMAX system manager (WSM) is devised to manage multiple radio ac-
cess stations (RASs or BSs) and access control routers (ACRs or ASN-
G/W) for the purpose of network optimization. ACR is the central sys-
tem of the Wibro network, which connects the CSN and RAS. It enables
multiple RASs to internetwork with CSN and IP networks and sends and
receives traffic between the external network and MS. Therefore, it can
be used as the centralized controller over WiBro system. We also empha-
size that our proposed schemes can be used in any other wireless system,
which employs preamble code sequences.
The IEEE 802.16e specification [31] defines 114 pseudo noise (PN) se-
quences to be used as the preamble sequences in the 1k Fast Fourier Trans-
form (FFT) mode. These sequences are 284 bits long, and have the char-
acteristic properties that make them appealing for applications like cell
identification and synchronization.
In our schemes, we work with decisions involving cross-correlation be-
tween the PN code sequences, as the average cross-correlation between the
different PN code sequences have been found to be ranging from a mini-
mum of 0.04 to a maximum of 0.16 [30]. Also, a recent study [33] shows,
it is possible to use just a part of the whole PN code sequence to practi-
cally achieve the goals of synchronization and cell identification, mainly
because of this cross-correlation property among different sequences.
In a practical cellular network, a station generally selects the BS, which
yields the maximal received signal strength indicator (RSSI) obtained by
reading the preamble code sequence. In a model where B is the set of
all the base stations, gbs is the channel gain from BS b to an MS s, Pb is the
transmission power of BS b, → −
p b is the preamble code sequence correspond-
→
−
ing to base station b, and x s (t) is the signal received by an MS s at time t
30 CHAPTER 3. SYSTEM MODEL
from all BSs; the decision made by the MS s is given in Eq. 5.1, where b̂ is
the chosen BS.
RSSIs (t, b) = →
−
p b .→
−
x s (t) (3.3)
→
− gbs Pb (t)→
−
X
x s (t) = pb (3.4)
b∈B
3.4 Summary
In this chapter, we have presented a brief definition of preamble sequences,
how they are generated, and their applications, along with a note on fair-
ness in cellular networks. We introduced our proposed concept of how
preamble sequences can be utilized for load balancing with a model/design
parameter to target the boundary users. Finally, we presented our sys-
tem model, and used the IEEE 802.16e/WIMAX system for illustration,
with a note on its architectural components and how we use the pream-
ble sequences in it for load balancing. In the next chapter, we present our
proposed auto-correlation based implicit load indication scheme with the
algorithms discussing how it is realized.
Chapter 4
31
32CHAPTER 4. AUTO-CORRELATION BASED IMPLICIT LOAD INDICATION SCHEME
quence by selecting the first Mj bits of the PN sequence and then repeating
it j times where j = arg{Lj } and this will grouped into one of Lj . This will
give us a sequence of M bits which would be periodic in the time domain
and would have j periods in the M bit length.
Figure 4.2 shows the auto-correlation plot of a preamble of length 284
bits which is made up of four repeated preamble sequences of length 71.
After this operation, the autocorrelation plot for the modified pream-
ble code shows j peaks corresponding to the number of repetitions in the
M bit sequence. We propose that this value j be the metric which we use
for load indication of a particular BS. Hence, the more the repetitions in
34CHAPTER 4. AUTO-CORRELATION BASED IMPLICIT LOAD INDICATION SCHEME
the preamble sequence, the more will be the number of peaks in the auto-
correlation plot and that would indicate a more loaded BS.
This modification to the preamble code sequence by introducing pe-
riodicity in the time domain does cause concerns over its effect on cell
identification and synchronization which the preamble sequence actually
has to fulfill. These are valid concerns as due to the periodic nature of the
modified preamble, it exhibits lower separation of magnitude between the
autocorrelation peak and other values on the autocorrelation plot. These
concerns have been addressed in a recent study [33], which shows that a
considerably small part of the preamble sequence is practically sufficient
in terms of achieving the required goals of identifiability and also synchro-
nization. Larger number of repetitions would make the errors higher, but
below a maximum number of allowed repetitions p, it would be practi-
cally sufficient. We now present two algorithms working side by side. The
preamble modification algorithms works at the central controller and MS
cell decision algorithm works at the user end.
The modification of the preamble code would happen at the central net-
work controller where it will assign the j value (number of repetitions) to
the BSs according to their loads.
Then, at the MS, the MS Cell Decision (MSCD) algorithm will be used to
detect load values of BSs which are of interest to the MS and consequently
make cell choice decision. We denote this MSCD algorithm using auto-
correlation as MSCD AutoCorr. The MS first correlates the preamble code
with the copy of the original preamble sequence code list it possesses to
identify the BSs (this step is involved in detecting the three strongest BS
signals in lines (2 - 6) of MSCD AutoCorr) and then uses the autocorre-
lation property (line 8 - 10) to find multiple peaks (if applicable) instead
of the single peak which would have been the normal case. Detecting the
number of peaks (line 11-13), it arrives at the value j which conveys infor-
36CHAPTER 4. AUTO-CORRELATION BASED IMPLICIT LOAD INDICATION SCHEME
mation about the load, which is then used to decide on the choice between
the three BSs of interest.Prior to the Preamble Modifying Algorithm, the
grouping intervals of the load values are assumed to have been decided
by the central network controller using uniform grouping.
equal to the number of peaks in it. Here we define two design parameters
r and δ, which specifies the area to be influenced by load balancing algo-
rithm and the minimum RSSI requirement, respectively.
4.4 Summary
In this chapter, we first presented a brief defintion of the auto-correlation
property of preamble sequences, which is the cross-correlation of a signal
sequence with itself along with its use and applications. Based on this
property, we have developed and defined two algorithms working side
by side, one on the central network controller and one on the user side to
associate MSs with BSs considering the level of load at them.
In the first algorithm, at the central network controller, the load values
of all BSs is collected first and then the preamble sequences of all of them
are modified. Then the controller assigns a specific value obtained by the
modification to BSs according to their loads. The BSs will then transmit
using these modified preamble sequences in the Preamble Modifying Al-
gorithm. The MS then receives and correlates the preamble code with the
copy of the original preamble it had and finds the modification which im-
plicitly conveys the load level to it and it chooses the BS which is lightest
loaded in the MSCD algorithm, which runs on the user’s side.
In the next chapter, we present our proposed cross-correlation based
implicit load indication scheme and how it is applied for load balancing.
38CHAPTER 4. AUTO-CORRELATION BASED IMPLICIT LOAD INDICATION SCHEME
Chapter 5
R∞
(f ? g)(t) = f ∗ (τ )g(t + τ )dτ (5.1)
−∞
39
40CHAPTER 5. CROSS-CORRELATION BASED IMPLICIT LOAD INDICATION SCHEME
m=∞
X
(f ? g)[n] = f ∗ [m]g(n + m) (5.2)
m=−∞
As an example, Figure 5.1 shows two time series xy, and Figure 5.2, a
cross-correlation between the two time series performed with a maximum
delay of 4000. The strong correlation can be observed from the peak at the
delay of about 40.
5.2. PREAMBLE ALLOCATION USING CROSS-CORRELATION 41
the boundary between three BSs. Firstly the algorithm identifies the three
nearest BSs by using their RSSI (line 2 - 6). Then, a condition is tested using
a design parameter r which determines whether the MS is at the boundary
area between the two identified BS’s cells by calculating the ratio of their
RSSI.
Also, a minimum RSSI criteria is tested using a parameter δ (line 7). When
44CHAPTER 5. CROSS-CORRELATION BASED IMPLICIT LOAD INDICATION SCHEME
either of these two conditions fail, the usual RSSI based selection is fol-
lowed (line 15). Otherwise, the load balancing algorithm comes into effect.
Cross correlations of the preamble sequences of the three BSs are calcu-
lated (line 8 - 10) and the BS having highest maximum cross-correlation is
chosen.
5.4 Summary
In this chapter, we first presented a brief defintion of the cross-correlation
property of preamble sequences, along with its use and applications. We
have developed and defined two algorithms working side by side on the
basis of this property, one on the central network controller and one on the
user side to associate MSs with BSs considering the level of load at them.
In the first algorithm that we call Preamble Allocation using cross-
correlation (PAC), at the central network side, the load value of all BSs
is collected first and then the preamble sequences are correlated with an
arbitary sequence to get different values which are then assigned to im-
plicitly indicate the load to the users seeking association and service. On
the user’s side runs the MSCD algorithm, where the users correlate the
sequences present in them with the sequence of the incoming stations to
implictly know the load of the BS for smart cell-selection.
In the next chapter, we perform extensive simulations of our proposed
schemes and discuss the results.
Chapter 6
In this chapter, simulations results are presented on the two load balancing
schemes described in Chapter 4 and 5. The main objective is to investigate
the performance of the schemes to substantiate their effectiveness using
popular performance metrics such as throughput, load variance and fair
resource sharing. First, Section 6.1 discusses the channel characteristics
in wireless systems that affect the performance and following that a breif
note on the simulation environment. Subsequently, Section 6.2 presents
the performance results using the performance metrics mentioned earlier.
After this, in Section 6.3, the performance of our proposed schemes is then
evaluated under different environments, namely, the Hata for urban areas.
Finally, in Section 6.4, we present a comparison of our proposed schemes
against RSSI-based schemes.
45
46 CHAPTER 6. SIMULATION RESULTS AND DISCUSSION
Figure 6.1: A conventional 12-cell model with focus on cells 0,1 and 2
cated in cell 0, 80 in cell 1, 20 in cell 2, and all the other cells have 45 stations
randomly distributed over their cell region. Our algorithm is then applied
to the boundary stations. In our simulations, we consider the channel gain
due to path loss effect with a path loss exponent of 4, which is ideal for a
typical cellular network.
At r = 10 case, one can see how our algorithm leads many of the MSs near
the boundary of cell 0 to be handed over to neighbouring BSs and thus
6.2. SIMULATION RESULTS AND DISCUSSION 49
(lb − lb )2
P
b∈B
lvar = (6.1)
n(B)
where n(B) is the total number of BSs, lb is the load experienced by each
BS and lb is the mean of all the load values.
For this test, we take the number of users as 100 in cell 0, 80 in cell 1, and
20 in cell 3. Therefore, as the load gets distributed more evenly among the
different BSs, we see a gradual decrease in lvar , as seen in Figure 6.3, which
shows its variation with different values of our design parameter r.
We now vary the number of user in cells and simulate by having 60 users
in cell 0, 40 users in cell 1, and 10 users in cell 2. We observe, at r =
7, in Figure 6.4, the load gets minimal and then slightly increases before
stabilizing after r = 9. This is because the total population decreases a bit
as r increases in cell 2 and go into cell 10 and 11 as their serving cells. Thus,
this metric is useful in measuring the even-ness of distribution of MSs in a
collection of cells and shows the effectiveness of our proposed schemes in
terms of fair user distribution.
50 CHAPTER 6. SIMULATION RESULTS AND DISCUSSION
Figure 6.3: Load Variance test with 100 users in cell 0, 80 users in cell 1,
and 20 users in cell 3.
Figure 6.4: Load Variance test with 60 users in cell 0, 40 users in cell 1, and
10 users in cell 2.
6.2. SIMULATION RESULTS AND DISCUSSION 51
Figure 6.5: Resource Fairness with initially 100 users in cell 0, 80 in cell 1
and 20 users in cell 2.
52 CHAPTER 6. SIMULATION RESULTS AND DISCUSSION
SNR. This is clear from the expression for channel capacity [34], where R
is the channel capacity, W is the bandwidth assigned to each MS, P is the
power received by the MS and N0 /2 is the noise.
R P
= log(1 + ) (6.2)
W N0 W
Figure 6.7: Throughput Fairness with initially 100 users in cell 0, 80 in cell
1 and 20 users in cell 2.
On the other hand, the other two lightly loaded BS’s throughput de-
teriorates slightly because of the increase in number of users managed by
the BS, as seen in Figure 6.7.
We now vary the number of user in cells and simulate by having 50
users in cell 0, 40 users in cell 1, and 10 users in cell 2 in Figure 6.8. We
again observe that the minimum throughput of users in cell 0 increases
along with users in cell 2, while the minimum throughput of users in cell
1 experience a deterioration in their throughput due to the new handoffs.
This can be interpreted that our load balancing scheme leads to an im-
proved consequence in terms of max-min throughput fairness.
6.2. SIMULATION RESULTS AND DISCUSSION 55
Pn
i=1 Ui
L= (6.3)
n
where n is the number of BSs, and Ui is the resource utilization of BS i
and compare this average to the individual resource utilizations Ui of each
BS. To describe the loading state of the whole system with one value the
following load balance index has been defined [42]:
( ni=1 Ui )2
P
B= 2 (6.4)
n ∗ ni=1 Ui
P
Figure 6.9 shows the load balance index, where values near 1 depict a
load balanced system and 0, no load balancing.
To quantify and measure the fairness acheived in the system, we use
Jains0 s F airness Index again described as follows :
Pn
( i=1 xi )2
J(x1 , x2 , ..., xn ) = P n 2 [42] (6.5)
n∗ i=1 xi
Equation 6.4 rates the fairness of a set of values where there are n users
and xi is the throughput for the ith connection. The result ranges from 1/n
(worst case) to 1 (best case), and it is maximum whenall users receive the
same allocation. This index is k/n when k users equally share the resource,
and the other n-k users receive zero allocation. This metric identifies un-
derutilized channels and is not unduly sensitive to atypical network flow
patterns.
Figure 6.10 shows, as r increases, the system gets fairer and at r = 6, we
are able to obtain fairness greater than 0.9 on the index. This also proves
that there is a very strong correlation between load balancing and fairness.
56 CHAPTER 6. SIMULATION RESULTS AND DISCUSSION
Coverage Value
Frequency (MHz) 150 - 1500
Mobile Station Antenna Height (Meters) 1 - 10
Base station Antenna Height (Meters) 30 - 200
Link distance (Kms) 1 - 20
LU = 69.55 + 26.16 log f − 13.82 log hB − CH + [44.9 − 6.55 log hB ] log d(6.6)
where,
LU = Path Loss in Urban Areas. Unit: decibel (dB)
hB = Height of Base Station Antenna. Unit: meter (m)
hM = Height of Mobile Station Antenna. Unit: meter (m)
f = Frequency of Transmission. Unit: megahertz (MHz)
CH = Antenna Height Correction Factor
58 CHAPTER 6. SIMULATION RESULTS AND DISCUSSION
Figure 6.13 shows the varinace of load in the system. Due to the sever-
ity of noisy conditions, when our load balancing algorithm comes into
effect at r = 1, we see a sharp decline in the load variance initially until
r = 2 because of the user handoffs. Then the variance gradually stabilizes
at r = 8.
We now evaluate our schemes in terms of the load balance index of the
whole system [42] now. It can be observed from Figure 6.14 that due to
the noisy channel conditions, at r = 2, when our load balancing scheme
comes into effect, we see an increment initially but it is met by resistance
from r = 3 to 8, until it sharply increases again at r = 9. This shows the
robustness of our schemes.
6.3. PERFORMANCE UNDER DIFFERENT ENVIRONMENTS 61
(
8.29(log(1.54hM ))2 − 1.1, 150 ≤ f ≤ 200
CH = (6.8)
3.2(log(11.75hM ))2 − 4.97, 200 < f ≤ 1500
We first simulate again for throughput fairness versus our design param-
eter r. Figure 6.15 shows the fairness of throughput under the channel
conditions mentioned above. It can be observed that there is a great im-
provement in the throughput of the cell 0 as the cell edge users leave the
62 CHAPTER 6. SIMULATION RESULTS AND DISCUSSION
cell and are handed off to cell 1 and 2 until r = 9 where noisy conditions
overpower it, but it recovers again at r = 10.
The throughput of cell 1 deteriorates as it accomodates new users from
cell 0 and gets stabilized as r increases, but due to the extremely noisy
channel conditions, it does not gain at all to be noticable. Also, due to the
very low number of users in cell 2, the throughput deterioration is barely
visible, but is minimal and stabilizes along with increasing r.
This shows that our proposed schemes are able to perform in the noisiest
of environments in terms of throughput fair scheduling, even though the
improvement in the minimum throughput in not very substantial.
As seen in Figure 6.16, our schemes perform well again to induce user
handoffs into the lightest loaded cell, which is cell 2 and gains users from
6.3. PERFORMANCE UNDER DIFFERENT ENVIRONMENTS 63
both cells 0 and 1 showing a well balanced user distribution under these
channel conditions. This is again due to the effectiveness of our design
parameter r that targets the boundary users that the schemes are able to
balance user distribution well.
Figure 6.17 shows the varinace of load in the system. Due to the sever-
ity of noisy conditions in the large city model, when our load balancing al-
gorithm comes into effect at r = 1, we again see a sharp decline in the load
variance initially from r = 2 till r = 4 because of the user handoffs. Then,
the variance stabilizes despite the noisy channel conditions and mildly
climbs from r = 9 to r = 10.
We now evaluate our schemes in terms of the load balance index of the
whole system [42] now for the large city model. It can be observed from
64 CHAPTER 6. SIMULATION RESULTS AND DISCUSSION
to users index.
6.5 Summary
In this chapter, we performed extensive simulations on our two proposed
load balancing schemes. We first present a brief discussion on the channel
characteristics of wireless networks and the various degradation factors.
Then we discuss the simulation environment with the underlying assump-
tions. We first simulate using the peformance metric, load variance, which
shows that our proposed schemes peform well balancing the load of the
system, minimizing the traffic load variance. Then, the schemes are tested
for fairness to users in terms of resources under various user densities to
demonstrate their effectiveness in balanced user distribution across the
network. We then quantify the fairness acheived by the schemes using
Jain’s fairness index, which displays very high levels of fairness in terms
in terms of load and user distribution. We also compare the performance
of our schemes under different environments to test their robustness using
the Hata model. Finally, we compare our proposed schemes with schemes
based on RSSI-based assocation to compare their performance and make
our case.
68 CHAPTER 6. SIMULATION RESULTS AND DISCUSSION
Chapter 7
Conclusion
69
70 CHAPTER 7. CONCLUSION
but also the level of congestion at it. The second scheme works using the
cross-correlation property among preamble sequences to implicitly obtain
the load state of BSs for load balancing. This enables the users while join-
ing the network to perform smart cell-site selection based on the level of
congestion at the BS along with the conventional association metrics.
We have performed extensive tests to evaluate the performance of the
schemes considering the scheduling disciplines RF and TF, as the resource
allocation policies. The proposed schemes are able to obtain a high degree
of improvement in the minimum throughput of users in the cells we focus
on, and apply our load balancing schemes to, and perform well in terms of
throughput fair scheduling. The schemes are then tested for fair user dis-
tribution and achieve great results in alleviating the problem of load vari-
ance by swiftly inducing user handoffs into lightly loaded cells from the
highly loaded ones to balance the load. We also test the schemes in terms
of Jain’s fairness index for resource fairness evaluation and for load vari-
ance and obtain great results. Finally, we tested the schemes for robustness
and compared them with schemes relying on conventional RSSI-based cell
selection to the conclude that, our proposed schemes are reasonably ro-
bust, performorming well in noisy environments and outpeforming the
schemes relying on the conventional association metric.
To conclude, we have confirmed the applicability of the preamble se-
quence as an implicit information indicating tool and stations can take
advantage of this in selecting a more appropriate BS, thereby maintaining
resource and throughput fairness across the network.
Chapter 8
Future Work
Probing deeper, the results in this thesis provide a strong foundation for
future work in the area of using of preamble sequences for load balanc-
ing in cellular networks. Some of the areas that can be considered for for
future work are as follows:
71
72 CHAPTER 8. FUTURE WORK
Bibliography
[1] V . H. Mac Donald, ”The Cellular Concept,” Bell Sys. Tech. J, vol. 58,
no.1, pp. 15.45, Jan. 1979.
[4] Ankit Chopra, Peter Sam Raj and Winston KG Seah, ”Utilizing the
Inherent Properties of Preamble Sequences for Load Balancing in Cellu-
lar Networks”, accepted by the 7th International Conference on Intelli-
gent Sensors, Sensor Networks and Information Processing (ISSNIP 2011),
Adelaide, Australia, Dec 6-9, 2011.
73
74 BIBLIOGRAPHY
[20] T-C. Tsai and C-F. Lien., ”IEEE 802.11 Hot Spot Load Balance and QoS
Maintained Seamless Roaming”, In Proc. NCS, page 1-8, Taiwan, R.O.C,
24-26 November, 2003.
[21] Y. Bejerano S-J. Han and L. E. Li. ”Fairness and Load Balancing in
Wireless LANs Using Association Control”, In Proc. MOBICOM, pages
315-329, Philadelphia, PA, USA, 26 September- 01 October, 2004.
[24] H. Luo, R. Ramjee, P. Sinha, L. Li, and S. Lu, ”UCAN: A Unified Cellu-
lar and Ad-hoc Network Architecture,” in Proc. MOBICOM, pp. 353-367,
San Diego, California, USA , 14-19 September, 2003.
[26] R. Yates and C.-Y. Huang, Integrated Power Control and Base Station
Assignment, IEEE Trans. on Veh. Technol., vol. 44, no. 3, pp. 638-644, Aug.
1995.
[27] S. V. Hanly, ”An Algorithm for Combined Cell-Site Selection and Power
Control to Maximize Cellular Spread Spectrum Capacity,” IEEE J. Select.
Areas in Comms., vol. 13, no. 7, pp.1332-1340, Sep 1995.
[30] Minsoo Na, Youngkyu Choi, Dongmyoung Kim, Kwanghun Han, and
Sunghyun Choi, ”On Utilizing Preamble Code Sequence as Implicit Load
Indicator,” in Proc. IEEE APWCS, Sendai, Japan, Aug 21-22, 2008.
[31] IEEE 802.16e-2006, ”Part 16: Air Interface for Fixed and Mobile Broad-
band Wireless Access Systems-Amendment for Physical and Medium Ac-
cess Control Layers for Combined Fixed and Mobile Operation in Licensed
Bands,” IEEE std., Feb. 2006.
[32] Byeong Gi Lee and Sunghyun Choi, Broadband Wireless Access & Local
Networks: Mobile WiMAX and WiFi, Aretech House, 2008.
[33] Peng Cheng, et al., ”A study on cell search algorithms for IEEE 802.16e
OFDMA systems,” in Proc. IEEE WCNC, Hong Kong, Mar 11-15, 2007.
[45] D. Julian, M. Chiang, D. O’Neill, and S. Boyd, ”QoS and Fairness Con-
starined Convex Optimization of Resource Allocation for Wireless Cellular
and Ad-hoc Networks,” in Proc. of IEEE INFOCOM, vol. 2, pp. 477-486,
San Francisco, California USA, 30 March, 2003.