• No results found

Improved Channel Allocation and RLC block scheduling for Downlink traffic in GPRS

N/A
N/A
Protected

Academic year: 2021

Share "Improved Channel Allocation and RLC block scheduling for Downlink traffic in GPRS"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

Improved Channel Allocation and RLC block scheduling for

Downlink traffic in GPRS

Haibo Wang, Devendra Prasad, Xin Zhou

Jimena Martinez Llorente, Franc¸ois Delawarde, Gw´ena¨el Coget, Patrick Eggers, Hans Peter Schwefel

Center for Teleinfrastructure, Aalborg University, Niels-Jernes Vej 12, 9220 Aalborg, Denmark e-mail:{hps,pe}@kom.auc.dk Phone: +45 9635 8677, Fax: +45 9815 1583

Keywords— Radio Resource Management, Scheduling, GPRS, Time-Slot allocation

Abstract This paper investigates the Radio Resource Manage-ment (RRM) approaches for GSM/GPRS networks. The effort was put on Access Control(AC), Time-Slot (TS) allocation, and Radio Link Control (RLC) packet scheduling for down-link performance enhancement. A new credit-based algorithm was proposed and implemented in a system level simulator. The simulation results for overall cell throughput as well as throughput per user show an improvement for the proposed scheme in comparison to a Best Effort algorithm, in particular in high-load scenarios.

I. INTRODUCTION

Although GPRS networks are now widely deployed, the traffic volumes in the packet switched domain are still rather low, but they are expected to increase dramatically in the near future. With increasing traffic volumes adequate radio resource management strategies are becoming relevant, namely those should optimize the time-slot utilization for GPRS services while not decreasing the quality of voice services.

Radio Resource Management in GSM/GPRS system is respon-sible for access control as well as frequency-channel (TRX) and time-slots allocation of GSM voice calls (Circuit Switched) and GPRS data transmission (Packet Switched, using temporary block flows, TBFs[1]). For GPRS data, scheduling of packet transmis-sions for multiplexed TBFs is another important task of RRM.

Different RRM policies have been suggested previously, those include ”complete-sharing”, as well as time-slot reservation schemes for GPRS traffic, see [2] for details. In practical deploy-ment, ”Best Effort” strategies with strict voice priority are still widely used, i.e. all the time-slots are completely shared between GSM voice traffic and GPRS data traffic, but voice calls have preemptive priority towards GPRS data transmission. Scheduling of packets for multiplexed GPRS transmissions is often performed using First-In-First-Out(FIFO) or Round-Robin policies.

This paper proposes a new credit-based approach for access con-trol, time-slot allocation, and scheduling in GPRS-like radio access networks (based on TDMA/FDMA). The credit-based mechanism uses measured Carrier to Interference Ratios and has the following advantages, which are proven in extensive simulation experiments in carefully selected scenarios:

It increases the overall data throughput per cell, while de-creasing the Blocking Rate and Access Delay compared to existing Best Effort strategies.

The mechanism is very simple to implement and does not require complex processing (low computational costs).

In the chosen approach, GSM voice traffic is still served in strict priority manner. Hence, GSM call blocking probabilities remain predictable using the Erlang-B formula.

II. BESTEFFORTSTRATEGY

The RRM strategy called ”best effort” for GPRS is the one currently used by mobile operators and does not take Quality of Service (QoS) or propagation conditions into account for either choosing the resources to allocate or scheduling the transmission of RLC blocks. It considers all GPRS users equally and tries to share the available bandwidth fairly among all sessions. Voice GSM users have the absolute priority, and when no resources are available, GPRS users can be downgraded to free a time-slot to be used by the voice user (preemption).More explicit work in best effort policy was investigated in [5].

A. Resource allocation

GSM users are allocated the first available time-slot starting from the first TRX. If no time-slot is available at the time of an incoming voice call, this call will be allowed to preempt a GPRS time-slot, thus downgrading all GPRS users multiplexed in this TS. The TS selected for preemption will be the first GPRS time-slot starting from the first TRX. In the extreme case where all TS are already taken by voice calls, the incoming GSM call will be blocked.

For GPRS users requiring K channels (depending only on the capabilities of the mobile as QoS is not considered), a TRX will be chosen which will be the last least-loaded one in terms of number of TBF and GSM calls assigned. In this TRX, the K least loaded time-slots will be selected and if less than K TS are available, the maximum amount possible will be allocated. If no TS is available (taken by voice or completely filled by TBFs), the GPRS TBF request will be queued in the access queue, which is FIFO. If the queue is filled, the incoming GPRS TBF request will be blocked.

B. Resource reassignment

During transmission, if a TBF possesses less than K channels due to voice preemption or lack of resources, a TBF reassignment can be done to upgrade the throughput for this TBF.

When resources become free after a congestion period, the priority of TBF assignment goes first to the TBFs having the least resources to improve the user throughput and release resources more rapidly. Once the GPRS upgrades have been done, free resources are given to the access queue to decrease access delay and GPRS blocking rate.

(2)

Best Effort Credit-based RRM Access Queuing FIFO FIFO with priority Treatment of arriving

requests when access full

Block the new request

Remove the request with least credit value

Time-Slot allocation Depending on number of mul-tiplexed TBFs in a TS

Depending on the total credits of all multiplexed TBFs in a TS

Scheduling Round-Robin Graded

Round-Robin

Voice Pre-emption Yes Yes

Tab. 1. Best Effort and Credit-based RRM Features

C. Scheduling

Once a GPRS call has been allocated resources, a scheduling technique is used to choose blocks that have to be sent in TS holding multiple TBFs (multiplexed TSs). In the ”best effort” strategy, in order to send blocks fairly in multiplexed TSs, the queue used is a Round Robin queue, meaning that blocks will be sent from a different TBF every block period.

III. CREDIT-BASEDRRMSTRATEGY

The proposed RRM strategy is based on a credit system imple-mented at the base station sub-system (BSS). A first credit value is assigned to each TBF set-up request, when it is stored in the access queue. That credit value is derived from the current Carrier to Interference ratio (C/I) of the link to the corresponding mobile. This credit value is relevant for the service policy in the access queue as well as for the time-slot allocation, and later for the RLC Block scheduling. Voice Calls are not subject to the credit mechanism since they are still served in a preemption strict-priority manner.

In the simulated scenario, the grading assigned is the same as the C/I value (in dB) corresponding to this mobile. The main purpose by choosing C/I is to improve the system throughput. Since the link adaptation is employed, the throughput is always considered optimized for a chosen Coding Scheme, which is selected according to C/I (see Table 3). In the case we give priority to high C/I values, the throughput per cell should increase and resources should be released more rapidly, thus decreasing the access delay and the blocking rate.

The main features of the new credit-based RRM strategy are summarized in comparison to a Best Effort strategy in Table 1. Important aspects are described in more detail in the following sections.

A. Access Control

When a new GPRS TBF arrives, it is assigned its initial credit value according to the C/I ratio and its position in the access queue will be determined by the credit value. TBFs with higher credits are selected first, while in case of equal credit values, FIFO is applied.

Moreover, when the access queue is full, the request with the least credit value is blocked, which can be either the last one in the access queue or the incoming one (instead of simply blocking the incoming request, as done in Best Effort strategy). The resource

allocation process is described in Figure 1. TBF requests in the access queue are scheduled whenever time-slots become available that are not fully booked.

Fig. 1. Handling of incoming GSM calls/GPRS TBFs

B. TRX/TS Allocation

In the first step, a least loaded TRX is identified based on the number of time-slots used by GSM calls and based on the number of TBFs already assigned to the TRX. Within the TRX, most suitable time-slots will be selected based on the number of TBFs and their aggregated credit-value. The details of the TRX and TS selection method are described in the following using the example in Figure 2.

Fig. 2. RRM Allocation Strategy: The leftmost time-slots are assumed to be exclusively used for signalling.

Each TS has a grade(GT S) calculated as the sum of all the TBF credits assigned to this TS. The possible availability of a TS for an incoming TBF is calculated by the following expression:

T Savailable= GincomingT BF

(3)

Note that T Savailable = 0 in case that the number of already

assigned TBFs to the TS has reached the maximum, see Table 4. Besides a TS can be shared by at most 32 TBF due to the Temporary Flow Identifier(TFI) was set to 5 bits.

In the example, the grade of the first request waiting in the access queue is12. For the first TRX, there are 6 TSs allocated to ongoing GSM voice-calls, and only one is free. The availability of this TS is calculated according to the previous Equation (1) to be

T Savailable= 100%, which is then (since it is the only TS in that

TRX with availability larger than 0) also the value used to decide the order of the TRX selection. Whereas in the second TRX, the sum of the availability values of the K = 4 (in this implementation , see Table 4) least-loaded TSs yields a value of 93%. The GT S

values for each TS are shown in the Figure 2. Although the second TRX has more TSs to be used, the sum of the K availability values yields only 93%, which is less than for the first TRX. In this case, the first TRX is selected allocating the session in only one TS.

C. Scheduling

In the case of multiple TBFs occupying one TS, as mentioned before, the scheduling of the optimized RRM strategy is also based on the grading, which, in our scheme, depends on the C/I value. The probability for i-th TBF in the same TS to use the assigned resource is calculated from its grade (GT BFi) divided by the sum

of all TBFs grades (GT S) in this TS. Prob(T BFiis scheduled)=GT BFi

GT S × 100(%) (2)

For example, assume that there are 3 TBFs assigned to the same TS. The grades are 3, 1, and 6, respectively. Therefore, the probability for the three TBFs to obtain the TS is 30%, 10% and 60%, which guarantees that in the long run the highest graded TBF will have a largest share of the TS to transmit data.

IV. SIMULATIONMODEL ANDEVALUATIONMETHODOLOGY Simulations are performed using a self-developed simulation tool, which is a time- and event-driven network level simulator, where the basic simulation time step is 20ms (1 RLC block time of GPRS). Only the down-link traffic of a single cell is investigated and simulated. Hence the simulation scenario was limited to one Base-Station and multiple Mobile-Stations and only protocol behavior up to RLC layer is considered. The most important assumptions are summarized in Table 2 and further explained in the following.

Parameter Name VALUE

Simulated Cell Number 1

Mobility Model TU3

User distribution Uniform

Mobility Tracking No

Power Control No

Frequency Hopping Ideal Random Hopping

Reuse Pattern 1/3

Co-channel Interferers 6, 1st tier

Cell Radius 500m

Path-loss exponent 3.5 Log-normal fading STD 7dB

Tab. 2. Simulation Assumptions

A. Mobility and Channel model

The mobility model was assumed as TU3 [3], a typical case for pedestrian users. The simulated mobiles are uniformly distributed in the cell and their movement is reduced to a small area around their initial position when setting up a voice call or data transmis-sion sestransmis-sion, so no mobility tracking was simulated.

The propagation model includes path-loss and log-normal fading while multi-path fading was neglected according to the assumption that ideal random frequency hopping was used. With the same path-loss effects, log-normal fading can be considered as a spatial variation among different users with the same distance from the BTS. We also assume that the received desired signal and the interferers (which have experienced path-loss) are subject to independent log-normal distributed stochastic variations, hence the C/I ratio of the received signal is also subject to log-normal variations:

C/I[dB] = DesiredSignal −Interf erers (3)

B. Imported link level results and Link Adaptation

The implemented network simulator implemented the C/I to RLC-Block Error Rate (BLER) mapping based on a look-up table imported from [4]. We have assumed an ideal case where we can measure or estimate the C/I of each user before the real data transmission starts, so we are able to select a coding scheme to achieve the maximum session throughput:

C/I Selected Code

≤ 5dB CS1

6∼ 9dB CS2

10∼ 16dB CS3

≥ 17dB CS4

Tab. 3. Proposed Coding Selection

C. Traffic Model

GSM calls arrive according to a Poisson process with rate λGSM

and have an exponentially distributed call holding time with rate

µGSM. GPRS TBFs arrive according to a Poisson process with rate

λGP RS and contain a geometrically distributed number of RLC blocks with a constant mean value. An arriving GSM or GPRS session is assigned with equal probability to any of the mobiles in the radio cell.

D. RLC Functionalities

Simulations are restricted to the RLC layer, where RLC acknowl-edged mode is assumed: retransmissions are performed on the RLC layer until a successful transmission is achieved or the maximum number of retransmissions (set to 25 in the simulations) has been performed. In the latter case, the TBF containing the unsuccessful RLC block is dropped and its resources are freed.

TBF assignment signalling is modelled by a constant time delay of 20ms.

E. Evaluation Methodology

In the evaluation experiments, the traffic load is increased by simultaneously increasing the GSM and GPRS call arrival rate, keeping λGP RS/λGSM = 2.25 constant. Instead of the actual

(4)

Erlangs as the sum of the GSM load and an equivalent GPRS load (calculated as the ratio of GPRS TBF arrival rate and average TBF duration, given it was served at 50kb/s). For each traffic load, 20 replications of the simulation experiment are conducted.

Estimates for the averages and corresponding95% confidence intervals (shown by dotted curves) are obtained for the following performance parameters:

Average total throughput of packet traffic (kb/s) per Cell

Average throughput (kb/s) per packet-switched TBF (user perspective)

Blocking Rate of TBFs in the access queue

Access Delay: time from entering the access queue until radio resources (TSs) get assigned

V. DISCUSSION OF SELECTEDEVALUATIONRESULTS Table 4 shows the values used for the simulation.

Parameter Name VALUE

Simulated Duration 4 hours

Traffic Load (TL) from 6 to 28

”equivalent Erlangs” Number of simulations (per TL) 20

TRXs 4 (32 TSs)

Number of signalling channels 4 Number of traffic channels 28 Maximum number of multiplexed sessions per TS

32 Number of Mobile Nodes 30 Multi-slot capacity of Mobile K= 4TSs

Mean GSM call duration 120s Mean GPRS session size 100kB

Access queue size 7 sessions

Maximum number of RLC block re-transmissions

25

Tab. 4. Simulation Parameters

A. Throughput per cell

Figure 3 shows the throughput per cell of both strategies. It can be observed that up to a certain traffic load (approx. 20 Erl), the throughput per cell increases with the traffic load for both schemes equivalently. In that region of low utilization, radio resources are not scarce and hence there is little impact of the RRM strategy.

For higher traffic load, the proposed credit-based strategy achieves a significantly higher overall cell throughput. Furthermore, the proposed strategy does not lead to a throughput decrease at the right end of the curve, as it is observed for the best-effort strategy. This performance enhancement is due to the fact that our grading system prioritizes the GPRS users with higher C/I in the scheduler and the access queue, thus preference is given to users that are using Coding Schemes with higher throughput and those users will experience lower BLER (less retransmissions).

B. Throughput per user

The mean throughput per user decreases with the traffic load as fewer resources are available. For low traffic load, the result is equivalent for both strategies (as explained above), but it can be seen that the Best Effort strategy leads to significantly faster

5 10 15 20 25 30 20 30 40 50 60 70 80 90 100 110 120

Mean throughput per cell (kbps)

Traffic Load (Equivalent Erlangs) Proposed Strategy Best Effort

Fig. 3. Throughput Per Cell Vs. Traffic Load with 95% confidence interval

degradation with increasing load. The intuitive argument for this performance difference between the schemes is the same as given above for the cell throughput.

5 10 15 20 25 30 0 10 20 30 40 50 60

Mean throughput per user (kbps)

Traffic Load (Equivalent Erlangs)

Proposed Strategy Best Effort

Fig. 4. Throughput Per User Vs. Traffic Load with 95 percent confidence interval

C. Access Delay

The access delay for both strategies is close to zero in the region of low load (below 20 equivalent Erl). When the traffic load is increase beyond this region, the best effort strategy leads to rapidly increasing access delays, while the increase is dramatically slower for the proposed credit-based scheme. The intuitive reasoning for that improvement is that in the Best Effort Strategies, TBFs with poor transmission quality can block resources for a long time, since they are only served at very low data rate.

D. Fairness analysis

A possible drawback of the C/I grading system could have been that the throughput gain is mainly achieved for GPRS users with high C/I at the cost of reduced throughput for the users with lower

(5)

5 10 15 20 25 30 −2 0 2 4 6 8 10 12 14 16

Mean access delay per user (s)

Traffic Load (Equivalent Erlangs) Proposed Strategy

Best Effort

Fig. 5. Access Delay Vs. Traffic Load

C/I. This could be caused by the fact that users with high C/I are prioritized for the use of resource.

In order to check this hypothesis, the average throughput of users that experience a certain C/I radio quality is shown in Figure 6. In order to detect the impact of the different RRM strategies, scenarios with relatively high traffic load are selected and shown in that figure. The figure actually reveals that users of all types

5 10 15 20 25 30 0 10 20 30 40 50 60 70 C/I (dB)

Throughput Per User (kbps)

Proposed,TL=20E Proposed,TL=25E Best Effort,TL=20E Best Effort,TL=25E

Fig. 6. User Throughput Vs. C/I

of C/I quality seemingly benefit from the improved RRM strategy. However, TBF requests that are dropped in the access queue are not contributing to the throughput values in that figure.

VI. CONCLUSIONS ANDOUTLOOK

This paper proposes a new credit-based RRM strategy for GPRS-like radio access networks. Compared to best effort strategies, the proposed method shows better utilization of the radio resources in simulation experiments. The scheme is rather simple to implement and it is able to achieve that in high-load scenarios resources are not blocked for long duration by packet-switched calls of low transmission throughput.

Future work aims at upgrading the credit scheme with the notion of Quality of Service classes to improve the user experiences.

Furthermore, modifications to CDMA based systems, such as UMTS, can be considered.

REFERENCES

[1] Regis J.(Bud) Bates; GPRS (General Packet Radio

Ser-vice)Quebecor/Martinsburg, 2002

[2] R.G. Garroppo, S. Giordano, S. Lucetti;Capacity Evaluation of Re-source Allocation Strategies in the GPRS System, Academic OPNET Research and Educational Projects, University of Pisa.

[3] 3GPP TS 05.05 V8.6.0, ”Digital cellular telecommunications sys-tem (Phase 2+); Radio transmission and reception (Release 1999)”, http://www.3gpp.org

[4] Nicolas El Khessassi,”Mapping Tables for General packet Radio Service(GPRS)”,Master Thesis, CPK, Aalborg University,June 2000 [5] David D. Clark, and Wenjia Fang,”Explicit Allocation of Best-Effort

Packet Delivery Service”, IEEE/ACM Transactions on networking, Vol. 6, No. 4, August 1998

References

Related documents

Year 5 Figure 2.1 Construction project lifecycle 12 Figure 2.2 Risk Management Planning Process 14 Figure 2.3 Probability-impact grid 18 Figure 2.4 Probability and Impacts of Risk

An analysis of the economic contribution of the software industry examined the effect of software activity on the Lebanese economy by measuring it in terms of output and value

We will check our proposal by arguing that all genus zero A/2 model correlation functions will match those of the B/2-twisted mirror Landau-Ginzburg theory given above, using

Observing that an overwhelming majority of banks do not provide loans with patents as collateral, provides an incomplete picture. The few banks that have recorded their

Path names, like /usr/bin/tar‚ can be resolved by iteratively calling lookup(). Every component of the path requires one call, while the ID of the root directory has to be known

User name: GPRS user name (provided by your GSM operator) Password: GPRS user password (provided by your GSM operator) IP address: AVL Server IP Address (recommended IP:

The paper includes a discussion about the voice source model, an analysis of the effects in capacity of a GPRS carrier when feed with VoIP packets, measurements of

The reason for handoff call blocking probability exceeds P thb at high voice traffic load is that although the guard channels temporarily used by GPRS connections can be