Computing the Blocking Probabilities in a Circuit-Switched Network with Multi-Priority Traffic

Total Page:16

File Type:pdf, Size:1020Kb

Computing the Blocking Probabilities in a Circuit-Switched Network with Multi-Priority Traffic

Computing the Blocking Probability in Tactical Communications Networks1

Victor T.-S Shi, William Perrizo Computer Science Dept., North Dakota State University Fargo, ND 58105

Abstract — Tactical communications networks are multi-hop wireless networks in which switches and endpoints are mobile nodes. In a tactical environment, fast algorithms for performance analysis are desirable for optimizing the network in a timely fashion. Also, preemptive priorities are commonly used to achieve low blocking probabilities for high priority calls when the loss of equipment in the battlefield is not trivial. This paper presents analytical algorithms for computing the end-to-end blocking probability in a tactical communications network where a preemption service discipline is employed and traffic is divided into multiple classes to provide multiple grades of service. Each class of traffic has its distinct characteristics, such as average call arrival rate, average call holding time, and service priority. Experiments show that the preemption does provide significantly better performance for higher priority traffic. The algorithms presented in this paper may also be useful in the optimization of other rapidly deployable networks, where mobility, communication efficiency and computational complexity for adapting the network to unpredictable environments are of significant concern.

Index terms: Communication networks, call blocking probabilities, algorithms

1 Introduction

Tactical communications networks use wireless technology to achieve high degree of mobility while providing multiple services to users. Unlike cellular networks where base

1 Partially supported by grants, National Science Foundation No. OSR-9553368 and

Defense Advanced Projects Agency No. DAAH04-96-1-0329.

-1- stations are static, tactical communications networks can not rely on static infrastructure for three reasons [1]: 1) fixed nodes are more vulnerable to enemy attacks; 2) highly mobile military forces need networks that are equally mobile; 3) the need for military networks to continue “in operation” even when some nodes are destroyed and/or some links are jammed. Thus special techniques need to be used in a tactical network to efficiently utilize the limited network resources, and to quickly adjust network topologies to tolerate frequent node/link failures in battlefield environments.

Ad hoc networking [2] is one of the network architectures that have been suggested for future mobile military networks [3]. Ad hoc networks presume a homogeneous environment – all nodes have similar capabilities with respect to energy supply, processing power, memory capacity, etc. While Ad hoc networks may be appropriate for a Navy network in which every node is a ship, it may not be good for army battalion forces. In a tactical network for army battalion forces, some communication nodes are foot soldiers. It is nearly impossible to require foot soldiers carrying heavy equipment in a battlefield where mobility is paramount.

In this paper we focus on analyzing a two-tier multi-hop network [1]. This two-tier network consists of two types of mobile nodes – base stations and endpoints. The base stations are more powerful than mobile endpoints and together form a backbone network.

The mobile endpoints may be much lighter, so that they can be carried by foot soldiers.

In contrast to the single-hop cellular network model, the performance of such a two-tier tactical network needs to be frequently evaluated so that its dynamic topological structure

-2- can be optimized to tolerate node and link failures. In general, it is not feasible to use simulation for the purpose of topological optimization because of the limited time constraint. We hence seek analytic algorithms for fast network performance analysis. A typical two-tier tactical network [1] is shown in Figure 1.

Mobile base Mobile endpoint station Backbone wireless Last hop wireless link link

Figure 1 A typical two-tier mobile network in a battlefield

Another feature of tactical networks is preemption. Preemption is the best way to utilize the limited resources in a battlefield and to compensate for loss of equipment. In this paper we divide the traffic flowing through the network into multiple classes according users’ grade of service (GoS) requirements [4, 5]. Multiple grades of service are achieved by the use of multiple preemptive priorities. Call blocking probability is used as the performance metric at the call level.

-3- The paper is organized as follows. In section 2 we discuss a model for the two-tier network to which k preemptive priority classes of calls arrive. Section 3 presents mathematical algorithms for computing end-to-end blocking probabilities of calls of any preemptive priority. Section 4 demonstrates how to apply the algorithms in section 3 to the performance analysis of a network with 6 backbone nodes and traffic of 3-preemptive priorities. Section 5 discusses related work. We end with conclusions in Section 6.

2 The Model and Notations

Figure 1 shows a two-tier network model we use for the discussion of a multi-hop tactical network. In the model, the nodes are classified into two types – switches (base stations) and endpoints (in general we can also view the switches as clusters and endpoints as sub-clusters with aggregated traffic at that sub-cluster, if the considered network is a network of three or more levels of hierarchy [6, 15]). Switches form a backbone network. Endpoints are attached to a switch. Traffic traverses shortest-path routes. All the switches in the network are non-blocking and the call setup time is negligible compared to the average call holding time. Calls (corresponding to customers in a random service system) are categorized into k classes according to their priorities.

The call service discipline is preemptive priority, i.e., a newly arriving call of higher priority can preempt a channel that is servicing a call of the lowest priority in the link when all the channels in the network are busy. The preempted call is lost and cleared for simplicity. The considered link system is an Erlang loss system. This means that a newly arriving call is lost when it cannot find a free channel and no lower priority calls are in service.

-4- Let M denote the number of nodes and S the number of links in the network. The i th

link has N i channels. We use the following notations for the convenience of formula development.

k k l , pl : denote, respectively, average arrival rate and blocking probability of a k -th priority call on the l -th link, k  1,2,..., K , l  1 , 2 , . . . , S . We assume Poisson distribution for call arrival processes at the session level.

k k k qi : qi  1 pi , denotes the acceptance probability of a k -th priority call on the l -th link, k  1,2,..., K , l  1 , 2 , . . . , S .

1/  k : denotes average holding time of a k -th priority call, k  1,2,...,K . We assume negative exponential distribution for call holding times at the session level.

k ak : ak  l , denotes the offered load of a k -th priority call on the l -th link, l l  k k  1,2,..., K , l  1 , 2 , . . . , S .

k Lij : denotes the offered load of a k -th priority call between node i and node j .

M 1 M 1 k k k L : L    Lij , denotes the total offered load of the k -th priority calls on the i0 j 0 network.

K M 1 M 1 k L : L     Lij , denotes the total offered load on the network. t 1 i0 j0

r i j : denotes the shortest-path between the i -th node and the j -th node.

k CPij : denotes the carried load of k -th priority calls on the path between the i -th node and the j -th node.

-5- M 1 M 1 k k k CT : CT    CPij , denotes the total carried k -th priority load on the network. i0 j 0

k CLl : denote the carried load of the k -th priority calls on the l -th link.

k CBPij : denote the blocking probability of k -th priority calls between nodes i and j .

3 Algorithms for computing the blocking probabilities

From the above model and definitions, the carried load of priority k on the path from node i to node j is:

k k k CPij  (1 CBPij )Lij (1)

k k CLl   CPij The carried load of priority k flowing on link l is i, j . Since the offered lrij

k k k k load equals the carried load plus load loss, (i.e., al  CLl  al pl ), it follows that

k k k k k CLl  al (1 pl )  al ql . Thus, we have

k k k k k al  CLl / ql   CPij / ql i, j (2) lrij

k In a network of K classes of traffic, the blocking probability pl depends on the traffic

i k volumes of al for all i  1,2,..., K . When given an end-to-end traffic pattern { Lij :

i i, j  1,2,...,M 1 and k  1,2,..., K }, al depends on the routing policy and the service discipline and is also affected by other classes of traffic. As we mentioned in [7], preemptive service discipline separates the effects of lower priority traffic from higher priority traffic. In other words, the behavior of higher priority traffic is not affected by the behavior of lower priority traffic. This allows us to produce algorithms in which

-6- blocking probability of each class can be calculated separately and reduces the computational complexity (this complexity reduction at the link level has been

1 1 demonstrated in [7]). In particular, for calculating CBPij and al , we only need to consider traffic of class 1, because such traffic has the highest priority and other traffic does not affect its performance when the preemptive service discipline is applied. We can use the Erlang formula and the methods in [8] for computing the blocking probability

1 k CBPij of class 1 ( k  1). For computing CBPij (1  k  K ), the traffic we need to consider is calls from higher priority classes and the class that the call is pertaining to, i.e., classes of priorities 1, 2, …, k . As such, we can apply induction techniques to

k compute CBPij as follows.

k 1 k 1 Assuming we have reached a stable solution of CBPij and al by induction, we

k initialize a value to al , and then solve equations:

k i i i 1 2 k  (al  jl ) p( jl , jl ,..., jl ) i1 k (3.1) i 1 2 i k i 1 2 i k i   [al p( jl , jl ,..., jl 1,..., jl )  ( jl 1) p( jl , jl ,..., jl 1,..., jl )] i1

k i (  jl < Nl ) i1 with the boundary conditions

k k i i 1 2 k 1 1 1 2 i k  jl  p( jl , jl ,..., jl )  al   p( jl 1, jl ,..., jl 1,..., jl ) (3.2) i1 i1

-7- k i t (  jl = Nl and jl  0 when 1  t  k ) i1

for t 0  2 , 3 , . . . , k  1 ,

t0 1 k i i i i 1 2 k ( al    j  ) p( jl , jl ,..., jl ) i1 i1

t0 t0 k t0 (3.3) i i 1 i k s s 1 s s1 t1 r1   al  p( jl ,..., jl 1,..., jl )    al  p( jl ,..., jl 1, jl ,..., jl , N 1  jl ,0,...,0) i1 s1 tt0 1 r1

k i t t  t  k (  jl = Nl and jl  0 when 0 ) i1

k 1 k i i i i 1 2 k ( al l   jl  ) p( jl , jl ,..., jl ) i1 i1 k k1 k i1 (3.4) i i 1 i k s s 1 s s1 t1 r   al l p( jl ,..., jl 1,..., jl )    al l p( jl ,..., jl 1, jl ,..., jl , N 1  jl ,0,...,0) i1 s1 ts1 r1

k i k (  jl = Nl and jl  0 ). i1 then the link blocking probability is

k 1 2 k pl   p( jl , jl ,..., jl ) (3.5) 1 2 k jl  jl ... jl  Nl

CBPk  1 qk  1 (1 pk ) and the call blocking probability is ij  l  l for a shortest- lrij lrij

k path routing network (see [9] for a mathematical proof). Compare the al computed from

(2) with the old assumed value. Adopt the new value if their difference is not within a

k predefined threshold. Compute al iteratively by using equations (1), (2) and (3.1-3.5) until the difference of two values are within the threshold, then we have reached a stable

k k solution for al and CBPij . The convergence will behave in the same manner as the mathematical algorithms demonstrated by Akinpelu in [8], since for k , the unknown

-8- k k i i variables are al and pl . All al and pl for 1  i  k have been computed in previous steps. Thus, we need only to deal with the same single-type traffic problem each time (to determine the traffic flows of k service priority, see the example in section 4).

Based on the above discussion we formally present the algorithms as follows. We

k initialize CBPij  0 for i  0 , 1 , . . . , M  1 , j  0 , 1 , . . . , M  1 , and k  1,2,..., K . This yields

k k faster convergence than initializing al , because we can easily guess that CBPij is very close to 0 for a practical network (see the computational example in section 4). In fact, a

k k 1 k technique we can use for fast convergence is to initialize CBPij  CBPij , since CBPij is

k 1 always at least CBPij , due to the properties of the preemptive service discipline. We

k k 1 2 k 1 2 k use pl  B (Nl ;al ,al ,...,al ;l ,l ,...,l ) in the algorithms to denote the result obtained from equations (3.1-3.5) for presentation simplicity.

Algorithm 1: For computing the blocking probabilities of 1-st priority calls. Step 1: Initialization.

1 1 Let p l  0 for l  1 , 2 , . . . , S ; Let C B P i j  0 for i  0 , 1 , . . . , M  1 and j  0 , 1 , . . . , M  1 ;

1 Step 2: compute the offered load a l for l  1 , 2 , . . . , S

1 1 1 a l   ( 1  C B P i j ) / q l i , j l r i j

1 Step 3: compute the blocking probability p l for l  1 , 2 , . . . , S

( a 1 ) N l / N ! p 1  B 1 ( N ; a 1 ; 1 )  l l l l l l N l 1 s  ( a l ) / s ! s  0

-9- 1 Step 4: compute C B P i j for i  0 , 1 , . . . , M  1 and j  0 , 1 , . . . , M  1

1 1 1 C B P i j  1   q l  1   ( 1  p l ) l r i j l r i j

1 1 Step 5: compare this C B P i j with the former C B P i j . If the relative difference is less than a given value (for example 0.0001), go to Step 6; otherwise go to Step 2. Step 6: end.

1 1 For l  1 , 2 , . . . , S and i  0 , 1 , . . . , M  1 and j  0 , 1 , . . . , M  1 , assume that we have a l , p l

1 2 2 2 k 1 k 1 k 1 , C B P i j , a l , p l , C B P i j , …, al , pl , CBPij , then we can use the following algorithms, 2 and 3, to get the end-to-end blocking probabilities of k -th priority calls in the network. Algorithm 2: Step 1: Initialization.

k k Let pl  0 for l  1 , 2 , . . . , S ; Let CBPij  0 for i  0 , 1 , . . . , M  1 and j  0 , 1 , . . . , M  1 ; 1  k  K .

k Step 2: compute the offered load al for l  1 , 2 , . . . , S

k k k al   (1 CBPij ) / ql i, j lrij

k Step 3: compute the blocking probability pl for l  1 , 2 , . . . , S

k k 1 2 k 1 2 k pl  B (Nl ;al ,al ,...,al ; ,  ,..., )

k Step 4: compute CBPij for i  0 , 1 , . . . , M  1 and j  0 , 1 , . . . , M  1

k k k CBPij  1  ql 1  (1 pl ) lrij lrij

k k Step 5: compare this CBPij with the former CBPij . If the relative difference is less than a given value (for example 0.0001), go to Step 6; otherwise go to Step 2. Step 6: end. Algorithm 3:

k Repeat algorithm 2 until k  K , giving all CBPij for i  0 , 1 , . . . , M  1 , j  0 , 1 , . . . , M  1 , and k  1,2,..., K .

-10- Compute , using Algorithm 1 for , , and .

Let

No If

Stop Compute , using Algorithm 2, for , , and .

Let

Figure 2. A flowchart of the algorithms for calculating call blocking probabilities

Figure 2 is a flowchart of the algorithms for calculating the call blocking probabilities of a network with the shortest-path routing policy and K -priority traffic.

4 Results of an example

Consider a communication network as shown in Figure 3. The traffic from each node in the graph is the aggregated traffic from all the endpoints it represents. We say a node represents an endpoint if the endpoint is attached to that node, or is within the cluster that the node represents. Assume each link has 15 channels. The offered loads have 3- preemptive priorities ( K  3 ) and have the following traffic pattern: for i , j  0 , 1 , . . . , 5 and i  j ,

1 1 L i j  0 . 3 ,  i j  0 . 0 2 when k  1;

2 2 L i j  0 . 4 ,  i j  0 . 0 2 when k  2 ;

-11- 3 3 L i j  0 . 8 ,  i j  0 . 0 2 when k  3 ;

1 3

0 5

2 4

Figure 3. An example network of 6 nodes with 3-priority traffic ( K  3 )

Then we can derive the following algorithms from formulas in the preceding section for computing the blocking probability of each node-pair in the graph.

For k =1, the Erlang formula

1 1 jl 1 1 (al ) / jl ! p( jl )  N 1 1 i , ( jl  0,..., Nl ) (5)  (al ) /i! i0

The corresponding algorithms are the same as Algorithm 1 in section 3 for computing

1 CBPij .

2 1 2 For k =2, pl   p( jl , jl ) (6) 1 2 jl  jl  Nl

1 2 p( jl , jl ) can be calculated by solving the equations (6.1-6.3), which are deduced from the general equations (3.1-3.5) when k =2

1 1 2 2 1 1 2 2 1 2 (al   al   jl l  jl l ) p( jl , jl ) 1 1 1 2 2 2 1 2 1 1 1 2 2 2 1 2 (6.1)  al  p( jl 1, jl )  al  p( jl , jl 1)  ( jl 1) p( jl 1, jl )  ( jl 1) p( jl , jl 1)

1 2 ( jl  jl  Nl )

-12- with the boundary conditions

1 1 2 2 1 2 1 1 1 2 1 1 2 ( jl   jl  ) p( jl , jl )  al  p( jl 1, jl )  al  p( j1 1, jl 1) (6.2)

1 2 2 ( jl  jl  Nl ; jl  0 )

1 1 1 1 2 2 (al   jl   jl  ) p( j1, j2 ) 1 1 1 2 2 2 1 2 1 1 1 2 (6.3)  al  p( jl 1, jl )  al  p( jl , jl 1)  al  p( jl 1, jl 1)

1 2 2 ( jl  jl  Nl ; jl  0 )

2 The corresponding algorithms for computing CBPij are algorithm 2 in section 3, where k  2 . That is:

Algorithm for k  2 :

Step 1: Initialization.

2 2 Let pl  0 for l  1 , 2 , . . . , S ; Let CBPij  0 for i  0 , 1 , . . . , M  1 and

j  0 , 1 , . . . , M  1 ;

2 Step 2: compute the offered load al for l  1 , 2 , . . . , S

2 2 2 al   (1 CBPij )/ ql i, j lrij

2 Step 3: compute the blocking probability pl for l  1 , 2 , . . . , S :

2 2 1 2 1 2 pl  B (Nl ;al ,al ; ,  ) ,

which can be calculated from the above equations (6, 6.1-6.3)

2 Step 4: compute CBPij for i  0 , 1 , . . . , M  1 and j  0 , 1 , . . . , M  1

2 2 2 CBPij  1  ql 1  (1 pl ) lrij lrij

2 2 Step 5: compare this CBPij with the former CBPij . If the relative difference is less

-13- than a given value (for example 0.0001), go to Step 6; otherwise go to Step 2.

Step 6: end.

3 1 2 3 For k =3, pl   p( jl , jl , jl ) (7) 1 2 3 jl  jl  jl  Nl

1 2 3 p( jl , jl , jl ) may be calculated by solving the equations (7.1-7.4), which are deduced from the general equations (3.1-3.5) when k =3

1 1 2 2 3 3 1 1 2 2 3 3 1 2 3 (al   al   al   jl   jl   jl l ) p( jl , jl , jl ) 1 1 1 2 3 2 2 1 2 3 3 3 1 2 3  al  p( jl 1, jl , jl )  al  p( jl , jl 1, jl )  al  p( jl , jl , jl 1) (7.1) 1 1 1 2 3 2 2 1 2 3 3 3 1 2 3  ( jl 1) p( jl 1, jl , jl )  ( jl 1) p( jl , jl 1, jl )  ( jl 1)l p( jl , jl , jl 1)

1 2 3 ( jl  jl  jl  Nl ) with the boundary conditions

1 1 1 2 3 1 1 1 2 3 1 1 1 2 1 1 1 2 3 jl  p( jl , jl , jl )  al  p( jl 1, jl , jl )  al  p( jl 1, jl 1,0)  al  p( jl 1, jl , jl 1) (7.2)

1 2 3 2 3 ( jl  jl  jl  Nl ; jl  jl  0 )

1 1 1 1 2 2 3 3 1 2 3 (al   jl   jl   jl l ) p( jl , jl , jl ) 1 1 1 2 3 2 2 1 2 3 1 1 1 2  al  p( jl 1, jl , jl )  al  p( jl , jl 1, jl )  al  p( jl 1, jl 1,0) (7.3) 1 1 1 2 3 2 2 1 2 3  al  p( jl 1, jl , jl 1)  al  p( jl , jl 1, jl 1)

1 2 3 2 3 ( jl  jl  jl  Nl ; jl  0 , jl  0 )

1 1 2 2 1 1 2 2 3 3 1 2 3 (al   al   jl   jl   jl l ) p( jl , jl , jl ) 1 1 1 2 3 2 2 1 2 3 3 3 1 2 3  al  p( jl 1, jl , jl )  al  p( jl , jl 1, jl )  al  p( jl , jl , jl 1) (7.4) 1 1 1 1 1 1 1 2 3 2 2 1 2 3  al  p( jl 1, N  jl 1,0)  al  p( jl 1, jl , jl 1)  al  p( jl , jl 1, jl 1)

1 2 3 3 ( jl  jl  jl  Nl ; jl  0 )

3 The corresponding algorithms for computing CBPij are algorithm 2 in section 3, where k  3 . That is:

-14- Algorithm for k  3 :

Step 1: Initialization.

3 3 Let pl  0 for l  1 , 2 , . . . , S ; Let CBPij  0 for i  0 , 1 , . . . , M  1 and

j  0 , 1 , . . . , M  1 ;

3 Step 2: compute the offered load al for l  1 , 2 , . . . , S

3 3 3 al   (1 CBPij ) / ql i, j lrij

3 Step 3: compute the blocking probability pl for l  1 , 2 , . . . , S :

3 3 1 2 3 1 2 3 pl  B (Nl ;al ,al ,al ; , , ) ,

which can be calculated from the above equations (7, 7.1-7.4)

3 Step 4: compute CBPij for i  0 , 1 , . . . , M  1 and j  0 , 1 , . . . , M  1

3 3 3 CBPij  1  ql  1  (1 pl ) lrij lrij

3 3 Step 5: compare this CBPij with the former CBPij . If the relative difference is less

than a given value (for example 0.0001), go to Step 6; otherwise go to Step 2.

Step 6: end.

Using the above formulas and algorithms, we get Table 1, listing the corresponding computational results of the end-to-end blocking probabilities of the network. From table

1 we can see following features of this particular network:

 The longer the route, the higher the call blocking probabilities. The longest path in

the table is between node 0 and node 5, which consists of 4 hops. The corresponding

1 1 2 2 3 call blocking probabilities are C B P 0 5 =C B P 5 0 =0, C B P 0 5 =C B P 0 5 =0.003370, C B P 0 5 =

-15- 3 C B P 0 5 =0.197913. There are 8 paths consisting of only 1 hop and having much lower

k values of CBPij ( k  1,2,3).

 Routing policies can greatly affect network performance. For example, in this

network, of the eight 1-hop paths, the path with the lowest call blocking probability is

1 1 the path between node 3 and node 4. The corresponding values are C B P 3 4 =C B P 4 3 =0,

2 2 3 3 C B P 3 4 =C B P 4 3 =0, C B P 3 4 =C B P 4 3 =0.000001. The 1-hop path with highest call

blocking probability is between node 1 and node 3. The corresponding values are

1 1 2 2 3 3 C B P 1 3 =C B P 3 1 =0, C B P 1 3 =C B P 3 1 =0.003319, C B P 1 3 =C B P 3 1 =0.176876. The large

difference is caused by the routing policy. There are 4 routes over link (1-3) (with

routes: 0-1-3, 0-1-3-5, 1-2-3, 1-3), while only one route over link (3-4) (route 3-4).

 Calls with different service priority have different grades of service. As a matter of

1 2 3 1 2 3 fact, the table shows C B P i j  C B P i j  C B P i j for i, j  0,1,...5 . C B P i j

when the traffic on the route is heavy.

Table 1 End-to-end blocking probabilities of the network

Pairs of nodes End-to-end blocking probabilities the Route k  1 k  2 k  3 (shortest-path) 01 0.000000 0.000025 0.012861 (0-1) 02 0.000000 0.000000 0.000724 (0-2) 03 0.000000 0.003345 0.187463 (0-1-3) 04 0.000000 0.000473 0.085646 (0-2-4) 05 0.000000 0.003370 0.197913 (0-1-3-5) 10 0.000000 0.000025 0.012861 (1-0) 12 0.000000 0.000025 0.014641 (1-2) 13 0.000000 0.003319 0.176876 (1-3) 14 0.000000 0.000498 0.098380 (1-2-4)

-16- 15 0.000000 0.003345 0.187463 (1-3-5) 20 0.000000 0.000000 0.000724 (2-0) 21 0.000000 0.000025 0.014641 (2-1) 23 0.000000 0.003345 0.188928 (2-1-3) 24 0.000000 0.000473 0.084984 (2-4) 25 0.000000 0.000473 0.085646 (2-4-5) 30 0.000000 0.003345 0.187463 (3-1-0) 31 0.000000 0.003319 0.176876 (3-1) 32 0.000000 0.003345 0.188928 (3-1-2) 34 0.000000 0.000000 0.000001 (3-4) 35 0.000000 0.000025 0.012861 (3-5) 40 0.000000 0.000473 0.085646 (4-2-0) 41 0.000000 0.000498 0.098380 (4-2-1) 42 0.000000 0.000473 0.084984 (4-2) 43 0.000000 0.000000 0.000001 (4-3) 45 0.000000 0.000000 0.000724 (4-5) 50 0.000000 0.003370 0.197913 (5-3-1-0) 51 0.000000 0.003345 0.187463 (5-3-1) 52 0.000000 0.000473 0.085646 (5-4-2) 53 0.000000 0.000025 0.012861 (5-3) 54 0.000000 0.000000 0.000724 (5-4)

M 1 M 1 (1 CBPk )Lk k   ij ij k CT i0 j 0 The measure, R  k  M 1 M 1 , k  1,2,3, is the ratio of the carried L k   Lij i0 j 0 load to the offered load of k -th priority. This measure shows the relative throughput of the network for each priority and demonstrates clearer the benefits of the preemptive priority service discipline. The results in Table 2 show that the calls of higher priority get better service: Calls of the highest service priority ( k  1) are all accepted (100%), while only 91.1% of calls of the lowest service priority ( k  3 ) are accepted by the network.

Table 2 The throughput of the network

-17- k  1 k  2 k  3 Offered load ( Lk ) 9 12 24 Carried load (CT k ) 9 11.985026 21.863825 Rk 100% 99.8% 91.1%

5 Related work

In this paper we described a two-tier model for tactical communications networks and presented analytical algorithms for computing the end-to-end call blocking probabilities.

In the literature, various algorithms have been proposed for calculating call blocking probability for networks with multiple classes of traffic. Wang and Saadawi [10] discuss the applicability of trunk reservation techniques to nonhierarchical circuit-switched networks, in which two classes of traffic with unequal arrival rates and holding times are present. They introduced two control schemes, restricted access and preemption, to improve the overall performance. In their paper, the steady-state equations for two preemptive priority classes of calls were given and solved using a method called

Successive Over-Relaxation (SOR) [11]. Their algorithms are limited to symmetric, fully connected networks. In reference [8] Akinpelu proposed mathematical algorithms for computing the blocking probabilities of non-symmetric networks with homogeneous

(single class) traffic loads. They used direct and disjoint two-hop paths and assumed that the mixed traffic on a link is Poissonian and independent of other links in the network.

Their computational results showed the analytical algorithms converge much faster than simulations with approximate numerical results.

In [7] we developed algorithms and methods for performance analysis of multi- priority traffic on a single link. The next important question concerns performance analysis of multi-priority traffic through an entire network. This paper studied the

-18- algorithms and methods that deal with the case of a network with any topology, multi- priority traffic and shortest-path routing policy. With the shortest path routing, the resource consumption per connection is minimal. It also can reduce computational complexity and can be used to find the minimum cost network topology [12]. When the link costs do not vary with traffic load (which is the case in [12] and in our example), shortest-path routing becomes fixed-path routing and thus the blocking probabilities of links are independent of each other [9]. The link independence assumption has been implicitly built in to alternate routing algorithms without mathematical proof [8, 13, 14].

Reference [8] verified it with simulation in a fully connected network environment.

Further, in the fixed-path routing case, reference [9] mathematically proves the validity of link independence using the Erlang fixed-point approximation method. This paper assumed shortest path routing, which is a fixed-path routing, thus the link independence can be used to simplify the algorithms for calculating blocking probabilities of communication network with any topology.

6 Conclusions

In this paper we proposed analytical algorithms for the performance evaluation of tactical networks where preemptive service discipline is adopted. Unlike traditional cellular networks where the last hop (the wireless hop between the network infrastructure and the mobile user) plays a predominant role, performance evaluation in tactical networks involves all links. We incorporate the effects of all links on a route when computing the end-to-end blocking probability. In traditional cellular networks, infrastructure nodes either remain stationary or move in a predictable fashion (e.g., in low-earth-orbit), and can be assumed to have sufficient capacity to satisfy virtually all

-19- traffic demands for network resources. The performance of the last-hop wireless link in traditional cellular networks thus is considered to be decisive [6]. In tactical networks, there is no fixed, wired infrastructure. All nodes, including switches as well as endpoints

(possessing no switching capabilities), communicate via wireless links and move along trajectories that are not necessarily planned in advance. The unpredictable movement of switches implies that node interconnectivity and link properties (e.g., capacity, error rate) cannot be predetermined. Therefore, in tactical networks, performance issues cannot be confined to the last hop but instead pervade the entire network.

In the proposed algorithms, we classified traffic into multiple priority classes based on the preemptive service discipline. In previous performance analyses of wireless networks, calls are divided into new calls (NC) and handoff calls (HC) and wireless links usually reserves a certain number of channels for handoff calls. When a mobile node station travels across a cell boundary, the channel in the old cell is released, and an idle channel is required in the new cell. Such a simple classification does not reflect the preemptive service discipline commonly used in tactical environments. Also channel reservation for handoff calls is not as efficient as preemption, since it is a waste of precious resources when reserved channels are idle and new calls are blocked because of lack of resources. Handoff call channel reservation does not guarantee satisfactory service when the handoff call needs to be maintained due to its communication importance. With the preemptive service discipline, such handoff calls can be treated as calls of higher priority, thus the connection can be maintained by preempting resources used by calls of lower priority.

-20- We expect our analytical algorithms will also find application in fields other than tactical networks. Tactical networks share many common features with many other multi-hop wireless networks – those in which providing low-cost, rapidly-deployable and self-organizing networks in situations where no infrastructure yet exists or where the existing infrastructure has been severely damaged are of extreme importance. This type of network is used in emergency relief communications in areas afflicted by a natural disasters, and for field studies conducted by teams of scientists in remote locations. In many of these situations, timely and accurate receipt of multiple types of information transmitted across the network can mean the difference between life and death.

Reference

[1] R. Sanchez, J. Evans and G. Minden, “Networking on the battlefield: Challenges in

Highly Dynamic Multi-hop Wireless Networks”, in Proceedings of IEEE MILCOM

’99, Atlantic City, New Jersey, 1999.

[2] M. Corson, S. Batsell, and J. Macker, “Architectural Considerations for Mobile

Mesh Networking”, in Proceedings of IEEE MILCOM ’96, Mclean, Virginia, 1998.

[3] Z. Haas and S. Tabrizi, “On some Challenges and Design Choices in Ad-Hoc

Communications”, in Proceedings of IEEE MILCOM ’98, Bedford, Massachusetts,

1998.

[4] D. Medhi, S. Guptan, “Network dimensioning and performance of multi-service,

multi-rate loss networks with dynamic routing”, IEEE/ACM Transactions on

networking, Vol. 5, No. 6, 1997, pp.944-957.

-21- [5] G. L. Choudhury, K. K. Leung and W. Whitt, “Efficiently providing multiple grades

of service with protection against overloads in shared resources”, AT&T Technical

Journal, July-August, 1995, pp.50-63.

[6] R. Ramanathan and M. Steenstrup, “Hierarchically-Organized, Multi-hop Mobile

Wireless Networks for Quality of Service Support”, in ACM/Baltzer Mobile

Networks Journal, Vol. 3, No. 1, 1997.

[7] Victor T.-S Shi, Wang Chu and William Perrizo, “The performance of a link with

multi-priority traffic”, IEEE Transactions on Communications, Vol.46, No.6, 1998,

pp.743-746.

[8] J. M. Akinpelu, “The overload performance of engineered networks with

nonhierarchical and hierarchical routing”, AT&T Technical Journal, No. 7, Vol. 63,

1984, pp.1261-1280.

[9] J. Dshalalow, Frontiers in queuing: models and applications in science and

engineering, CRC Press, 1997.

[10] W. Wang, T. N. Saadawi, “Trunk congestion control in heterogeneous circuit

switched networks”, IEEE Trans. Comm., No.7, Vol. 40, 1992, pp.1156-1161.

[11] R. Cooper, Introduction to Queuing Theory, 2nd ed., New York, Macmillan, 1981.

[12] Gersht, et al, “Joint optimization of data network design and facility selection”,

IEEE JSAC, Vol.8, No.9, 1990, pp.1667-1681.

[13] L. Kleinrock, Queueing systems, Wiley Intersciences, Volume 1 and 2, 1976.

[14] M. Shwartz, Telecommunication networks, Addison-Wesley, 1986.

[15] J. Sucec and I. Marsic, “Clustering Overhead for Hierarchical Routing in Mobile Ad

hoc Networks”, in Proceedings of IEEE INFOCOM ’02, New York, 2002.

-22-

Recommended publications