Vous êtes sur la page 1sur 11

880 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO.

3, MAY 2004

Location Area Planning and Cell-to-Switch


Assignment in Cellular Networks
Ilker Demirkol, Cem Ersoy, Senior Member, IEEE, Mehmet Ufuk Çağlayan, Member, IEEE, and
Hakan Deliç, Senior Member, IEEE

Abstract—Location area (LA) planning plays an important role load on the database elements of the cellular network, 2) the load
in cellular networks because of the tradeoff caused by paging and created on the wired connection part of the cellular network; and
registration signalling. The upper boundary for the size of an LA 3) the load on the air interface. Among these, the least scalable
is the service area of a mobile services switching center (MSC). In
that extreme case, the cost of paging is at its maximum but no reg- one (that is, the most affected resource as the population and
istration is needed. On the other hand, if each cell is an LA, the traffic in a cell grow) is the radio bandwidth resource. More-
paging cost is minimal but the cost of registration is the largest. over, because the radio bandwidth is shared by control functions
Between these extremes lie one or more partitions of the MSC ser- such as paging, registration and call traffic, it is regarded as the
vice area that minimize the total cost of paging and registration. scarcest resource in a wireless network. Hence, we may just con-
In this paper, we seek to determine the location areas in an op-
timum fashion. Cell to switch assignments are also determined to sider the paging and registration load on the radio bandwidth.
achieve the minimization of the network cost. For that purpose, we A particular LA management approach is classified according
use the available network information to formulate a realistic op- to its use of zone, time, movement, distance, or profile infor-
timization problem, and propose an algorithm based on simulated
annealing (SA) for its solution. Then, we investigate the quality of
mation in its location update and paging procedures. In zone-
the SA-based technique by comparing it to greedy search, random based location updating, employed by the global system for mo-
generation methods, and a heuristic algorithm. bile communications (GSM) standard, LA boundaries are fixed
Index Terms—Location area (LA), location management, loca- and the same boundaries are used for all mobile registrations.
tion tracking, location update, paging area, simulated annealing. Optimal location area planning in zone-based schemes is not
widely studied. Saraydar et al. investigate zone-based schemes
by aiming to optimize the LA borders, where they either sup-
I. INTRODUCTION
pose a one-dimensional service area [2], or Poisson-distributed

M OBILITY tracking is crucial for the wireless networks


to achieve the quality of service (QoS) objectives [1].
In cellular communications, upon the arrival of a mobile-ter-
paging load [3]. The model and simulations in our work rely on
actual data obtained from a national cellular service provider so
that no assumptions are necessary regarding mobility or call ar-
minated call, the system tries to find the mobile terminal by rivals. In [4], zone-based scheme with selective paging is inves-
searching for it among a set of base stations (BS’s) over the tigated, and a new location-tracking algorithm, namely tree-lo-
current region knowledge of the mobile. This search is called cation area algorithm (TrLA), is proposed. Ozugur [5] defines
paging, and the set of base stations in which a mobile is paged a multiobjective zone-based LA and routing area (RA) problem
is called the location area (LA). At each LA boundary crossing, for general packet radio service (GPRS) and universal mobile
mobile terminals register their new locations through signaling telecommunications system (UMTS) standards, and applies a
in order to update the location management databases. There- genetic algorithm formulation. In [6], LA partitioning is con-
fore, the size of the LA is important for reducing the cost of sidered as a graph optimization problem.
paging and registration signalling [2]. Although there may be The location update can be performed according to the time
events other than location updates that cause registration, we elapsed since the last update [7]–[9]. The implementation of the
will use the term “registration” instead of “location update” so-called time-based location update schemes are simple. How-
throughout this paper. ever, redundant signalling may be incurred when the system
The cost of paging or registration has three distinct sources: 1) has low mobility because of numerous stationary mobiles. In
the select or update queries, which create processing and storage movement-based LA management [10]–[13], the location up-
date decision depends on the number of cell boundary crossings
Manuscript received March 11, 2002; revised December 2, 2002, March 19, measured since the previous location update. Distance-based
2003; accepted April 3, 2003. The editor coordinating the review of this paper schemes state that location update will be carried out when
and approving it for publication is V. Leung. This work was supported in part
by the State Planning Organization of Turkey under Grant 98K120890 and in a mobile terminal moves a threshold number of cells away
part by Turkcell, Inc. This work was presented in part at IEEE INFOCOM 2001, from the cell in which the last location update was performed
Anchorage, AK, April 2001. [14]–[17]. A hybrid of zone-based and distance-based scheme
I. Demirkol, C. Ersoy and M. U. Çağlayan are with NETLAB, Department
of Computer Engineering, Boğaziçi University, 34342 Istanbul, Turkey (e-mail: is studied in [18]. The distance-based location update scheme
ilker@boun.edu.tr; ersoy@boun.edu.tr; caglayan@boun.edu.tr). produces the minimum signaling cost compared to movement-
H. Deliç is with BUSIM Laboratory, Department of Electrical and Elec- and time-based techniques [19]. However, its implementation
tronics Engineering, Boğaziçi University, 34342 Istanbul, Turkey (e-mail:
delic@boun.edu.tr). is hard since the distance of the mobile has to be computed
Digital Object Identifier 10.1109/TWC.2004.827767 dynamically as it moves from cell to cell. In the profile-based
1536-1276/04$20.00 © 2004 IEEE
DEMIRKOL et al.: LA PLANNING AND CELL-TO-SWITCH ASSIGNMENT IN CELLULAR NETWORKS 881

scheme, the location update is performed according to some loads, the paging rate for each cell , , which just includes the
specific criterion such as the mobility behavior of the mobile or paging generated because of the mobiles residing in that cell, is
the distribution of the mobile terminated call arrivals [20]–[23]. used.
In this paper, we propose a solution for zone-based location The maximum call traffic load capacities of BSC and MSC
update and paging schemes, since they are used in the widely ( and , respectively) impose constraints that are
deployed GSM systems. Most LA planning problems in the lit- related to the processing capabilities of the equipment. These
erature have a common objective: minimizing the total paging constraints are checked through the busy-hour call traffic of each
and registration costs, where the objective function requires the cell, which is for cell and which has the unit Erlang-hours.
addition of the two distinct cost types. To that end, certain as- In order to have a feasible cellular network, the limited call
sumptions are made for the relative values of these costs; e.g., processing capability of MSCs and BSCs may create a limit on
assuming one unit cost for each paging event is equal to 10 the peak call arrival rate (this call arrival rate includes not only
unit cost for each registration event. Such assumptions have the the established connections but also the failed attempts), known
deficiency of being the same throughout the whole network, as the busy hour call attempt (BHCA) capacity. The BHCA ca-
whereas the load (i.e., cost) of paging and registration varies pacities for BSC and MSC are represented as and
from cell to cell. Moreover, these costs do not have compa- , respectively. The BHCA load on BSCs and MSCs are
rable units, for different control channels are used for paging calculated by using the call attempt rate of the cells which has
and registration. Hence, a linear combination of these costs is the unit call attempts per unit time. Let denote the peak call
not very meaningful since the operators cannot specify the rela- attempt rate of cell per unit time.
tive weight of each cost. In literature, the cell-to-switch assign- Each BS has a finite number of transmitters (TRXs), which
ments are often assumed to be known, and only cell-to-LA as- defines the number of channels in that cell. The TRX capacity
signments are considered. In this paper, we generalize the LA constraint is vendor-specific for BSCs and MSCs. For any BSC
planning problem by including the cell-to-switch assignment and MSC , the sum of the number of TRXs for each cell con-
decisions. Hence, we define and formulate a problem in which nected to that BSC or MSC must comply with a limit, denoted
both cell-to-switch and cell-to-LA assignments are jointly in- as and , respectively. To check for this constraint,
vestigated to minimize the cellular network cost. Subsequently, we need to know the number of TRXs in cell , for all .
a simulated annealing (SA)-based solution is developed for the The registration cost has several components including
generalized cellular network structuring problem. Although var- usage of radio resources, database updates. Normally, the
ious algorithms are extensively applied to LA planning in liter- registration cost is directly proportional to both idle-state cell
ature, SA-based solutions have not been studied for cell-to-LA boundary crossings and active-state handovers between cells
or cell-to-switch assignment. at LA boundaries. The calculation of these costs requires
In order to prohibit linear combining of incomparable costs, the collection of the flow rates at all cell boundaries while
the paging cost is included in the problem formulation as a con- mobile terminals are idle (i.e., with hand-set on but not in
straint. The registration cost is left alone in the objective func- conversation). Since this is infeasible, cellular network oper-
tion, which still results in a difficult combinatorial optimiza- ators (including the four in Turkey) cannot collect idle-state
tion problem. However, compared to minimizing the paging statistics. On the other hand, operators collect handover data for
within acceptable registration capacities, this goal is advanta- the mobiles passing cell boundaries during conversation. Since
geous since paging capacity is easier to quantify as a constraint our formulation relies strictly on available data, the aggregate
as explained in Section II. We propose a simulated annealing al- mobile flow behavior is approximated by assuming that the idle
gorithm and a heuristic approach for the solution of the problem mobile flow rate between any given two cells is proportional
in Section III, and present the results of the computational ex- to the active mobile flow rate (i.e., the handover rate) between
periments in Section IV. Section V concludes the paper. these cells. In other words, the handover traffic from the th cell
to th cell, , is used instead of the mobile flow data which
has the unit handovers per unit time.
II. LA PLANNING PROBLEM
To propose a BS–BSC topology, we must know which BS can
Without loss of generality, we consider a model that com- be connected to which BSC and discard those BS–BSC pairs
plies with the GSM hierarchy, which consists of BS’s, base sta- that are not feasible (due to physical limitations, geographical
tion controllers (BSCs) and mobile switching centers (MSCs) constraints, etc.). This information is available in the form of a
[24]. While formulating the LA planning problem, we only use proximity matrix, , among BS’s and BSCs in which
the available network information and try to include all realistic if can be connected to , and otherwise. Sim-
constraints and goals. The overall problem in LA planning and ilarly, for the BSC–MSC topology, we will use a proximity ma-
dimensioning stems from the tradeoff between the paging cost trix, , among BSCs and MSCs where if may be
and the registration cost. The paging cost is a result of the ar- connected to , and otherwise. Part of the network
riving calls to mobiles (i.e., mobile-terminated calls). The called structure may already be established with connections that are
party has to be searched and located in order to establish the con- not allowed to be changed. Hence, using the proximity matrix,
nection. In order to have a feasible cellular network, the paging existing physical infrastructure can be taken into account in the
capacities of BS and BSC (that have the unit paging com- resulting network solutions.
mands per second and denoted by and , respec- The following design variables will also be used in the for-
tively) should not be exceeded. For evaluation of the paging mulation.
882 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004

1) LA–BS topology is represented by the matrix . 6) The paging capacity of any BSC must not be exceeded.
If the th BS resides in the th LA, then , and Assuming that a BSC pages the mobile station (MS) sep-
, otherwise. arately in each cell of the same LA, this constraint be-
2) The matrix is used to establish the matrix , comes
where if the and BS’s reside in different
LAs, and , otherwise. (8)
3) The BSC-MSC topology is represented by the matrix
. If the th BSC is connected to the th MSC, 7) The call traffic capacity of any BSC must not be ex-
then , and , otherwise. ceeded
4) The BS-BSC topology is represented by the matrix
in which, if the th BS is connected to the th (9)
BSC, then , and , otherwise.
The paging cost on a cell is determined by the total call ar-
rivals to cells that belong to the same LA. We use a vector, , 8) The call traffic capacity of any MSC must not be ex-
where the th entry holds that total value for cell, which can ceeded
be calculated as (10)
(1)
9) The BHCA capacity of any BSC must not be exceeded
As a result, our “minimize the total registration signalling”
goal is formulated as follows. (11)

(2)
10) The BHCA capacity of any MSC must not be exceeded

subject to the following constraints. (12)


1) Each BS should be assigned to exactly one BSC. Thus,
for the th cell, the BS–BSC topology matrix should have 11) The TRX capacity of any BSC must not be exceeded
only one entry in the th row that is 1 and others must be
0 (13)
(3)
12) The TRX capacity of any MSC must not be exceeded
2) Each BSC should be assigned to exactly one MSC. For (14)
the th BSC, the BSC–MSC topology matrix should
have only one entry in the th row that is 1 and all others
must be 0 13) The proximity constraints must be satisfied

(4) (15)
(16)
3) Each BS should be assigned to exactly one LA. For the
th cell, the BS–LA topology matrix should have only The generalized LA planning formulation in equations
one entry in the th row that is 1 and others must be 0 (1)–(16) poses a difficult optimization problem in which the
LA–BS (matrix ), BSC–MSC (matrix ) and the BS–BSC
(5) topologies (the matrix ) have to be determined. There may
be many special cases of the general LA planning problem.
4) Each LA must reside within exactly one MSC. For each Typically, some of the constraints may be omitted. For example,
cell pair, if they belong to the same LA, then they also there may not be any call capacity constraint for the MSCs, in
must belong to the same MSC. Thus which case, Constraint (10) is omitted. Another special case
arises when there may be exactly one BSC for each MSC.
Then, is already known.

III. SOLUTION TECHNIQUES


(6) Our aim is to develop algorithms that take the available con-
straints, capacity and load information described in Section II
5) The paging capacity of any BS must not be exceeded as inputs, and find an optimal or near optimal network topology
which includes the assignment of cells (BS’s) to switches (BSCs
(7) and MSCs) and location areas (LAs).
DEMIRKOL et al.: LA PLANNING AND CELL-TO-SWITCH ASSIGNMENT IN CELLULAR NETWORKS 883

A. Remarks on the Complexity of the Problem


Since the solution space consists of all possible network
topologies, the BS-to-BSC, BSC-to-MSC and BS-to-LA
assignments determine the complexity of the solution. If there
are BS’s, BSCs, MSCs, the number of possible BS-BSC
assignments is calculated as follows. For each BS, there are
possible BSCs to be connected, hence possible connections.
Likewise, the number of possible BSC-to-MSC assignments
is and because the upper limit of the number of LAs is
the number of BS’s , the number of possible BS-to-LA
assignments is . Consequently, the size of the solution space
is . Although the solution space includes both feasible
and infeasible solutions, all solutions must be assessed whether
they are feasible or not. Because of the solution space size,
exhaustive methods result in exponential time complexity.
In order to give a sense for the difficulty of the formulation,
NP-hardness of two subproblems can be shown. The assignment
of cells to switches without considering the location areas was
studied in [25], where the problem was formulated as integer
programming and shown to be NP-hard.
Next, consider the subproblem of assigning BS’s to LAs. LAs
correspond to bins due to their common paging capacity limit.
We try to pack the BS’s to LAs in such a way that the number of
LAs is minimum. In general, the smaller the number of LAs,
the smaller the registration cost. In the limit, if there is only
one LA, there is no need for registration, and the corresponding
cost becomes zero. Therefore, having the registration cost or the
number of LAs in the objective function results in similar final
solutions. Since minimizing the number of LAs can be formu-
lated as a bin packing problem which is known to be NP-hard
[26], we conjecture that the optimization described by (1)–(16) Fig. 1. SA flowchart.
is also NP-hard.
Then, a random feasible LA is assigned to that BS. If no
B. Simulated Annealing feasible LA is found, a new LA is created.
2) Changing a BSC-to-MSC assignment: First, a BSC and a
Due to the difficulty of the problem described in Section II, candidate MSC for new assignment is chosen randomly.
it is not possible to guarantee the optimal solution in reasonable If the constraints are not violated, the LAs residing merely
running times. Therefore, techniques that give near optimal so- in that BSC (i.e., none of their BS’s are connected to an-
lutions within acceptable run times are needed. One method that other BSC) stay with their BS connections (i.e., nothing
finds a suboptimal solution without searching the entire solution is changed for these LAs), but LAs having some of their
space is simulated annealing (SA) [27], which approximates BS’s connected to that BSC go through rearrangement.
the solution of very large combinatorial optimization problems The assignments of BS’s to those LAs are released, and
[28]. Detailed information about the SA algorithm can be found therefore those LAs have no more BS’s assigned to them
in [29]. from that BSC. For those “released” BS’s, an adequate
The SA-based algorithm described here finds a network number of new LAs are created (if the capacity of a new
topology that consists of the LA-BS assignments (the matrix LA is full, then another LA is created).
), the BSC-MSC topology (the matrix ) and the BS-BSC 3) Changing a BS-to-LA assignment: Without affecting the
topology (the matrix ). BS-BSC connection, a new LA assignment is done by
Fig. 1 shows the flowchart of the SA algorithm. For a suc- searching the available LAs residing within the same
cessful SA implementation, two key items that must be defined BSC.
carefully are the moves that create neighbor solutions and the The cooling schedule consists of three components: setting
cooling schedule. A feasible solution is a topology where all the initial temperature; the decision of when and how to decrease
network nodes (BS’s, BSCs, MSCs) are connected and the LA the temperature; and the stopping rule of the algorithm. The
borders are specified while satisfying the constraints. Therefore, efficiency of a cooling schedule is determined by the quality
a (feasible) neighbor solution may be generated by any of the of the solution and the rate with which the process converges
three types of moves: [30]. The performance of SA depends heavily on the cooling
1) Changing a BS-to-BSC assignment: If constraints are not schedule and neighborhood structure, which should be carefully
violated, a new BSC is assigned to a randomly chosen BS. investigated and optimized to have the best results.
884 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004

C. Greedy Search ASMA resides in the Computer Engineering Department of


As a natural competitor, greedy search (GS) is one of the tech- Boğaziçi University, and has 32 personal computers (PCs) with
niques that we compare the SA-based algorithm to. It starts with Linux operating system [32]. In order to find the SA parameter
randomly selecting one of the feasible neighbors. If the chosen set that gives the best results, different parameter values are
neighbor improves the registration cost of the current solution, tried on multiple data sets. Experiments are repeated approx-
then it is accepted as the current solution. The search continues imately 30 times for each data and parameter set. The data
until an “iteration limit” is reached or a “specified number of sets used in the experiments are collected from an operational
iterations” result in no improvement. The flowchart of the GS GSM network at different times of a week. By choosing a
algorithm is obtained by setting the initial temperature to 0 in the pilot area from the GSM network, all relevant information
SA flowchart (Fig. 1). When the system temperature is zero, the about the network elements (BS, BSC, and MSCs) is extracted.
probability of accepting a neighbor that yields worse registration The capacity limits are vendor-specific and those stipulated
cost becomes zero. Therefore, only the neighbors that improve by the GSM operator’s equipment are fed to the algorithm as
the registration cost of the current solution are accepted. execution parameters. In particular, the paging capacity limits
The registration cost produced by GS should be an upper for a cell and a BSC are 33.98 and 8,500 paging commands per
bound on the SA runs, since the greedy search can only find second, respectively. Call traffic capacity limits for a BSC and
the local minima of the solution space. The quality of GS results an MSC are 1300 and 2600 Erlangs, respectively. The BHCA
rely on the initially formed solution, and a number of simulation limits for BSC and MSC are 200 000 call attempts per unit
runs are performed to test the GS with different initial solutions. time. Finally, the TRX capacity limits of a BSC and an MSC
are 600 and 1200 TRXs, respectively.
D. Heuristics In the second and third set of experiments, the greedy search
(with random initial topology), random generation and HOLAP
Since heuristics try to find the best solution without tracing are applied to the same data sets for comparison with the SA
an extensive part of the solution space and instead attempt to technique. Evaluation of SA against other evolutionary algo-
build the best solution directly, their time complexity is gener- rithms for different applications can be found in [33], [34].
ally much better than other techniques. However, heuristic so-
lutions tend to offer inferior quality. A. Simulated Annealing-Based Solution
The cellular network registration cost is determined by the
Fig. 3 shows the registration cost of the solutions found at dif-
sum of the number of handovers among cells belonging to dif-
ferent stages of a typical SA run for a moderate sized example
ferent LAs, since those handovers are assumed to be propor-
network, which has about 600 BS’s, 6 BSCs and 6 MSCs. While
tional to the number of location updates that occur by crossing
the SA parameters are optimized with this network, verification
the LA borders. The total network cost can be minimized by de-
via other networks is also carried out. In the initial stages, the
signing the LA borders such that the cell pairs belonging to dif-
SA algorithm accepts nearly all solutions, since the temperature
ferent LAs have the lowest handover rates. We call the heuristic
is very high. It acts as a random search first, and the registration
based on the preceding approach as the heuristic for optimiza-
cost of the accepted solutions fluctuates in a wide range as seen
tion of location area planning (HOLAP). Hence, HOLAP aims
in Fig. 3. As the temperature decreases, the probability of ac-
to gather cell pairs with high handovers within the same LA so
cepting worse solutions also decreases so that in the later stages
that the registration cost is not raised by the high handover rates.
of the run, the search becomes greedy and only better solutions
Fig. 2 represents the flow diagram of HOLAP, which consists of
are accepted.
two main blocks (loops). The algorithm starts with sorting the
The parameter set of SA includes the number of neighbors
cell pairs according to the handover rates between them.
assessed for the initial temperature setting (IN), the value
Starting with the pair that induces the highest handover rate,
(alpha) and the number of accepted neighbor movements (AD)
HOLAP tries to assign a common LA to both cells of that pair.
to decrement the temperature, the number of iterations to stop
The process begins with searching feasible BSCs for the same
the execution (IL) and the number of temperature decrements
pair by assuring that the BSC capacities are adequate to handle
without registration cost improvement to stop the execution
these cell-to-BSC assignments. If any cell of the pair under
(WI). The optimized parameter set found for the reference
process was previously assigned to an LA, that pair is skipped.
case with 600 BS’s, 6 BSCs and 6 MSCs is {IN:10,000,
Otherwise, if the number of available LAs is greater than one,
alpha:0.9999, AD:20, IL:5,000,000, WI:5,000}, as described
then the decision of the LA assignment is made based on the de-
in [31]. The execution time varies with the size of the problem
cision priorities shown in the flow diagram. After the processing
and the SA parameter values, but the longest run has taken
of all cell pairs in a sequential manner, there will be cells that
about 1.5 h the above network.
are not assigned to any LA. For the remaining unassigned cells,
the algorithm described in the second loop applies, and again B. Statistical Quality Measures
the decision priorities are considered. HOLAP is compared to
Besides GS and HOLAP, a large set of randomly generated
SA and GS in Section IV-C-2.
solutions is also used to investigate the quality of SA results.
The two random generation (RG) methods, labeled as RG1 and
IV. COMPUTATIONAL EXPERIMENTS
RG2 are based on the procedure where first BS’s are connected
The cluster system named ASMA (Advanced system for randomly to feasible BSCs (considering the constraints), and
multicomputer applications) is employed in the experiments. then BSCs are connected to feasible MSCs. In RG1, for each
DEMIRKOL et al.: LA PLANNING AND CELL-TO-SWITCH ASSIGNMENT IN CELLULAR NETWORKS 885

Fig. 2. Flowchart of HOLAP.

MSC starting with one LA, BS’s are assigned to an LA. If LA MSC (after randomly establishing the BS-BSC-MSC topology).
capacity (paging capacity of BS’s) reaches its limit, then a new In contrast, in RG2, a random number of LAs are created for
LA is created and the remaining BS’s are assigned to that LA. each MSC. The randomization is based on the uniform distri-
Here the goal is to create the minimum number of LAs for each bution with upper limit to be the number of BS’s connected to
886 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004

Fig. 3. Yypical run of the SA algorithm on a sample network. The registration Fig. 4. RG1 histogram. The registration cost of the network is computed in
cost of the network is computed in total number of handoffs incurred between total number of handoffs incurred between the LAs per second.
the LAs per second.

BSCs of the MSC. Then, all BS’s are assigned to a randomly


feasible LA. If for a BS, no feasible LA exists, then a new LA
is created and the BS is assigned to it. With RG2, the aim is to
make all of the network topology decisions random, and there-
fore to sample the solution space more uniformly.
A sample histogram of the registration cost values found by
RG1 and RG2 can be seen in Figs. 4 and 5, respectively. The
histograms reflect approximately 1 000 000 random solutions
grouped within 50 bins (classes) according to their network reg-
istration costs. The number of solutions that fall into each bin are
counted. Relative frequency shows the number of occurrences
for each bin, and gives an idea about the distribution of the reg-
istration costs of generated solutions. Fig. 4 depicts that the reg-
istration cost values of RG1 have a normal distribution. On the
other hand, because for each MSC a random number of LAs are
Fig. 5. RG2 histogram (with logarithmic frequency axis). The registration cost
created in RG2, the total number of LAs created in the system of the network is computed in total number of handoffs incurred between the
deviates a lot from the minimum possible number. For example, LAs per second.
if the number of MSCs in a system is 6, then minimum number
of LAs that can be created is 6. For each MSC, LAs are cre- solution found by SA and GS algorithms, and source code for
ated randomly, and the probability of having the number of LAs all techniques are hosted on the Boğaziçi University Computer
close to 6 is very small. This explains the accumulation of the Engineering Network Research Laboratory webpage [35].
RG2 results to the right side of Fig. 5. Experimental results produced by the SA algorithm reflect
the averages of about 30 independent runs. The minimum regis-
C. Comparison of Solution Techniques tration costs found by the GS, RG1, and RG2 runs are selected
The comparison between SA and the other techniques is for comparison. The number of GS algorithm runs on each data
based on the resulting network registration cost. Both infor- set is between 30 and 100. RG1 and RG2 methods are applied
mation collected from three pilot areas of a GSM network and 1 000 000 times to each data set.
randomly generated network data are employed in experiments. 1) Experiments on Real Network Data: The experiments
For the latter, the loads on all network elements are assumed to that are based on the GSM network data yield Table I. All data
be exponentially distributed with mean set equal to the average are collected at the peak hour when channel occupation is at
value measured on the GSM network. Proximity matrices are its maximum within the day. The first set of data is measured
such that all BS-to-BSC and BSC-to-MSC connections are on a Friday in a pilot area of the GSM network that belongs
allowed. A third set of experiments are performed with random to a metropolitan city. Data sets 2 to 5 are extracted from a
data representing different types of cellular networks. For in- smaller pilot area of the same city on a Monday, Tuesday,
stance, to represent a network with higher mobility subscribers, Saturday and Sunday, respectively. The sixth data set is comes
the mean value of the handover rates is scaled up. Sample from the third pilot area that belongs to a less populated city on
random data generated, the network architecture of the best a Friday. Table I shows that the SA-based solution technique
DEMIRKOL et al.: LA PLANNING AND CELL-TO-SWITCH ASSIGNMENT IN CELLULAR NETWORKS 887

TABLE I TABLE III


SA, GS, RG1, AND RG2 COMPARISONS FOR DIFFERENT PROBLEMS SA AND RG2 COMPARISON FOR DIFFERENT PROBLEMS BASED ON DATA OF
BASED ON DATA OF AN EXISTING NETWORK AN EXISTING NETWORK

TABLE II TABLE IV
SA AND RG1 COMPARISON FOR DIFFERENT PROBLEMS BASED ON DATA OF SA, GS, RG1, AND RG2 RESULTS FOR RANDOM DATA
AN EXISTING NETWORK

outperforms the others. Furthermore, the minimum registration


costs found by the RG1 runs are uniformly lower than those
attained by RG2. Thus, setting the number of LAs randomly
and then making the BS-BSC-MSC assignments does not
give a better result than making BS-BSC-MSC assignments
randomly and then setting the number of LAs to the minimum
possible value. Another outcome of Table I is that SA gives the network topologies created by RG2 method are collected in
approximately 50% better results than GS, which turns out to a smaller region, RG2 has smaller standard deviation compared
be the best competitor to SA. The reason behind the superiority to RG1. Hence, in the units of , the distance of SA result to the
of SA is that the SA algorithm is able to escape from local RG2 mean is much more than the RG1. As an example, again
minima, while GS always gets stuck in a local minimum. for the case of the second data set, the distance from SA result
Although just the averages of the SA results are presented in to the mean of RG2 results is . Another observation from
Table I, their variance on different runs is not very large. For ex- Table III is that the first data set produces much higher values
ample, the 30 separate SA runs performed for Data Set 1 range compared to other data sets. The reason is that the first pilot area
from 405 571 to 475 072. The maximum and the minimum reg- is a hotspot in the city.
istration costs found on distinct SA runs diverge at most 15% 2) Experiments on the Second Set of Example Prob-
from the average. Therefore, we may state that SA has a tight lems: RandSetA1 to RandSetA10 of Table IV list the resulting
range, and any execution of the SA method gives results near network registration costs for a network with 386 BS’s, 6 BSCs
the values presented in the tables. and 6 MSCs. Although the loads are randomly generated for
In order to have a feeling about the distribution of the regis- all elements based on the average values calculated using real
tration cost values in the solution space, and to see how far from GSM network data, the results obtained from all techniques are
the average of the solution space the SA results are, RG methods similar. Table IV depicts that SA again finds the best solution.
are used, as well. The resulting networks of RG methods con- However, the GS results are closer to those of SA compared
sist of real (measured) loads, albeit an arbitrary topology. For to the runs performed with the real data. For the first data set,
the first group of experiments, the mean value of SA results are the SA registration cost is 11% better than GS as opposed to
compared to the mean and standard deviation of the RG1 43% for Data Set 1 in Table I. Loads generated according to
runs in Table II. The SA results are located very far from the a specific distribution are similar unlike real GSM network
average. For Data Set 1, the distance between the SA and the measurements. Hence, neighboring solutions have similar
mean RG1 results is . registration costs, and it is harder for SA to find significantly
RG2 designates the actual solution space; however, it only better solutions.
includes the feasible solutions. Finally for the first group of ex- RandLargeSet1 and RandLargeSet2 of Table IV indicate that
periments, Table III shows the mean value of SA results com- SA produces superior solutions for a network consisting of 800
pared with the mean and standard deviation of RG2 runs. Since BS’s, 12 BSCs and 12 MSCs. For the experiments conducted
888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004

TABLE V TABLE VI
HOLAP, SA, GS, RG RESULTS OF RANDOM DATA FOR NETWORKS WITH 386 SA, GS, RG1, AND RG2 COMPARISON FOR RANDOM DATA FOR NETWORKS
BSS, 6 BSCS AND 6 MSCS WITH DIFFERENT MOBILITIES

on this larger network topology, data sets are obtained again


through random data generation. It is interesting that the results
are very close to those listed for Data Sets 2–4 of Table I. This
similarity is be an evidence for the reliability of random data
generation.
The comparison between SA and HOLAP is in Table V for
386 BS’s, 6 BSCs and 6 MSCs. The loads of the network ele-
ments are generated randomly based on the average values ob-
tained from the GSM network. As it turns out, HOLAP is not
a competitor to SA, and not even to GS. The reason behind the
compared to other techniques, for some experiments, GS does
worse performance of HOLAP can be that the first those pairs
approach SA (e.g., data set HighMob2).
with higher handover rates are considered and the pairs with low
A network with high paging implies that the number of mo-
handover rates are discarded. The main goal is to allocate the
bile-terminated calls occurring in the network is high. As seen
pairs with high handover rates to the same LA. The remaining
in Table VI, for the high paging situation, SA gives better out-
pairs have to be assigned to different LAs due to system con-
comes compared to other methods. In addition, we notice that
straints, and it is these ones that determine the network registra-
there are improvements in SA network registration costs over
tion cost. That is, cell pairs with average or low handovers are
Table IV. However, the paging capacity is one of the constraints,
also critical for the network registration costs and should not be
and high paging reduces the size of the feasible solution space.
ignored.
In contrast, the results of GS, RG1, and RG2 are very close
3) Effect of Network Properties: For a network with high
to those in Table IV. Since methods other than SA use random
(low) mobility, the average value of the handover rates, which is
search and simple logic, they cannot improve the results when
obtained from the GSM network, is multiplied (divided) by two.
constraints are tightened. It is also observed that low paging and
A network with high (low) paging is generated by multiplying
high paging cases create similar results.
(dividing) the average paging rate by three. A random network
Table VII displays the performance against traffic load. Com-
with low (high) call traffic load is obtained by dividing (multi-
parison of data sets LowTraff1-LowTraff4 of Table VII with
plying) the average value of the call traffic load by two. How-
data sets LowPag1-LowPag4 of Table VI reveals that although
ever, for the high call traffic case, because the number of BSCs
SA, RG1 and RG2 generate networks with similar registration
used in the experiments, which is six, is not capable of handling
costs to those in Table VI, GS yields higher registration costs.
the number of BS’s, which is 386, we decrease the number of
Moreover, networks with low call traffic have worse registra-
BS’s to 250. To obtain a network with high or low TRX load,
tion costs than those with high load, because the solution space
the same procedure is applied to the average values as in net-
is enlarged by relaxing a constraint, and it is harder to find better
works with high or low call traffic. Again because of capacity
results in a larger space.
constraints, for high TRX load, the number of BS’s is reduced
to 250.
V. CONCLUSION
In Table VI, data sets from HighMob1 to HighMob4 have
high mobility, and data sets from LowMob1 to LowMob4 be- The most important benefit of optimized LA planning is pre-
long to networks with low mobility. In the rest of the tables, the venting needless radio resource usage that can instead be allo-
data sets represent a random network whose data are formed cated for the communication of the customers. Furthermore, the
by using the same average values. This is one reason why the network elements can be utilized more efficiently, and network
registration costs in the table are close. Table VI indicates that construction costs can be reduced. In order to design a feasible
the impact of high mobility is an increase in registration cost cellular network, constraints on the call handling capacities of
due to increased handover rate. When compared to Table IV, network elements and costs related to the paging and registra-
this becomes more obvious. Although SA gives better results tion activities should be considered. In this paper, we presented a
DEMIRKOL et al.: LA PLANNING AND CELL-TO-SWITCH ASSIGNMENT IN CELLULAR NETWORKS 889

TABLE VII [3] C. U. Saraydar and C. Rose, “Location area design using population and
SA, GS, RG1, AND RG2 COMPARISON FOR RANDOM DATA FOR NETWORKS traffic data,” in Proc. Conf. Information Sciences and Systems, vol. II,
WITH DIFFERENT CALL TRAFFIC LOADS Princeton, NJ, Mar. 1998, pp. 739–744.
[4] P. G. Escalle, V. C. Giner, and J. M. Oltra, “Reducing location update
and paging costs in a PCS network,” IEEE Trans. Wireless Commun.,
vol. 1, pp. 200–209, Jan. 2002.
[5] T. Ozugur, “Multiobjective hierarchical location and routing area opti-
mization in GPRS and UMTS networks,” in Proc. IEEE Int. Conf. Com-
munications, vol. 1, New York, Apr.–May 2002, pp. 579–584.
[6] S. Z. Ali, “Design of location areas for cellular mobile radio networks,”
in Proc. 55th IEEE Vehicular Technology Conf., vol. 3, 2002, pp.
1106–1110.
[7] L. D.-Jun and C. D.-Ho, “On optimum timer value of area and timer-
based location registration scheme,” IEEE Commun. Lett., vol. 5, pp.
148–150, Apr. 2001.
[8] S. H. Ryu, K. H. Lee, Y. Y. Oh, J. Y. Lee, and S. B. Lee, “Adaptive
time-based location update scheme using fuzzy logic,” in Proc. IEEE Int.
Conf. Consumer Electronics, Los Angeles, CA, June 1999, pp. 322–323.
[9] Y. Fang, I. Chlamtac, and F. H.-Ring, “Analytical results for optimal
choice of location update interval for mobility database failure restora-
tion in PCS networks,” IEEE Trans. Parallel Distrib. Syst., vol. 11, pp.
615–624, June 2000.
[10] Z. Mao and C. Douligeris, “Two location tracking strategies for PCS sys-
tems,” in Proc. 8th Int. Conf. Computer Communications and Networks,
Boston, MA, Oct. 1999, pp. 318–323.
[11] Y. Fang, “Tradeoff analysis for location update and paging in wireless
networks,” in Proc. IEEE GLOBECOM, San Antonio, TX, Nov. 2001,
pp. 1754–1758.
[12] J.-T. Tsai and H.-H. Hsiao, “Performance of movement-based location
update and one-step paging in wireless networks with sparsely underlaid
microcells,” in Proc. IEEE GLOBECOM, San Antonio, TX, Nov. 2001,
pp. 642–647.
[13] L. Jie, H. Kameda, and K. Li, “Optimal dynamic mobility management
generalized formulation of the LA planning and cell-to-switch for PCS networks,” IEEE/ACM Trans. Networking, vol. 8, pp. 319–327,
assignment problem that uses the available network informa- June 2000.
tion in a realistic manner. We also proposed a solution technique [14] W. Wang and I. F. Akyildiz, “Intersystem location update and paging
schemes for multitier wireless networks,” in Proc. ACM MobiCom’00,
based on the SA algorithm, which has not been studied in this Boston, MA, Aug. 2000.
field, as well as, a heuristic algorithm to the NP-hard optimiza- [15] V. Wong and V. Leung, “An adaptive distance-based location update
tion problem. The load values supplied to the SA-based algo- algorithm for next-generation PCS networks,” IEEE J. Select. Areas
Commun., vol. 19, pp. 1942–1952, Oct. 2001.
rithm can be generated using any model, or they can be fetched [16] M. Verkama, “A simple implementation of distance-based location up-
from an existing network. dates,” in Proc. 6th IEEE Int. Conf. Universal Personal Communica-
We described the implementational details of the algorithm tions, vol. 1, San Diego, CA, Oct. 1997, pp. 163–167.
[17] V. W.-S. Wong and V. C. M. Leung, “An adaptive distance-based lo-
and compared it to other solution techniques. For the compar- cation update algorithm for PCS networks,” in Proc. IEEE Int. Conf.
ison between SA and the other techniques, three types of exper- Communications, vol. 7, Helsinki, Finland, June 2001, pp. 2000–2005.
iments were conducted. Real GSM network data (loads of the [18] V. Casares-Giner and J. Mataix-Oltra, “Global versus distance-based
local mobility tracking strategies: A unified approach,” IEEE Trans. Veh.
functional cells, etc.) were used in the first type of experiments, Technol., vol. 51, pp. 472–485, May 2002.
with the SA-based algorithm delivering the best performance. [19] A. Bar-Noy, I. Kessler, and M. Sidi, “Mobile users: to update or not to
The second best method was GS, with 50% higher registration update?,” Wireless Networks, vol. 1, no. 2, pp. 175–185, July 1995.
[20] I. F. Akyildiz and W. Wang, “A dynamic location management scheme
cost than SA. For the second group of experiments, to assure for next-generation multitier PCS systems,” IEEE Trans. Wireless
that the success of SA is not dependent on to a certain data set, Commun., vol. 1, pp. 178–189, Jan. 2002.
randomly generated network data are deployed. Again SA per- [21] C. Woo-Jin and S. Tekinay, “An adaptive location registration scheme
formed the best; however, the difference between SA and GS with dynamic mobility classification,” in Proc. IEEE Int. Conf. Commu-
nications, vol. 1, New York, Apr.–May 2002, pp. 440–444.
results narrowed down to approximately 15%. The heuristic al- [22] K. T. Chen, S. L. Su, and R. F. Chang, “Design and analysis of dynamic
gorithm HOLAP turned out to be poorer than SA and GS. The mobility tracking in wireless personal communication networks,” IEEE
last group of experiments investigated the impact of load char- Trans. Veh. Technol., vol. 51, pp. 486–497, May 2002.
[23] L. Shou-Chih and A. L. P. Chen, “Adaptive region-based location
acteristics, with superior results for SA. management for PCS systems,” IEEE Trans. Veh. Technol., vol. 51, pp.
Better heuristic algorithms need to be developed in the future. 667–676, July 2002.
The SA algorithm can also be run on a wider test set to check [24] G. Heine, GSM Networks: Protocols, Terminology, and Implementa-
tion. Boston, MA: Artech House, 1998.
the optimality of currently proposed SA parameter values. [25] A. Merchant and B. Sengupta, “Assignment of cells to switches in PCS
networks,” IEEE/ACM Trans. Network., vol. 3, pp. 521–526, Oct. 1995.
[26] M. R. Garey and D. S. Johnson, Computers and Intractability: A
REFERENCES Guide to the Theory of NP-Completeness. San Francisco, CA: W. H.
Freeman, 1979.
[1] B. L. Mark and Z. R. Zaidi, “Robust mobility tracking for cellular net- [27] N. Metropolis, A. W. Rosenbluth, M. N. Rosenbluth, A. H. Teller, and
works,” in Proc. IEEE Int. Conf. Communications, vol. 1, New York, E. Teller, “Equation of state calculations by fast computing machines,”
Apr.–May 2002, pp. 445–449. J. Chem. Phys., vol. 21, no. 6, pp. 1087–1092, June 1953.
[2] C. U. Saraydar, O. Kelly, and C. Rose, “One-dimensional location area [28] S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, “Optimization by simu-
design,” IEEE Trans. Veh. Technol., vol. 49, pp. 1626–1633, Sept. 2000. lated annealing,” Science, vol. 220, pp. 671–680, May 1983.
890 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004

[29] E. H. Aarts, J. Korst, and P. J. van Laarhoven, Simulated Annealing, Mehmet Ufuk Çağlayan (S’77–M’82) received
Local Search in Combinatorial Optimization, E. Aarts and J. K. Lenstra, the B.S.E.E. and M.S.C.S. degrees from Middle
Eds. New York: Wiley, 1997, pp. 91–120. East Technical University, Ankara,Turkey, in 1973
[30] E. Rich and R. Knight, Artificial Intelligence. New York: McGraw- and 1975, respectively, and the Ph.D. degree from
Hill, 1991. Northwestern University, Evanston, IL, in 1981.
[31] I. Demirkol, C. Ersoy, M. U. Çağlayan, and H. Deliç, “Location area He was a Faculty Member with DePaul Univer-
planning in cellular networks using simulated annealing,” in Proc. IEEE sity, Northwestern University, and University of
INFOCOM, Anchorage, AK, Apr. 2001, pp. 13–20. Petroleum and Minerals, Dhahran, Saudi Arabia.
[32] BU ASMA Project Home Page (1999). http://www.asma.cmpe. He served as a Computer Scientist in BASF AG,
boun.edu.tr [Online] Ludwigshafen, Germany. He is currently serving as
[33] S. Elmohamed, P. Coddington, and G. Fox, “A comparison of annealing a Full Professor with the Department of Computer
techniques for academic course scheduling,” in Proc. 2nd Int. Conf. Engineering, Bogazici University, Istanbul,Turkey. His research interests in
Practice and Theory of Automated Timetabling, Toronto, ON, Canada, computer networks, wireless and mobile networks, sensor networks, parallel
Aug. 1997, pp. 146–166. and distributed systems, operating systems, computer security, performance
[34] W. E. Hart, “A theoretical comparison of evolutionary algorithms and modeling, and software engineering.
simulated annealing,” in Proc. 5th Annu. Conf. Evolutionary Program- Dr. Caglayan is a member of the ACM, Turkish Informatics Society, Turkish
ming, San Diego, CA, Feb.–Mar. 1996, pp. 147–154. Association of Electrical Engineers, and the Turkish Internet Technologies So-
[35] Computer Networks Research Lab (2002). http://www.netlab.boun. ciety.
edu.tr/thesis/ilker/index.html [Online]

Ilker Demirkol received the B.Sc. (with honors)


and M.Sc. degrees in computer engineering from
Bogazici University, Istanbul, Turkey, in 1998 and
2002, respectively. He is currently working toward
the Ph.D. degree at the same university.
His research interests include the areas of wire- Hakan Deliç (S’88–M’93–SM’00) received the B.S.
less communications, wireless ad hoc and sensor net- degree (with honors) in electrical and electronics
works, and optimization of communication networks. engineering from Boğaziçi University, Istanbul,
Turkey, in 1988, and the M.S. and the Ph.D.
degrees in electrical engineering from the University
of Virginia, Charlottesville, in 1990 and 1992,
respectively.
He was a Research Associate with the University
Cem Ersoy (S’87–M’92–SM’02) received the B.S. of Virginia Health Sciences Center from 1992 to
and M.S. degrees in electrical engineering from 1994. In September 1994, he joined the University
Boğaziçi University, Istanbul, Turkey, in 1984 and of Southwestern Louisiana, Lafayette, where he was
1986, respectively, and the Ph.D. degree in electrical on the Faculty of the Department of Electrical and Computer Engineering
engineering from Polytechnic University, Brooklyn, until February 1996. He was a Visiting Associate Professor in the Department
NY, in 1992. of Electrical and Computer Engineering, the University of Minnesota, Min-
He worked as an R&D engineer in Nortel NETAS neapolis, during the 2001–2002 academic year. He is currenlty a Professor of
A.S., Istanbul, between 1984 and 1986. Currently, he Electrical and Electronics Engineering at Boğaziçi University. His research
is a Professor with the Computer Engineering De- interests include the areas of communications and signal processing. His
partment, Boğaziçi University. His research interests current research focuses on cellular network design, receiver design, random
include performance evaluation and topological de- access protocols, application of signal processing techniques to wireless net-
sign of communication networks, wireless, mobile, and multimedia communi- working, robust systems, and detection and estimation using multiple sensors.
cations. He frequently serves as a consultant to the telecommunications industry.

Vous aimerez peut-être aussi