Professional Documents
Culture Documents
Defense and Space, 31 avenue des cosmonautes, 31402 Toulouse Cedex 04, France
Bretagne - Institut Mines Telecom, 10 avenue Edouard Belin, 31028 Toulouse Cedex 04, France
{joan.venturajaume, laurent.girardeau}@astrium.eads.net, laurent.franck@telecom-bretagne.eu
Telecom
I.
I NTRODUCTION
II.
DEDICATED
CELL
SUPER
NODE 1
SUPER
NODE 2
LTE CORE
NETWORK
B
A
REQUE
ST
RANT
PRE - G
BUFFER
TIMER 1
VOICE
REQ
UES
VO
PRE-TA
ICE
KEN
VOICE
REL
EAS
E
RELEAS
Fig. 1.
BUFFER
TIMER 2
T
- GRAN
FINAL
RELEAS
P REVIOUS W ORK
III.
P ROTOCOL D ESCRIPTION
Gran
t
Voice
Grant
Req
Listening
Clients
of SN 2
Refuse
Client B
ERROR
Tbuffer 2
se
Tbuffer 1
Super
Node 2
Refu
t
Gran
Super
Node 1
Release
Voice
Pre
t
Gran
Client A Req
Pre
Gran
t
Message from
Client B is cut
Fig. 2.
A NALYTICAL M ODEL
& T2 < T1
(1)
Where T1 and T2 are the timestamp from the first and the
second requests received; d1 and d2 are the experienced delay
of these two requests, i.e. the time between the moment the
user sends the request and the SN receives it; finally, Tbuf f er
indicates the duration of the buffer period.
When the SN receives the first request, it knows the values
of T1 , d1 and their sum. Then, the buffer duration is calculated
assuming that T1 + d1 < T2 + d2 , i.e. the request was received
before any other. Hence, we derive the probability of system
failure at a single SN when two users are contending for the
floor, Pf ailure one :
Pf ailure
P {A & B k C}
T1 + d1 + Tbuf f er < T2 + d2
T2 < T1
T1 + d1 < T2 + d2
=
=
=
=
one
A
B
C
(2)
(3)
(4)
(5)
Pf ailure
one
P {A & B & C}
P {C}
(6)
Pf ailure
one
P {A & B}
P {C&T1 < T2 } + P {C&T1 > T2 }
(7)
(log (t))2
1
e 22
t 2
(8)
Here, and , mean and standard deviation of the logarithm of the variable, denote the parameters of the distribution.
The parameters are estimated using the likelihood maximization algorithm.
The study of the network delay can be very useful to examine the performance of the system and adopt the necessary
changes to optimize it. However, the analysis of such key element remains difficult to be characterized by a single random
distribution. Authors in [14] propose a simple and flexible
method using a finite combination of Weibull distributions.
The probability distribution function of a mixture is a weighted
sum of the functions of the different elements that compose it:
f (d)
I
X
qi fi (d)
(9)
i=1
si
ri
d li
ri
si 1
e
dli
ri
si
(10)
N
1
X
k=0
1 (1 Pf ailure
N 1
one )
(11)
Pf ailure = 1
N 1
k
Ppush
(1 Ppush )N 1k (1 Pf ailure
k
one )
(12)
PM
Ppush
m=1
requests receivedm 1
N 1
Req
Client
Super
Node
Gra
nt
Voice
Pr
Gra e
nt
Tgo
Tbuffer
(13)
Fig. 3.
from the same SN. In that way, the estimation of the parameters
of the delay could be the same for a number of groups. Still, the
weighting parameters, the q 0 s in the presented mixture, should
be tuned for every group in order to reflex the distribution of
the messages throughout the SNs.
Finally, we expect that the deployed cells or SNs, the ones
that need to be back hauled, manage a small number of talk
groups and users, whereas a control center could face a much
higher load, while benefiting from a better hardware to handle
it.
V.
A DDITIONAL OPTIONS
0.045
Ts=1.2,d=0.025 N=5
0.04
Pfailure
failure
0.07
Ts=2.1,d=0.025 N=5
0.03
0.06
Ts=2.1,d=0.04 N=5
0.05
0.025
Tbuffer=0.25,Ts=1.2 N=5
Tbuffer=0.28,Ts=1.2 N=5
Tbuffer=0.25,Ts=2.1 N=5
Tbuffer=0.28,Ts=2.1 N=5
0.08
Ts=1.2,d=0.04 N=5
0.035
0.04
0.02
0.015
0.03
0.01
0.02
0.01
0.005
0
0.26
0.265
0.27
0.275
0.28
0.285
0.29
0.295
0
0.02
0.3
0.022
0.024
0.026
0.028
Tbuffer (s)
0.03
0.032
0.034
0.04
Tbuffer=0.01,Ts=1.2 N=5
Tbuffer=0.03,Ts=1.2 N=5
Tbuffer=0.01,Ts=2.1 N=5
Tbuffer=0.03,Ts=2.1 N=5
Ts=1.2,d=0.28 N=5
Ts=1.2,d=0.3 N=5
0.04
0.06
Pfailure
Ts=2.1,d=0.28 N=5
Pfailure
0.038
0.05
0.1
0.08
0.03
Ts=2.1,d=0.3 N=5
0.02
0.04
0.01
0.02
0.036
Delay (s)
0
0
0.005
0.01
0.015
0.02
Tbuffer (s)
0.025
0.03
0.29
0.295
0.3
0.305
0.31
0.315
Delay (s)
Fig. 6.
Fig. 4.
0.285
0.18
0.16
call idle time and the system delay for a given scenario. The
following table displays the parameters, introduced in chapter
IV.B, used in this example:
0.14
Pfailure
0.12
0.1
Tbuffer=0.26,d=0.04
N=5
Tbuffer=0.26,d=0.04
N=5
Tbuffer=0.22,d=0.04
N=5
Tbuffer=0.22,d=0.04
N=5
Tbuffer=0.26,d=0.025N=5
N=5
Tbuffer=0.26,d=0.025
Tbuffer=0.22,d=0.025N=5
N=5
Tbuffer=0.22,d=0.025
0.08
0.06
0.04
0.02
0
0.5
1.5
2.5
3.5
4.5
0.05
0.04
Tbuffer=0.01,d=0.28
N=5
Tbuffer=0.01,d=0.28
N=5
Tbuffer=0.03,d=0.28
N=5
Tbuffer=0.03,d=0.28
N=5
Tbuffer=0.01,d=0.3
N=5
Tbuffer=0.01,d=0.3
N=5
Tbuffer=0.03,d=0.3
N=5
Tbuffer=0.03,d=0.3
N=5
Pfailure
0.03
0.02
0.01
0
Fig. 5.
0.5
1.5
2.5
3.5
4.5
VI.
E VALUATION
Delay
Weibull Mixture
Three-parameters
= 0.25
q1 = 0.2
q2 = 0.175
q3 = 0.1
q4 = 0.125
q5 = 0.25
q6 = 0.15
= 0.4
r1
r2
r3
r4
r5
r6
= 0.005
= 0.015
= 0.011
= 0.013
= 0.006
= 0.012
s1 = 3.2
s2 = 1.9
s3 = 2.2
s4 = 1.3
s5 = 1.25
s6 = 1.1
l1 = 0.023
l2 = 0.023
l3 = 0.023
l4 = 0.29
l5 = 0.29
l6 = 0.29
20
s+
va
r
s+
iab
l
20
Fig. 7.
le
20 ms + variab
SUPER
NODE 1
SUPER
NODE 2
20 ms
20
ms
le
+ variab
SUPER
NODE A
+v
ar i
ab
le
SUPER
NODE C
SUPER
NODE B
riable
m
20
le
s + va
20 m
s+
iab
bl
ia
20 ms + variable
r
va
r
va
may differ from the values imposed at the user level but,
as the distributions are flexible enough, they provide with a
set of parameters that has a good fit and serves to calculate
the failure probability and the necessary timers. Further, it
computes a set of Tbuf f er on a pre-defined frequency. It
simulates the buffering of the voice packets that are then sent
to the clients upon the expiration of the buffer timer. Each
server works independently and the calculated matrix Tbuf f er
varies slightly. Finally, every SN counts the number of failure
occurred during the simulation and displays the corresponding
Pf ailure result.
In these simulations, clients are connected to their SNs
via point-to-point links with a delay similar to the one
experienced in LTE networks (20 - 50 ms). An additional
random delay is introduced, with a generator based on a
mixture of two-parameters Weibull distributions, to emulate
the possible buffering and queueing delays. Furthermore, SNs
were interconnected with links experiencing higher delays,
from 100 to 300 ms. Figure 7 displays the most common
simulated scenario.
We have performed a series of simulations with the same
scenario and different Pf ailure targets in order to see if the
resulting Pf ailure matched the given objective. The next table
shows the obtained results:
Target
0.01
0.001
0.0001
Average
0.00902 0.00182 0.000449
Standard Deviation 0.00132 0.00102 0.000251
The simulations show that the results are satisfactory for
the first two targets, 0.01 and 0.001, and that the outcome
for the most constrained target, 0.0001, displays a difficulty
to match the demanded Pf ailure . For this last target, a failure
could be experienced because the calculated Tbuf f er was just
a few milliseconds too short. As no closed-form solution exists
for the calculated probabilities, the use of numerical methods
could result in a decrease of the precision of the procedure. A
mechanism that constrains the target during the calculation of
the Tbuf f er could be implemented to finally meet the Pf ailure
required by the administrator.
We observed that in the cases where the variance of the
delay is smaller or larger for the call idle time, the failure
probability decreased and was closer to the defined target.
VII.
C ONCLUSION
This paper presented a novel distributed floor control protocol tailored for large-delay hybrid LTE and satellite networks.
Users interact with a set of entities, named Super Nodes, that
Fig. 8.
R EFERENCES
[1]
H.-P. Dommel and J. Garcia-Luna-Aceves, Floor control for multimedia conferencing and collaboration, 1997.
[2]
[3]
Vodafone
foundation
instant
network,
http://www.vodafone.com/content/index/about/foundation/instantnetwork/vodafone-instantnetwork.html, accessed: 2014-07-08.
[4]
[5]
S. Banik, S. Radhakrishnan, V. Sarangan, and C. Sekharan, Implementation of distributed floor control protocols on overlay networks,
Parallel and Distributed Systems, IEEE Transactions on, vol. 19, no. 8,
pp. 10571070, 2008.
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
T1 +d1 +Tbuf f er t
(14)
P rob {T1 + d1 < T2 + d2 & T2 < T1 } =
P rob {T1 + d1 < & < T1 } =
Z T1 Z +
f (t)f (d)dd
0
T1 +d1 t
(15)
T1 +d1 t
(16)