SlideShare a Scribd company logo
الدهر يومان ذا أمن وذا خطر **   والعيش عيشان ذا صفو وذا كدر أما ترى البحر تعلو فوقه جيف **   وتستقربإقصى قاع ـــــــــ ه الدرر وفي السماء نجوم لاعداد لها   ** وليس يكسف إلا الشمس والقم ـ ر أخي لن تنال العلم إلا بستة  **  سأنبيك عن تفصيلها ببيان ذكاء وحرص وإجتهاد وبلغة   **   وصحبة أستاذ وطول زمان
Admission Control Handoff Amira Rezk Mervat Fahmy
Handoff Strategy
Mobile Computing A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link .
Mobile data communication Allows users to transmit data from remote locations to other remote or fixed locations .  It is a solution to the biggest problem of business people on the move  -  Mobility .
Cellular Network Architecture   consists of mobile units linked together to switching equipment, which interconnect the different parts of the network and allow access to the fixed Public Switched Telephone Network  ( PSTN (
Cellular Network Architecture Each cell has a number of channels associated with it .  These are assigned to subscribers on demand . When a Mobile Station  ( MS )  becomes 'active' it registers with the nearest BS .  The corresponding MSC stores the information about that MS and its position .  This information is used to direct incoming calls to the MS .
When a mobile user want to communicate with another user or a base station it must first obtain a channel from the base stations that hears it. If a channel is available, it is granted to the user else the  new call is blocked . Cellular Wireless Technology
Cellular Wireless Technology The user releases the channel under either of the following scenarios: The user complete the call The user moves to another cell before the call is completed ( Handoff )  while performance the handoff the mobile unit requires that the base station in the cell that it move into will allocate it a channel. If no channel available in the new cell, (the  handoff call blocked )
Handoff The process of reconfiguring the mobile host, wireless network and backbone wired network to support communication after a user enters a different cell of the wireless network. The objective of handoff   Is to maintain end-to-end connectivity in the dynamically reconfigured network topology.
Handoff During a handoff Assign a channel in the new cell. The route of data through the wired network to the MH must be updated to pass through this new BS.  Any state in the old BS associated with the MH must somehow be transferred to the new BS.
Problems with handoff High speed vehicles can cross many “small” cells in a short time. Umbrella cell.  Large cell with a powerful base station  to handle high speed vehicles Another problem is called cell dragging. Happens when the user moves slowly away from the cell and the base station didn’t recognize it due to strong average signal. Macrocells for fast movers Microcells for slow movers
Implementation Goals Minimize handoff latency Minimize frequency of handoff and its effects on QoS Minimize probability of dropping connections across handoffs Minimize “call blocking”/effects of admission control
Handling Handoffs Here, an important issue is to limit the probability of forced call termination. Therefore, the system must reduce the chances of unsuccessful handoffs by reserving some channels explicitly for handoff calls.  Handoff prioritizing schemes are channel assignment strategies that allocate channels to handoff requests more readily than new calls. Guard Channels Schemes Handoff Queuing Schemes New Call Queuing Schemes
Handoff prioritizing schemes Guard Channels Schemes Reserving a number of channels exclusively for handoffs in each cell. The remaining channels can be shared equally between handoffs and new calls.  Handoff Queuing Schemes In this scheme no new call is granted a channel before the handoff requests in the queue are served.  New Call Queuing Schemes The delay insensitivity of new calls makes it more feasible to queue new call attempts instead of handoff attempts.
Re-routing Connection Protocol •  Virtual connection trees •  User tracking •  Multicast routing The most important difference between the mobile and stationary user is that the routing of data to mobile users must be more dynamic. The route data takes in a network must change each time a mobile user moves between cells of a wireless network. There have been many past efforts to support wireless mobile data communication and re-routing connection such as:
Virtual Connection Trees The objective of the VC Tree approach is to reduce the number of router updates caused by handoffs. Virtual Connection Numbers: Defines a path between the root node of the tree and one of the base stations in the region.
Virtual Connection Trees
Virtual Connection Trees Have some weaknesses include : •  The virtual connection tree handoff is a long and expensive procedure.  •  The approach does not attempt to eliminate data loss. While the root node is being notified, the data is incorrectly routed and never forwarded. •  The approach has possible scaling problems. There is a single root node per region. However to reduce inter-region handoffs, regions must be made as large as possible. As a result, the root node must process a large number of routing updates as well as route a large amount data.
User tracking  (groups-based routing) This design introduces a three level hierarchy. This hierarchy consists of: Mobile Hosts (MH) Mobile Support Stations (MSS) Supervisor Hosts (SH)
User Tracking •  Connection Establishment –  MH S  to communicate with MH D ; Reflect request to MSS S  and SH S –  Assigns local VCN –  SH S  locates MH D  (VCN, ID of MH S , ID of MH D ) » Looks for MH D  within local subnet first (ACTIVE LOCAL) » If no response, broadcast locate request to other SHs; When located, assign local VCN, respond to SH S Connection status becomes ACTIVE REMOTE –  Connection is now established
Multicast routing There are three basic parts to the routing system : 1. Delivery to the home agent: 2.  Determine the physical location of the mobile host. 3.The delivery of packets from the home agent to the mobile host .
Do not Forget From the point of a mobile user forced termination of an ongoing call is less desirable than blocking a new call Need handoff mechanism that achieves very low latencies with little disruption in traffic at the receiver, and to do this with as little data loss as possible
Thanks
Call Admission Control in  Mobile Wireless Networks What? Why? and How? By Mervat M. Fahmy Mansoura University Faculty of Computer & Information Sciences Information Systems Dept.
The rapid development in wireless cellular communications dictates that the next generation of networks carry multimedia traffic: voice, video, images, or data, or combinations of them.  The QoS guarantee is an essential issue in wireless mobile networks supporting multimedia. One of the key elements in providing QoS guarantee is an effective  Call Admission Control  (CAC) policy. CAC…..what?
CAC…..what? Call admission control  is the process of making a decision  for new call admission according to the amount of available resources versus user’s QoS requirements and the effect upon the QoS of the existing calls imposed by new admission. CAC has to ensure that the network meets the QoS of newly arriving calls (if accepted) while guaranteeing that the QoS of existing calls does not deteriorate . .
CAC…..what? Admission control decision is made using a traffic descriptor that specifies traffic characteristics and QOS requirements Traffic characteristics: peak cell rate (PCR), sustained cell rate (SCR), maximum burst size (MBS),... QOS requirements: tolerable cell loss, cell delay, delay variation
Two more QoS requirements are considered for wireless networks: Graceful degradation of service:  reducing allocated bandwidth to the existing calls, Guarantee of seamless service:  providing connectivity on the move, based on the minimum requirement criteria provided by the user. CAC…..what?
CAC…..what? When a mobile moves across cells during its lifetime, dropping is caused by unavailability of the channels in the new cell. Dropping a call in progress has more negative impact from users’ perception than rejecting a newly requested call.  A key design goal is to minimize the  call dropping probability .  This leads to poor  channel utilization  due to admitting less new calls.
CAC…..what? The main challenge in the design of an efficient admission control scheme is to balance these two conflicting requirements.  The major performance parameters of interest are the  call dropping probability ,  channel utilization , and new  call blocking probability .
CAC…..what? Example (Uncontrolled TDMA Network)  Assumptions:   Number of channels per cell=20. The network consists of 3 cells. At instant (t 0 ), number of users N i (t 0 ) (i=1,2,3) is equal to (18, 17, 19) At instant (t 1 ), a new user arrived at cell 3. Then N i (t 2 ) will be (18, 17,20).
CAC…..what? At instant (t 2 ), one of the 17 active users in cell 2 is leaving cell 2 heading cell 3.  This user has to be handed over to cell 3,  but cell 3 is fully loaded. Result: This user will be rejected by cell 3 and the call will be dropped. Conclusion: Admitting the new user in cell 2 at instant (t 1 ) was not a good decision!
CAC…..why difficult? Typical traffic sources are bursty Some traffic sources are VERY bursty Traffic can be highly unpredictable Accurate traffic descriptors may not be known in advance Traffic may not conform to its descriptor
CAC…..how? CAC strategies can be categorized according to: Decision Level Distributed  Semi-Distributed Central. Information Level Local Semi-local Global
CAC…..how? -Less information -No comm. -Simple (Distributed , Local) -More BS-to-switch comm. -Most Complex -All information (Optimum) (Central , Global) -BS-to-switch comm. -More complex -More information (Sub-optimum) (Semi-distributed , Semi-local) -BS-to-BS comm. -More information (Sub-optimum) (Distributed , Semi-local) (Cooperative) Cons Pros (Decision , Information)
Static CAC Strategies Guard Channel Scheme (Trunk reservation):   Preferential treatment to the handoff calls. Reserves a fixed long-term number of guard channels exclusively for handoffs . Assumptions are needed for the call arrival processes, call lifetime, and channel holding time to calculate the number of guard channels. uses a threshold to decide whether to accept new call requests or not, the threshold is a maximum number of busy channels in each cell.
Static CAC Strategies Pros:   It is easy to decide whether to accept a new connection or not. Cons: Bandwidth underutilization
Dynamic (Statistical)CAC Strategies Shadow Cluster Scheme: Every mobile terminal with an active wireless connection exerts an influence upon the cells in the vicinity of its current location and along its direction of travel. The coverage of a shadow cluster for a given active mobile consists of the cell where the mobile is currently present (center of shadow cluster) and all its adjacent cells. The area moves as the mobile call is handed off to other cells, thus a shadow cluster needs to be implemented for every new call as well as for handoff call. Status information is exchanged among base stations upon each call arrival (new call and handoff).
Distributed call admission control (D-CAC):   Status information exchange is done periodically. Calculates the maximum number of calls that can be admitted to a given cell without violating the QoS of the existing calls in the cell and its adjacent cells. D-CAC determines the admission threshold (maximum number of admitted calls) for a cell to admit new calls during a CAC period  T  by considering the number of active calls in both the local and adjacent cells.  Dynamic CAC Strategies
Dynamic CAC Strategies This admission test is applied for newly requested connection in a cell:  Where  C  is the wireless link capacity,  B r  is the target reservation  bandwidth for hand­offs in the cell,  b i  is the bandwidth being used by an existing connection  i , and  b new   is the bandwidth required by the newly requested connection.  The approach is based on the estimated mobility during the time window [ t o  , t o  + T  ], where  t o  is the current time.  The mobility of an active mobile with connection  C 0,j  is estimated with  P h ( C 0,j      i ), the probability that  C 0,j  hands off into cell  i  within  T  .
The required bandwidth  to be reserved in cell  0  for the expected hand­offs from cell  i  is obtained as:    where  C i  is the set of indices of the connections in cell  i  and  b ( C i,j ) is connection  C i,j 's bandwidth.  The target reservation bandwidth  B r,0  in cell  0 , which is the aggregate bandwidth to be reserved in cell  0  for the expected hand­offs from adjacent cells within  T  , is calculated as:    where  A i  is the set of indices of cell  i 's neighbors.  Dynamic CAC Strategies
The admission test is given by:  For all  i  belonging to  A 0  (neighbors of cell  C 0 ), check if    Check if:  If all of the above tests are positive then the connection is admitted.  Dynamic CAC Strategies
Dynamic CAC Strategies Pros:   Bandwidth efficient utilization based on statistical information about call traffic characteristics. Cons: Difficulties in characterizing a call arrival process and lack of understanding as to how it is shaped. CAC Decisions must be made on the fly.
THANK YOU

More Related Content

PDF
Lec7 cellular network
PDF
An efficient model for reducing soft blocking probability in wireless cellula...
PDF
4 ijcse-01218
PDF
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
PDF
DYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORK
PDF
Vol 16 No 1 - January-June 2016
PDF
Wap based seamless roaming in urban environment with wise handoff technique
PPT
Channel assignment strategies
Lec7 cellular network
An efficient model for reducing soft blocking probability in wireless cellula...
4 ijcse-01218
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
DYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORK
Vol 16 No 1 - January-June 2016
Wap based seamless roaming in urban environment with wise handoff technique
Channel assignment strategies

What's hot (20)

PDF
Research Inventy : International Journal of Engineering and Science
PDF
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
PDF
Improved handoff mechanism for infiltrating user equipments in composite netw...
PDF
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
PDF
05 handover
PDF
Umts services
PDF
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
PPTX
PDF
Reduce the probability of blocking for handoff and calls in cellular systems ...
PDF
Reducing handoff delay by adaptive threshold
PDF
PDF
B04502005008
PDF
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...
PDF
DISCRETE COSINETRANSFORM-II FOR REDUCTION IN PEAK TO AVERAGE POWER RATIO OF O...
PDF
Hp3414121418
PDF
EFFICIENT BROADCASTING MECHANISMS FOR DATA DISSEMINATION IN VEHICULAR AD HOC ...
PDF
01 01 bss signaling fundamental
PDF
MATLAB Implementation of Multiuser Code Division Multiple Access
PDF
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Research Inventy : International Journal of Engineering and Science
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
Improved handoff mechanism for infiltrating user equipments in composite netw...
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
05 handover
Umts services
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
Reduce the probability of blocking for handoff and calls in cellular systems ...
Reducing handoff delay by adaptive threshold
B04502005008
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...
DISCRETE COSINETRANSFORM-II FOR REDUCTION IN PEAK TO AVERAGE POWER RATIO OF O...
Hp3414121418
EFFICIENT BROADCASTING MECHANISMS FOR DATA DISSEMINATION IN VEHICULAR AD HOC ...
01 01 bss signaling fundamental
MATLAB Implementation of Multiuser Code Division Multiple Access
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Ad

Viewers also liked (7)

PPT
Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...
PPTX
Internet Domain Names
PDF
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
PPTX
IP address and Domain name
PPTX
Networking
PPT
Cellphone based home automation
PPTX
Internet protocol (ip) ppt
Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...
Internet Domain Names
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
IP address and Domain name
Networking
Cellphone based home automation
Internet protocol (ip) ppt
Ad

Similar to Call Admission Control In Mobile Wireless Networks (20)

PDF
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
PDF
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
PDF
Call for Papers -International Journal of Wireless & Mobile Networks (IJWMN)
PDF
The Effect of Accepted Handoff Signal Quality on the Queued Combined Guard Ch...
PDF
THE EFFECT OF ACCEPTED HANDOFF SIGNAL QUALITY ON THE QUEUED COMBINED GUARD ...
PPTX
Pertemuan Ke-11- Wireless Mobile Computing - Konsep Jaringan Seluler.pptx
PDF
Ijeet 06 08_006
PPTX
Lecture 2 Chapter 2- Mobile Communication.pptx
PDF
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
PPTX
QOS oriented vho scheme for wifi and wimax overlay networks
PDF
Handoff in cellular systems
PPT
cellular wireless networks
PDF
Simulation of handoff performance using matlab
PDF
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
PDF
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...
PPT
PDF
29 88-96
PPT
basic-celluar-systefhurdhguudhugudhguugudghum.ppt
PPT
Basic celluar-system
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
Call for Papers -International Journal of Wireless & Mobile Networks (IJWMN)
The Effect of Accepted Handoff Signal Quality on the Queued Combined Guard Ch...
THE EFFECT OF ACCEPTED HANDOFF SIGNAL QUALITY ON THE QUEUED COMBINED GUARD ...
Pertemuan Ke-11- Wireless Mobile Computing - Konsep Jaringan Seluler.pptx
Ijeet 06 08_006
Lecture 2 Chapter 2- Mobile Communication.pptx
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
QOS oriented vho scheme for wifi and wimax overlay networks
Handoff in cellular systems
cellular wireless networks
Simulation of handoff performance using matlab
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...
29 88-96
basic-celluar-systefhurdhguudhugudhguugudghum.ppt
Basic celluar-system

Recently uploaded (20)

PPTX
Probability Distribution, binomial distribution, poisson distribution
PPTX
HR Introduction Slide (1).pptx on hr intro
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
Training And Development of Employee .pdf
PDF
IFRS Notes in your pocket for study all the time
PPT
Data mining for business intelligence ch04 sharda
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Business model innovation report 2022.pdf
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
How to Get Funding for Your Trucking Business
PDF
Unit 1 Cost Accounting - Cost sheet
PPT
Chapter four Project-Preparation material
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PPTX
Amazon (Business Studies) management studies
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
DOCX
Euro SEO Services 1st 3 General Updates.docx
Probability Distribution, binomial distribution, poisson distribution
HR Introduction Slide (1).pptx on hr intro
Lecture (1)-Introduction.pptx business communication
Training And Development of Employee .pdf
IFRS Notes in your pocket for study all the time
Data mining for business intelligence ch04 sharda
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Roadmap Map-digital Banking feature MB,IB,AB
ICG2025_ICG 6th steering committee 30-8-24.pptx
Business model innovation report 2022.pdf
Reconciliation AND MEMORANDUM RECONCILATION
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
How to Get Funding for Your Trucking Business
Unit 1 Cost Accounting - Cost sheet
Chapter four Project-Preparation material
DOC-20250806-WA0002._20250806_112011_0000.pdf
Amazon (Business Studies) management studies
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Euro SEO Services 1st 3 General Updates.docx

Call Admission Control In Mobile Wireless Networks

  • 1. الدهر يومان ذا أمن وذا خطر ** والعيش عيشان ذا صفو وذا كدر أما ترى البحر تعلو فوقه جيف ** وتستقربإقصى قاع ـــــــــ ه الدرر وفي السماء نجوم لاعداد لها ** وليس يكسف إلا الشمس والقم ـ ر أخي لن تنال العلم إلا بستة ** سأنبيك عن تفصيلها ببيان ذكاء وحرص وإجتهاد وبلغة ** وصحبة أستاذ وطول زمان
  • 2. Admission Control Handoff Amira Rezk Mervat Fahmy
  • 4. Mobile Computing A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link .
  • 5. Mobile data communication Allows users to transmit data from remote locations to other remote or fixed locations . It is a solution to the biggest problem of business people on the move - Mobility .
  • 6. Cellular Network Architecture consists of mobile units linked together to switching equipment, which interconnect the different parts of the network and allow access to the fixed Public Switched Telephone Network ( PSTN (
  • 7. Cellular Network Architecture Each cell has a number of channels associated with it . These are assigned to subscribers on demand . When a Mobile Station ( MS ) becomes 'active' it registers with the nearest BS . The corresponding MSC stores the information about that MS and its position . This information is used to direct incoming calls to the MS .
  • 8. When a mobile user want to communicate with another user or a base station it must first obtain a channel from the base stations that hears it. If a channel is available, it is granted to the user else the new call is blocked . Cellular Wireless Technology
  • 9. Cellular Wireless Technology The user releases the channel under either of the following scenarios: The user complete the call The user moves to another cell before the call is completed ( Handoff ) while performance the handoff the mobile unit requires that the base station in the cell that it move into will allocate it a channel. If no channel available in the new cell, (the handoff call blocked )
  • 10. Handoff The process of reconfiguring the mobile host, wireless network and backbone wired network to support communication after a user enters a different cell of the wireless network. The objective of handoff Is to maintain end-to-end connectivity in the dynamically reconfigured network topology.
  • 11. Handoff During a handoff Assign a channel in the new cell. The route of data through the wired network to the MH must be updated to pass through this new BS. Any state in the old BS associated with the MH must somehow be transferred to the new BS.
  • 12. Problems with handoff High speed vehicles can cross many “small” cells in a short time. Umbrella cell. Large cell with a powerful base station to handle high speed vehicles Another problem is called cell dragging. Happens when the user moves slowly away from the cell and the base station didn’t recognize it due to strong average signal. Macrocells for fast movers Microcells for slow movers
  • 13. Implementation Goals Minimize handoff latency Minimize frequency of handoff and its effects on QoS Minimize probability of dropping connections across handoffs Minimize “call blocking”/effects of admission control
  • 14. Handling Handoffs Here, an important issue is to limit the probability of forced call termination. Therefore, the system must reduce the chances of unsuccessful handoffs by reserving some channels explicitly for handoff calls. Handoff prioritizing schemes are channel assignment strategies that allocate channels to handoff requests more readily than new calls. Guard Channels Schemes Handoff Queuing Schemes New Call Queuing Schemes
  • 15. Handoff prioritizing schemes Guard Channels Schemes Reserving a number of channels exclusively for handoffs in each cell. The remaining channels can be shared equally between handoffs and new calls. Handoff Queuing Schemes In this scheme no new call is granted a channel before the handoff requests in the queue are served. New Call Queuing Schemes The delay insensitivity of new calls makes it more feasible to queue new call attempts instead of handoff attempts.
  • 16. Re-routing Connection Protocol • Virtual connection trees • User tracking • Multicast routing The most important difference between the mobile and stationary user is that the routing of data to mobile users must be more dynamic. The route data takes in a network must change each time a mobile user moves between cells of a wireless network. There have been many past efforts to support wireless mobile data communication and re-routing connection such as:
  • 17. Virtual Connection Trees The objective of the VC Tree approach is to reduce the number of router updates caused by handoffs. Virtual Connection Numbers: Defines a path between the root node of the tree and one of the base stations in the region.
  • 19. Virtual Connection Trees Have some weaknesses include : • The virtual connection tree handoff is a long and expensive procedure. • The approach does not attempt to eliminate data loss. While the root node is being notified, the data is incorrectly routed and never forwarded. • The approach has possible scaling problems. There is a single root node per region. However to reduce inter-region handoffs, regions must be made as large as possible. As a result, the root node must process a large number of routing updates as well as route a large amount data.
  • 20. User tracking (groups-based routing) This design introduces a three level hierarchy. This hierarchy consists of: Mobile Hosts (MH) Mobile Support Stations (MSS) Supervisor Hosts (SH)
  • 21. User Tracking • Connection Establishment – MH S to communicate with MH D ; Reflect request to MSS S and SH S – Assigns local VCN – SH S locates MH D (VCN, ID of MH S , ID of MH D ) » Looks for MH D within local subnet first (ACTIVE LOCAL) » If no response, broadcast locate request to other SHs; When located, assign local VCN, respond to SH S Connection status becomes ACTIVE REMOTE – Connection is now established
  • 22. Multicast routing There are three basic parts to the routing system : 1. Delivery to the home agent: 2. Determine the physical location of the mobile host. 3.The delivery of packets from the home agent to the mobile host .
  • 23. Do not Forget From the point of a mobile user forced termination of an ongoing call is less desirable than blocking a new call Need handoff mechanism that achieves very low latencies with little disruption in traffic at the receiver, and to do this with as little data loss as possible
  • 25. Call Admission Control in Mobile Wireless Networks What? Why? and How? By Mervat M. Fahmy Mansoura University Faculty of Computer & Information Sciences Information Systems Dept.
  • 26. The rapid development in wireless cellular communications dictates that the next generation of networks carry multimedia traffic: voice, video, images, or data, or combinations of them. The QoS guarantee is an essential issue in wireless mobile networks supporting multimedia. One of the key elements in providing QoS guarantee is an effective Call Admission Control (CAC) policy. CAC…..what?
  • 27. CAC…..what? Call admission control is the process of making a decision for new call admission according to the amount of available resources versus user’s QoS requirements and the effect upon the QoS of the existing calls imposed by new admission. CAC has to ensure that the network meets the QoS of newly arriving calls (if accepted) while guaranteeing that the QoS of existing calls does not deteriorate . .
  • 28. CAC…..what? Admission control decision is made using a traffic descriptor that specifies traffic characteristics and QOS requirements Traffic characteristics: peak cell rate (PCR), sustained cell rate (SCR), maximum burst size (MBS),... QOS requirements: tolerable cell loss, cell delay, delay variation
  • 29. Two more QoS requirements are considered for wireless networks: Graceful degradation of service: reducing allocated bandwidth to the existing calls, Guarantee of seamless service: providing connectivity on the move, based on the minimum requirement criteria provided by the user. CAC…..what?
  • 30. CAC…..what? When a mobile moves across cells during its lifetime, dropping is caused by unavailability of the channels in the new cell. Dropping a call in progress has more negative impact from users’ perception than rejecting a newly requested call. A key design goal is to minimize the call dropping probability . This leads to poor channel utilization due to admitting less new calls.
  • 31. CAC…..what? The main challenge in the design of an efficient admission control scheme is to balance these two conflicting requirements. The major performance parameters of interest are the call dropping probability , channel utilization , and new call blocking probability .
  • 32. CAC…..what? Example (Uncontrolled TDMA Network) Assumptions: Number of channels per cell=20. The network consists of 3 cells. At instant (t 0 ), number of users N i (t 0 ) (i=1,2,3) is equal to (18, 17, 19) At instant (t 1 ), a new user arrived at cell 3. Then N i (t 2 ) will be (18, 17,20).
  • 33. CAC…..what? At instant (t 2 ), one of the 17 active users in cell 2 is leaving cell 2 heading cell 3. This user has to be handed over to cell 3, but cell 3 is fully loaded. Result: This user will be rejected by cell 3 and the call will be dropped. Conclusion: Admitting the new user in cell 2 at instant (t 1 ) was not a good decision!
  • 34. CAC…..why difficult? Typical traffic sources are bursty Some traffic sources are VERY bursty Traffic can be highly unpredictable Accurate traffic descriptors may not be known in advance Traffic may not conform to its descriptor
  • 35. CAC…..how? CAC strategies can be categorized according to: Decision Level Distributed Semi-Distributed Central. Information Level Local Semi-local Global
  • 36. CAC…..how? -Less information -No comm. -Simple (Distributed , Local) -More BS-to-switch comm. -Most Complex -All information (Optimum) (Central , Global) -BS-to-switch comm. -More complex -More information (Sub-optimum) (Semi-distributed , Semi-local) -BS-to-BS comm. -More information (Sub-optimum) (Distributed , Semi-local) (Cooperative) Cons Pros (Decision , Information)
  • 37. Static CAC Strategies Guard Channel Scheme (Trunk reservation): Preferential treatment to the handoff calls. Reserves a fixed long-term number of guard channels exclusively for handoffs . Assumptions are needed for the call arrival processes, call lifetime, and channel holding time to calculate the number of guard channels. uses a threshold to decide whether to accept new call requests or not, the threshold is a maximum number of busy channels in each cell.
  • 38. Static CAC Strategies Pros: It is easy to decide whether to accept a new connection or not. Cons: Bandwidth underutilization
  • 39. Dynamic (Statistical)CAC Strategies Shadow Cluster Scheme: Every mobile terminal with an active wireless connection exerts an influence upon the cells in the vicinity of its current location and along its direction of travel. The coverage of a shadow cluster for a given active mobile consists of the cell where the mobile is currently present (center of shadow cluster) and all its adjacent cells. The area moves as the mobile call is handed off to other cells, thus a shadow cluster needs to be implemented for every new call as well as for handoff call. Status information is exchanged among base stations upon each call arrival (new call and handoff).
  • 40. Distributed call admission control (D-CAC): Status information exchange is done periodically. Calculates the maximum number of calls that can be admitted to a given cell without violating the QoS of the existing calls in the cell and its adjacent cells. D-CAC determines the admission threshold (maximum number of admitted calls) for a cell to admit new calls during a CAC period T by considering the number of active calls in both the local and adjacent cells. Dynamic CAC Strategies
  • 41. Dynamic CAC Strategies This admission test is applied for newly requested connection in a cell: Where C is the wireless link capacity, B r is the target reservation bandwidth for hand­offs in the cell, b i is the bandwidth being used by an existing connection i , and b new is the bandwidth required by the newly requested connection. The approach is based on the estimated mobility during the time window [ t o , t o + T ], where t o is the current time. The mobility of an active mobile with connection C 0,j is estimated with P h ( C 0,j  i ), the probability that C 0,j hands off into cell i within T .
  • 42. The required bandwidth to be reserved in cell 0 for the expected hand­offs from cell i is obtained as:   where C i is the set of indices of the connections in cell i and b ( C i,j ) is connection C i,j 's bandwidth. The target reservation bandwidth B r,0 in cell 0 , which is the aggregate bandwidth to be reserved in cell 0 for the expected hand­offs from adjacent cells within T , is calculated as:   where A i is the set of indices of cell i 's neighbors. Dynamic CAC Strategies
  • 43. The admission test is given by: For all i belonging to A 0 (neighbors of cell C 0 ), check if   Check if: If all of the above tests are positive then the connection is admitted. Dynamic CAC Strategies
  • 44. Dynamic CAC Strategies Pros: Bandwidth efficient utilization based on statistical information about call traffic characteristics. Cons: Difficulties in characterizing a call arrival process and lack of understanding as to how it is shaped. CAC Decisions must be made on the fly.