SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 4, August 2020, pp. 4189∼4207
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i4.pp4189-4207 Ì 4189
A NURBS-optimized dRRM solution in a mono-channel
condition for IEEE 802.11 entreprise Wlan networks
Mehdi Guessous, Lahbib Zenkouar
Department of Electrical Engineering, Mohammadia School of Engineers, Mohammed V University, Morocco
Article Info
Article history:
Received Aug 6, 2019
Revised Feb 4, 2020
Accepted Feb 24, 2020
Keywords:
Co-channel interference
Dynamic RRM
IEEE 802.11
NURBS surface
Wlan
ABSTRACT
Dynamic Radio Resource Management, RRM, is an essential design block in the
functional architecture of any Wifi controller in IEEE 802.11 indoor dense enterprise
Wlans. In a mono-channel condition, it helps tackle co-channel interference problem
and enrich end-to-end Wifi clients experience. In this work, we present our dRRM
solution: WLCx, and demonstrate its performance over related-work and vendor ap-
proaches. Our solution is built on a novel and realistic per-Beam coverage repre-
sentation approach. Unlike the other RRM solutions, WLCx is dynamic: even the
calculation system parameters are processed. This processing comes at price in terms
of processing time. To overcome this limitation, we constructed and implemented
a NURBS surface-based optimization to our RRM solution. Our NURBS optimized
WLCx, N-WLCx, solution achieves almost 92.58% time reduction in comparison with
basic WLCx. Furthermore, our optimization could easily be extended to enhance oth-
ers, vendors and research, RRM solutions.
Copyright © 2020 Insitute of Advanced Engineeering and Science.
All rights reserved.
Corresponding Author:
Mehdi Guessous,
Department of Electrical Engineering,
Mohammadia School of Engineers,
Mohammed V University, Rabat, Morocco.
Email: mehdiguessous@research.emi.ac.ma
1. INTRODUCTION
The Wifi controller is the central component of a Wlan enterprise network architecture. All network
access points get their radio configuration from this controller especially, what radio/canal to use, and at what
transmit power. The controller plays another important role in Wlan integration to other parts of the enterprise
network: Lan, Local Area Network, Wan, Wide Area Network, and Dcn, Datacenter Network, where application
servers are located. By looking closely at the controller functional architecture, it is RRM block that processes
the radio plan. RRM controls access points transmit parameters such as to minimize interference and optimize
the spectrum utilization. But how does RRM decide on what channel to be used by an access point? and at
what transmit power? To build an efficient radio plan that maximizes the network capacity, the controller needs
data from access points, Wifi clients, wired network devices, and servers. This data pertains to the quality of the
radio interface and client overall experience when accessing to services. But this information is not sufficient
to hint on the whole coverage quality, such as the interference, at any point of the coverage area; it is limited to
some coverage points where access points and clients are located. To overcome this limitation, either we place
sensors everywhere, which is not economically feasible in an enterprise network, or model the coverage area.
The Vendors do coverage modelization in a lab context to provide strict recommendations that customers should
follow to build their networks. This approach works in common situations but, it requires a lot of engineering
effort and monitoring to maintain the network at an optimal condition. In some situations, it may just not work
or false the transmit opportunity estimation. For the rest of this work, this approach is referenced as static RRM,
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
4190 Ì ISSN: 2088-8708
or sRRM. The third alternative is to allow the controller to do more real-time complex processing, without
any or very few preconfigured settings, to find out the optimum RRM configuration to apply network-wide.
This approach is the focus of this study and will be referenced as dynamic RRM, or dRRM.
A controller, that supports dRRM, does not rely on any preconfigured settings, in hardware
or software, to decide on how to modify the radio plan to meet the function utility. In dRRM, even the system
parameters are processed to optimize the network capacity which is different from sRRM. But the advantage of
dRRM comes at a high price in terms of time and system resources consumption to process the whole network
coverage and adaptation to changes. The aim of this study is to reduce the required processing time of dRRM
as it is descrided in this work [1].
In this work, we present our dRRM optimization solution algorithm: N-WLCx, that is based on
concepts generally encountered in the context of CAGD, Computer Aided Graphical Design, field: B´ezier
curves and NURBS sufaces. Our solution approach is built on a novel and realistic per-Beam coverage
representation that is different from research models: per-Range and per-Zone. In theses works [1, 2],
we detail our coverage representation approach and demonstrate how it generalizes the other common and
advanced literature approaches. In this study, we show that our optimization achieves a 92.58% time
reduction by processing only 6.5% of available coverage points in average. This result is more significant
than the 79.99% time reduction we achieved in this work [3] and its extension [4]. In Section 2., we present
how related work, researchers and vendors, process RRM. In Section 3., we present our dRRM solution and
compare it to vendors’ solution in processing the radio coverage. Before the problem statement, in Section
5., and the presentation of our solution, in Section 6., we introduce, in Section 4., some important facts about
Wlan network design, coverage representation models and NURBS surfaces. Section 7. is dedicated to the
simulation and evaluation of our optimization. In the conclusion, we recall our achievements and further our
work. This paper is an extension of the work originally presented in the 2017 15th
International Conference
on Wired/Wireless Internet Communications (IFIP WWIC) [5]. In this extended version, and in addition to the
original version, we evaluate deeply our solution results in terms of processing time and the accuracy of results,
visually and statistically. We explore also, the effect of modifying the number of control points in a very large
coverage area. We enhance significantly the NTO-CP algorithm Part2 procedure and clarify the purpose of the
coverage area zoning.
2. DRRM RELATED WORK
In this section we discuss RRM approaches from research and vendors leader of the Wifi market such
as: Cisco, Aruba-HPE, that pertain to enterprise Wlan networks. We’re interested in algorithms that modify
the transmit power of APs in order to maximize the network capacity or optimize radio resources utilization.
An algorithm is different from another when the used variables are different. In this preliminary work,
we discuss a mono channel condition.
2.1. In research
The first category of approaches concentrate on lower-layer constraints: co-channel interference,
physical interface and MAC performance. The authors in these works [6–8], modeled the coverage area
per-range: transmit, interference, and not-talk ranges, using a circular or disk pattern. The way this model
represents the coverage is common but may not hint on some opportunities to transmit as discussed in this
work [2]. The author in this work [9], focused instead on the interaction that an AP may have with its neighbor-
ing AP. The result is a per-zone, Voronoi zone, negotiated coverage pattern. This model is difficult to put into
practice technologically and economically as it was discussed in [1, 2]. Both models: per-zone and per-range,
do not take upper layer constraints into account.
Another set of similar works tackle the issue from a power saving perspective. The authors in [10]
build their on-demand Wlan approach on the observation of idle APs that have no clients associated to.
The Wlan controller manages the activation or not of an AP. In this work [11], the authors build a radio
environment map to allocate dynamically the spectrum among stations. This map considers the stations
location and power models to minimize the outage probability and reduce service blocking to users.
A third category of approaches tackle the issue from an upper-layer perspective for applications such
as: FTP, HTTP. This work [12], as an example, presented an interesting idea to find out a suitable power,
or RRM, scheme, that may optimize the application performance. It is a per-experience approach that requires
a huge amount of data, to be put into practice. And, it is very dependent on the coexistent applications behavior.
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4191
Another challenge, is to be able to determine when physical layer is responsible of the observed performance.
Works like [13] use concepts from Game theory, that is a powerful tool, to model the interactions between APs.
These concepts are applied to the user perception of the QoS it receives. The same limitation of the previously
cited work applies to this one also.
A fourth category tackles the problem from an inter-protocol cooperation point of view like in this
example [14]. Making the protocols aware of each other is a good strategy to find an optimum inter-protocol
negotiated power scheme that optimizes the performance of each of them individually. It’s an idealistic scheme,
difficult to put into practice technologically and economically, with regards to vendors offering. Let’s imagine
the integration of a Wifi and Bluetooth network. The impact of a Wifi AP on Bluetooth network is very
important but not the opposite. Then, as an example, it is necessary to find out a way to provide the network
controller (for both Wifi and Bluetooth) with feedback so it can adjust Wifi power scheme to allow a Bluetooth
optimum operation. This would require important data transfers (and power) from the Bluetooth network to
the controller which is very difficult, by design of Bluetooth devices, to implement.
A fifth cateroy of approaches such as [15–19] concentrate on the environmental variables that may
affect the phenomena under study. In this work [15], the RRM policy is issued by a learner repeatedly to train
the general RRM model. In [19], the authors apply deep learning principales to the the stations power scheme.
The outcome of these methods depend heavily on the quality of the training step.
2.2. Vendor solutions
The approach or theoretical background, behind the vendor implementations, is hidden in general for
commercial purposes, only the settings (recommendations) are provided by those vendors. Cisco TPC, Trans-
mit Power Control, algorithm, that is a part of Cisco RRM, processes, at each AP, the desired transmit power
hysteresis, TxHysteresis,Current, that is equal to the sum of the current transmit power (initially at maximum),
TxCurrent, and the difference between the power threshold, TxT hresh, and RSSI3rd
, the third neighbor re-
ported RSSI. If the difference between the processed power and the current one, TxHysteresisT hresh, is at least
6dBm, then the current power must be reduced by 3db (by half). We should then wait for 10 minutes before
re-attempting another calculation. Details about this implementation are given in [20].
Aruba-HPE adopts another strategy. The ARM, Adaptive Radio Management, algorithm maintains
two measures for every channel : a coverage index, covidx, and an interference index, iferidx. The decision of
increasing or decreasing the transmit power level on a given channel is based on the processed coverage index as
compared to the “ideal” coverage index, noted covidx,ideal, and “acceptable” coverage index, covidx,acceptable,
for instance. As a general rule, the current coverage index should be greater than covidx,acceptable and equiv-
alent to covidx,ideal. Coverage index, covidx, corresponds to the sum of two variables : x and y. x is the
weighted average of all other APs SNR as being measured by the current AP. y is the weighted average of the
processed x variables by other APs from the same vendor and on the same channel. The same thing applies to
iferidx processing. Details of this calculation are in [21].
Fortinet Auto Power that is a part of ARRP, Automatic Radio Resource Provisioning, solution, works
by reducing automatically the transmit power if the transmit channel is not clear. From the corresponding
documentation [22], it is an alternative to manually limiting the number of neighbors per channel (less than 20)
by adjusting the transmit power level.
3. OUR WLCX DRRM SOLUTION
Our WLCx dynamic RRM solution is based on the per-Beam coverage representation we discuss in
the upcoming section. Our solution is ”dynamic” because even the parameters values change, especially, the
optimum number of supported direction per AP in the case of WLC2 variant. The workflow in Figure 1,
describes how our solution works.
Our solution runs three algorithms: TDD (Discovery), TDM (Map) and TDO (Opportunity). After
initialization, TDD optimizes the number of supported directions per AP by reducing the power level and
doubling the initial number of direction until all neighbors are discovered and at almost one neighbor is
discovered per AP direction. Based on information from TDD, TDM categorizes the coverage area points
into categories that hints on how these points appear on APs directions. Each category is assigned a cost to hint
on its probability to get a fair transmit opportunity. TDO aim is to process each coverage area point opportunity
to transmit, taking into account data from TDM and SLA (upper-layer input).
A NURBS-optimized dRRM solution in... (Mehdi Guessous)
4192 Ì ISSN: 2088-8708
Figure 1. WLCx dRRM solution workflow
We simulate, using Matlab 2019a, two variants of our WLCx solution : WLC1 and WLC2. In WLC1,
all APs share the same optimal number of supported directions and transmit at the same power level. In WLC2,
APs process the same optimal number of supported directions but may use different transmit power level per
AP. In the same simulation, we compare both WLCx variants to vendor implementation : Cisco. We evaluate
models based on their performance at processing the coverage and time this processing takes.
The coverage processing performance, Pr(), of a given model, m, is calculated in (1). I(), H()
and O() are the model processed interference, number of coverage holes and transmit opportunity, repectively.
Pr(m) = K1
ΣI
I(m) + 1
+ K2
ΣH
H(m) + 1
+ K3
O(m)
ΣO
(1)
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4193
The performance calculation in (1), is the weighted sum of relative interference, opportunity and coverage holes
in each model. The weights K1, K2 and K3, hints on how important is processing of interference, opportunity
or holes, to the performance of a given model. For the rest of our study, we consider that all variables are of
equal importance then, K1 = K2 = K3 = 1.
The diagram in Figure 2, shows the performance of models after 10 iterations of the same simulation.
Each simulation corresponds to a random distribution of a set of 30 APs and 100 WDs. We check that our
WLC2 solution variant performs better than Cisco and WLC1. Cisco model performance is comparable to
WLC1. The processing time of models is represented in Figure 3. The models have a comparable processing
time for a large number of the same simulation iterations. In work [2], we discuss our WLC2 dRRM solution.
For further details about our solution, refer to [1] work that is an extension of the previous one.
Figure 2. Performance of models after 10 simulations of the network of 30 APs and 100 WDs
Figure 3. Processing time of models after 10 simulations of the network of 30 APs and 100 WDs
4. THEORETICAL BACKGROUND
Before we dive into the description of the problem, let’s recall some facts about Wlan enterprise
network architecture design, the importance of coverage representation for radio planning, and NURBS
surfaces concepts that are the foundation of our NURBS optimized WLCx dRRM solution.
4.1. Wlan Enterprise networks
In a standalone AP-based Wifi architecture, the network capacity do not scale with dense, important
number of Wifi clients and APs, frequently changing radio environments. To optimize the network capacity,
some kind of coordination and control, distributed or centralized, is needed. In UWA, Unified Wifi Architecture,
A NURBS-optimized dRRM solution in... (Mehdi Guessous)
4194 Ì ISSN: 2088-8708
a WLC, Wireless LAN Controller, acts as a repository of APs intelligence, runs routines to plan radio usage,
provides an interface to wired network, etc. and guarantees conformance to policies: QoS and Security, domain-
wide, including LAN, MAN, WAN, and DCN, network parts. A typical enterprise Wlan architecture is given
in Figure 4. Two market leading implementations of such WLCs are the Cisco 8540 Wireless Controller and
the Aruba 7280 Mobility Controller. The rest of our study focuses on Cisco implementation.
Figure 4. An example of a Wlan architecture
In Figure 4, APs are located nearest to Wifi clients, WDs. All APs are connected to the LAN and are
associated, via VPNs, Virtual Private Networks, or tunnels, to the controller, WLC, located at the Datacenter, in
a Hub and Spoke architecture. Depending on the network size and requirements, the controller may be located
at the same location as APs. To build an association, an AP should be able to join the controller, via MAN,
WAN or internet. After AP’s successful association to the controller, WDs start their association process, that
includes authentication, to Wlan. After the successful association, WDs are able to access network resources
behind the controller or in some configurations, behind APs (FlexConnect or Local Switched mode).
WLC receives information about the network from three sources : the wired path toward the
datacenter, the radio interface counters of each associated AP, and OTA, Over-The-Air, AP to AP wireless
messages over a dedicated low speed radio. In the case of Cisco, two protocols are available for the purpose of
exchanging data between APs, and between APs and WLC:
(a) CAPWAP: stands for Control and Provisioning of Wireless Access Points, is used by APs to build
a protocol association to the RF group leader WLC and for control and data exchange.
(b) NDP: is the Neighbor Discovery Protocol, it allows APs to send Over-The-Air (OTA) messages and
exchange standard and some proprietary control and management information.
In addition to these protocols, Cisco APs embark a set of on-chip features such as : CLIENTLINK
and CLEANAIR. CLEANAIR enables the APs to measure real-time radio characteristics and send them to the
controller via the already established CAPWAP tunnels. Cisco appliances such as Cisco Prime Infrastructure
(CPI) and Mobility Services Engine (MSE), shown in Figure 4, extend the capability of this feature to process
analytics on Wifi client presence, interfering devices management and heatmaps processing. CLIENTLINK
version 4.0, is the Cisco at AP-level implementation of MU-MIMO IEEE 802.11ac beamforming. It works
independently of CLEANAIR after the assessment of the quality of the channel. In this scheme, an AP sends
a special sounding signal to all its associated WDs which report, back to this AP, their signal measurement.
Based on these feedbacks, the AP, and not the controller, decides on how much steering toward a specific WD
is needed to optimize the energy radiation.
4.2. Coverage representation and processing
We categorize related-work’s coverage representation models into three categories: Range-based,
Zone-based and Beam-based. In the upcoming subsections, we describe each of them and discuss their limi-
tations. In Range-based category of models, it is common to represent an AP’s wireless coverage such as :
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4195
a transmission, interference or no-talk range. These ranges processing is based on the estimation of the
distance between the AP and a receiving point P (AP or WD). Further, this category of coverage represen-
tation models, consider that an AP’s coverage pattern is omnidirectional, with the geometric shape of a circle
or a disk, centered at the AP, like in Figure 5. In this scheme, the interference, for example, at any given point
is approximated by the weighted intersection of all interfering devices patterns at this point.
Figure 5. A per-Range model coverage pattern
In Zone-based category of models, an AP coverage is not only function of its transmission charac-
teristics: channel, power level, etc., but depend also on the neighboring APs. The result of this, is that the
transmission shape is no more a solid circle but a convex polygon with straight sides. Each straight side
defines a borderline that separate two neighboring APs’ transmission ranges. The more an AP transmit power
is strong, the more the borderline with its neighboring APs is far. Further, it is important to note that a point
in a transmission zone of one AP could not be in another AP’s transmission zone. An example of Zone-based
AP’s wireless coverage is represented in Figure 6. In this scheme, the interference caused by the transmission
ranges in the previous model, is totally cancelled. Only interference caused by other ranges : interference, and
no-talk is still present.
Figure 6. A per-Zone model coverage pattern
A NURBS-optimized dRRM solution in... (Mehdi Guessous)
4196 Ì ISSN: 2088-8708
The previous two models: Range and Zone-based, come with these limitations:
(a) Both models are limited to consider that the strength of interference is only inversely proportional to the
distance (or quadratic) of an AP from interfering neighbors,
(b) Both models would interpret an increase in a transmission power level as an expanded reach in all
directions: uniformly in case of Range-based models but depending on neighboring APs in the case
of Zone-based ones,
(c) A point could not be in two transmission ranges of two different APs at the same time in Zone-based
models,
(d) Both models would interpret falsely obstacles to the signal propagation, as a weaker signal from an AP
in the context of indoor Wlans does not mean necessarily that this AP is out of reach,
(e) Alternatively, a stronger signal from an AP does not mean necessarily that this AP is at reach: it may be
guided or boosted under some conditions.
The consequences of these limitations, the adoption of a Range or Zone-based like representation model of
coverage, and regardless of the RRM solution that is built upon, is to false our transmit opportunity processing
and misinterpret some phenomenons encountered in the specific context of indoor enterprise Wlans.
To overcome the limitations of the previous models, our Beam-based coverage representation, defines
for each AP a number of directions over which it may transmit. Depending on the number of directions, their
order and transmit power levels, an AP may be able to mimic a Range or Zone-based scheme. The Figure 7,
shows a per-Beam coverage pattern example. In this pattern, the APs have an equal number of directions, equal
to eight, that are uniformly distributed and of equivalent transmit power. In works [2, 1], we discussed in detail
how per-Zone and per-Range representation models are generalized to per-Beam representation and how our
representation model could solve previous models limitations such as : per direction transmit power control,
hole coverage reduction, obstacle detection, client localization and transmit opportunities maximization.
Figure 7. A per-Beam model coverage pattern
4.3. NURBS surfaces
The processing of coverage may induce huge time and system resources consumption. In this work,
we propose an approach to alleviate this processing using NURBS surfaces, that are a generalization of B´ezier
curves and B-Splines surfaces. For complete details about these concepts, please refer to this book [23].
A NURBS surface is described in (2).
S(x, y) =
Σn
i=0Σm
j=0Bn
i,p(x)Bm
j,q(y)wi,jPi,j
Σn
i=0Σm
i=0Bn
i,p(x)Bm
j,q(y)wi,j
(2)
The NURBS surface S() in (2) is associated with two degrees q and p that correspond to the number
of control polygons and the number of control points. Bi,j is the B-Spline surface given in (3).
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4197
Bi,0(u) =
1, ui ≤ u < ui+1
0, otherwise
Bi,j(u) =
u − ui
ui+j − ui
Bi,j−1(u)
+
ui+j+1 − u
ui+j+1 − ui+1
Bi+1,j−1(u), j = 0 (3)
In [24, 25], NURBS surfaces are built using B-Splines, that are an application of B´ezier curves, it
is required that the control points or polygons be of the same number. Using B-Splines, to process NURBS
surfaces, introduces the utilization of knots. The nodal vector defined by these knots, subdivide the parametric
space to these corresponding points t0, t1, . . . , tm+p+1 and t0, t1, . . . , tn+q+1. The first set of points correspond
to control polygons and the second set to control points. A control point or control polygon become active
when the parameter enters the corresponding parametric interval. Some important properties about drawing
a NURBS surface:
(a) The surface shape depends on control points positioning and concentration,
(b) Weights associated with these control points,
(c) And the nodal vector.
In the upcoming sections, we show how our solution uses these important concepts about NURBS surfaces in
optimizing the coverage processing.
5. PROBLEM STATEMENT: TIME PROCESSING OF COVERAGE
Coverage processing includes the calculation of interference, opportunity and coverage holes, as per
our Beam-based representation model, that is a generalization of the previous work models such as Range or
Zone-based representation models.
For the problem description let us define:
Pi — a coverage point.
Lj,k — APj, number k direction.
Ci — the sensitiviy of point Pi at reception.
Ci,1 — AP to which Pi is associated, range of transmission.
Cj,2 — APj, interference range.
Cj,3 — APj, no-talk range.
We show in (4), the interference IB() that is calculated by WLC2, our WLCx dRRM solution variant,
using Beam-based representation model. The processed interference by this model at a point Pi, corresponds
to the sum of the intersections, Sc(), of all APs beam patterns with Ci and their interference and no-talk ranges
with Ci,1 that is the transmission range of APi to which the point Pi is associated.
IB(Pi(x, y)) = α1ΣjΣkβj,k ∗ Sc(Lj,k, Ci) + Σ3
k=2αkΣn
j=iβj ∗ Sc(Cj,k, Ci,1) (4)
For the opportunity calculation let us define:
s1,i — passive survey result at a coverage point Pi.
s2,i — active survey result at a coverage point Pi.
In (5), we give the opportunity calculated by WLC2 model, using our Beam-based representation
model, OB(). The opportunity is inversely proportional to the interference calculation and hints also, on the
result of surveys on the active and passive network paths: s1,i and s2,i. Passive surveys allow the controller
to have statistics and metrics from the network devices and attached interfaces that are on the network path
between the client and the server such as : the number of transmit errors, number of lost packets, etc. and
is generally available via protocols such: SNMP or Simple Network Management Protocol. Active surveys
instead, craft traffic patterns and simulate actively the traffic between the client and the server, using protocols
such as UDP or TCP, and report measurements such as : delay, jitter, etc. to the controller.
A NURBS-optimized dRRM solution in... (Mehdi Guessous)
4198 Ì ISSN: 2088-8708
OB(Pi(x, y)) ∼
s1,is2,i
IB(Pi(x, y))
(5)
The last element to include in the coverage processing, is the number of the detected coverage holes,
that is given in (6). Coverage holes are evaluated at every coverage point Pi and correspond to points where
the signal is insufficient to perform an accurate communication with their APs of association or the access
network, if they’re not already associated. holeTheshi is another variable that is tight to the point Pi sensitivity
at reception.
HB(Pi) = |(Pi|ΣjΣk ∗ Sc(Lj,k, Ci) ≤ holeTheshi)| (6)
The processing of the coverage, that is done in (4), (5) and (6), is a part of the general processing
of our dRRM solution variants: WLC1 and WLC2 that is described in Figure 1 workflow. We give in (7)
the necessary time to process a coverage and to process changes to this coverage. In (7), we neglected, for
simplification, the necessary time to process the optimal number of directions that is supported by the APs
and the corresponding transmit power levels. M is the number of APs and any monitoring device. Tdiscovery
is the necessary time to run TDD and build a neighborship map. N is the number of coverage points, where
the coverage must be calculated. d is the processed optimum number of the directions that are supported by
APs. Tinterference corresponds to the necessary time to process coverage. We consider that Tinterference,
Topportunity and Tholes, times are equivalent.
TW LC2 = CONST + M ∗ Tdiscovery + k(N − M) ∗ M ∗ d ∗ Tinterference (7)
In Figure 8, we plot the processing time results of models with and without control: simplistic (Range-
based), idealistic (Zone-based), WLC1, WLC2 (dRRM) and Cisco (sRRM). We notice that in general, without-
control models perform better than with-control models due to the addition to the control part of processing.
Processing time of with-control models are equivalent but huge in comparison with without-control models.
Figure 8. WLC2 time in comparison with idealistic and simplistic models
sRRM and dRRM solutions have advantages over each others and over the without-control models
approaches but they require important processing time and resources, which is not suitable in the context of
indoor dense enterprise Wlans. In the next section, we propose an optimization solution that is based on
concepts from CAGD field: NURBS surfaces, to with-control RRM solutions. To stick we the aim of this
work, we apply this optimization to the example of our dRRM WLC2 solution, but it’s easily applicable to the
other approaches.
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4199
6. NURBS OPTIMIZED WLC2 SOLUTION: N-WLC2
The workflow in Figure 9 describes how our solution processes the coverage. After the initialization,
our solution model runs NTO-CP function to discover the ”effective” control points and optimize the knots
number. Then, it runs NTO-CH that is responsible of change processing. The upcoming subsections detail the
functioning of our optimization solution.
Figure 9. The NURBS optimized WLCx dRRM solution workflow
6.1. Processing of control points: NTO-CP
The aim of this algorithm is to reduce the number of control points and still obtain the same coverage
calculation results. It optimizes also the knots number corresponding to the variables u and v in (2). NTO-CP
processing is done at the system initialization, and for any newly added control point, or at a large periodic time
interval to guarantee that A set is up-to-date.
A NURBS-optimized dRRM solution in... (Mehdi Guessous)
4200 Ì ISSN: 2088-8708
For the description of this algorithm let us define:
A — the set of Pi,j control points.
Aineff — the set of ineffectif control points, that have no control over the transmission opportunity of the other
nodes, but still monitor the radio interface.
ERR— the difference between S() calculation and the corresponding reported measure.
Ai — set of Pj points that are affected by the maximum weighting of point Pi.
wavg,reported— the average of the reported measures of Pi as seen by all the other nodes.
P0,pseudo— the nearst point of A − Aineff from the processed pseudo-node.
Z0,pseudo— the central zone control points set that is covered by the pseudo control point at the maximum
weight.
At first, as described in Algorithm 1, A set is initialized to correspond to the mobility devices: APs,
WDs, and all devices that have the ability to report raw radio data measurements. These devices are also the
main source of co-channel interference. We reorder A set by increasing power levels. We increase the transmit
power level of the first node to the maximum and calculate S() at all the other A set nodes. If the reported
measures, after and before weight change, are the same and if S() at these points is the same, then we move
this node from A set to Aineff set. If S() calculation is not equal to the corresponding reported measure, we
set ERR to this difference. ERR hints on the difference between the analytically processed coverage and the
reported measure at the radio interface. Furthermore, all Pj nodes that are affected by Pi maximum weighting
are put in Ai set.
The processing of the effective control points requires a one by one node weighting at the maximum
level, and the measurement of its effect on the other control points. This weighting may correspond to an
increase of the transmit power level, a higher QoS classification, or any other variable that can impact the
transmit opportunity.
Algorithm 1 NTO-CP algorithm: Part1
1: procedure EFFECTIVE-A(A, wmax)
2: for i ← 0, |A|, i + + do
3: wi ← wmax
4: Aineff ← ∅
5: Ai ← ∅
6: for j = i ← 0, |A|, j + + do
7: if wj,after = wj,before then
8: Aineff = Aineff {Pi}
9: if Sj,after = Sj,before then
10: ERR = max(ERRnew, ERRold)
11: end if
12: else
13: Ai = Ai Pj
14: if Sj,after = Sj,before then
15: wj = wj + 1
16: end if
17: end if
18: end for
19: end for
20: end procedure
After processing the control points, NTO-CP processes the control zones as per the Algorithm 2.
We divide the coverage area into a maximum of four zones: one central and three suburbans. In each region,
we elect a zone control point that matches these two criteria: covers the all corresponding zone, and is the
farthest point from the central zone or the central zone control point. We set these four zones control points
transmit power level at the maximum and turn the other control points to monitoring state that is the lowest
transmit power level.
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4201
Algorithm 2 NTO-CP algorithm: Part2
1: procedure CP-ZONES(A, wmax)
2: wi ← wmax, ∀Pi ∈ A − Aineff
3: for i ← 0, |A|, i + + do
4: wi ← wi
wi+wavg,reported
5: end for
6: P0,pseudo ← wi∗Pi
wi
7: w0,pseudo ← wmax
8: for i ← 0, |A − Aineff − {P0,pseudo}|, i + + do
9: wi ← wmin
10: Z0,pseudo = {P0,pseudo} {Pi}
s. t. wi,reported > wmin
11: end for
12: if Z0,pseudo = A − Aineff then
13: P1,pseudo ← Pi ∈ Z0,pseudo
s. t. ∀j = i, wi,reported = min(wi,reported, wj,reported)
14: else
15: P1,pseudo ← Pi
s. t. Pi ∈ A − Aineff − Z0,pseudo
16: end if
And so on for P2,pseudo and P3,pseudo
17: end procedure
We initialize next, per the Algorithm 3, the knots number to match the control points number. If the
reported measures at these points are the same as the calculated ones we keep the current number, otherwise
we double it until the acceptable hysteresis is satisfied in the corresponding zone. In the upcoming subsection,
we describe how our solution react to a change that may affect the coverage area.
Algorithm 3 NTO-CP algorithm: Part3
1: procedure ZONES-KNOTS
2: for i ← 0, 1, 2, 3 do
3: wi,pseudo ← wmax
4: for j, j = i, Pj ∈ Zi,pseudo do
5: wj ← wmin
6: if Sj = measure then
7: while |SJ − measure| ≥ ERR do
8: Knotsi,pseudo = 2 ∗ Knotsi,pseudo
9: end while
10: end if
11: end for
12: end for
13: end procedure
6.2. Adaptation to change: NTO-CH
Not all changes are relevant: they may affect a zone, multiple zones or the entire network. A change
may correspond to a newly reported RSSI, measured SNR or any other relevant variable that impacts the
coverage area. The NTO-CH Algorithm 4 describes how a change is handled by our solution. The procedure
tries to scope the change impact so that only the pertaining control points sets are processed to reflect the new
change. The notion of zone, used in NTO-CH, is different from NTO-CP, as the purpose is different. The idea
here, is to find an optimized number of zones that hints on the impact of a given change and not to optimize
the coverage processing. NTO-CH algorithm categorizes the coverage points into three classes : C1, C2 and
C3. C1 points have a higher impact on the coverage area than C2 and C3 classes points. A coverage point
A NURBS-optimized dRRM solution in... (Mehdi Guessous)
4202 Ì ISSN: 2088-8708
that belongs to C1 has an important impact on its neighborship and corresponds by itself to an entire impact
zone. C2 impact zones include many adjacent coverage points of lower impact to be equivalent to a C1 impact
zone. The determination of the C3 impact zones, follows the same logic of collecting many class C3 adjacent
coverage points to form a C2 class equivalent zone.
Algorithm 4 NTO-CH algorithm
1: procedure CH-ZONES
2: j ← 1
3: for i ← |A − Aineff | do
4: if wi ≥ wC1 then
5: Pj,change ← Pi
6: Zj,change ← {Pi}
7: j = j + 1
8: else if wC1 > wi ≥ wC2 then
9: Zj,change ← {Pi} {Pi+1}
Pi+1 ∈ Ai, wC1 > wi+1 ≥ wC2
Otherwise break
10: i = i + 1, j = j + 1
11: else if wC2 > wi ≥ wC3 then
12: Zj,change ← {Pi} {Pi+1} {Pi+2}
Pi+1, Pi+2 ∈ Ai, wC2 > wi+1, wi+2 ≥ wC3
Otherwise break
13: i = i + 2, j = j + 1
14: end if
15: end for
16: end procedure
6.3. Time
The total required coverage processing time corresponds to one initial calculation of the coverage and
k − 1 changes processing. This time includes the effective control points processing time, the optimization
of the knots number time, and the changes processing time. The processing of the effective control points is
unique to this method and requires running S(), M ∗ (M − 1) times. The optimum knots number processing
time corresponds to S() calculations at every zone control point, and multiple iterations of the same calculation,
until the required accuracy is achieved. The necessary time to process knots is equal to α
µ ∗ (M − β). α, µ, and
β, are the number of iterations, the number of zones and the number of ineffective controls points respectively.
We give in (8) the necessary time to process our NURBS optimized WLC2 solution. η is a value that represents
the scope of the change.
TW LC2,NURBS = CONST + M2
− (1 +
k − α
µ
)M + kηN + (k
µ + β
µ
− α
β
µ
) (8)
For the remaining of this work, we apply these numerical simplifications: α = 1, µ = 4, η = 0.25.
α = 1, that corresponds to one iteration, is sufficient for an acceptable accuracy in comparison with the other
algorithms. Also, at initialization, the number of knots is set to a high level. µ = 4 is more to allow parallel
processing when computing the zones and may correspond to non-overlapping channels. η = 0.25 supposes
that most changes affect only specific zones and do not span multiple zones.
7. EVALUATION
In this section we evaluate our NURBS optimized WLC2 solution, N-WLC2, against WLC2 our
dRRM basic solution variant. We describe the process of our simulation, the effect of modifying the number
of control points, the criteria we adopted to check the accuracy of our results, and the processing time of the
models with and without optimization.
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4203
7.1. Simulation
We simulate all the models in Matlab 2019a version using a 32-Giga RAM 8-Core AMD processor
SSD disk and Windows 10 Pro operating system. For this test, we simulate a random network of 30 APs.
The Figure 10 shows an example of the distribution of APs and WDs, when the number of the control points is
equal to 32 points. The points in red (*), correspond to the control points, WDs, where the coverage calculations
are done. They are uniformly distributed: 32 points in each dimension axis of a 2D Cartesian plan. The total
number of the coverage area points, including the control points, is equal to 128 ∗ 128 = 16, 384 points.
In Figure 11, we show our reference heatmap that represents the coverage calculations result of WLC2 without
optimization. These calculations have been done for all the 16,384 coverage area points.
Figure 10. The distribution of access points and Wifi clients when the number of control points is equal to 32
points per dimension in a 2D Cartesian plan
Figure 11. WLC2 heatmap without optimization
7.2. The effect of modifying the number of control points
Our optimization objective is to reduce the number of needed calculations and still obtain an
acceptable accuracy of the results. The number of the calculations depends on the number of the control
points. In this test, we modify the number of the control points in this range: 128, 64, 32, 16, 8 and 4 points
per axis. In Figure 12, we show the visual effect of modifying the number of the control points. We notice
how comparable are first, second and third subplots. As a first conclusion, it is, visually, enough to process the
coverage at only 6.25% of the total number of the coverage area points to get the same result.
In Table 1, we show the mean, median and standard deviation of the difference between WLC2 and
N-WLC2 calculations. We check that the mean and median are slightly different from zero when the control
points number is : 128, 64, 32 or 16 points per axis. The standard deviation is getting higher for the lower
values of the number of the control points number. At this stage, we could state that statistical results:
mean, median and standard deviation of 2.51, 2.33 and 24.55 units, respectively, correspond to a visually
A NURBS-optimized dRRM solution in... (Mehdi Guessous)
4204 Ì ISSN: 2088-8708
acceptable result. The Figure 13, shows the distribution of the difference between WLC2 and N-WLC2 when
the number of control points is modified in the range: 128, 64, 32, 16, 8 and 4 points per axis. We notice a
high concentration of patterns around zero value when the control points number is : 128, 64, 32 and 16 points
per axis.
(a) (b) (c)
(d) (e) (f)
Figure 12. The visual effect of modifying the number of the control points (a) CP = 128, (b) CP = 64,
(c) CP = 32, (d) CP = 16, (e) CP = 8, (f) CP = 4
Table 1. Statistical Results of Changing the Number of Control Points
CP 128 64 32 16 8 4
Mean -0.56 -1.39 -2.51 -0.74 6.85 21.26
Median -0.4 -1.05 -2.33 -3.14 -1.84 7.48
Std. Dev 13.42 17.69 24.55 33.24 42.04 48.23
(a) (b) (c)
(d) (e) (f)
Figure 13. The effect of modifying CP number on the distribution of the calculation difference between
WLC2 and N-WLC2 (a) CP = 128, (b) CP = 64, (c) CP = 32, (d) CP = 16, (e) CP = 8, (f) CP = 4
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4205
In Figure 14, we plot the coverage required processing time as a function of the number of the control
points. We notice that the processing time decreases exponentially with the number of the control points. When
the number of the control points is equal to 32 points per axis, the relatively required processing time reduction
is almost 93.75%.
Figure 14. The effect of changing the number of the control points on the processing time
7.3. Accuracy of results
We visually observed that using only 32 control points per axis is sufficient to get an accurate
estimation of the coverage area heatmap. We quantified these observations, using statistical variables : mean,
median and standard deviation. We’ve seen that a visually acceptable result may correspond to a mean, median
and standard deviation almost equal to 2.51, 2.33 and 24.55 units, respectively. To confirm our observation,
we redo the previous simulation multiple times. In Table 2, we show the results of 10 iterations of the same
simulation. We check that the mean and median values when the number of control points is equal to 32 points,
is almost constant. The standard deviation is varying between 15 and 25 units.
Table 2. Statistical Results for 10 Iterations of the Same Simulation, CP=32 points
Sim. 1 2 3 4 5 6 7 8 9 10
Mean -2.5 -0.3 -0.7 0.1 0.2 -1.6 -0.1 0 -1 -1.1
Median -2.3 -1 -1.2 -1 -0.6 -2.4 -0.9 0.1 -1.7 -2.2
Std. Dev 24.6 15.1 15.9 23.9 13.9 24 16 24.1 16.4 15.9
7.4. Processing time
In Figure 15, we plot N-WLC2 processing time results for 10 iterations of the same simulation.
We notice that in general, N-WLC2 time is very negligible in comparison with WLC2 time. The N-WLC2
optimization reduces the required coverage relative processing time, in average, by almost 92.58%.
Figure 15. Processing time after 10 iterations of the same simulation, CP=32 points
A NURBS-optimized dRRM solution in... (Mehdi Guessous)
4206 Ì ISSN: 2088-8708
8. CONCLUSION
In this work, we’ve presented our WLC2 dRRM solution in comparison with the idealistic (Zone-
based), the simplistic (Range-based) and the vendors’ sRRM category of models. We’ve shown that our solution
performs better than vendors’ sRRM solution in a simulated controller-based Wifi environment. But the basic
variant of our dRRM solution: WLC2, requires relatively important processing time than the reference models.
The N-WLC2 optimization, solved this limitation and allowed us to achieve an average of 92.58% relative time
reduction when processing only 6.5% of the total number of the available coverage area points. The accuracy
of the results was evaluated both visually and statistically among a large set of patterns.
Our N-WLC2 optimization approach does not depend on the Beam-based coverage representation
model approach we adopted for the simulation of the coverage area. But the calculations of the coverage, at the
control points, are done using the basic variant of our dRRM solution, WLC2. In this preliminary work [4], we’s
explored the possibility to optimize the prediction of the coverage area measurements based on environmental
variables rather than on an analytical interpretation of the phenomena under study. But the result is not as much
important, only 79.99% time reduction. In further work, we explore the possibility to introduce an hybrid
approach in predicting the coverage either by adapting the basic machine learning algorithm or using their deep
learning counterparts.
ACKNOWLEDGMENT
We would thank colleagues : researchers, engineers, and reviewers for sharing their precious
comments and on-field experience that improved the quality of this paper.
REFERENCES
[1] M. Guessous and L. Zenkouar, “A novel beamforming based model of coverage and transmission costing
in ieee 802. 11 wlan networks,” Advances in Science, Technology and Engineering Systems Journal,
vol. 2, no. 6, pp. 28–39, 2017.
[2] M. Guessous and L. Zenkouar, “Cognitive directional cost-based transmit power control in ieee 802.11
wlan,” in 2017 International Conference on Information Networking (ICOIN). IEEE, 2017, pp. 281–287.
[3] M. Guessous and L. Zenkouar, “Ml-optimized beam-based radio coverage processing in ieee 802.11 wlan
networks,” Proceeding of the Electrical Engineering Computer Science and Informatics, vol. 5, no. 5, pp.
564–570, 2018.
[4] M. Guessous and L. Zenkouar, “An ML-optimized dRRM Solution for IEEE 802 . 11 Enterprise Wlan
Networks,” Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 6, pp. 19–31,
2019.
[5] M. Guessous and L. Zenkouar, “A nurbs based technique for an optimized transmit opportunity map
processing in wlan networks,” in International Conference on Wired/Wireless Internet Communication.
Springer, 2017, pp. 143–154.
[6] R. Ruslan and T.-C. Wan, “Cognitive radio-based power adjustment for wi-fi,” in TENCON 2009-2009
IEEE Region 10 Conference. IEEE, 2009, pp. 1–5.
[7] D. Qiao, S. Choi, A. Jain, and K. G. Shin, “Adaptive transmit power control in ieee 802.11 a wireless
lans,” in The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring., vol. 1.
IEEE, 2003, pp. 433–437.
[8] N. Ahmed and S. Keshav, “A successive refinement approach to wireless infrastructure network deploy-
ment,” in IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006., vol. 1. IEEE,
2006, pp. 511–519.
[9] P. R. Kapadia and O. P. Damani, “Interference-constrained wireless coverage in a protocol model,” in
Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless
and mobile systems. ACM, 2006, pp. 207–211.
[10] A. P. Jardosh, K. Papagiannaki, E. M. Belding, K. C. Almeroth, G. Iannaccone, and B. Vinnakota, “Green
wlans: on-demand wlan infrastructures,” Mobile Networks and Applications, vol. 14, no. 6, pp. 798–814,
2009.
[11] R. Mahapatra, “Radio environment map based radio resource management in heterogeneous wireless net-
work,” in Proceedings of 2nd International Conference on Communication, Computing and Networking,
C. R. Krishna, M. Dutta, and R. Kumar, Eds. Springer Singapore, 2019, pp. 283–292.
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4207
[12] A. Akella, G. Judd, S. Seshan, and P. Steenkiste, “Self-management in chaotic wireless deployments,”
Wireless Networks, vol. 13, no. 6, pp. 737–755, 2007.
[13] C. U. Saraydar, N. B. Mandayam, D. J. Goodman et al., “Efficient power control via pricing in wireless
data networks,” IEEE transactions on Communications, vol. 50, no. 2, pp. 291–303, 2002.
[14] D. Raychaudhuri and X. Jing, “A spectrum etiquette protocol for efficient coordination of radio devices
in unlicensed bands,” in 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications,
2003. PIMRC 2003., vol. 1. IEEE, 2003, pp. 172–176.
[15] F. D. Calabrese, L. Wang, E. Ghadimi, G. Peters, L. Hanzo, and P. Soldati, “Learning radio resource man-
agement in rans: Framework, opportunities, and challenges,” IEEE Communications Magazine, vol. 56,
no. 9, pp. 138–145, Sep. 2018.
[16] L. Liang, H. Ye, G. Yu, and G. Y. Li, “Deep-learning-based wireless resource allocation with application
to vehicular networks,” Proceedings of the IEEE, 2019.
[17] H. Sun, X. Chen, Q. Shi, M. Hong, X. Fu, and N. D. Sidiropoulos, “Learning to optimize: Training deep
neural networks for interference management,” IEEE Transactions on Signal Processing, vol. 66, no. 20,
pp. 5438–5453, 2018.
[18] H. Sun, X. Chen, Q. Shi, M. Hong, X. Fu, and N. Sidiropoulos, “Deep wireless interference management,”
in Proc. Zurich Seminar Inf. Commun., 2018, p. 46.
[19] W. Lee, M. Kim, and D.-H. Cho, “Deep power control: Transmit power control scheme based on convo-
lutional neural network,” IEEE Communications Letters, vol. 22, no. 6, pp. 1276–1279, 2018.
[20] “Radio Resource Management White Paper - Transmit Power Control (TPC) Algorithm [Cisco 5500
Series Wireless Controllers],” Jun. 2016. [Online]. Available: https://www.cisco.com/c/en/us/td/docs/
wireless/controller/technotes/8-3/b RRM White Paper/b RRM White Paper chapter 0101.html
[21] “ARM Coverage and Interference Metrics.” [Online]. Available: https://www.arubanetworks.com/
techdocs/ArubaOS 64x WebHelp/Content/ArubaFrameStyles/ARM/ARM Metrics.htm
[22] “Lowering the power level to reduce RF interference.” [Online]. Available: https://help.fortinet.com/
fos50hlp/52data/Content/FortiOS/fortigate-best-practices-52/Wireless/Lowering Power Level.htm
[23] G. Demengel and J.-P. Pouget, “Math´ematiques des courbes et des surfaces. mod`eles de b´ezier, des b-
splines et des nurbs,” edition Ellipses, 1998.
[24] S. A. Coons, “Surfaces for computer-aided design of space forms,” Massachusetts Inst Of Tech Cambridge
Project Mac, Tech. Rep., 1967.
[25] K. J. Versprille, “Computer-aided design applications of the rational b-spline approximation form,” 1975.
BIOGRAPHY OF AUTHOR
Mehdi Guessous was born in Fez, Morocco, on February 23, 1981. He received the degree of
Engineer from Ecole Mohammadia d’Ing´enieurs, Rabat, Morocco, in 2004 and the degree of Mast`ere
Sp´ecialis´e en R´eseaux et Services from Telecom SudParis, Evry, France, in 2010, both in networks
and telecoms. Since June 2015 he has been with the Department of Electrical Engineering at Ecole
Mohammadia d’Ing´enieurs as a PhD student. His research interests include network design, array
processing, adaptative algorithms, statistics and machine learning. He is affiliated with IEEE as
student member.
A NURBS-optimized dRRM solution in... (Mehdi Guessous)

More Related Content

PDF
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
PDF
Improving the network lifetime of mane ts through cooperative mac protocol de...
PDF
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
PDF
Abrol2018 article joint_powerallocationandrelayse
PDF
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
PDF
Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)
PDF
Mutual Exclusion in Wireless Sensor and Actor Networks
PDF
Improving energy efficiency in manet’s for healthcare environments
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
Improving the network lifetime of mane ts through cooperative mac protocol de...
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
Abrol2018 article joint_powerallocationandrelayse
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)
Mutual Exclusion in Wireless Sensor and Actor Networks
Improving energy efficiency in manet’s for healthcare environments

What's hot (15)

PDF
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
PDF
40120140501011 2
PDF
Performance evaluation of interference aware topology power and flow control ...
PDF
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
PDF
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
PDF
IJCTET2015123106
PDF
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
PDF
E43032231
PDF
Efficient power allocation method for non orthogonal multiple access 5G systems
PDF
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
PDF
Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Net...
PDF
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...
PDF
Comparative analysis of the performance of various active queue management te...
PDF
Enhancement of qos in lte downlink systems using
PDF
40120140501003
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
40120140501011 2
Performance evaluation of interference aware topology power and flow control ...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
IJCTET2015123106
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
E43032231
Efficient power allocation method for non orthogonal multiple access 5G systems
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Net...
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...
Comparative analysis of the performance of various active queue management te...
Enhancement of qos in lte downlink systems using
40120140501003
Ad

Similar to A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 entreprise Wlan networks (20)

PDF
IRJET- An Efficient Cross-Layer Cooperative Diversity Optimization Scheme Tog...
PDF
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
PDF
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
PDF
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHOD
PDF
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHOD
PDF
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
PDF
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...
PDF
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...
PDF
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
PDF
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
PDF
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
PDF
IRJET- DOE to Minimize the Energy Consumption of RPL Routing Protocol in IoT ...
PDF
A Case Study on Ip Based Cdma Ran by Controlling Router
PDF
QoS controlled capacity offload optimization in heterogeneous networks
DOC
Internet acess to rural areas using wifi altanai bisht , 1st year
PDF
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
PDF
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
PDF
Study of Energy Saving in Carrier-Ethernet Network
PPTX
9. Evaluation methodology.pptx
IRJET- An Efficient Cross-Layer Cooperative Diversity Optimization Scheme Tog...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHOD
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHOD
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
IRJET- DOE to Minimize the Energy Consumption of RPL Routing Protocol in IoT ...
A Case Study on Ip Based Cdma Ran by Controlling Router
QoS controlled capacity offload optimization in heterogeneous networks
Internet acess to rural areas using wifi altanai bisht , 1st year
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
Study of Energy Saving in Carrier-Ethernet Network
9. Evaluation methodology.pptx
Ad

More from IJECEIAES (20)

PDF
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
PDF
Embedded machine learning-based road conditions and driving behavior monitoring
PDF
Advanced control scheme of doubly fed induction generator for wind turbine us...
PDF
Neural network optimizer of proportional-integral-differential controller par...
PDF
An improved modulation technique suitable for a three level flying capacitor ...
PDF
A review on features and methods of potential fishing zone
PDF
Electrical signal interference minimization using appropriate core material f...
PDF
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
PDF
Bibliometric analysis highlighting the role of women in addressing climate ch...
PDF
Voltage and frequency control of microgrid in presence of micro-turbine inter...
PDF
Enhancing battery system identification: nonlinear autoregressive modeling fo...
PDF
Smart grid deployment: from a bibliometric analysis to a survey
PDF
Use of analytical hierarchy process for selecting and prioritizing islanding ...
PDF
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
PDF
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
PDF
Adaptive synchronous sliding control for a robot manipulator based on neural ...
PDF
Remote field-programmable gate array laboratory for signal acquisition and de...
PDF
Detecting and resolving feature envy through automated machine learning and m...
PDF
Smart monitoring technique for solar cell systems using internet of things ba...
PDF
An efficient security framework for intrusion detection and prevention in int...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Embedded machine learning-based road conditions and driving behavior monitoring
Advanced control scheme of doubly fed induction generator for wind turbine us...
Neural network optimizer of proportional-integral-differential controller par...
An improved modulation technique suitable for a three level flying capacitor ...
A review on features and methods of potential fishing zone
Electrical signal interference minimization using appropriate core material f...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Bibliometric analysis highlighting the role of women in addressing climate ch...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Smart grid deployment: from a bibliometric analysis to a survey
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Remote field-programmable gate array laboratory for signal acquisition and de...
Detecting and resolving feature envy through automated machine learning and m...
Smart monitoring technique for solar cell systems using internet of things ba...
An efficient security framework for intrusion detection and prevention in int...

Recently uploaded (20)

PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
Management Information system : MIS-e-Business Systems.pptx
PPTX
introduction to high performance computing
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
Artificial Intelligence
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
Feature types and data preprocessing steps
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
communication and presentation skills 01
PPT
Total quality management ppt for engineering students
PPTX
Module 8- Technological and Communication Skills.pptx
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Management Information system : MIS-e-Business Systems.pptx
introduction to high performance computing
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf
Safety Seminar civil to be ensured for safe working.
Artificial Intelligence
Fundamentals of Mechanical Engineering.pptx
Exploratory_Data_Analysis_Fundamentals.pdf
Feature types and data preprocessing steps
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
R24 SURVEYING LAB MANUAL for civil enggi
communication and presentation skills 01
Total quality management ppt for engineering students
Module 8- Technological and Communication Skills.pptx
Nature of X-rays, X- Ray Equipment, Fluoroscopy

A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 entreprise Wlan networks

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 4, August 2020, pp. 4189∼4207 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i4.pp4189-4207 Ì 4189 A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 entreprise Wlan networks Mehdi Guessous, Lahbib Zenkouar Department of Electrical Engineering, Mohammadia School of Engineers, Mohammed V University, Morocco Article Info Article history: Received Aug 6, 2019 Revised Feb 4, 2020 Accepted Feb 24, 2020 Keywords: Co-channel interference Dynamic RRM IEEE 802.11 NURBS surface Wlan ABSTRACT Dynamic Radio Resource Management, RRM, is an essential design block in the functional architecture of any Wifi controller in IEEE 802.11 indoor dense enterprise Wlans. In a mono-channel condition, it helps tackle co-channel interference problem and enrich end-to-end Wifi clients experience. In this work, we present our dRRM solution: WLCx, and demonstrate its performance over related-work and vendor ap- proaches. Our solution is built on a novel and realistic per-Beam coverage repre- sentation approach. Unlike the other RRM solutions, WLCx is dynamic: even the calculation system parameters are processed. This processing comes at price in terms of processing time. To overcome this limitation, we constructed and implemented a NURBS surface-based optimization to our RRM solution. Our NURBS optimized WLCx, N-WLCx, solution achieves almost 92.58% time reduction in comparison with basic WLCx. Furthermore, our optimization could easily be extended to enhance oth- ers, vendors and research, RRM solutions. Copyright © 2020 Insitute of Advanced Engineeering and Science. All rights reserved. Corresponding Author: Mehdi Guessous, Department of Electrical Engineering, Mohammadia School of Engineers, Mohammed V University, Rabat, Morocco. Email: mehdiguessous@research.emi.ac.ma 1. INTRODUCTION The Wifi controller is the central component of a Wlan enterprise network architecture. All network access points get their radio configuration from this controller especially, what radio/canal to use, and at what transmit power. The controller plays another important role in Wlan integration to other parts of the enterprise network: Lan, Local Area Network, Wan, Wide Area Network, and Dcn, Datacenter Network, where application servers are located. By looking closely at the controller functional architecture, it is RRM block that processes the radio plan. RRM controls access points transmit parameters such as to minimize interference and optimize the spectrum utilization. But how does RRM decide on what channel to be used by an access point? and at what transmit power? To build an efficient radio plan that maximizes the network capacity, the controller needs data from access points, Wifi clients, wired network devices, and servers. This data pertains to the quality of the radio interface and client overall experience when accessing to services. But this information is not sufficient to hint on the whole coverage quality, such as the interference, at any point of the coverage area; it is limited to some coverage points where access points and clients are located. To overcome this limitation, either we place sensors everywhere, which is not economically feasible in an enterprise network, or model the coverage area. The Vendors do coverage modelization in a lab context to provide strict recommendations that customers should follow to build their networks. This approach works in common situations but, it requires a lot of engineering effort and monitoring to maintain the network at an optimal condition. In some situations, it may just not work or false the transmit opportunity estimation. For the rest of this work, this approach is referenced as static RRM, Journal homepage: http://ijece.iaescore.com/index.php/IJECE
  • 2. 4190 Ì ISSN: 2088-8708 or sRRM. The third alternative is to allow the controller to do more real-time complex processing, without any or very few preconfigured settings, to find out the optimum RRM configuration to apply network-wide. This approach is the focus of this study and will be referenced as dynamic RRM, or dRRM. A controller, that supports dRRM, does not rely on any preconfigured settings, in hardware or software, to decide on how to modify the radio plan to meet the function utility. In dRRM, even the system parameters are processed to optimize the network capacity which is different from sRRM. But the advantage of dRRM comes at a high price in terms of time and system resources consumption to process the whole network coverage and adaptation to changes. The aim of this study is to reduce the required processing time of dRRM as it is descrided in this work [1]. In this work, we present our dRRM optimization solution algorithm: N-WLCx, that is based on concepts generally encountered in the context of CAGD, Computer Aided Graphical Design, field: B´ezier curves and NURBS sufaces. Our solution approach is built on a novel and realistic per-Beam coverage representation that is different from research models: per-Range and per-Zone. In theses works [1, 2], we detail our coverage representation approach and demonstrate how it generalizes the other common and advanced literature approaches. In this study, we show that our optimization achieves a 92.58% time reduction by processing only 6.5% of available coverage points in average. This result is more significant than the 79.99% time reduction we achieved in this work [3] and its extension [4]. In Section 2., we present how related work, researchers and vendors, process RRM. In Section 3., we present our dRRM solution and compare it to vendors’ solution in processing the radio coverage. Before the problem statement, in Section 5., and the presentation of our solution, in Section 6., we introduce, in Section 4., some important facts about Wlan network design, coverage representation models and NURBS surfaces. Section 7. is dedicated to the simulation and evaluation of our optimization. In the conclusion, we recall our achievements and further our work. This paper is an extension of the work originally presented in the 2017 15th International Conference on Wired/Wireless Internet Communications (IFIP WWIC) [5]. In this extended version, and in addition to the original version, we evaluate deeply our solution results in terms of processing time and the accuracy of results, visually and statistically. We explore also, the effect of modifying the number of control points in a very large coverage area. We enhance significantly the NTO-CP algorithm Part2 procedure and clarify the purpose of the coverage area zoning. 2. DRRM RELATED WORK In this section we discuss RRM approaches from research and vendors leader of the Wifi market such as: Cisco, Aruba-HPE, that pertain to enterprise Wlan networks. We’re interested in algorithms that modify the transmit power of APs in order to maximize the network capacity or optimize radio resources utilization. An algorithm is different from another when the used variables are different. In this preliminary work, we discuss a mono channel condition. 2.1. In research The first category of approaches concentrate on lower-layer constraints: co-channel interference, physical interface and MAC performance. The authors in these works [6–8], modeled the coverage area per-range: transmit, interference, and not-talk ranges, using a circular or disk pattern. The way this model represents the coverage is common but may not hint on some opportunities to transmit as discussed in this work [2]. The author in this work [9], focused instead on the interaction that an AP may have with its neighbor- ing AP. The result is a per-zone, Voronoi zone, negotiated coverage pattern. This model is difficult to put into practice technologically and economically as it was discussed in [1, 2]. Both models: per-zone and per-range, do not take upper layer constraints into account. Another set of similar works tackle the issue from a power saving perspective. The authors in [10] build their on-demand Wlan approach on the observation of idle APs that have no clients associated to. The Wlan controller manages the activation or not of an AP. In this work [11], the authors build a radio environment map to allocate dynamically the spectrum among stations. This map considers the stations location and power models to minimize the outage probability and reduce service blocking to users. A third category of approaches tackle the issue from an upper-layer perspective for applications such as: FTP, HTTP. This work [12], as an example, presented an interesting idea to find out a suitable power, or RRM, scheme, that may optimize the application performance. It is a per-experience approach that requires a huge amount of data, to be put into practice. And, it is very dependent on the coexistent applications behavior. Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4191 Another challenge, is to be able to determine when physical layer is responsible of the observed performance. Works like [13] use concepts from Game theory, that is a powerful tool, to model the interactions between APs. These concepts are applied to the user perception of the QoS it receives. The same limitation of the previously cited work applies to this one also. A fourth category tackles the problem from an inter-protocol cooperation point of view like in this example [14]. Making the protocols aware of each other is a good strategy to find an optimum inter-protocol negotiated power scheme that optimizes the performance of each of them individually. It’s an idealistic scheme, difficult to put into practice technologically and economically, with regards to vendors offering. Let’s imagine the integration of a Wifi and Bluetooth network. The impact of a Wifi AP on Bluetooth network is very important but not the opposite. Then, as an example, it is necessary to find out a way to provide the network controller (for both Wifi and Bluetooth) with feedback so it can adjust Wifi power scheme to allow a Bluetooth optimum operation. This would require important data transfers (and power) from the Bluetooth network to the controller which is very difficult, by design of Bluetooth devices, to implement. A fifth cateroy of approaches such as [15–19] concentrate on the environmental variables that may affect the phenomena under study. In this work [15], the RRM policy is issued by a learner repeatedly to train the general RRM model. In [19], the authors apply deep learning principales to the the stations power scheme. The outcome of these methods depend heavily on the quality of the training step. 2.2. Vendor solutions The approach or theoretical background, behind the vendor implementations, is hidden in general for commercial purposes, only the settings (recommendations) are provided by those vendors. Cisco TPC, Trans- mit Power Control, algorithm, that is a part of Cisco RRM, processes, at each AP, the desired transmit power hysteresis, TxHysteresis,Current, that is equal to the sum of the current transmit power (initially at maximum), TxCurrent, and the difference between the power threshold, TxT hresh, and RSSI3rd , the third neighbor re- ported RSSI. If the difference between the processed power and the current one, TxHysteresisT hresh, is at least 6dBm, then the current power must be reduced by 3db (by half). We should then wait for 10 minutes before re-attempting another calculation. Details about this implementation are given in [20]. Aruba-HPE adopts another strategy. The ARM, Adaptive Radio Management, algorithm maintains two measures for every channel : a coverage index, covidx, and an interference index, iferidx. The decision of increasing or decreasing the transmit power level on a given channel is based on the processed coverage index as compared to the “ideal” coverage index, noted covidx,ideal, and “acceptable” coverage index, covidx,acceptable, for instance. As a general rule, the current coverage index should be greater than covidx,acceptable and equiv- alent to covidx,ideal. Coverage index, covidx, corresponds to the sum of two variables : x and y. x is the weighted average of all other APs SNR as being measured by the current AP. y is the weighted average of the processed x variables by other APs from the same vendor and on the same channel. The same thing applies to iferidx processing. Details of this calculation are in [21]. Fortinet Auto Power that is a part of ARRP, Automatic Radio Resource Provisioning, solution, works by reducing automatically the transmit power if the transmit channel is not clear. From the corresponding documentation [22], it is an alternative to manually limiting the number of neighbors per channel (less than 20) by adjusting the transmit power level. 3. OUR WLCX DRRM SOLUTION Our WLCx dynamic RRM solution is based on the per-Beam coverage representation we discuss in the upcoming section. Our solution is ”dynamic” because even the parameters values change, especially, the optimum number of supported direction per AP in the case of WLC2 variant. The workflow in Figure 1, describes how our solution works. Our solution runs three algorithms: TDD (Discovery), TDM (Map) and TDO (Opportunity). After initialization, TDD optimizes the number of supported directions per AP by reducing the power level and doubling the initial number of direction until all neighbors are discovered and at almost one neighbor is discovered per AP direction. Based on information from TDD, TDM categorizes the coverage area points into categories that hints on how these points appear on APs directions. Each category is assigned a cost to hint on its probability to get a fair transmit opportunity. TDO aim is to process each coverage area point opportunity to transmit, taking into account data from TDM and SLA (upper-layer input). A NURBS-optimized dRRM solution in... (Mehdi Guessous)
  • 4. 4192 Ì ISSN: 2088-8708 Figure 1. WLCx dRRM solution workflow We simulate, using Matlab 2019a, two variants of our WLCx solution : WLC1 and WLC2. In WLC1, all APs share the same optimal number of supported directions and transmit at the same power level. In WLC2, APs process the same optimal number of supported directions but may use different transmit power level per AP. In the same simulation, we compare both WLCx variants to vendor implementation : Cisco. We evaluate models based on their performance at processing the coverage and time this processing takes. The coverage processing performance, Pr(), of a given model, m, is calculated in (1). I(), H() and O() are the model processed interference, number of coverage holes and transmit opportunity, repectively. Pr(m) = K1 ΣI I(m) + 1 + K2 ΣH H(m) + 1 + K3 O(m) ΣO (1) Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4193 The performance calculation in (1), is the weighted sum of relative interference, opportunity and coverage holes in each model. The weights K1, K2 and K3, hints on how important is processing of interference, opportunity or holes, to the performance of a given model. For the rest of our study, we consider that all variables are of equal importance then, K1 = K2 = K3 = 1. The diagram in Figure 2, shows the performance of models after 10 iterations of the same simulation. Each simulation corresponds to a random distribution of a set of 30 APs and 100 WDs. We check that our WLC2 solution variant performs better than Cisco and WLC1. Cisco model performance is comparable to WLC1. The processing time of models is represented in Figure 3. The models have a comparable processing time for a large number of the same simulation iterations. In work [2], we discuss our WLC2 dRRM solution. For further details about our solution, refer to [1] work that is an extension of the previous one. Figure 2. Performance of models after 10 simulations of the network of 30 APs and 100 WDs Figure 3. Processing time of models after 10 simulations of the network of 30 APs and 100 WDs 4. THEORETICAL BACKGROUND Before we dive into the description of the problem, let’s recall some facts about Wlan enterprise network architecture design, the importance of coverage representation for radio planning, and NURBS surfaces concepts that are the foundation of our NURBS optimized WLCx dRRM solution. 4.1. Wlan Enterprise networks In a standalone AP-based Wifi architecture, the network capacity do not scale with dense, important number of Wifi clients and APs, frequently changing radio environments. To optimize the network capacity, some kind of coordination and control, distributed or centralized, is needed. In UWA, Unified Wifi Architecture, A NURBS-optimized dRRM solution in... (Mehdi Guessous)
  • 6. 4194 Ì ISSN: 2088-8708 a WLC, Wireless LAN Controller, acts as a repository of APs intelligence, runs routines to plan radio usage, provides an interface to wired network, etc. and guarantees conformance to policies: QoS and Security, domain- wide, including LAN, MAN, WAN, and DCN, network parts. A typical enterprise Wlan architecture is given in Figure 4. Two market leading implementations of such WLCs are the Cisco 8540 Wireless Controller and the Aruba 7280 Mobility Controller. The rest of our study focuses on Cisco implementation. Figure 4. An example of a Wlan architecture In Figure 4, APs are located nearest to Wifi clients, WDs. All APs are connected to the LAN and are associated, via VPNs, Virtual Private Networks, or tunnels, to the controller, WLC, located at the Datacenter, in a Hub and Spoke architecture. Depending on the network size and requirements, the controller may be located at the same location as APs. To build an association, an AP should be able to join the controller, via MAN, WAN or internet. After AP’s successful association to the controller, WDs start their association process, that includes authentication, to Wlan. After the successful association, WDs are able to access network resources behind the controller or in some configurations, behind APs (FlexConnect or Local Switched mode). WLC receives information about the network from three sources : the wired path toward the datacenter, the radio interface counters of each associated AP, and OTA, Over-The-Air, AP to AP wireless messages over a dedicated low speed radio. In the case of Cisco, two protocols are available for the purpose of exchanging data between APs, and between APs and WLC: (a) CAPWAP: stands for Control and Provisioning of Wireless Access Points, is used by APs to build a protocol association to the RF group leader WLC and for control and data exchange. (b) NDP: is the Neighbor Discovery Protocol, it allows APs to send Over-The-Air (OTA) messages and exchange standard and some proprietary control and management information. In addition to these protocols, Cisco APs embark a set of on-chip features such as : CLIENTLINK and CLEANAIR. CLEANAIR enables the APs to measure real-time radio characteristics and send them to the controller via the already established CAPWAP tunnels. Cisco appliances such as Cisco Prime Infrastructure (CPI) and Mobility Services Engine (MSE), shown in Figure 4, extend the capability of this feature to process analytics on Wifi client presence, interfering devices management and heatmaps processing. CLIENTLINK version 4.0, is the Cisco at AP-level implementation of MU-MIMO IEEE 802.11ac beamforming. It works independently of CLEANAIR after the assessment of the quality of the channel. In this scheme, an AP sends a special sounding signal to all its associated WDs which report, back to this AP, their signal measurement. Based on these feedbacks, the AP, and not the controller, decides on how much steering toward a specific WD is needed to optimize the energy radiation. 4.2. Coverage representation and processing We categorize related-work’s coverage representation models into three categories: Range-based, Zone-based and Beam-based. In the upcoming subsections, we describe each of them and discuss their limi- tations. In Range-based category of models, it is common to represent an AP’s wireless coverage such as : Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4195 a transmission, interference or no-talk range. These ranges processing is based on the estimation of the distance between the AP and a receiving point P (AP or WD). Further, this category of coverage represen- tation models, consider that an AP’s coverage pattern is omnidirectional, with the geometric shape of a circle or a disk, centered at the AP, like in Figure 5. In this scheme, the interference, for example, at any given point is approximated by the weighted intersection of all interfering devices patterns at this point. Figure 5. A per-Range model coverage pattern In Zone-based category of models, an AP coverage is not only function of its transmission charac- teristics: channel, power level, etc., but depend also on the neighboring APs. The result of this, is that the transmission shape is no more a solid circle but a convex polygon with straight sides. Each straight side defines a borderline that separate two neighboring APs’ transmission ranges. The more an AP transmit power is strong, the more the borderline with its neighboring APs is far. Further, it is important to note that a point in a transmission zone of one AP could not be in another AP’s transmission zone. An example of Zone-based AP’s wireless coverage is represented in Figure 6. In this scheme, the interference caused by the transmission ranges in the previous model, is totally cancelled. Only interference caused by other ranges : interference, and no-talk is still present. Figure 6. A per-Zone model coverage pattern A NURBS-optimized dRRM solution in... (Mehdi Guessous)
  • 8. 4196 Ì ISSN: 2088-8708 The previous two models: Range and Zone-based, come with these limitations: (a) Both models are limited to consider that the strength of interference is only inversely proportional to the distance (or quadratic) of an AP from interfering neighbors, (b) Both models would interpret an increase in a transmission power level as an expanded reach in all directions: uniformly in case of Range-based models but depending on neighboring APs in the case of Zone-based ones, (c) A point could not be in two transmission ranges of two different APs at the same time in Zone-based models, (d) Both models would interpret falsely obstacles to the signal propagation, as a weaker signal from an AP in the context of indoor Wlans does not mean necessarily that this AP is out of reach, (e) Alternatively, a stronger signal from an AP does not mean necessarily that this AP is at reach: it may be guided or boosted under some conditions. The consequences of these limitations, the adoption of a Range or Zone-based like representation model of coverage, and regardless of the RRM solution that is built upon, is to false our transmit opportunity processing and misinterpret some phenomenons encountered in the specific context of indoor enterprise Wlans. To overcome the limitations of the previous models, our Beam-based coverage representation, defines for each AP a number of directions over which it may transmit. Depending on the number of directions, their order and transmit power levels, an AP may be able to mimic a Range or Zone-based scheme. The Figure 7, shows a per-Beam coverage pattern example. In this pattern, the APs have an equal number of directions, equal to eight, that are uniformly distributed and of equivalent transmit power. In works [2, 1], we discussed in detail how per-Zone and per-Range representation models are generalized to per-Beam representation and how our representation model could solve previous models limitations such as : per direction transmit power control, hole coverage reduction, obstacle detection, client localization and transmit opportunities maximization. Figure 7. A per-Beam model coverage pattern 4.3. NURBS surfaces The processing of coverage may induce huge time and system resources consumption. In this work, we propose an approach to alleviate this processing using NURBS surfaces, that are a generalization of B´ezier curves and B-Splines surfaces. For complete details about these concepts, please refer to this book [23]. A NURBS surface is described in (2). S(x, y) = Σn i=0Σm j=0Bn i,p(x)Bm j,q(y)wi,jPi,j Σn i=0Σm i=0Bn i,p(x)Bm j,q(y)wi,j (2) The NURBS surface S() in (2) is associated with two degrees q and p that correspond to the number of control polygons and the number of control points. Bi,j is the B-Spline surface given in (3). Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
  • 9. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4197 Bi,0(u) = 1, ui ≤ u < ui+1 0, otherwise Bi,j(u) = u − ui ui+j − ui Bi,j−1(u) + ui+j+1 − u ui+j+1 − ui+1 Bi+1,j−1(u), j = 0 (3) In [24, 25], NURBS surfaces are built using B-Splines, that are an application of B´ezier curves, it is required that the control points or polygons be of the same number. Using B-Splines, to process NURBS surfaces, introduces the utilization of knots. The nodal vector defined by these knots, subdivide the parametric space to these corresponding points t0, t1, . . . , tm+p+1 and t0, t1, . . . , tn+q+1. The first set of points correspond to control polygons and the second set to control points. A control point or control polygon become active when the parameter enters the corresponding parametric interval. Some important properties about drawing a NURBS surface: (a) The surface shape depends on control points positioning and concentration, (b) Weights associated with these control points, (c) And the nodal vector. In the upcoming sections, we show how our solution uses these important concepts about NURBS surfaces in optimizing the coverage processing. 5. PROBLEM STATEMENT: TIME PROCESSING OF COVERAGE Coverage processing includes the calculation of interference, opportunity and coverage holes, as per our Beam-based representation model, that is a generalization of the previous work models such as Range or Zone-based representation models. For the problem description let us define: Pi — a coverage point. Lj,k — APj, number k direction. Ci — the sensitiviy of point Pi at reception. Ci,1 — AP to which Pi is associated, range of transmission. Cj,2 — APj, interference range. Cj,3 — APj, no-talk range. We show in (4), the interference IB() that is calculated by WLC2, our WLCx dRRM solution variant, using Beam-based representation model. The processed interference by this model at a point Pi, corresponds to the sum of the intersections, Sc(), of all APs beam patterns with Ci and their interference and no-talk ranges with Ci,1 that is the transmission range of APi to which the point Pi is associated. IB(Pi(x, y)) = α1ΣjΣkβj,k ∗ Sc(Lj,k, Ci) + Σ3 k=2αkΣn j=iβj ∗ Sc(Cj,k, Ci,1) (4) For the opportunity calculation let us define: s1,i — passive survey result at a coverage point Pi. s2,i — active survey result at a coverage point Pi. In (5), we give the opportunity calculated by WLC2 model, using our Beam-based representation model, OB(). The opportunity is inversely proportional to the interference calculation and hints also, on the result of surveys on the active and passive network paths: s1,i and s2,i. Passive surveys allow the controller to have statistics and metrics from the network devices and attached interfaces that are on the network path between the client and the server such as : the number of transmit errors, number of lost packets, etc. and is generally available via protocols such: SNMP or Simple Network Management Protocol. Active surveys instead, craft traffic patterns and simulate actively the traffic between the client and the server, using protocols such as UDP or TCP, and report measurements such as : delay, jitter, etc. to the controller. A NURBS-optimized dRRM solution in... (Mehdi Guessous)
  • 10. 4198 Ì ISSN: 2088-8708 OB(Pi(x, y)) ∼ s1,is2,i IB(Pi(x, y)) (5) The last element to include in the coverage processing, is the number of the detected coverage holes, that is given in (6). Coverage holes are evaluated at every coverage point Pi and correspond to points where the signal is insufficient to perform an accurate communication with their APs of association or the access network, if they’re not already associated. holeTheshi is another variable that is tight to the point Pi sensitivity at reception. HB(Pi) = |(Pi|ΣjΣk ∗ Sc(Lj,k, Ci) ≤ holeTheshi)| (6) The processing of the coverage, that is done in (4), (5) and (6), is a part of the general processing of our dRRM solution variants: WLC1 and WLC2 that is described in Figure 1 workflow. We give in (7) the necessary time to process a coverage and to process changes to this coverage. In (7), we neglected, for simplification, the necessary time to process the optimal number of directions that is supported by the APs and the corresponding transmit power levels. M is the number of APs and any monitoring device. Tdiscovery is the necessary time to run TDD and build a neighborship map. N is the number of coverage points, where the coverage must be calculated. d is the processed optimum number of the directions that are supported by APs. Tinterference corresponds to the necessary time to process coverage. We consider that Tinterference, Topportunity and Tholes, times are equivalent. TW LC2 = CONST + M ∗ Tdiscovery + k(N − M) ∗ M ∗ d ∗ Tinterference (7) In Figure 8, we plot the processing time results of models with and without control: simplistic (Range- based), idealistic (Zone-based), WLC1, WLC2 (dRRM) and Cisco (sRRM). We notice that in general, without- control models perform better than with-control models due to the addition to the control part of processing. Processing time of with-control models are equivalent but huge in comparison with without-control models. Figure 8. WLC2 time in comparison with idealistic and simplistic models sRRM and dRRM solutions have advantages over each others and over the without-control models approaches but they require important processing time and resources, which is not suitable in the context of indoor dense enterprise Wlans. In the next section, we propose an optimization solution that is based on concepts from CAGD field: NURBS surfaces, to with-control RRM solutions. To stick we the aim of this work, we apply this optimization to the example of our dRRM WLC2 solution, but it’s easily applicable to the other approaches. Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
  • 11. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4199 6. NURBS OPTIMIZED WLC2 SOLUTION: N-WLC2 The workflow in Figure 9 describes how our solution processes the coverage. After the initialization, our solution model runs NTO-CP function to discover the ”effective” control points and optimize the knots number. Then, it runs NTO-CH that is responsible of change processing. The upcoming subsections detail the functioning of our optimization solution. Figure 9. The NURBS optimized WLCx dRRM solution workflow 6.1. Processing of control points: NTO-CP The aim of this algorithm is to reduce the number of control points and still obtain the same coverage calculation results. It optimizes also the knots number corresponding to the variables u and v in (2). NTO-CP processing is done at the system initialization, and for any newly added control point, or at a large periodic time interval to guarantee that A set is up-to-date. A NURBS-optimized dRRM solution in... (Mehdi Guessous)
  • 12. 4200 Ì ISSN: 2088-8708 For the description of this algorithm let us define: A — the set of Pi,j control points. Aineff — the set of ineffectif control points, that have no control over the transmission opportunity of the other nodes, but still monitor the radio interface. ERR— the difference between S() calculation and the corresponding reported measure. Ai — set of Pj points that are affected by the maximum weighting of point Pi. wavg,reported— the average of the reported measures of Pi as seen by all the other nodes. P0,pseudo— the nearst point of A − Aineff from the processed pseudo-node. Z0,pseudo— the central zone control points set that is covered by the pseudo control point at the maximum weight. At first, as described in Algorithm 1, A set is initialized to correspond to the mobility devices: APs, WDs, and all devices that have the ability to report raw radio data measurements. These devices are also the main source of co-channel interference. We reorder A set by increasing power levels. We increase the transmit power level of the first node to the maximum and calculate S() at all the other A set nodes. If the reported measures, after and before weight change, are the same and if S() at these points is the same, then we move this node from A set to Aineff set. If S() calculation is not equal to the corresponding reported measure, we set ERR to this difference. ERR hints on the difference between the analytically processed coverage and the reported measure at the radio interface. Furthermore, all Pj nodes that are affected by Pi maximum weighting are put in Ai set. The processing of the effective control points requires a one by one node weighting at the maximum level, and the measurement of its effect on the other control points. This weighting may correspond to an increase of the transmit power level, a higher QoS classification, or any other variable that can impact the transmit opportunity. Algorithm 1 NTO-CP algorithm: Part1 1: procedure EFFECTIVE-A(A, wmax) 2: for i ← 0, |A|, i + + do 3: wi ← wmax 4: Aineff ← ∅ 5: Ai ← ∅ 6: for j = i ← 0, |A|, j + + do 7: if wj,after = wj,before then 8: Aineff = Aineff {Pi} 9: if Sj,after = Sj,before then 10: ERR = max(ERRnew, ERRold) 11: end if 12: else 13: Ai = Ai Pj 14: if Sj,after = Sj,before then 15: wj = wj + 1 16: end if 17: end if 18: end for 19: end for 20: end procedure After processing the control points, NTO-CP processes the control zones as per the Algorithm 2. We divide the coverage area into a maximum of four zones: one central and three suburbans. In each region, we elect a zone control point that matches these two criteria: covers the all corresponding zone, and is the farthest point from the central zone or the central zone control point. We set these four zones control points transmit power level at the maximum and turn the other control points to monitoring state that is the lowest transmit power level. Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
  • 13. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4201 Algorithm 2 NTO-CP algorithm: Part2 1: procedure CP-ZONES(A, wmax) 2: wi ← wmax, ∀Pi ∈ A − Aineff 3: for i ← 0, |A|, i + + do 4: wi ← wi wi+wavg,reported 5: end for 6: P0,pseudo ← wi∗Pi wi 7: w0,pseudo ← wmax 8: for i ← 0, |A − Aineff − {P0,pseudo}|, i + + do 9: wi ← wmin 10: Z0,pseudo = {P0,pseudo} {Pi} s. t. wi,reported > wmin 11: end for 12: if Z0,pseudo = A − Aineff then 13: P1,pseudo ← Pi ∈ Z0,pseudo s. t. ∀j = i, wi,reported = min(wi,reported, wj,reported) 14: else 15: P1,pseudo ← Pi s. t. Pi ∈ A − Aineff − Z0,pseudo 16: end if And so on for P2,pseudo and P3,pseudo 17: end procedure We initialize next, per the Algorithm 3, the knots number to match the control points number. If the reported measures at these points are the same as the calculated ones we keep the current number, otherwise we double it until the acceptable hysteresis is satisfied in the corresponding zone. In the upcoming subsection, we describe how our solution react to a change that may affect the coverage area. Algorithm 3 NTO-CP algorithm: Part3 1: procedure ZONES-KNOTS 2: for i ← 0, 1, 2, 3 do 3: wi,pseudo ← wmax 4: for j, j = i, Pj ∈ Zi,pseudo do 5: wj ← wmin 6: if Sj = measure then 7: while |SJ − measure| ≥ ERR do 8: Knotsi,pseudo = 2 ∗ Knotsi,pseudo 9: end while 10: end if 11: end for 12: end for 13: end procedure 6.2. Adaptation to change: NTO-CH Not all changes are relevant: they may affect a zone, multiple zones or the entire network. A change may correspond to a newly reported RSSI, measured SNR or any other relevant variable that impacts the coverage area. The NTO-CH Algorithm 4 describes how a change is handled by our solution. The procedure tries to scope the change impact so that only the pertaining control points sets are processed to reflect the new change. The notion of zone, used in NTO-CH, is different from NTO-CP, as the purpose is different. The idea here, is to find an optimized number of zones that hints on the impact of a given change and not to optimize the coverage processing. NTO-CH algorithm categorizes the coverage points into three classes : C1, C2 and C3. C1 points have a higher impact on the coverage area than C2 and C3 classes points. A coverage point A NURBS-optimized dRRM solution in... (Mehdi Guessous)
  • 14. 4202 Ì ISSN: 2088-8708 that belongs to C1 has an important impact on its neighborship and corresponds by itself to an entire impact zone. C2 impact zones include many adjacent coverage points of lower impact to be equivalent to a C1 impact zone. The determination of the C3 impact zones, follows the same logic of collecting many class C3 adjacent coverage points to form a C2 class equivalent zone. Algorithm 4 NTO-CH algorithm 1: procedure CH-ZONES 2: j ← 1 3: for i ← |A − Aineff | do 4: if wi ≥ wC1 then 5: Pj,change ← Pi 6: Zj,change ← {Pi} 7: j = j + 1 8: else if wC1 > wi ≥ wC2 then 9: Zj,change ← {Pi} {Pi+1} Pi+1 ∈ Ai, wC1 > wi+1 ≥ wC2 Otherwise break 10: i = i + 1, j = j + 1 11: else if wC2 > wi ≥ wC3 then 12: Zj,change ← {Pi} {Pi+1} {Pi+2} Pi+1, Pi+2 ∈ Ai, wC2 > wi+1, wi+2 ≥ wC3 Otherwise break 13: i = i + 2, j = j + 1 14: end if 15: end for 16: end procedure 6.3. Time The total required coverage processing time corresponds to one initial calculation of the coverage and k − 1 changes processing. This time includes the effective control points processing time, the optimization of the knots number time, and the changes processing time. The processing of the effective control points is unique to this method and requires running S(), M ∗ (M − 1) times. The optimum knots number processing time corresponds to S() calculations at every zone control point, and multiple iterations of the same calculation, until the required accuracy is achieved. The necessary time to process knots is equal to α µ ∗ (M − β). α, µ, and β, are the number of iterations, the number of zones and the number of ineffective controls points respectively. We give in (8) the necessary time to process our NURBS optimized WLC2 solution. η is a value that represents the scope of the change. TW LC2,NURBS = CONST + M2 − (1 + k − α µ )M + kηN + (k µ + β µ − α β µ ) (8) For the remaining of this work, we apply these numerical simplifications: α = 1, µ = 4, η = 0.25. α = 1, that corresponds to one iteration, is sufficient for an acceptable accuracy in comparison with the other algorithms. Also, at initialization, the number of knots is set to a high level. µ = 4 is more to allow parallel processing when computing the zones and may correspond to non-overlapping channels. η = 0.25 supposes that most changes affect only specific zones and do not span multiple zones. 7. EVALUATION In this section we evaluate our NURBS optimized WLC2 solution, N-WLC2, against WLC2 our dRRM basic solution variant. We describe the process of our simulation, the effect of modifying the number of control points, the criteria we adopted to check the accuracy of our results, and the processing time of the models with and without optimization. Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
  • 15. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4203 7.1. Simulation We simulate all the models in Matlab 2019a version using a 32-Giga RAM 8-Core AMD processor SSD disk and Windows 10 Pro operating system. For this test, we simulate a random network of 30 APs. The Figure 10 shows an example of the distribution of APs and WDs, when the number of the control points is equal to 32 points. The points in red (*), correspond to the control points, WDs, where the coverage calculations are done. They are uniformly distributed: 32 points in each dimension axis of a 2D Cartesian plan. The total number of the coverage area points, including the control points, is equal to 128 ∗ 128 = 16, 384 points. In Figure 11, we show our reference heatmap that represents the coverage calculations result of WLC2 without optimization. These calculations have been done for all the 16,384 coverage area points. Figure 10. The distribution of access points and Wifi clients when the number of control points is equal to 32 points per dimension in a 2D Cartesian plan Figure 11. WLC2 heatmap without optimization 7.2. The effect of modifying the number of control points Our optimization objective is to reduce the number of needed calculations and still obtain an acceptable accuracy of the results. The number of the calculations depends on the number of the control points. In this test, we modify the number of the control points in this range: 128, 64, 32, 16, 8 and 4 points per axis. In Figure 12, we show the visual effect of modifying the number of the control points. We notice how comparable are first, second and third subplots. As a first conclusion, it is, visually, enough to process the coverage at only 6.25% of the total number of the coverage area points to get the same result. In Table 1, we show the mean, median and standard deviation of the difference between WLC2 and N-WLC2 calculations. We check that the mean and median are slightly different from zero when the control points number is : 128, 64, 32 or 16 points per axis. The standard deviation is getting higher for the lower values of the number of the control points number. At this stage, we could state that statistical results: mean, median and standard deviation of 2.51, 2.33 and 24.55 units, respectively, correspond to a visually A NURBS-optimized dRRM solution in... (Mehdi Guessous)
  • 16. 4204 Ì ISSN: 2088-8708 acceptable result. The Figure 13, shows the distribution of the difference between WLC2 and N-WLC2 when the number of control points is modified in the range: 128, 64, 32, 16, 8 and 4 points per axis. We notice a high concentration of patterns around zero value when the control points number is : 128, 64, 32 and 16 points per axis. (a) (b) (c) (d) (e) (f) Figure 12. The visual effect of modifying the number of the control points (a) CP = 128, (b) CP = 64, (c) CP = 32, (d) CP = 16, (e) CP = 8, (f) CP = 4 Table 1. Statistical Results of Changing the Number of Control Points CP 128 64 32 16 8 4 Mean -0.56 -1.39 -2.51 -0.74 6.85 21.26 Median -0.4 -1.05 -2.33 -3.14 -1.84 7.48 Std. Dev 13.42 17.69 24.55 33.24 42.04 48.23 (a) (b) (c) (d) (e) (f) Figure 13. The effect of modifying CP number on the distribution of the calculation difference between WLC2 and N-WLC2 (a) CP = 128, (b) CP = 64, (c) CP = 32, (d) CP = 16, (e) CP = 8, (f) CP = 4 Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
  • 17. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4205 In Figure 14, we plot the coverage required processing time as a function of the number of the control points. We notice that the processing time decreases exponentially with the number of the control points. When the number of the control points is equal to 32 points per axis, the relatively required processing time reduction is almost 93.75%. Figure 14. The effect of changing the number of the control points on the processing time 7.3. Accuracy of results We visually observed that using only 32 control points per axis is sufficient to get an accurate estimation of the coverage area heatmap. We quantified these observations, using statistical variables : mean, median and standard deviation. We’ve seen that a visually acceptable result may correspond to a mean, median and standard deviation almost equal to 2.51, 2.33 and 24.55 units, respectively. To confirm our observation, we redo the previous simulation multiple times. In Table 2, we show the results of 10 iterations of the same simulation. We check that the mean and median values when the number of control points is equal to 32 points, is almost constant. The standard deviation is varying between 15 and 25 units. Table 2. Statistical Results for 10 Iterations of the Same Simulation, CP=32 points Sim. 1 2 3 4 5 6 7 8 9 10 Mean -2.5 -0.3 -0.7 0.1 0.2 -1.6 -0.1 0 -1 -1.1 Median -2.3 -1 -1.2 -1 -0.6 -2.4 -0.9 0.1 -1.7 -2.2 Std. Dev 24.6 15.1 15.9 23.9 13.9 24 16 24.1 16.4 15.9 7.4. Processing time In Figure 15, we plot N-WLC2 processing time results for 10 iterations of the same simulation. We notice that in general, N-WLC2 time is very negligible in comparison with WLC2 time. The N-WLC2 optimization reduces the required coverage relative processing time, in average, by almost 92.58%. Figure 15. Processing time after 10 iterations of the same simulation, CP=32 points A NURBS-optimized dRRM solution in... (Mehdi Guessous)
  • 18. 4206 Ì ISSN: 2088-8708 8. CONCLUSION In this work, we’ve presented our WLC2 dRRM solution in comparison with the idealistic (Zone- based), the simplistic (Range-based) and the vendors’ sRRM category of models. We’ve shown that our solution performs better than vendors’ sRRM solution in a simulated controller-based Wifi environment. But the basic variant of our dRRM solution: WLC2, requires relatively important processing time than the reference models. The N-WLC2 optimization, solved this limitation and allowed us to achieve an average of 92.58% relative time reduction when processing only 6.5% of the total number of the available coverage area points. The accuracy of the results was evaluated both visually and statistically among a large set of patterns. Our N-WLC2 optimization approach does not depend on the Beam-based coverage representation model approach we adopted for the simulation of the coverage area. But the calculations of the coverage, at the control points, are done using the basic variant of our dRRM solution, WLC2. In this preliminary work [4], we’s explored the possibility to optimize the prediction of the coverage area measurements based on environmental variables rather than on an analytical interpretation of the phenomena under study. But the result is not as much important, only 79.99% time reduction. In further work, we explore the possibility to introduce an hybrid approach in predicting the coverage either by adapting the basic machine learning algorithm or using their deep learning counterparts. ACKNOWLEDGMENT We would thank colleagues : researchers, engineers, and reviewers for sharing their precious comments and on-field experience that improved the quality of this paper. REFERENCES [1] M. Guessous and L. Zenkouar, “A novel beamforming based model of coverage and transmission costing in ieee 802. 11 wlan networks,” Advances in Science, Technology and Engineering Systems Journal, vol. 2, no. 6, pp. 28–39, 2017. [2] M. Guessous and L. Zenkouar, “Cognitive directional cost-based transmit power control in ieee 802.11 wlan,” in 2017 International Conference on Information Networking (ICOIN). IEEE, 2017, pp. 281–287. [3] M. Guessous and L. Zenkouar, “Ml-optimized beam-based radio coverage processing in ieee 802.11 wlan networks,” Proceeding of the Electrical Engineering Computer Science and Informatics, vol. 5, no. 5, pp. 564–570, 2018. [4] M. Guessous and L. Zenkouar, “An ML-optimized dRRM Solution for IEEE 802 . 11 Enterprise Wlan Networks,” Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 6, pp. 19–31, 2019. [5] M. Guessous and L. Zenkouar, “A nurbs based technique for an optimized transmit opportunity map processing in wlan networks,” in International Conference on Wired/Wireless Internet Communication. Springer, 2017, pp. 143–154. [6] R. Ruslan and T.-C. Wan, “Cognitive radio-based power adjustment for wi-fi,” in TENCON 2009-2009 IEEE Region 10 Conference. IEEE, 2009, pp. 1–5. [7] D. Qiao, S. Choi, A. Jain, and K. G. Shin, “Adaptive transmit power control in ieee 802.11 a wireless lans,” in The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring., vol. 1. IEEE, 2003, pp. 433–437. [8] N. Ahmed and S. Keshav, “A successive refinement approach to wireless infrastructure network deploy- ment,” in IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006., vol. 1. IEEE, 2006, pp. 511–519. [9] P. R. Kapadia and O. P. Damani, “Interference-constrained wireless coverage in a protocol model,” in Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems. ACM, 2006, pp. 207–211. [10] A. P. Jardosh, K. Papagiannaki, E. M. Belding, K. C. Almeroth, G. Iannaccone, and B. Vinnakota, “Green wlans: on-demand wlan infrastructures,” Mobile Networks and Applications, vol. 14, no. 6, pp. 798–814, 2009. [11] R. Mahapatra, “Radio environment map based radio resource management in heterogeneous wireless net- work,” in Proceedings of 2nd International Conference on Communication, Computing and Networking, C. R. Krishna, M. Dutta, and R. Kumar, Eds. Springer Singapore, 2019, pp. 283–292. Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4189 – 4207
  • 19. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 4207 [12] A. Akella, G. Judd, S. Seshan, and P. Steenkiste, “Self-management in chaotic wireless deployments,” Wireless Networks, vol. 13, no. 6, pp. 737–755, 2007. [13] C. U. Saraydar, N. B. Mandayam, D. J. Goodman et al., “Efficient power control via pricing in wireless data networks,” IEEE transactions on Communications, vol. 50, no. 2, pp. 291–303, 2002. [14] D. Raychaudhuri and X. Jing, “A spectrum etiquette protocol for efficient coordination of radio devices in unlicensed bands,” in 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003., vol. 1. IEEE, 2003, pp. 172–176. [15] F. D. Calabrese, L. Wang, E. Ghadimi, G. Peters, L. Hanzo, and P. Soldati, “Learning radio resource man- agement in rans: Framework, opportunities, and challenges,” IEEE Communications Magazine, vol. 56, no. 9, pp. 138–145, Sep. 2018. [16] L. Liang, H. Ye, G. Yu, and G. Y. Li, “Deep-learning-based wireless resource allocation with application to vehicular networks,” Proceedings of the IEEE, 2019. [17] H. Sun, X. Chen, Q. Shi, M. Hong, X. Fu, and N. D. Sidiropoulos, “Learning to optimize: Training deep neural networks for interference management,” IEEE Transactions on Signal Processing, vol. 66, no. 20, pp. 5438–5453, 2018. [18] H. Sun, X. Chen, Q. Shi, M. Hong, X. Fu, and N. Sidiropoulos, “Deep wireless interference management,” in Proc. Zurich Seminar Inf. Commun., 2018, p. 46. [19] W. Lee, M. Kim, and D.-H. Cho, “Deep power control: Transmit power control scheme based on convo- lutional neural network,” IEEE Communications Letters, vol. 22, no. 6, pp. 1276–1279, 2018. [20] “Radio Resource Management White Paper - Transmit Power Control (TPC) Algorithm [Cisco 5500 Series Wireless Controllers],” Jun. 2016. [Online]. Available: https://www.cisco.com/c/en/us/td/docs/ wireless/controller/technotes/8-3/b RRM White Paper/b RRM White Paper chapter 0101.html [21] “ARM Coverage and Interference Metrics.” [Online]. Available: https://www.arubanetworks.com/ techdocs/ArubaOS 64x WebHelp/Content/ArubaFrameStyles/ARM/ARM Metrics.htm [22] “Lowering the power level to reduce RF interference.” [Online]. Available: https://help.fortinet.com/ fos50hlp/52data/Content/FortiOS/fortigate-best-practices-52/Wireless/Lowering Power Level.htm [23] G. Demengel and J.-P. Pouget, “Math´ematiques des courbes et des surfaces. mod`eles de b´ezier, des b- splines et des nurbs,” edition Ellipses, 1998. [24] S. A. Coons, “Surfaces for computer-aided design of space forms,” Massachusetts Inst Of Tech Cambridge Project Mac, Tech. Rep., 1967. [25] K. J. Versprille, “Computer-aided design applications of the rational b-spline approximation form,” 1975. BIOGRAPHY OF AUTHOR Mehdi Guessous was born in Fez, Morocco, on February 23, 1981. He received the degree of Engineer from Ecole Mohammadia d’Ing´enieurs, Rabat, Morocco, in 2004 and the degree of Mast`ere Sp´ecialis´e en R´eseaux et Services from Telecom SudParis, Evry, France, in 2010, both in networks and telecoms. Since June 2015 he has been with the Department of Electrical Engineering at Ecole Mohammadia d’Ing´enieurs as a PhD student. His research interests include network design, array processing, adaptative algorithms, statistics and machine learning. He is affiliated with IEEE as student member. A NURBS-optimized dRRM solution in... (Mehdi Guessous)