Abstract
A wireless backhaul optimization approach using a delay jitter is suggested to handle the wireless backhaul issue for 5G dynamic heterogeneous situations. First, the delay and delay jitter issues in 5G dynamic heterogeneous situations are carefully evaluated, optimization indicators are defined, and the fundamental backhaul model is further built. Then, considering the optimization action needs, include delay constraints to create better model 1; examine network overload, relax channel number allocation variables to construct improved model 2, and present a matching hierarchical method for a quick solution. The simulation results reveal that the suggested approach has improved delay jitter performance compared with three kinds of current wireless backhaul optimization algorithms.
You have full access to this open access chapter, Download chapter PDF
Similar content being viewed by others
Keywords
Introduction
With the rapid development of science and technology and the continuous improvement of people’s living standards, various types of mobile terminal equipment and mobile Internet services are widely used. It is estimated that by 2030, the number of mobile terminals will be close to 100 billion, and mobile service traffic will increase by nearly 20,000 times (Ge et al. 2019; Wang et al. May 2016). It will be difficult for the existing communication system to meet the access requirements of massive terminals and services in the future. In view of this, the fifth generation mobile communication system (5G) (Zhang et al. 2020; Madapatha et al. 2021) emerges as the times require. On the other hand, with the gradual rise of various interactive multimedia services (such as video conferencing and online games, etc.), delay and delay jitter have increasingly become the most important QoS indicators, and become the key to user service experience (Chaudhry et al. 2020a; Ahmad 2015). The current research mainly focuses on the analysis of the delay characteristics of data packets, and there are relatively few studies on delay jitter. Therefore, it is imperative to study the delay jitter for the 5G environment.
The control of service delay and delay jitter is mainly implemented at the network link layer with the packet as the granularity, and the forwarding scheduling and queue management of the data packets are carried out through the network nodes. At present, the results of studying delay jitter performance with packet as granularity are rare. References (Rezaabad et al. 2018; Hore et al. 2021) have explored the network delay jitter characteristics. Reference (Chaudhry et al. 2020b) uses delay mean square error to approximate the delay jitter for multi-hop wireless Mesh networks and obtains the delay jitter by solving the end-to-end delay distribution. It should be noted that most of the literature on delay jitter research is based on single-point systems, such as only studying the delay jitter of wireless access network or wired core network (Tran and Le 2018; Pham et al. 2019). However, the 5G network must be a complex and diverse heterogeneous network, and the backhaul network is an important part. The unified consideration of the access network and the backhaul network can more truly describe the future 5G network.
Therefore, in the assessment of the existing problems, this paper suggests an optimal channel resource allocation algorithm with delay jitter as the optimization index for the 5G hybrid backhaul scenario. Considering the dynamic characteristics of the channel, the delay jitter problem is comprehensively analyzed, the delay jitter index is obtained, and then various backhaul optimization models are constructed. Finally, the hierarchical algorithm is used to solve the problem quickly.
The rest of the chapter is organized as follows: section “Network Scenarios and System Assumptions” covers the 5G network scenario, section “Analysis of Delay Jitter Indicators” includes the analysis of delay jitter indicators, section “Optimization Model Establishments” includes the proposed model description, section “Improved Model Solutions” includes the improved model, section “Simulation Analysis” includes the simulation detail and result analysis, and at last, section “Conclusions” includes the conclusion and future work.
Network Scenarios and System Assumptions
As shown in Fig. 4.1, for a two-layer heterogeneous network scenario, the upper layer is a Backhaul Aggregator Node (BAN). The lower layer is multiple Small-Cell Base stations (SCBS) covered by the BAN. Dedicated optical fibers link the BAN to the rest of the network, and millimeter waves are used for communication with SCBS or end customers (Iradukunda et al. 2021).
While SCBS uses frequency bands below 6 GHz (Liu et al. 2020) to communicate with users, here, the BAN combines the functions of an aggregator and base station access. Considering the hybrid backhaul scenario, there are two backhaul methods to choose from: the first one, the user can attach to the BAN via a one-hop wireless connection, and the BAN will handle the backup via an Ethernet cable; the second one, the user can access the SCBS to which he belongs, and then owned by.
The SCBS accesses the BAN and the core network through a two-hop wireless link.
Define SCBS set SC = {C1, C2,…, C1,…, CL}, define the user set covered by cell C1 as UE1 = {UE11, UE12,…, UEln,…, UElNl}, where UEln represents the nth user, Nl is the number of users in the cell SC1. It is assumed that all SCBSs have a common channel. Now, the seamless coverage of the entire network is disjoint, that is, UEi⋂UEj = ∅ (i ≠ j). Therefore, the set of users is UE = {UE1, UE2,…, UE1,…, UEL}, then the number of users \(N=\sum_{l=1}^{L}{N}_{l}\).
The access selection vector is defined as
Among them, aln = 1 (n ≤ Nl) means that user n in cell C1 accesses the BAN, and the BAN performs the backhaul; aln = 0 (n ≤ Nl) means that the user n in cell C1 accesses the Cl, and the C1 performs the backhaul.
The channel allocation matrix that defines SCBS is
Among them, bln,m = 1 shows that the bandwidth Wm is allocated to the user UEln, and bln,m = 0 suggests that it is not given. Here, \(W = \left\{ {W_{1} ,W_{2} , \ldots ,W_{{M_{1} }} } \right\}\) denotes the channel vector that SCBS can allocate, and M1 is the total number of SCBS channels.
The BAN channel distribution vector is defined as below, where M2 is the total number of channels in BAN
The number of BAN channels assigned to UEln is denoted by cln and cln 1(l,n). It’s important to remember that users require a certain quantity of BAN capacity whether they use the BAN backhaul or the SCBS backhaul. cln displays the number of channels assigned to the Cl BAN link in the UEln Cl BAN route for UEln packet transmission if aln is set to 1; otherwise, cln displays the number of channels assigned to the UEln BAN link for UEln data packet transmission if aln is set to 0.
The paper’s method has been based on the following principles:
-
(1)
Assuming that the channels are discrete, the BAN can assign different tracks to any SCBS or a particular user. The SCBS can also set other numbers of media to a specific user.
-
(2)
For the service uplink transmission scenario, study the delay jitter index based on packet granularity.
-
(3)
To simplify interference analysis, we will presume that the BAN and SCBS channels have the same total bandwidth, and the BAN's total bandwidth should be larger than the SCBS's total bandwidth.
-
(4)
If the link’s transmission rate is higher than its channel capacity, wireless packet loss will occur; each SCBS has an unlimited wait buffer to prevent packet loss from accumulating (or overcrowding); and if the link experiences packet loss, the transmission mechanism will resume to transmit the packet again.
Analysis of Delay Jitter Indicators
In the wireless communication environment, delay jitter is a physical quantity that measures the delay change experienced by data packets during network transmission—packet delay jitter. Therefore, to analyze the delay jitter problem, it is necessary to examine the delay problem first. Propagation delay and transmission delay are components of link delay. Propagation delays are affected by a number of factors, including the distance over which a signal must travel and the pace at which electromagnetic waves travel. (i.e., the speed of light). Due to the short distances over which 5G signals must travel, transmission delays are negligible. However, data fragment transfer causes a delay, which is known as transmission delay. Therefore, the analysis of the service delay and delay jitter system is analyzed separately below.
Delay Analysis
In this scenario, there are three types of wireless links for UEln: the link \({l}_{ln}^{1}\) for UEln to access BAN, the link for UEln to access SCl \({l}_{ln}^{2}\), and the link for SCl to access BAN correspondingly \({l}_{ln}^{3}\). All link channels are assumed to be subject to small-scale Rayleigh fading. For links \({l}_{ln}^{1}\) and \({l}_{ln}^{3}\), since the same track is not repeatedly allocated in the BAN, there is no interference in the BAN;
Both use millimeter wave communication, and the distance between BANs is relatively long. The above analysis denotes the signal-to-interference noise ratio of the link \({l}_{ln}^{i}\) as \({\mathrm{SINR}}_{ln}^{i}\). If \({\mathrm{SINR}}_{ln}^{i}\) ≥ SINRth, the transmission is considered successful, and the bit error rate \({\mathrm{BER}}_{ln}^{i}\) of the link \({l}_{ln}^{i}\) is calculated.
Channel error correction coding is linked to the data loss rate. It is believed that the capacity of all packages is PL (PL ≥ 3). According to this report, the data package has three mistakes, or bits, and the box is presumed gone. If there is a loss of packets and the data has to be reissued, the packet loss rate is
\({C}_{\uptheta }^{\mathrm{\vartheta }}\) represents the number of combinations to select ϑ elements from θ elements. Link \({l}_{ln}^{i}\) is derived from the packet loss rate average transmission delay for
T represents a transmission delay, while RT is the greatest number of retransmissions.
The latency study of the UE → BAN route is straightforward once we move beyond the connection level. With a one-hop wireless link, the latency introduced by the cable central network is negligible and not worth considering. Therefore, for the UE → SC → BAN path, the time for Packet1, Packet2, Packet3, …, Packet k to reach SC1 is\({\tau }_{ln}^{2}\), 2\({\tau }_{ln}^{2}\), 3\({\tau }_{ln}^{2}\), ···, k \({\tau }_{ln}^{2}\) in sequence. If \({\tau }_{ln}^{2}\)≥\({\tau }_{ln}^{3}\), there is no queue congestion at SCl, so the time to reach BAN is \({\tau }_{ln}^{2}\)+\({\tau }_{ln}^{3}\), 2 \({\tau }_{ln}^{2}\)+\({\tau }_{ln}^{3}\), 3 \({\tau }_{ln}^{2}\)+\({\tau }_{ln}^{3}\),⋯, k \({\tau }_{ln}^{2}\)+\({\tau }_{ln}^{3}\). If \({\tau }_{ln}^{2}\)<\({\tau }_{ln}^{3}\), there is a queuing delay in SCl, so the queuing delay in SClis 0 in sequence, \({\tau }_{ln}^{3}-{\tau }_{ln}^{2}\),2(\({\tau }_{ln}^{3}-{\tau }_{ln}^{2}\)),⋯, (k − 1) (\({\tau }_{ln}^{3}-{\tau }_{ln}^{2}\)), the time for each data packet to arrive at the BAN is is \({\tau }_{ln}^{2}\) + \({\tau }_{ln}^{3}\), \({\tau }_{ln}^{2}\) + \({2\tau }_{ln}^{3}\), \({\tau }_{ln}^{2}\) + \(3{\tau }_{ln}^{3}\),⋯, \({\tau }_{ln}^{2}\) + \(k{\tau }_{ln}^{3}\). Combining the above two situations, the path delay of UE → SC → BAN can be analyzed from the perspective of the expected average; the packet arrival delay interval is max{\({\tau }_{ln}^{2}\),\({\tau }_{ln}^{3}\)}, and the initial delay is \({\tau }_{ln}^{2}\) +\({\tau }_{ln}^{3}\).
Delay Jitter Analysis
Further, the delay jitter of the link \({l}_{ln}^{i}\) can be calculated as
Among them, \({\tau }_{ln}^{i}\) represents the mean transmission delay of the link \({l}_{ln}^{i}\), \({PER}_{ln}^{i}\) represents the packet loss rate, and T represents the one-time transmission delay. Furthermore, Eq. (4.3) describes the fluctuation degree of the transmission delay of the link \({l}_{ln}^{i}\) relative to the average delay in the form of mathematical variance (Chaudhry et al. 2020b).
Spreading from the link to the path, for the transmission of the first data packet, since there is no waiting delay, each component link can be regarded as independent of each other, so the initial delay jitter of the path is the sum of the delay jitter of each component link. For the transmission of subsequent data packets, there are two situations of queuing and non-queuing at intermediate nodes. The packet retransmission mechanism makes the calculation of waiting delay more complicated. At this time, each component link can be regarded as interrelated, so the path. The delay jitter should be less than the sum of the delay jitters of each component link. For simplicity, this paper uses the maximum delay jitter of each component link to approximate the delay jitter of the entire path.
Analyzing the latency and disturbance on the UE → BAN route (where the BAN immediately backhauls UEln) is straightforward. The cable network's backbone can be reached via a single wireless step. It assumes that the wired connection has no delay jitter, the path wireless. The initial delay jitter and the average delay jitter of the incoming side are both \({\sigma }_{\mathrm{ln}}^{i}\). For the UE → SC → BAN path (i.e., the backhaul path where UEln accesses BAN via SC1), its initial delay jitter is \({\sigma }_{\mathrm{ln}}^{2}\) + \({\sigma }_{\mathrm{ln}}^{3}\), and the average delay jitter of subsequent packets is max (\({\sigma }_{\mathrm{ln}}^{2},{\sigma }_{\mathrm{ln}}^{3}\)).
Optimization Model Establishments
Basic Backhaul Model
The optimization goal can be written as, based on the delay jitter study above:
Among them, U represents the optimization objective function of the basic backhaul model, which can be regarded as the sum of the average delay jitter of all user backhaul paths, X*, Y*, and Z* represent the optimal solutions of X, Y, and Z, respectively, and r ≥ 1 is the initial delay jitter compensation factor to reflect the effect of the initial delay jitter. In particular, when max(\({\sigma }_{ln}^{2},{\sigma }_{ln}^{3}\)), the average delay jitter of the two types of paths is the same. In this case, UE → BAN with a more negligible initial delay jitter will be selected as the optimal path.
Then, the basic optimization model can be established:
Based on Eq. (4.6), UEln uses either the SCBS backhaul (for which the SCBS allocates multiple bandwidths) or the BAN backhaul (for which the SCBS does not assign a channel). According to Eq. (4.7), in order to prevent intra-cell crosstalk, each track within a given cell is only shared by a single user. In Eq. (4.8), M2 is the highest number of channels that can be provided by BAN, so the number of channels allotted by BAN must be less than or equal to M2. Equations (4.9) and (4.10) define the value space of aln and bln,m. Finally, Eq. (4.11) indicates that the BAN bandwidth needs to be allocated no matter how the user is backhauled.
Improved Model 1
The basic model only optimizes the delay jitter and ignores the optimization of a service delay, so the delay interval constraint of the backhaul path of user UEln is added:
Among them, εln represents the maximum delay constraint to ensure the basic delay requirements of the business. Therefore, an improved model 1 is constructed:
Improved Model 2
When the number of users exceeds the number of available channels on the network (that is, the network is overloaded), the above model will face an unsolvable problem, namely:
At this time, even if cln = 1(∀l,n), there is still \(\sum\nolimits_{\forall 1,n} {c_{\ln } = N > M_{2} }\).
Since there is insufficient BAN route to satisfy all demands, the admittance control system must be triggered, disappointing some users. As for which users are dismissed and how resources are allocated to admit users, an improvement model 2 needs to be established:
where ω is the adjustment factor, if ω is small, U is inclined to be optimized; if ω is large, \(M_{2} - \sum\nolimits_{\forall l,n} {c_{\ln } }\) is inclined to be optimized to allocate resources to users as much as possible under the premise of ensuring a solution. Also, if cln = 0, the user request is denied.
Improved Model Solutions
Modified Model 1 and Modified Model 2 are fundamentally integer programming. To solve the above models quickly, according to their mathematical characteristics, corresponding solving algorithms are designed based on stratification and branch and bound.
Improved Model 1 Solution
Modified Model 1 consists of the Boolean vector X, the Boolean matrix Solution Y, and the number vector Z. This leads to the optimization problem being decomposed into its component parts. First, the initialization process is given as follows:
Initialization:
-
1.
Generate X = zeros(1, N), Y = zeros(N, M1),
-
2.
Z = ones(1, N)
-
3.
Input: W, C, L, Nl, M1
-
4.
for bln ∈ Y, Wm ∈ W
-
5.
\(if\left(m=\left(\sum_{l=1}^{l-1}{N}_{l}+n\right)\mathrm{mod}{M}_{1}\right)||((\sum_{l=1}^{l-1}{N}_{l}+n)/{M}_{1}\in {N}^{*})\)
-
6.
then bln,m ← 1 end if
-
7.
end for
-
8.
for Wm \(\in \) W, Cl \(\in \) C
-
9.
if \(\sum_{n=1}^{{N}_{l}}{b}_{ln,m}\ge 2\)
-
10.
then bln,m′ = find(bln,m = 1); bln,m′ ← 0; aln ← 1 end if
-
11.
end for
-
12.
Output: Initial solution X,Y,Z
In the first layer, solve for the vector X. Vector X according to Eq. (4.18) to construct multiple subproblems. Each iteration can obtain an optimal solution to the current optimization problem. Among them, \({ff}_{ln}\) represents the value of the formula on the left side of Eq. (4.17), and \({ff}_{0}\) represents its minimum value. In the algorithm, \({f}_{0}\) and { \({f}_{ln}\)} represent the objective function value of the current feasible solution. The first layer of explanation that is, Algorithm 1, is as follows:
Algorithm 1 Algorithm for Computing X Vector
Input: X, Y, Z, M 2 , R, RT, PL
Calculate f 0 ;
-
1.
for aln ∈ X
-
2.
if aln = 0 then
-
3.
aln ← 1; bln,m′ = find(bln,m = 1); bln,m′ ← 0;
-
4.
Calculate \({ff}_{\mathrm{ln}}\), \({f}_{\mathrm{ln}}\);
-
5.
if (\({ff}_{\mathrm{ln}}\) ≤ \({\varepsilon }_{\mathrm{ln}}\))&&(\({f}_{\mathrm{ln}}\)<\({f}_{0}\)) then
-
6.
\({f}_{0}\) ← \({f}_{\mathrm{ln}}\);
-
7.
else bln,m′ ← 1; aln ← 0; end if
-
8.
end if
-
9.
end for
-
10.
Output: optimized value X*Y, \({f}_{0}\)
Matrix Y must be solved in the second layer. Using the first layer’s answer, the remaining channels in the cell have been allocated so as to fulfill the algorithm (17). Users who access SCBS get more channels, which will reduce the packet loss rate accordingly. The second layer of the solution that is, Algorithm 2, is as follows:
Algorithm 2 Algorithm for Computing Y Matrix
Input: X *, Y , Z , W , f 0 , N l , M 2 , ε ln , R , RT, PL
-
1.
for aln ∈ X
-
2.
if aln = 0 then
-
3.
bln,m′ = find(bln,m = 1);
-
4.
for Wm ∈ W
-
5.
if (Wm ≠ Wm′)&&\( (\sum_{{n}{\prime}=1}^{{N}_{l}}{b}_{{\mathrm{ln}}^{\mathrm{^{\prime}}}m}=0)\) then
-
6.
bln,m ← 1; bln,m′ ← 0; Compute fm;
-
7.
if fm < f0 then f0 ← fm;
-
8.
else bln,m ← 0, bln,m′ ← 1 end if
-
9.
end if
-
10.
end for
-
11.
end if
-
12.
end for
-
13.
for aln ∈ X
-
14.
if aln = 0 then
-
15.
while \({ff}_{\mathrm{ln}}\)> εln
-
16.
bln,m′ = find(bln,m = 1);
-
17.
for Wm ∈ W
-
18.
if (Wm ≠ Wm′)&&\((\sum_{{n}{\prime}=1}^{{N}_{l}}{b}_{{\mathrm{ln}}^{\mathrm{^{\prime}}}m}=0)\) then
-
19.
bln,m ← 1; Calculate \({ff}_{\mathrm{ln},m}\); bln,m ← 0 end if
-
20.
end for
-
21.
\({ff}_{\mathrm{ln},{m}^{*}}\) = arg min(\({ff}_{\mathrm{ln},m}\)); bln,m* ← 1;
-
22.
end while
-
23.
end if
-
24.
end for
-
25.
for Wm ∈ W, aln ∈ X
-
26.
if aln = 0 then
-
27.
Set B_temp = find(bln,m = 1);
-
28.
if (bln,m ∉ B_temp)&&\((\sum_{{n}{\prime}=1}^{{N}_{l}}{b}_{{\mathrm{ln}}^{\mathrm{^{\prime}}}m}=0)\) then
-
29.
bln,m ← 1; Calculate fln,m, ffln,m; bln,m ← 0; end if
-
30.
end if
-
31.
[fln,m*] = arg min(fln,m);
-
32.
if (ffln,m* ≤ εln)&&(fln,m* < f0) then
-
33.
f0 = fln,m*, bln,m* ← 1 end if
-
34.
end for
-
35.
Output: optimized value of Y*
In this step, solve the matrix Z. After the first and second layers are solved, the current optimization problem becomes a pure integer programming problem. The remaining channels of the BAN are allocated, and one remaining channel is allocated for each traversal. The third layer of the solution that is, Algorithm 3 is as follows:
Algorithm 3 Algorithm for Computing Z Vector
Input: X*, Y*, Z, f0, L, Nl, M2, εln, r2, RT, PL
-
1.
while \(\sum_{l=1}^{L}\sum_{n=1}^{{N}_{l}}{c}_{ln}<{M}_{2}\)
-
2.
for cln ∈ Z
-
3.
Z′ ← Z; cln = cln + 1; compute fln, ffln; Z ← Z′;
-
4.
end for
-
5.
[fl*n*] = arg min(fln);
-
6.
if (ffl*n* ≤ εln)&&(fl*n* < f0) then
-
7.
f0 ← fl*n*; cl*n* = cl*n* + 1 end if
-
8.
end while
-
9.
Output: optimized value of Z*
The above method for finding a solution can be seen to break down the initial issue into a set of three progressively more difficult challenges iteratively solved according to the characteristics of the solution space. The related problem's optimal solution can be obtained using the branch and bound method, and the iterative solution can gradually converge to the optimal solution of the original problem.
Improved Model 2 Solution
Based on the solution technique of the improved model 1, based on the mathematical characteristics of the enhanced model 2, a three-layer solution technique of the improved model 2 is proposed:
In the first layer, solve the matrix X. Relax (25) and set ω = 0. The solution method is the same as algorithm 1 of the enhanced model 1.
In the second layer, solve matrix Y. The solution process is the same as algorithm 2 of the enhanced model 1.
In the third level, the vector Z must be resolved. It is required to reevaluate the limits of Eq. (4.25) based on the answers found in the first and second layers and to conduct N−M2 repetitions. At each step, the person with the largest delay fluctuation in the present optimization outcome is dropped. Algorithm 4 describes the method used to find the answer.
Algorithm 4 Algorithm for Solving Z Vector
Input: X*, Y*, Z, L, Nl, M1, M2, ω, εln, r, RT, PL
-
1.
While \(\sum_{l=1}^{L}\sum_{n=1}^{{N}_{l}}{a}_{\mathrm{ln}}+\sum_{l=1}^{L}\sum_{n=1}^{{N}_{l}}\sum_{m=1}^{{M}_{1}}{b}_{\mathrm{ln},m}>{M}_{2}\) do
-
2.
for aln ∈ X
-
3.
if aln = 1 then aln ← 0;
-
4.
Algorithm 1; Algorithm 2;
-
5.
compute fln; aln ← 1;
-
6.
else for bln,m ∈ Y
-
7.
Set B_temp = find(bln,m = 1);
-
8.
for bln,m ∈ B_temp then bln,m ← 0 end for
-
9.
Algorithm 1; Algorithm 2; Calculate fln;
-
10.
for bln,m ∈ B_temp then bln,m ← 0 end for
-
11.
end for
-
12.
end if
-
13.
end for
-
14.
[fl*n*] = arg max(fln); al*n* ← 0;
-
15.
bl*n*, 1 ← 0, bl*n*,2 ← 0, …, bl*n*,M1 ← 0;
-
16.
end while
-
17.
for aln ∈ X
-
18.
if (aln = 0)&&\((\sum_{m=1}^{{M}_{1}}{b}_{\mathrm{ln},m}=0)\) then cln ← 0 end if
-
19.
end for
-
20.
Output: optimized solution Z*
Simulation Analysis
The BAN is positioned in the middle of a 500 m * 500 m, and all four are placed evenly at regular intervals. To ensure complete coverage, the SCBS has a typical contact radius of 175 m. Each of the N customers corresponds to one of the N SCBSs, and the N transmission channels are modeled as Rayleigh fading channels. Furthermore, the network’s performance will be directly affected by the value of the number of retransmissions RT: a large RT will increase the transmission delay but decrease the packet loss rate, while a small RT will decrease the transmission delay but increase the packet loss rate. To find a happy medium between transmission lag and packet loss in a real-world system, try RT = 5. Table 4.1 shows additional simulation parameters.
In this paper, we propose the Improved Model 1-Based Solved Algorithm (IM1SA) and the Improved Model 2-Based Solved Algorithm (IM2SA) as two versions of a model-based solved algorithm for wireless backhaul optimization, and we model their performance using three distinct algorithms to evaluate their effectiveness. WBOASBS (Gu et al. 2018) is the wireless backhaul optimization algorithm for single backhaul scenarios, and it belongs to the first class of algorithms. This approach was developed for a particular kind of communication scenario. (that is, all users access the BAN through SCBS for backhaul). The second category of method is the Wireless Backhaul Optimization method for Static Channel Scenarios (WBOASCS) (Zhang et al. 2020). To optimize channel allocation, the third type of algorithm, WBOABIDJ, uses an average delay jitter index that does not take into account channel dynamics. This algorithm is considered for hybrid backhaul scenarios (which include two types of backhaul methods). All three categories of algorithms are very similar to the one presented in this article, and each one is developed with the help of MATLAB. Delay jitter is used as an efficiency metric to evaluate the aforementioned methods. Jitter in this context refers to the time it takes to implement the outcomes of channel distribution derived from various methods into a working network. The typical user delay fluctuation number is determined.
In the situation of minimal service demand, Fig. 4.2 compares the delay jitter of IM1SA, the other three kinds of algorithms, and the number of users (the number of users is less than M2). Increasing the number of users N causes the delay jitter of the four distinct methods to rise steadily, as shown below for varying values of M1; when the number of users is small, the network load is low, and the network performance is at a better level (that is, the link packet loss rate is standard), at this time, the delay jitter of the same algorithm under different M1 is very close; when the number of users is large, the network load is high, and the network performance deteriorates (that is, the link packet loss rate is high), At this time, the higher M1, the smaller the delay jitter of the same algorithm; in any case, the delay jitter performance of IM1SA is always optimal (Table 4.2).
The modeling findings for the light traffic burden scenario are not shown in Fig. 4.2. Once the number of users rises above M2, all four kinds of algorithms will be unable to optimize the system; in other words, they will be useless in an overloaded system. As a result, IM2SA is proposed in this article. In the event of a heavy service demand, the delay fluctuation of IM2SA varies as shown in Fig. 4.3. (that is, the number of users is more significant than M2). As the number of users on IM2SA grows, the delay fluctuation will only vary within a narrow range. The IM2SA delay fluctuation decreases as the number of users, N, increases. Admission management and channel allocation can be efficiently executed by IM2SA.
In the case of IM2SA, the delay jitter performance based on IM2SA is always maintained at a certain level without deterioration (Tables 4.3 and 4.4).
Figure 4.4 shows the different results of the network parameter of IM2SA with the number of users in the case of a high service load (that is, the number of users is more significant than M2). It can be seen that the packet delivery ratio, end-to-end delay, and load of IM2SA fluctuates within a specific range with the increase in the number of users N. Given the number of users, the delay jitter of IM2SA shows a downward trend with the rise in M1. IM2SA can effectively carry out admission control and allocate channels reasonably.
Conclusions
For 5G dynamic diverse situations, this article suggests an optimization method for wireless backhaul that takes delay uncertainty into account. Backhaul optimization metrics are created, and a fundamental backhaul model is built, based on a methodical study of service delay and delay instability in active diverse techniques. Additionally, an optimized model 1 and an optimized model 2 are developed from the vantage points of delay optimization and network overflow, respectively, and a hierarchy method is suggested to handle them efficiently. This article uses a program to demonstrate the efficacy of the method.
Change history
07 October 2023
A correction has been published.
References
Ahmad SA (2015) A waterfilling algorithm for multiple access point connectivity with constrained backhaul network. IEEE Wireless Commun Lett 4(5):517–520. https://doi.org/10.1109/LWC.2015.2451076
Chaudhry AU, Jacob N, George D, Hafez RHM (2020a) On the interference range of small cells in the wireless backhaul of 5G ultra-dense networks. Wireless Telecommun Symp (WTS) 2020:1–6. https://doi.org/10.1109/WTS48268.2020.9198725
Chaudhry AU, Jacob N, George D, Hafez RHM (2020b) On evaluating independent set heuristics for wireless backhaul network capacity of 5G ultra-dense networks. In: 2020b international symposium on networks, computers and communications (ISNCC), pp 1–6. https://doi.org/10.1109/ISNCC49221.2020.9297231
Ge X, Tu S, Mao G, Lau VKN, Pan L (2019) Cost efficiency optimization of 5G wireless backhaul networks. IEEE Trans Mobile Comput 18(12):2796–2810. https://doi.org/10.1109/TMC.2018.2886897
Gu Z, Zhang J, Ji Y (2018) Topology optimization for FSO-based fronthaul/backhaul in 5G+ wireless networks. In: 2018 IEEE international conference on communications workshops (ICC Workshops), pp 1–6. https://doi.org/10.1109/ICCW.2018.8403736
Hore A, Paul A, Maitra M (2021) Cost-effective policy for deployment of dense 5G RAN with fiber and wireless backhaul link. In: 2021 22nd asia-pacific network operations and management symposium (APNOMS), pp 142–147. https://doi.org/10.23919/APNOMS52696.2021.9562687
Iradukunda N, Pham Q-V, Zeng M, Kim H-C, Hwang W-J (2021) UAV-enabled wireless backhaul networks using non-orthogonal multiple access. IEEE Access 9:36689–36698. https://doi.org/10.1109/ACCESS.2021.3062627
Liu Y, Tang A, Wang X (2020) Joint incentive and resource allocation design for user provided network under 5G integrated access and backhaul networks. IEEE Trans Netw Sci Eng 7(2):673–685. https://doi.org/10.1109/TNSE.2019.2910867
Madapatha C, Makki B, Muhammad A, Dahlman E, Alouini M-S, Svensson T (2021) On topology optimization and routing in integrated access and backhaul networks: a genetic algorithm-based approach. IEEE Open J Commun Soc 2:2273–2291. https://doi.org/10.1109/OJCOMS.2021.3114669
Pham Q-V, Le LB, Chung S-H, Hwang W-J (2019) Mobile edge computing with wireless backhaul: joint task offloading and resource allocation. IEEE Access 7:16444–16459. https://doi.org/10.1109/ACCESS.2018.2883692
Rezaabad AL, Beyranvand H, Salehi JA, Maier M (2018) Ultra-dense 5G small cell deployment for fiber and wireless backhaul-aware infrastructures. IEEE Trans Veh Technol 67(12):12231–12243. https://doi.org/10.1109/TVT.2018.2875114
Tran TD, Le LB (2018) Joint wireless access-backhaul network slicing and content caching optimization. In: 2018 IEEE international conference on communications workshops (ICC Workshops), pp 1–6. https://doi.org/10.1109/ICCW.2018.8403710
Wang N, Hossain E, Bhargava VK (2016) Joint downlink cell association and bandwidth allocation for wireless backhauling in two-tier HetNets with large-scale antenna arrays. IEEE Trans Wireless Commun 15(5):3251–3268. https://doi.org/10.1109/TWC.2016.2519401
Zhang H, Huang C, Zhou J, Chen L (2020) QoS-aware virtualization resource management mechanism in 5G backhaul heterogeneous networks. IEEE Access 8:19479–19489. https://doi.org/10.1109/ACCESS.2020.2967101
Zhang Q, Luo K, Wang W, Jiang T (2020) Joint C-OMA and C-NOMA wireless backhaul scheduling in heterogeneous ultra dense networks. IEEE Trans Wireless Commun 19(2):874–887. https://doi.org/10.1109/TWC.2019.2949791
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Copyright information
© 2023 The Author(s)
About this chapter
Cite this chapter
Sharma, A., Soni, M., Nand, A., Singh, S.P., Kumar, S. (2023). Wireless Backhaul Optimization Algorithm in 5G Communication. In: Bhushan, B., Sharma, S.K., Kumar, R., Priyadarshini, I. (eds) 5G and Beyond. Springer Tracts in Electrical and Electronics Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-99-3668-7_4
Download citation
DOI: https://doi.org/10.1007/978-981-99-3668-7_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3667-0
Online ISBN: 978-981-99-3668-7
eBook Packages: EngineeringEngineering (R0)