About this Journal Submit a Manuscript Table of Contents
Journal of Electrical and Computer Engineering
Volume 2012 (2012), Article ID 169026, 10 pages
http://dx.doi.org/10.1155/2012/169026
Research Article

Resource Management in Satellite Communication Systems: Heuristic Schemes and Algorithms

School of Engineering, Ruppin Academic Center, Emek Hefer, Israel

Received 26 February 2012; Revised 30 April 2012; Accepted 1 May 2012

Academic Editor: Yi Su

Copyright © 2012 Shahaf I. Wayer and Arie Reichman. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

The high cost of frequency bandwidth in satellite communication emphasizes the need for good algorithms to cope with the resource allocation problem. In systems using DVB-S2 links, the optimization of resource allocation may be related to the classical multi-knapsack problem. Resource management should be carried out according to the requests of subscribers, their priority levels, and assured bandwidths. A satisfaction measure is defined to estimate the allocation processes. Heuristic algorithms together with some innovative scaling schemes are presented and compared using Monte Carlo simulation based on a traffic model introduced here.

1. Introduction

1.1. DVB-S2 in Satellite Communication

The most popular standard today in satellite communication is DVB-S2 [1], designed for transmission of digital television broadcasting. This relatively new standard is gradually replacing the classic DVB-S [2] in new systems as well as in existing systems. It is also used in new VSAT systems in forward link as well as in reverse link, in cases when the required data rates are higher than those supplied by DVB-RCS [3]. DVB-S2 is also used in satellite modems for point-to-point applications. In this paper we focus on a system that consists of DVB-S2 links with dynamic changes in the required parameters of the links due to changes in the traffic demands.

1.2. Resource Management

In order to save the operational cost of the satellite communication system, transmissions that share the total available frequency band have to be fairly divided according to the requirements of the subscribers [4]. For a star-type system with a central HUB that communicates with subscriber terminals, the control is conducted by the control center in the HUB according to subscriber needs. For other type of systems, like point-to-point, the control is conducted by a dedicated communication and control system that operates in addition to point-to-point links.

Regardless of the way the control is performed, a resource allocation algorithm has to be designed for optimal performances and best satisfaction.

In commercial systems run by a service provider, the Service Level Agreement (SLA), which is a set of parameters that defines the capabilities and the paid rights of every terminal in the system, connects the service provider and the subscribers. The Committed Information Rate (CIR) is the rate that is guaranteed by the system. Typically it is low enough so that the system can guarantee the user of this specific rate. The Peak Information Rate (PIR), on the other hand, is the maximum rate that may be allocated. When the user asks for a rate higher than CIR and lower or equal to PIR, the system will allocate this rate if available. When a user asks for a rate higher than PIR, the system will consider it as if the request was equal to PIR. The service provider has difficulty in providing the Committed Rate with certainty. In this research, we assumed that the bandwidth of a terminal is proportional to its rate. We use the term assured bandwidth as a quantity that the system can provide most of the time but not always.

The terminals have priority levels that determine their significance according to their payment to the service provider. In a situation of low resources, requests from high priority terminals may cause the system to decrease the rate of low priority terminals to their minimum.

In the course of the resource allocation cycle, subscribers issue requests for bandwidth. The bandwidths they own are removed from the spectrum list. The resource allocation process follows, and the bandwidths are reconfigured over the spectrum. This whole process of removing spectrum bands and reconfiguring the spectrum with the newly allocated bands creates gaps (holes) in the spectrum, resulting in a fragmented spectrum. The task of the resource allocation algorithms is to fit the requests into those holes in the spectrum.

In [5] it was shown that this task is equivalent to the multi-knapsack problem (MKP). Two heuristic algorithms were presented together with a single scaling scheme for the bandwidth requests. Scaling down the requests is necessary when their sum exceeds the available bandwidth budget, and utilizing the scaling scheme improves the algorithm results.

In this paper, we review the MKP problem and suggest an extension to it. We then present our idea of combining heuristic algorithms with scaling down schemes. Some innovative schemes are suggested to maximize a defined satisfaction measure and at the same time support the allocation of the assured bandwidth for each subscriber.

In Section 2, the system’s quality of service parameters is presented and performance criteria are defined. The resource management process is presented in Section 3, including the mathematical background for the MKP problem with extension, together with a problem reformulation that may suggest a scaling down strategy as a natural way to solve the extended MKP problem.

Section 4 focuses on the algorithms used for the resource allocation, while Section 5 shows the significance of the scaling schemes. Several schemes are presented, based on the quality of service parameters. Then a simplified example is presented to illustrate the whole process. The techniques used to model the system dynamics are presented in Section 6, while Section 7 compares the performances obtained in simulation. Finally, we draw our conclusions in Section 8.

2. System Parameters and Performance Criteria

2.1. The Quality of Service Parameters

Parameters of quality of service determine the capability of providing better service to network traffic. The system we study assumes some quality of service characteristics for each subscriber. The algorithms presented here take into consideration two such parameters.

(a) Priority Level
A priority factor 𝑤𝑘 is assigned to each subscriber type, such that higher level subscribers get priority in allocation of bandwidth following user request.

(b) Assured Level
Subscribers are guaranteed (with a high probability) to receive the bandwidth they request up to some assured amount Ω𝑘. Any bandwidth above this is optional, up to a maximal value determined by PIR.

These two parameters are used in the definition of the satisfaction measure function and play an important role in algorithm design and optimization of bandwidth utilization.

2.2. Disconnections

The fact that the DVB-S2 links were designed for fixed center frequency and symbol rate would cause disconnections while changing them. Therefore, allocating a new bandwidth to a user causes a disconnection to the subscriber. To take into account this fact, we use effective allocated bandwidth 𝐴 related to the allocated bandwidth 𝐴0 according to: 𝐴=𝛽𝐴0𝐴,(ifdisconnected),0,(otherwise),(1) where 𝛽<1 is a constant expressing the effect of disconnection period, and the assumed dissatisfaction it causes. In this paper, we narrow ourselves to the case where users are not moved in the frequency range if they have no request for a change.

2.3. The Satisfaction Criterion

Resource allocation is conducted according to the requests of subscribers, their priority levels, and their assured bandwidths. For a subscriber with assured bandwidth Ω, a requested bandwidth 𝑅, and an effective allocated bandwidth 𝐴, and assuming that 𝑅𝐴, we suggest the satisfaction measure 𝑆 that may be calculated for a factor 𝛼<1: 𝑆(𝑅,𝐴,Ω)=Ω+𝛼(𝐴Ω)𝐴Ω+𝛼(𝑅Ω),(𝑅>𝐴Ω),𝐴Ω+𝛼(𝑅Ω),(𝑅>Ω𝐴),𝑅,(Ω>𝑅𝐴).(2)

The satisfaction function ranges from 0 to 1. The maximum satisfaction value 𝑆=1 is reached when the allocated bandwidth is equal to the requested bandwidth. Also, one can see that when 𝐴>Ω, the contribution of any increment Δ𝐴 to the function is smaller by a factor of 𝛼<1 than the contribution of the same increment Δ𝐴 when 𝐴<Ω.

In order to reduce the number of variables involved in this formula, we express the satisfaction function in terms of the normalized bandwidth variables: 𝑅𝑟=Ω𝐴,𝑎=Ω,(3) such that the satisfaction measure may be defined as: 𝑆(𝑟,𝑎)=1+𝛼(𝑎1)11+𝛼(𝑟1),(𝑟>𝑎1),𝑎1+𝛼(𝑟1),(𝑟>1𝑎),𝑟,(1>𝑟𝑎).(4)

This is a concave function increasing monotonically both in the 𝑟 direction and in the 𝑎 direction.

For a given set of users with normalized requests and allocated bandwidths 𝑟𝑖, 𝑎𝑖 and priority factors 𝑤𝑖, the total (weighted) satisfaction 𝑆 is defined as: 𝑆=𝑖𝑤𝑖𝑟𝑆i,𝑎𝑖𝑖𝑤𝑖.(5)

The total satisfaction function gets the maximum of 1 when all requests are fulfilled. This quantitative measure may be used to compare the performance of the various algorithms and schemes.

2.4. The Requests Scale Down Criterion

While resource allocation algorithms fit the bandwidth requests into the holes in the spectrum, some holes may become under populated and some over-populated.

The first situation (under population) happens when the sum of requests inserted into a hole does not fully cover it.

The other one (over population) happens when the sum of requests assigned into a hole is greater than the capacity of the hole. In this situation the requests assigned to that hole should be scaled down to fit into the hole capacity.

Let {𝑅𝑗(𝑘)} be the set of requests allocated into a hole 𝐻(𝑘), Then the total amount 𝛿 of the requests bandwidth that is scaled down is: 𝛿=𝑘max𝑗𝑅𝑗(𝑘)𝐻(𝑘).,0(6)

The amount 𝛿 is the requests scale down factor. It measures the effectiveness of the algorithms in finding a good arrangement of the requests into the gaps (holes) in spectrum. A lower value indicates better algorithm performance.

3. The Resource Allocation Process

The disconnections caused while changing frequency and symbol rates pose a serious constraint in the design of optimal allocation algorithms. Therefore, links of terminals that did not require any change should stay in the same location in the spectrum, while new requests should be allocated only in the free portions (holes) of the spectrum.

In this part, we will show that this problem is equivalent to the multi-knapsack problem (MKP) [6] known in computational complexity theory and then draw a scheme for a computational process to cope with it.

3.1. Resource Allocation as a Complexity Theory Problem

The connection between the MKP problem and satellite communication resource allocation was already reported by Birmani [7]. However, his work deals with power allocation and burst scheduling problems, which are inherently quite different in their nature than the bandwidth allocation problems in our concern.

The association between resource allocation in communication and the MKP problem was already observed by Rajkumar et al. [8]. Their research was on a QoS-based Resource Allocation Model (QRAM) for satisfying multiple quality-of-service dimensions in a resource-constrained environment. Using this model, available system resources can be apportioned across multiple applications, thus maximizing the net utility that accrues to the end users of those applications. They showed that the Q-RAM problem of finding the optimal resource allocation to satisfy multiple QoS dimensions is NP hard. There is a similarity between the resources, QoS, and utility factor in their research and the bandwidth, priority level, and satisfaction function in this research. However, in our work the satisfaction function is different than their utility factor and the methods we suggest are simpler to implement.

The task of the resource allocation algorithms is to find an optimal match between a set of 𝑁 requests {𝑅𝑖0𝑖<𝑁} and a set of 𝑀 holes {𝐻(𝑗)0𝑗<𝑀} in a spectrum such that all the 𝑁𝑗 requests are inserted into those holes: 𝑁𝑗𝑖=0𝑅𝐾𝑗(𝑖)𝐻(𝑗),(7) where {𝐾𝑗} are 𝑀 disjoint subsets of indexes: the size of set 𝐾𝑗 is 𝑁𝑗, such that their union covers the set {1,,𝑁}: 𝐾𝑗𝐾=𝜙,𝑗={𝑖𝑖𝑁},(8) where 𝐾𝑗(𝑖) is the 𝑖th element in the set 𝐾𝑗.

The algorithm theory classifies such a problem as a variation of the multi-knapsack problem. Given 𝑀 containers (knapsacks) with capacities 𝐻(𝑗) and 𝑁 items with values 𝑅𝑖, the task is to split the set {𝑅𝑖} into 𝑀 disjoint subsets, such that the sum of item values in each subset will not exceed the given capacities 𝐻(𝑗) as in (7).

Although the set of inequalities in the problem definition resembles a typical linear programming formulation, it is not a linear programming problem. Instead, it belongs to a family of subset sum problems known as knapsack problems.

The knapsack problem is part of the family of combinatorial NP-complete problems [9], meaning that it is computationally difficult to solve in general (except for a 𝑂(𝑀𝑁) brute force solution). It is difficult enough to be chosen as a trapdoor cryptographic function (i.e., the Merkle-Hellman cryptosystem).

Yet the resource allocation problem does not fit the exact definition of a knapsack problem. There is one essential difference: when (7) cannot be fully satisfied, then the target of optimization should be replaced by: 𝑁𝑗𝑖=0𝐶𝑖(𝑗)𝑅𝐾𝑗(𝑖)𝐻(𝑗),0<𝐶𝑖(𝑗),1(9) such that the factors 𝐶𝑖(𝑗) are maximal.

This is a “softer” version of the original problem (7). It extends the problem adding some degree of complexity (finding the factors 𝐶𝑖(𝑗)). On the other hand, it eases the task somewhat, adding several degrees of freedom so that a solution can be found, even in situations where the original problem is practically insolvable.

So, because this is an NP-Hard problem, we shall not try to solve it fully. Instead we may design some practical heuristic algorithms and reach suboptimal solutions [10].

3.2. The Resource Management Process

The resource allocation problem is too complex to be solved at once. Instead of solving (9) directly by a single algorithm, we suggest splitting it into three subproblems:(1) find an initial approximation to the 𝐶𝑖(𝑗) factors;(2) solve the main resource allocation problem;(3) find the final values of the 𝐶𝑖(𝑗) factors.Following this model, the entire resource management process consists of three stages, as illustrated in Figure 1. (1) The prescaling Step. In order for the resource allocation algorithms to operate properly, subscriber requests for bandwidth cannot exceed the available bandwidth budget. However, this situation does occur frequently. To cope with this problem, we suggest the pre-scaling process, to scale down subscriber requests according to the priority factors 𝑤𝑖 and the assured bandwidths Ω𝑗.(2) The resource allocation algorithm finds the best fit between the requests and the holes in the spectrum.(3) The postscaling step is performed in one of the following situations: (a) if the sum of the allocated requests assigned to a hole is bigger than the size of the hole, then the requests should be downscaled; (b) if the sum of the allocated requests assigned to a hole is smaller than the size of the hole, and the requests were downscaled (by means of pre-scaling stage), then they may be upscaled. The allocated bandwidths are scaled up such that their new value will not exceed the original requests, and in addition their sum will not exceed the size of the hole.In either case, the scaling is conducted according to the priority factors 𝑤𝑖 and the assured bandwidths Ω𝑖 in a manner very similar to the prescale stage.

169026.fig.001
Figure 1: The resource allocation process flow chart.

The feedback in Figure 1 marks the transition to the next phase of the algorithm, when new requests are generated.

4. The Resource Allocation Algorithms

Two heuristic algorithms are presented to solve the main resource allocation problem:(i) the Fast MKP solver;(ii) the IBF (Insert to Best Fit) MKP solver.

Both algorithms are classified as greedy algorithms. At each stage they take the locally optimal choice rather than aiming for the global optimum. Such algorithms are widely used to solve heuristically dynamic programming problems.

4.1. The Fast MKP Algorithm

When allocating a request to a hole, we define the residue remainder after the allocation, that is, the size of the hole less the size of the request. The Fast MKP algorithm adopts a strategy of largest residues first, that is, it fits the largest requests to holes with the largest residue in decreasing order.

In order to perform this efficiently, we maintain a binary tree of hole items (sorted by the residue size) to enable a search and insert operation in O(log(M)) time steps [11].

The algorithm consists of the following steps.(1)Make a sorted list of requests in decreasing order (largest to smallest) and a binary tree of residues associated with the hole items.(2)Fit the largest request to the biggest residue hole item.(3)Update the residue value corresponding to the hole item and insert it back into the tree according to the residue value.(4)Discard the request from the list of requests.(5)Repeat steps (2)–(4) until the request list is empty.

This algorithm is efficient with respect to run time and memory consumption.

4.2. The IBF MKP Algorithm

This algorithm adopts a strategy of best fit residue, that is, it fits requests in decreasing order into holes with the residue that fits best (if no residue fits, it inserts to the largest one—). A best fit for any 𝑅𝑗 over a decreasing series of residues {𝑍𝑖}, is any 𝑍𝑖, such that 𝑍𝑖+1<𝑅𝑗𝑍𝑖.(1)Start with a sorted list of requests in decreasing order (largest to smallest) and a binary tree of residues associated with the hole items.(2)Insert the largest request into the hole item, with the smallest residue that is larger than the request.(3)If there is no such residue, insert the request into the hole with the largest residue.(4)Update the residue value corresponding to the hole item and insert it back into the tree according to the residue new value.(5)Discard the request from the list of requests.(6)Repeat steps (2)–(5) until the request list is empty.

The purpose of stage (3) in the algorithm is to ensure that all the requests are inserted into the holes, even when holes become overpopulated. This may involve temporarily assigning negative values to some residues. This is quite legitimate, because the residue values have instrumental meaning only. The postscaling stage described in next section would resolve this problem.

5. The Scaling Schemes

The algorithms presented above perform poorly under a shortage of bandwidth resources. We suggest activating some scaling schemes when the sum of the requests is greater than the sum of the holes. In those cases, such schemes can share fairly the available bandwidth resources, taking into consideration the quality of service parameters in order to resolve the users' diversity issues.

For a set of requests {𝑅𝑖} and a set of holes {𝐻(𝑗)} such that 𝑅𝑅=𝑖 and 𝐻𝐻=𝑖 we introduce scaling schemes to take place when 𝑅>𝐻.

Introducing scaling stages into the allocation process is crucial. It is analogous to adding filters at the entrance and outlet of an electronic system in order to adjust the signal to the dynamic range of a system. The design of scaling schemes may dramatically influence the overall performance of the allocating process just like filters that affect system’s behavior.

We present first the schemes for the downscaling performed in the prescaling step. In correspondence with the quality of service levels [12], we consider several levels of scaling schemes in accordance with the number of parameters taken into consideration:(i)the basic scheme, which takes no parameters;(ii)the priority-oriented scheme, which takes into consideration the priority factors 𝑤𝑖 only;(iii)advanced schemes, taking into consideration the assured bandwidth Ω𝑖 as well as the priority factors 𝑤𝑖.

5.1. The Basic Scaling Scheme

In absence of any priority criteria for sharing the bandwidth, the requests are simply scaled down proportionally to their value: 𝑅(new)𝑘=𝐻𝑅𝑅𝑘.(10)

Such a scheme corresponds to a network system that supports best-effort subscribers only, with no quality of service parameters.

5.2. The Priority-Oriented Scaling Scheme

This scheme takes into consideration only the priority factors 𝑤𝑖. Such a scheme is applicable for network systems that support at least the differentiated service level.

The amount of bandwidth to be reduced is the difference between the sum of requests and the sum of holes: 𝐷=𝑅𝐻.(11)

This amount should be shared proportionally to the requests 𝑅𝑗 (larger requests are reduced more than small ones) and inversely proportional to the priority factors 𝑤𝑗 (higher priority requests are reduced less than the lower ones). So, the request 𝑅𝑗 should be reduced by amount 𝑑𝑗 given by: 𝑑𝑗=𝐶(𝑅𝑗/𝑤𝑗) such that 𝐷=𝑗𝑑𝑗 is the total reduction.

Hence: 𝐷=𝐶(𝑗𝑅𝑗/𝑤𝑗) where 𝐶 is some proportion factor that can be written as: 𝐷𝐶=𝑘𝑅𝑘/𝑤𝑘=𝑅𝐻𝑘𝑅𝑘/𝑤𝑘.(12)

And finally, the requests are downscaled according to: 𝑅(new)𝑗=𝐶1𝑤𝑗𝑅𝑗.(13)

This scheme works unconditionally (but it does not take into consideration the assured bandwidth Ω).

5.3. Advanced Schemes

High-quality network systems should take into consideration the subscribers’ assured bandwidths Ω𝑖, as well as their priority factors 𝑤𝑖. The constraint imposed by the assured bandwidth condition can be expressed as: 𝑅(new)𝑖𝑅min𝑖,Ω𝑖.(14)

This condition could be met only when: 𝐻𝑖𝑅min𝑖,Ω𝑖.(15)

When this condition is satisfied, we can allocate bandwidth taking into account both the priority factors and the assured bandwidths. Otherwise, the priority-oriented scaling scheme should be used.

Our strategy is to grant all the requests below the assured bandwidth and scale down only the others.

The two schemes we present here have the same “prolog”, and differ only in the final stage.(0) Start with a set of indexes 𝐼={1,,𝑁}, where 𝑁 is the number of requests.(1) Split 𝐼 into 2 subsets:𝐼()={𝑖𝑅𝑖Ω𝑖} and 𝐼(+)={𝑖𝑅𝑖Ω𝑖} (the complementary set).(2) Then define 𝐻(+)=𝐻𝑖𝐼(+)𝑅𝑖,Ω(+)=𝑖𝐼(+)Ω𝑖.(16)(3)𝑅(new)𝑖=𝑅𝑖,𝑖𝐼() (“grant requests less than user's assured bandwidth”). (4) Scale the requests in 𝐼(+) using one of the schemes described next.

(i) Difference-Oriented Scaling
Using the difference (𝑅𝑖Ω𝑖) weighted by the priority factors 𝑤𝑖, we get: 𝑅(new)𝑖=Ω𝑖+𝐶𝑤𝑖𝑅𝑖Ω𝑖,𝑖𝐼(+).(17)

In similar arguments used in developing the priority-oriented scaling scheme, we find: 𝐻𝐶=(+)Ω(+)𝑖𝐼(+)𝑅𝑖Ω𝑖𝑤𝑖.(18) (Note that the denominator (𝑅𝑖Ω𝑖)𝑤𝑖 isalwayspositivebecause 𝑅𝑖>Ω𝑖 for all 𝑖𝐼(+)).

(ii) Ratio-Oriented Scaling
Using the ratio (𝑅𝑖/Ω𝑖) weighted by the priority factors 𝑤𝑖, we get: 𝑅(new)𝑖=Ω𝑖+𝐶𝑤𝑖𝑅𝑖Ω𝑖,𝑖𝐼(+),(19) where again by similar arguments we get: 𝐻𝐶=(+)Ω(+)𝑖𝐼(+)𝑅𝑖/Ω𝑖𝑤𝑖.(20)

After the prescaling procedure, the algorithms in Section 4 are applied. This prescaling is a necessary but not sufficient condition to be able to complete the procedure. However, the postscaling can be used to complete it.

5.4. The Postscaling Schemes

The postscaling stage makes the final correction to the allocated bandwidths. It may involve more downscaling to some of the requests. This happens when the allocating algorithm inserts to a hole a set of requests whose sum exceeds the hole size and assigns a negative value to the residue associated with the hole. In this case, the downscaling is performed in essentially same way as in the prescale step, except that the calculations are made separately for each hole 𝑗. Hence 𝐻𝑗 is used instead of 𝐻 and {𝑅𝑖(𝑗)}, and the set of requests allocated to 𝐻𝑗 would replace 𝑅𝑖.

There are situations when the allocating algorithm assigns to a hole requests whose sum is less than the hole size. In this case, if some of the requests were over-decreased in the prescaling stage, they should be now increased back (up to the original amount) to fit the hole size.

5.5. Concluding Remarks

We have presented here some scaling schemes to support fair sharing of available bandwidth resources in shortage conditions.

Naturally, the advanced schemes are expected to perform better than the priority oriented scheme because they take into consideration the assured bandwidths as well as the priority factors.

However, as we have pointed out, the other scaling schemes should not be abandoned. In some exceptional situations (heavy traffic periods for instance), when condition (15) is not satisfied, the priority oriented scheme (or the Basic one) should be used instead.

5.6. An Illustrative Example for the Allocation Cycle

To illustrate the whole resource allocation cycle, consider the following simplified example. Consider three requests issued to the system: 𝑅1=9,𝑅2=5,𝑅3=4.(21) When there are two available “holes” in the spectrum: 𝐻1=9,𝐻2=6.(22) As shown in Figure 2.

169026.fig.002
Figure 2: The initial state of holes and requests.

The sum of the requests 𝑅𝑗=18 is greater than the available space in the spectrum 𝐻𝑖=15, meaning there is deviation of 3, and a scaling phase should take place to address it.

(i) Prescaling
For the sake of simplicity and in order to make it intuitive to the reader, tedious calculations involving QoS parameters considerations are dropped. Instead, we will focus on illustrating the concepts of the scaling stages.

To solve the deviation problem, the prescaling phase can reduce each request by 1. For instance, 𝑅={9,5,4}{8,4,3}.(23) As shown in Figure 3.

169026.fig.003
Figure 3: The state of holes and requests after prescaling.

This way 𝑅𝑗=15, which is exactly the amount of available space.

(ii) Allocation
The residue of 𝐻𝑖 was denoted as 𝑍𝑖. Initially set: {𝐷}={𝐻}. Then:(1)insert 𝑅1=8 into 𝐻1 (with 𝑍1=9) such that the residue is updated to 𝐷1=1;(2)insert 𝑅2=4 into 𝐻2 (with 𝑍2=6) which makes this residue become 𝑍2=2;(3)finally, insert 𝑅3=3 into 𝐻2 (with 𝑍2=2). This makes the residue 𝑍2 receive a negative value: 𝑍2=1!

This state of affairs is presented in Figure 4. The overpopulation situation in 𝐻2 caused by the allocation algorithm is expressed by the overlapping 𝑅2 and 𝑅3 in the figure.

169026.fig.004
Figure 4: The requests inserted to the holes by the allocation algorithm. Notice the overlapping between 𝑅3 and 𝑅4.

As stated in Section 4.2, assigning a negative value to some residues is legitimate as an intermediate stage in calculation, and the task of the postscaling phase is to fix this situation.

(iii) Postscaling
This phase fine tunes the bandwidths allocated. Recall that originally the request 𝑅1 was 9, and then it was reduced to 8 and allocated to 𝐻1, which has a capacity of 9. Obviously the original request can be granted. Thus the final allocation for 𝑅1 should be 𝐴1=9.
𝑅2 and 𝑅3 were allocated to 𝐻2 which has a capacity of 6, but 𝑅2+𝑅3=7, so they should be reduced again to: 𝐴2=3.5 and 𝐴3=2.5 such that 𝐴2+𝐴3=6 to fit the 𝐻2=6 capacity.

So the final resource allocation yields:

𝐴1=9 inserted into 𝐻1=9 and {𝐴2=3.5,𝐴3=2.5} inserted into 𝐻2=6. (See Figure 5).

169026.fig.005
Figure 5: The final state after the postscaling.

6. Modeling the Resource Allocation Process

In order to simulate the system dynamics under the resource allocation process described above, we derived a model to produce the network traffic and the inputs to the process. We distinguish between the demands subscribers have and the requests they issue to the system. New demands for bandwidth emerge for each subscriber in random time steps. We assume that the demands 𝜈𝑘 of subscriber 𝑘 are gamma distributed. 𝜈𝑘Γ𝑚,𝜆𝑘.(24) The gamma distribution [13] is a two-parameter family of continuous probability distributions. It has a shape parameter 𝑚, a scale parameter 𝜆𝑘, and the average value: 𝐸𝜈𝑘=𝑚𝜆𝑘.(25) The traffic models based on random variables with Gamma distribution are used in applications such as video and speech [14, 15]. Such a random variable has a probability distribution with a shape similar to a Gaussian random variable but has only positive values.

The parameters are chosen such that the mean demand of subscriber 𝑘,𝜈𝑘, is proportional to Ω𝑘, the assured bandwidth of subscriber 𝑘, by a constant factor 𝜇: 𝐸𝜈𝑘=𝜇Ω𝑘.(26)

So comparing (25) and (26): 𝜆𝑘=𝜇Ω𝑘𝑚.(27)

In the simulation, the values used are: 𝜇=2.0 and 𝑚=3, as shown in Figure 6.

169026.fig.006
Figure 6: Gamma distribution: Γ(3,2).

We may assign a probability 𝑝 for new demand to emerge such that in time step 𝑛 we have demand 𝜈𝑘(𝑛): 𝜈𝑘(𝑛)=𝜈Γ𝑚,𝜆𝑘,withprobability𝑝,0,withprobability(1𝑝).(28)

We assume that very often user requests are not fully granted. In this situation, a subscriber should request the remainder 𝑅𝑘𝐴𝑘 in the next time step, added to a new demand (if one emerges). This can be modeled by assigning a variable 𝑄𝑘 to each subscriber 𝑘 to accumulate requests 𝑅𝑘, subtract the allocated bandwidth 𝐴𝑘, and add demands 𝜈𝑘: 𝑄𝑘(𝑛+1)=𝑄𝑘(𝑛)+𝑅𝑘(𝑛)𝐴𝑘(𝑛)+𝜈𝑘(𝑛+1).(29)

Stability considerations suggest limiting the request amount a subscriber 𝑘 may issue. In Section 1.1, we called this limit the Peak Information Rate (PIR). We set this limit to 𝜅Ω𝑘, where 𝜅>1 is a constant (𝜅=2 in our simulation): 𝑅𝑘(𝑛+1)𝑄=min𝑘(𝑛+1),𝜅Ω𝑘.(30)

Finally, in order to avoid the penalty of unwanted disconnections associated with new bandwidth allocations, a restriction is superimposed on issuing new requests. Only changes exceeding some threshold can justify issuing new requests. To assure this, we set up a rule: a new request shall be issued only when:||𝑅𝑘(𝑛+1)𝐴𝑘(𝑛)||𝛾𝐴𝑘(𝑛).(31)

In the simulation, 𝛾=0.4 is used.

7. Comparison between Algorithms

Algorithms can be ranked either by their efficiency or by the quality of the results they produce. We shall examine and compare our algorithms in the following aspects:(i)algorithm complexity (memory and time consumption);(ii)distribution of the satisfaction measure 𝑆;(iii)distribution of the requests scale down 𝛿.

We considered a typical system with 4 types of subscribers. Each type has its priority factor 𝑤𝑘 and assured bandwidth Ω𝑘. The system setup is shown in a simulation snapshot presented in Figure 7.

169026.fig.007
Figure 7: The system configuration in a simulation snapshot.

The other simulation parameters are presented in Table 1.

tab1
Table 1: The simulation configuration.
7.1. The Complexity of the Algorithms

Let us consider the complexity of the algorithms (without the scaling part) for 𝑁 new requests and 𝑀holes in the spectrum.

The time complexity of both Fast-MKP and IBF-MKP algorithm is bounded by O(N·log(M)) integer operations, as the search and insert operation in a binary tree is O(log(M)).

The memory complexity of both algorithms is 𝑂(𝑁+𝑀). However, we observed (experimentally) that the IBF-MKP algorithm runs slower than Fast-MKP by no more than 20% on the average. So, both algorithms are very efficient in run-time and memory consumption.

7.2. The Distributions of the Satisfaction Measure

The distributions for the satisfaction measure for the IBF-MKP and the Fast-MKP algorithms are presented by the histograms in Figures 8 and 9, obtained by simulation without the effect of the scaling schemes. For the criterion of satisfaction, the IBF-MKP algorithm achieves better results.

169026.fig.008
Figure 8: Satisfaction histogram IBF-MKP algorithm with priority-oriented scaling scheme.
169026.fig.009
Figure 9: Satisfaction histogram for Fast-MKP Algorithm with priority-oriented scaling scheme.

The effect of the scaling schemes on the satisfaction measure is shown in Figures 10, 11, and 12. The results are presented for the IBF-MKP algorithm only. The scaling schemes do improve results over those obtained without the scaling. The ratio-oriented scaling scheme yields better results than Difference Oriented, while the Priority Oriented scaling scheme is in third place.

169026.fig.0010
Figure 10: Satisfaction histogram for priority-oriented scaling scheme.
169026.fig.0011
Figure 11: Satisfaction histogram for difference-oriented scaling scheme.
169026.fig.0012
Figure 12: Satisfaction histogram for ratio-oriented scaling scheme.
7.3. The Distributions of the “Requests Scale-Down”

The simulation records the amount of bandwidth scaled down in the resource allocation. Table 2 compares the distribution of this variable for the two algorithms (without utilizing the scaling schemes).

tab2
Table 2: Comparison of the “requests scale-down” between the algorithms.

Clearly, the IBF-MKP algorithm achieves better results for the average amount of requests scale-down in the allocation process.

The effect of scaling schemes on the requests scale-down factor 𝛿 is compared in Table 3, which presents results where again the algorithm is the IBF-MKP.

tab3
Table 3: Comparison of the requests scale-down for different scaling schemes.

As expected, scaling schemes improve the scale-down results. The ratio-oriented gives the best results, while the difference-oriented is somewhat less effective, and the priority-oriented offers the least effectiveness.

The difference is probably due to the ability to grant all requests below the assured bandwidth. This approach makes these advanced scaling schemes superior to other schemes.

8. Conclusion

In a rapidly evolving communications market with ever-growing demand for more bandwidth, a good resource management mechanism is essential for efficient digital communication of any kind. The algorithms suggested here together with the scaling schemes successfully perform this task with reasonable computational complexity, producing a high-quality resource allocation with remarkable performance.

Acknowledgments

The authors wish to acknowledge the cooperation of Ayecka Communication Systems Ltd. and the support of the MAGNETON program of the Israel Ministry of Industry, Trade and Labor.

References

  1. ETSI: EN 302 307, Digital Video Broadcasting (DVB), “Second generation framing structure, channel coding and modulation systems for Broadcasting, Interactive Services, News Gathering and other broadband satellite applications (DVB-S2),” European Standard (Telecommunications series), 2005.
  2. ETSI: EN 300 421, Digital Video Broadcasting (DVB), “Framing structure, channel coding and modulation for 11/12 GHz satellite services (DVB-S),” European Standard (Telecommunications series),1994.
  3. ETSI: EN 301 790, Digital Video Broadcasting (DVB), “Interaction channel for satellite distribution systems (DVB-RCS),” European Standard (Telecommunications series), 2005.
  4. G. Giambene, Resource Management in Satellite Networks Optimization and Cross-Layer Design, Springer, 2007.
  5. S. I. Wayer and A. Reichman, “Resource management in satellite communication systems—Heuristic algorithms,” in Proceedings of the IEEE 26th Convention of Electrical and Electronics Engineers in Israel (IEEEI '10), pp. 342–346, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. D. Pisinger, “A Minimal Algorithm for the Bounded Knapsack Problem,” INFORMS Journal on Computing, vol. 12, no. 1, pp. 75–82, 2000. View at Scopus
  7. V. Birmani, Resource allocation for Ka-band broadband satellite systems [M.S. thesis], University of Maryland, 1999.
  8. R. Rajkumar, C. Lee, J. P. Lehoczky, and D. P. Siewiorek, “Practical solutions for QoS-based resource allocation problems,” in Proceedings of the 19th IEEE Real-Time Systems Symposium, pp. 296–306, December 1998. View at Scopus
  9. S. Goddard , “P, NP, and NP-Complete,” CSCE 310J lecture notes on “Data Structures & Algorithms”, University of Nebraska-Lincoln, http://www.cse.unl.edu/~goddard/Courses/CSCE310J/Lectures/Lecture10-NPcomplete.pdf.
  10. M. Hifi, M. Michrafy, and A. Sbihi, “Heuristic algorithms for the multiple-choice multidimensional knapsack problem,” Journal of the Operational Research Society, vol. 55, no. 12, pp. 1323–1332, 2004. View at Publisher · View at Google Scholar · View at Scopus
  11. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, MIT Press, 2nd edition, 2001.
  12. Quality of Service Networking, http://docwiki.cisco.com/wiki/Quality_of_Service_Networking.
  13. A. Papoulis, Probability, Random Variables, and Stochastic Processes, McGraw-Hill, New York, NY, USA, 2nd edition, 1984.
  14. M. Menth, A. Binzenhöfer, and S. Mühleck, “Source models for speech traffic revisited,” IEEE/ACM Transactions on Networking, vol. 17, no. 4, pp. 1042–1051, 2009. View at Publisher · View at Google Scholar · View at Scopus
  15. O. Rose, “Simple and efficient models for variable bit rate MPEG video traffic,” Performance Evaluation, vol. 30, no. 1-2, pp. 69–85, 1997. View at Scopus