chapter 3 channel allocation and multi-agent system: a literature...
TRANSCRIPT
sectoring, splitting, and micro-cell zone concept are also discussed to improve the
capacity of a cellular system by increasing S/I. The major objective of these methods is to
increase the number of subscribers in a system.
Chapter 3
Channel Allocation and Multi-agent System: A
Literature Survey
3.1Introduction
Though there has been a remarkable increase in the mobile user population, the narrow
radio spectrum allocated for communication is limited. The channel allocation aims to
allocate number of channels to each cell in such way that maximum frequency spectrum
utilization takes place and interference is minimized. In this chapter various schemes that
are used to allocate channels to the cells are reviewed and performance of each of these
schemes is discussed.
3.2The Channel Allocation Problem
The Channel Allocation Problem has two aspects [80]:
i. Frequencies are allocated to a pair of wireless communication connections in such
a way that data transfer between every connection is possible. The frequencies must
be selected from a pre-specified set and different frequencies should be allocated to
each connection. For bidirectional traffic, two frequencies should be selected one for
each direction.
ii. The frequencies allocated to different connections may interfere with each other
resulting in a loss of signal quality. The following two conditions must be satisfied
for interference to take place:
a) The frequencies must either be close on the electromagnetic band or
harmonics of one another. However, latter effect is very limited.
44
b) The two interfering connections must be very close to each other. The
interfering signals must have similar energy levels at the positions where they
may disturb each other.
The radio frequency band [fmin, fmax] provided to service provider is generally partitioned
in a set of channels, and all the channels are having same bandwidth δ of frequencies.
The channels are generally numbered from 1 to N, where N = (fmax - fmin)/ δ and the
existing channels are denoted by the domain D = {1, . . . , N}. It may happen that not all
the channels from a domain D are available for a particular connection. The channels
available for a particular connection v form a subset Dv ∈ D and information can be
transmitted from transmitter to receiver on each available channel. Two channels are
required for bidirectional communication, one for each direction. The second channel is
always ignored n the models considered in the literature. Instead of using one band [fmin,
fmax], most of the applications use two bands [f1min, f1
max] and [f2min, f2
max] of N channels:
one with the channels {1, . . . , N}, and another with the channels {s + 1 , . . . , s + N},
where s >> N. Therefore, the backward connection uses a channel which is shifted s
channels up in the frequency domain. The s should be chosen in such way that backward
channels do not interfere with the forward channels. As a result, every allocation for the
forward channels can directly be transformed to an allocation for the backward channels
with comparable performance.
Interference of signals at the receiver is measured by the signal-to-noise ratio or signal-
to-interference ratio. Therefore, the transmitted signal must be clearly understandable.
The noise generally comes due to the presence of other signals using same as well as
adjacent frequencies. There may be more than one sources present in the area that
transmits on the same or a close frequency and, therefore, contribute to the noise at the
receiver. In practical conditions, a threshold value of around 15 dB is found acceptable
for the signal-to-noise ratio. The calculation of the interference level is a hard job, since it
not only depends on the choice of signal and its strength, but also on the environment. If
the environment factor is ignored and considers only the signals transmitted at the same
frequency channel, then the interference at the receiver is computed with the following
formula:
45
P/dγ
where P is the transmitter power and d is the distance to the troubled receiver, whereas, γ
is a fading factor ( 2 ≤ γ ≤ 4). If the interfering signal is transmitted on a frequency, which
is present at a distance of n ≥ 1 units of the original signal, then a filtering factor of -15(1
+ log2n) is also taken into consideration [139]. The fact that the presence of multiple
signals in the area may disturb communication quality, is overlooked in most of the
models. A prominent exception is given by Fischetti et al., in which in order to determine
the interference of neighboring connections, some constraints are developed and another
assumption is the calculation of the levels of interference [124].
The two-way traffic creates several problems, as interference may not be symmetric: if a
transceiver pair (t1, t2) transmitting on frequencies f and (f + s) from t1 to t2, and another
transceiver pair (s1, s2) transmitting on frequencies g and (g + s) where f and g interfere,
(f + s) and (g + s) interfere, the amount of interference at t1 and t2 may be different
because these transceivers may possibly be having different distances from s1 and s2. This
aspect is also overlooked by most researchers.
Based on the application, one or multiple connections may be set between the same end
points. Therefore, this is modeled by assuming that (cz ∈Z+) frequencies are allocated to
connection v. Therefore, with the introduction of an extra value for certain combination
of frequencies (f,g ∈ D), the interference between frequencies allocated to the same
connection can only be avoided. In practical conditions and based on the demand for
connections, the value cz may vary with time. Through this property, the methods
suggested to deal with the channel allocation problem can be divided into three
categories: Fixed Channel Allocation (FCA), Dynamic Channel Allocation (DCA), and
Hybrid Channel Allocation (HCA).
In FCA, radio channels are allocated to each connection in advance and allocation is
based on the forecasted demand. Therefore, in order to satisfy the demand for
connections the radio channel allocation is not allowed to change on-line. Whereas, in
DCA schemes frequencies are allocated on-line to the wireless connections in such a way
46
that the actual demand is met and the interference is minimized. An example of a
procedure for DCA is presented by Janssen [85], who discussed the fixed preference
assignment scheme for DCA. According to this paper, for every cell a preference list of
frequencies exist to meet the demand and the preference lists must be created in such a
way, so that it should be optimal according to some performance measure.
Finally, HCA scheme is a combination of FCA and DCA and is implemented to get an
enhanced overall performance of the network. In HCA schemes some of the frequencies
are allocated to every connection beforehand, whereas rest of the frequencies can be used
for on-line allocation upon request. An example of an HCA scheme is given by
Sandalidis et al., who describe the neural network and genetic algorithm methods for
channel borrowing in order to solve the channel allocation problem [76]. In this scheme,
frequencies are allocated permanently to the connections. However, when the demand for
frequencies exceeds the number of frequencies available in the area, the connection can
borrow an unused frequency allocated to an adjacent connection. The performance of
networks that work on DCA and HCA schemes is generally studied via simulation of the
part time methods. It is also proved by Johri [153] that DCA schemes perform better than
FCA schemes under light traffic and non-uniform traffic loads. However, FCA schemes
perform better than DCA under uniform and heavy load. Katzela and Naghshineh [80]
provided a survey on the topic of FCA, DCA and HCA schemes.
3.3Fixed Channel Allocation
In FCA, fixed numbers of radio channels are allocated to each connection based on the
expected load. The standard representation of a CAP is by means of a graph G = (V,E),
where V is the vertices and E is the edges of the graph, also called the interference graph
or constraint graph. Each connection is represented by vertex v ∈ V. The available
channels for a vertex are denoted by the set Dv ⊆ D. Ci denote the number of frequencies
or channels required for connection v ∈ V. Two vertices v and w for which the
corresponding connection may interfere for at least one pair of frequencies, are connected
by an edge {v,w} ∈ E. For each pair of frequencies f ∈ D, and g ∈ D, the combined
47
choice of frequencies is penalized by a measure depending on the interference level and
pvwfg the penalty. The interference between frequencies f ∈ D, and g ∈ D, allocated to the
same vertex v can be represented in the same way: an edge {v, v} ∈ E and penalty pvvfg.
This can also be modeled in a different way, replacing v and cv vertices and additional
edges between them. In order to reduce the interference, some instances to deal with a
frequency plan are considered, and this reduction in interference happens under minimum
changes of the total frequency plan, therefore, changes in the frequency plan are also
penalized per change. This is modeled with extra penalties imposed on the frequencies to
be selected for each vertex: the choice of frequency f ∈ Dv costs qvf.
Various methods to solve the CAP can be subdivided into two main steams and
frequencies are allocated to each vertex in such a way that either the maximum penalty
incurred by a solution (minmax) is minimized or total penalty incurred by the solution
(minsum).
3.3.1 Minimization of the Maximum Penalty
Instead of calculating a solution where the maximum penalty is minimized [194], [26], a
solution is searched where the incurred interference does not go beyond a given threshold
value. Therefore, certain frequencies and combinations of frequencies are not allowed.
This basically reduces the penalty matrices of the edges to 0, 1 matrices. Frequency
combinations with penalty 0 are allowed, whereas, penalty 1 is not allowed. Therefore,
the objective here is to find a feasible solution, i.e. a solution in which no prohibited
frequency combinations are selected. If such an allocation is present, a second objective
can be introduced. The second objective introduces a preference relation between all
feasible allocations. Therefore, the problem of minimizing or reducing the number of
used frequencies is called the minimum cardinality problem, or minimum order problem.
The objective in this case is to reduce or minimize the span, i.e., the difference between
the highest and lowest frequencies are selected.
If the incurred penalties go above the given threshold value in every allocation, two
solutions are possible. In the first solution, the threshold value can be increased for
48
allowing allocation with greater interference and the other solution is that, the partial
allocation can be searched that does not go over the set threshold penalty. Therefore, the
objective here is minimization of the blocking probability. If in any case mv frequencies
can be allocated to a connection instead of the requested cv frequencies, the probability to
reject a connection can be computed. This probability is called the blocking probability.
Optimal partial allocations can minimize or reduce the overall blocking probability of the
network.
3.3.2 Minimization of the Cumulative Penalty
The minsum method is not commonly seen in practical situations, but in some cases it is
linked with the minmax criterion by introducing the threshold values for penalties that
indicate the maximum acceptable interference. Then the feasible solutions are looked
with a minimum total penalty and no penalty should go beyond the threshold value. For
describing real-world problems, this combined form is found to be most exact, but it is
also the one, for which determining an optimal solution is very difficult.
Four different models to solve the CAP are:
(i) Minimum Order Channel Allocation Problem (MO-CAP)
(ii) Minimum Span Channel Allocation Problem (MS-CAP)
(iii) Minimum Blocking Channel Allocation Problem (MB-CAP)
(iv) Minimum (Total) Interference Channel Allocation Problem (MI-CAP)
3.3.3 Channel Allocation and Graph Coloring
The minmax criterion is strongly linked to generalized coloring problems e.g. T-coloring
or list coloring and this relation have been first explained by Metzger [26] and Hale
[194]. The relation of looking a feasible solution with graph coloring, is due to two basic
modeling aspects: first, the levels of interference (in acceptable and unacceptable levels),
reduces the problem to prohibited combinations and permitted combinations similar to
graph coloring problem, where two adjacent vertices are not allowed to color, with the
same color. Second, in many cases the interference levels are associated with the distance
49
between the allocated frequencies: the smaller the distance between two allocated
frequencies, the larger is the interference level pvwfg. Therefore, interference between the
connections v and w is defined unacceptable if f ∈ Dv and g ∈ Dw are located at a
distance lesser than dvw of each other. The interference is acceptable if the radio
frequencies distance, i.e., | f – g | ≥ dvw is large. Now, if the problem is relaxed by setting
all dvw = 1 for {v, w} ∈ E, which is not far away from reality, then equal choices of
frequencies are penalized for connected vertices. Therefore, frequencies are viewed as
colors, and a solution should have very few edges for which the end vertices are allocated
the same colors.
In a more general setting, it is not permitted to allocate frequencies that is different from
a value contained in a set Tvw (containing 0), i.e., |f - g| ∉ Tvw and if Tvw is defined by
{0,...., dvw - 1} then the problems are alike. However, more general sets with non-
consecutive numbers can also be defined e.g. in UHF television broadcasting the set Tvw
contains non-successive set of integers [194]. If all sets Tvw are, then the problem is
reduced to a T-coloring problem, as introduced by Hale [78]. He properly defined both
minimum span and minimum order variants of T-coloring problem, and linked them to
the channel allocation problem.
Another method to represent the minimum distance constraints is through the use of a
compatibility matrix C, where the rows and columns of the matrix correspond to the
connections. The values Cvw = dvw indicate the minimum frequency separation distance. In
case Cvw = 0, v and w are not adjacent vertices, and no constraint on the allocated
frequencies exists and the constraints are differently depending on the value of Cvw. The
co-channel, adjacent-channel, and co-site constraints can be differentiated based on the
values of Cvw. The co-channel and adjacent-channel constraints are commonly used to
define a difference between values, if Cvw = 1 (same frequencies cannot be allocated to
both the connections), and if Cvw ≥ 2 (adjacent channels cannot be allocated to the
connections), respectively.
3.4Minimum Order Channel Allocation Problem
50
In the minimum order channel allocation problem (MO-CAP), radio channels are
allocated in such a way that no intolerable interference occurs, and the number of
different used frequencies for a particular connection is minimized. Therefore, the
problem can be described as follows:
INSTANCE: Undirected graph G = (V, E), {v,v}∈ E, for all v ∈ V, sets Tvw ⊂ Z, {v, w}
∈ E, 0 ∈ Tvw demand cv ∈ Z+, domain subsets Dv ⊆ Z+ for all v ∈ V, D = Uv∈VDv, and
positive integer K.
QUESTION: Find the minimum order allocation of subsets f : V → 2D such that,
(i) )(vf = cv,
(ii) F(v) ⊆ Dv,
(iii) ∉− gf Tvw,
(iv) U v∈V )(vf ≤ K?
The MO-CAP is the first frequency allocation problem that was discussed in the
literature. According to Hale [194], Metzger [26] has brought this problem into the notice
of operations research society. Therefore, MO-CAP is a clear generalization of the graph
coloring problem.
According to Garey and Johnson [131] Graph K-Colorability is:
INSTANCE: Undirected graph G = (V, E), and positive integer K ≤ |V|.
QUESTION: Is G a K-colorable graph, i.e., does there exist a function f : V → {1,2,.., K}
such that fu ≠ fw whenever {u, w} ∈ E?
Minimum number of colors required to color the graph is expressed as χ (G)- and it is
proved by Karp that Graph K-Colorability problem is NP-complete for all K > 3 [162].
As a result, MO-CAP is NP-complete as well. Garey and Johnson proved that within a
factor 2 approximation of the optimal value is NP-complete as well [130]. Hale proposed
a generalization of graph coloring and is therefore, known as T-coloring [194].
Minimum Order T-Coloring Problem as explained by (Hale [194]) is:
51
INSTANCE: Undirected graph G = (V,E), set T ⊂ Z+, {v, w} ∈ E, 0 ∈ T, and positive
integer K.
QUESTION: Does there exist an allocation f : V → Ζ + such that, fv - fw∉ T for all
{v, w} ∈ E and Uv∈V Fv ≤ K?The minimum number of colors required to color a graph G with respect to a set T is
denoted by χ Τ (G). Cozzens and Roberts have proved that χ Τ (G) = χ (G): Let (fv)v∈V
be a coloring for G, and let (tmax = maxt∈T t+1). Then the coloring (tmaxfv) v∈V is a feasible
T-coloring [39].
As a result, research in this direction has largely been focused on the graph coloring
problem in place of the T-coloring problem, or on the minimum span T-coloring
problem.
Another generalization of graph coloring problem is the List Coloring Problem.
Therefore, Minimum Order List Coloring Problem according to Erdos et al. [152], and
Vizing [192] is:
INSTANCE: Undirected graph G = (V, E), subsets Dv ⊂ Z+ (lists) for all v ∈ V, D = Uv
∈VDv, and positive integer if.
QUESTION: Does there exist an allocation of subsets f : V → D such that,
(i) fv ∈ Dv,
(ii) fv ≠ fw for all {v, w} ∈ E and,
(iii) Uv∈V F(v) ≤ K?
The Minimum Order List Coloring Problem is NP-complete, even for special purpose
graphs the graph coloring problem may be solved in linear time, e.g. for interval graphs
[121].
52
For the common MO-CAP, Aardal et al. [107] has presented an integer linear
programming formulation. For each vertex v and offered frequency f, a binary variable is
introduced:
∈
=
otherwise 0
vertex toassigned is D ffrequency if 1 v
vxvf
Moreover, a binary variable yf denotes the use of frequency f :
∈
=
otherwise 0
sed is D ffrequency if 1
uyf
Then, MO-CAP reads
min ∑∈Df
fy (3.1)
s.t. vc =∑∈Dvf
vfx V ∈∀v (3.2)
xvf + xwg ≤ 1 { } wv Dg DfEwv , , , ∈∈∈∀( ) ( ) ( )( )wvgfTgf vw - ≠∨≠∧∈ (3.3)
xvf ≤ yf vDfVv , =∈∀ (3.4)xvf = {0, 1} vDfVv , =∈∀ (3.5)yf = {0, 1} ∀ Df ∈ (3.6)
The constraints (3.2) model that cv frequencies have to be allocated to connection v ∈ V.
The constraints (3.3) modeled the prohibited set of frequencies, whereas (3.4) specifies
that if the resultant frequency is used by the allocation the variable y is set to. The goal
(3.1) just sums the use of the existing frequencies.
3.4.1 Lower Bounds and Exact Methods
In the CALMA project, Aardal et al. [107] had used integer programming techniques to
solve the problem. Cutting planes were added by them to the formulation (3.1)-(3.6). For
related vertex packing problem, the used cutting planes are very well known suitable
inequalities. Extra preprocessing techniques and particular branching strategies have
actually made it feasible to solve large instances (up to 916 vertices) to optimality. For all
53
the examined instances, optimal values were proved in this way. The lower bounds based
on linear programming (LP) were compared with bounds obtained through combinatorial
arguments like cliques in the coloring number (col.), and the generalized coloring (gcol.).
In all the 4 cases, the linear programming (LP) provided the best bound.
Hurkens and Tiourine calculated minimum order lower bounds of any allocation [36]. In
the constraint graphs, the lower bounds were obtained through the detection of cliques.
The clique lower bound can be enhanced by the combination of the information about
several cliques.
Finally, Kolen et al. applied the constraint satisfaction techniques to the MO-CAP [14].
The optimal solution is reported only for two instances by the combination of lower and
upper bounds created by the proposed technique.
3.4.2 Heuristics
Most of the heuristics for MO-CAP were proposed in the CALMA project. Besides lower
bounding techniques, Tiourine, Hurkens, and Lenstra [36][170] have also applied local
search techniques, e.g. simulated annealing (SA), variable depth search (VDS), and tabu
search (TS) [171]. Tabu search was applied by a group from King's College London as
well [2] [1]. As compared to the tabu search approach, the neighborhood function is less
sophisticated [170]. Moreover, Bouju et al. also applied a General NETwork algorithm
(GENET) for constraint satisfaction problems to the same instances [1]. They got optimal
or near optimal solutions.
A potential reduction (PR) algorithm for the MO-CAP was introduced by Warners et al.
[92] [91]. The algorithm is motivated by Karmarkar's interior point potential reduction
method for combinatorial optimization problems ([13], [141], [142]). Pasechnick [42]
enhanced the performance of the algorithm, and the optimal values of the instance
GRAPH 14 were proved.
Genetic algorithm was applied to the instances by Kapsalis et al. [4]. The obtained results
are found less satisfactory than the other algorithms, and the optimal solutions have been
54
obtained only for two instances. Crisan et al. [31] applied evolutionary search (ES) to
MO-CAP. Evolutionary search performs the repetitive mutation of a solution according
to a certain mutation operator. The performance of an evolutionary search algorithm was
investigated on a CALMA instance, and the search space was analyzed in order to get
some information on the difficulty of the instances. They found that there is very less
association between two good frequency allocation plans, than between two good tours in
the traveling salesman problem. This shows that local search techniques will encounter
more difficulties to arrive at the optimum solution for MO-CAP, than similar heuristics
for the traveling salesman problem. Their results with evolutionary search are similar
with the results of simulated annealing, tabu search, and variable depth search [170].
Finally, a genetic algorithm approach was applied by Cuppini [122] to the minimum
order problem. As compared to the other genetic algorithms for CAPs, an allocation is
represented by |D| genes of N = ∑ ∈VvvC elements (in the majority genetic algorithms |
V| genes of size |Dv| are used to represent an allocation).
3.5 Minimum Span Channel Allocation Problem
In the minimum span channel allocation problem (MS-CAP), the problem is to allocate
frequencies in such a way that no intolerable interference should occur, and the difference
between the maximum and minimum used frequency (the span), is minimized [194].
Therefore, the problem has been described as follows:
INSTANCE: Undirected graph G = (V, E ) , {v, v} ∈ E, for all v ∈ V, sets Tvw ⊂ Z,
{v, w} ∈ E, 0 ∈ Tvw, demand cv ∈ Z+, domain subsets Dv, ⊆ Z+ for all v ∈V, D = Uv∈
VDv and positive integer K.
QUESTION: Does there present an allocation of subsets f : V → 2D such that,
(i) )(vf = cv,
(ii) F(v) ⊆ Dv,
(iii) ∉− gf Tvw for all {v, w} ∈ E, f ∈ f(v), g ∈ f(w), v ≠ w or f ≠ g , and
(iv) max Uv∈VF(v) – min Uv∈VF(v) ≤ K?
55
The problems MO-CAP and MS-CAP are comparable [194], if Dv = Z+ and Tvw = {0}.
However, there exist examples in which neither a minimum order allocation with
minimum span, nor a minimum span allocation with minimum order is present. The
minimum span T-coloring got lot of attention, due to its association with both the
coloring problem and the MS-CAP. A survey on T-coloring problems was presented by
Roberts [64]. Theoretical results on T-coloring for MS-CAP are taken by Griggs and Liu
[93] and Liu [50]. A survey on frequency allocation problems with importance on the
relation with graph theory was presented by Murphey et al. [161].
Several authors have analyzed coloring problems associated to MS-CAP. Lower and
upper bounds were presented by Kubale [125], and considered exceptional cases for a
graph-coloring problem associated to the MS-CAP in which each vertex v is colored with
cv consecutive colors. Like in the MS-CAP the span of the allocation should be
minimized. Kubale presented the complexity results for another minimum span coloring
problem with prohibited colors (minimum span list coloring) [126].
De Werra and Gay studied the interval T-coloring problem, in which c consecutive colors
are allocated to v in such a way that the allocation does not violate the sets Tvw [48]. This
problem is comparable to an asymmetric MS-CAP, i.e. a CAP in which, instead of | f – g|
∈ Tvw, f-g ∈ Tvw have to be satisfied, where Tvw ⊂ Z may also contain negative numbers,
and is not essentially symmetric with respect to 0. Upper bounds were also derived on the
minimum span of the asymmetric MS-CAP. Additionally, a heuristic based on the graph
coloring algorithms of Brelaz was also applied on randomly generated instances [58].
An integer programming formulation related to (3.1)-(3.6) is as follows:
min zmax - zmin
(2.7)vc =∑
∈Dvf
vfx Vv ∈∀ (3.8)
xvf + xwg ≤ 1 { } wv Dg DfEwv , , , ∈∈∈∀( ) ( ) ( )( )wvgfTgf vw - ≠∨≠∧∈ (3.9)
56
2
6 7
3 2 4 2 5
8 2 9 10
13 14 16 17
19 20 321 2
8 25
15 18
8 2 8 2 8
52 2 77 28
15 57 28
10 13 8 2
xvf ≤ yf vDfVv , =∈∀ (3.10)zmax ≥ fyf ∀ Df ∈ (3.11)zmin ≤ fmax – (fmax – f )yf ∀ Df ∈ (3.12)
xvf = {0, 1} vDfVv , =∈∀ (3.13)yf = {0, 1} ∀ Df ∈ (3.14)zmin - zmax ∈ Z+ (3.15)
where fmax = maxf∈Df is the maximum available frequency, and zmin and zmax are extra
variables for the minimum and maximum used frequency, respectively. The constraints
(3.11) and (3.12) assure that these variables are set to the right values.
However, other ways to model the objective can also be applied. For instance, binary
variables lf and uf can also be instead of using y and z variables:
∈
=
otherwise 0
arg 1
usedthat isncyest frequeltheis Dfiflf
And
∈
=
otherwise 0
arg 1
usedthat isncyest frequeltheis Dfifuf
Then the objective (3.7) can be replaced by
min )(∑∈
−Df
ff luf
and the constraints (3.10)-(3.12) have to be replaced by
∑∈
=Df
fl 1
∑∈
=Df
fu 1
xvf + lg ≤ 1 gfDgfVv v <∈∈∀ ,,,
xvf + ug ≤ 1 gfDgfVv v >∈∈∀ ,,,
57
2
6 7
3 2 4 2 5
8 2 9 10
13 14 16 17
19 20 321 2
8 25
15 18
8 2 8 2 8
52 2 77 28
15 57 28
10 13 8 2
1 1 1 2 2 2
1 2 2 3
1 2 1 2 1 1
1 1 2 2 2 1
1 1 2 2 2 1
1 1 1 2 1 1
1 1 1 2 1
1 1 22 2 5
1 1 1 2 1 1
1 1 2 2 2 1
1 1 2 2 2 1
1 1 1 2 1
1 1 2
In case Dv = D for all v ∈ V and D consist of consecutive numbers, minimization of the
span is equal to minimization of the maximum frequency used. So, in that case the zmin
variable (or lf variable) can be deliberately left out of the formulation.
BENCHMARK INSTANCESTo test the proposed algorithms, several benchmark instances are present. Philadelphia
instances was introduced by Anderson in 1973 [115]. The original instance and certain
other variants of it are widely used afterwards to verify algorithms and lower bounds for
the MS-CAP. The Philadelphia instances have 21 hexagons denoting the cells of a
cellular network around Philadelphia (see Fig. 3.1). For each cell, a demand cv is given.
Fig. 3.2 shows the actual demand for the original instance P1.
Fig. 3.1: Network Structure
Fig. 3.2: Instance P1
In compliance with [34], the instances are denoted by P1-P9. Some of them are also
allotted as E3-E9 in [165]. In the basic model, co-channel reuse distance d is used to
58
1 2
6 7
3 2 4 2 5
8 2 9 10 11 12
13 14 16 17 18
19 20 321 2
15 8 25
15 18
8 2 8 2 8
52 2 77 28 13 15
31 15 36 57 28 8
10 13 8 2
1 1 1 2 2 2
1 2 2 3
1 2 1 2 1 1
1 1 2 2 2 1
1 1 2 2 2 1
1 1 1 2 1 1
1 1 1 2 1
1 1 22 2 5
1 1 1 2 1 1
1 1 2 2 2 1
1 1 2 2 2 1
1 1 1 2 1
1 1 2
represent interference, and no interference occurs if the distance between centers of two
cells is ≥ d. If the mutual distance is less than d, then it is not allowed to allocate the same
frequency to both the cells. This co-channel case is generalized by forbidden sets T0 ⊆ . .
. ⊆ Tk and replacing the reuse distance d with a series of non-increasing values d0,..., dk.
The following relation holds:
Tvw = Tj-1 whenever dj ≤ dvw < dj-1, j ∈ {1,…..,k}
where dvw is the distance between the two cell centers. The sets Tj are taken as Tj = {0, . . .
,j} for the Philadelphia instances. For instance P1 the values d0,...,dk are 2 3 , 3 ,1, 1,
1,0. So, frequencies allocated to the same site should be at a distance of at least 4 other
frequencies, whereas frequencies allocated to adjacent sites should be separated by at
least 2, and frequencies allocated to a second and third 'ring' of cells should also differ
(see Fig. 3.3). The domains Dv are simply Z+, in which minimization of the span is equal
to the minimization of the maximum frequency used, and there is a difference of one
between minimum span and maximum frequency used.
(a) P1, P3, P5, P7, P9 (b) P2, P4, P6
Fig. 3.3: Philadelphia Instances
A second set of benchmark instances are available via the CALM A project [60].
3.5.1 Lower Bounds and Exact Methods
59
1 1 1 2 2 2
1 1 2 2 3 2 1 1
1 2 1 2 1 1
1 1 2 2 2 1 1
1 1 2 2 2 1 1
1 1 1 2 1 1
1 1 1 2 1
1 1 2
1 2 2 5 2 1
1 1 1 2 1 1
1 1 2 2 2 1 1
1 1 2 2 2 1 1
1 1 1 2 1 1
1 1 2
A lot of research has already been dedicated to lower bounds on the span for the
Philadelphia instances. Gamst presented the first lower bounds for the MS-CAP, with Tvw
= {0,...,k} for some k ∈ Z+, and Dv = Z+, and applied several lower bounds based on
graph theory to instance P1 [3]. The clique bound is the most important bound of Gamst.
Here the vertices S ⊆ V form a clique in the graph G. Tmin, = min{v, w}∈E[s] |Tvw| (with Tvw
is a set of consecutive values). Then the span of any allocation sp(G) ≥ Tmin(∑ ∈−
SvvC 1)
and two more sophisticated bounds are also given. Even though, Gamst only calculated
the lower bounds for P1.
Only few researchers have succeeded in finding better bounds. Janssen and Kilakos
obtained the best bounds, from a polyhedral point of view in the study of minimum span
problem [82], [83]. The traveling salesman problem (TSP) on an associated graph G’ can
be seen as a MS-CAP, i.e. each lower bound for TSP is a lower bound for the MS-CAP
as well. The relation between MS-CAP and TSP was first discovered by Raychaudhuri
[8], and used by Roberts [64] and Smith et al. [49]. They proposed that if G’ be a
weighted complete graph with same vertex set G. The weights jivvw = 0 if {vi, vj} ∉ E,
and jivvw = jivvT + 1 if {vi, vj} ∈ E. H(G’) is the length of shortest Hamiltonian path in
G’, which leads to sp(G) ≥ (G’). Since, the lower bound for the shortest Hamiltonian path
is a minimum spanning tree S(G’), it also holds that sp(G) ≥ S(G’). Janssen and Kilakos
changed the TSP to edge cover polytope and studied the polyhedral structure of this
problem. They also studied the polyhedral structure of the TSP linear programming. For
the studied Philadelphia problem, (P1), a lower bound equal to 426 was also proved.
Shared with an upper bound i.e. 426, this means that the problem is solved [82]. Janssen
et. al. in [84], also examined the polyhedral structure of tile covers formulation for the
MS-CAP.
Smith et al. [49] presented lower bounds based on preprocessing ideas and subgraphs.
Every lower bound on a subgraph of G gives a lower bound on the span of G.
Preprocessing ideas include the removal of vertices with the same neighborhood, and the
removal of vertices can confirm that there is always an allocation achievable within the
lower bound of frequency spectrum. Recently, new lower bounds were computed by
60
Allen et al. using integer programming techniques [169]. They expanded the integer
programming technique for the Hamiltonian path problem, with extra variables and
constraints that represent the MI-CAP. Applications of integer programming techniques,
e.g. Lagrangean relaxation and branch-and-bound improved the lower bounds for small
instances.
New lower bound for the MS-CAP was presented by Sung et al., and based on related
arguments as the bounds of Gamst [37]. The lower bound is as powerful as the TSP
bound for most of the instances. Tcha et al. extended one of the lower bounds proposed
by Gamst [51] [3]. On an alternate instance P1, they also proved that the new lower
bound can certainly improve the lower bound proposed by Gamst.
For the CALMA instances, researchers used the same methods as for the MO-CAP. The
clique lower bound techniques were applied by Hurkens et al. [36], whereas Aardal et al.
[107] used branch-and-cut based techniques on CELAR 05 instance. It turned out from
the analysis that CALMA instances are fairly simple to solve to optimality. In fact, Kolen
et al. [14] reported the optimality results for all instances through constraint satisfaction
techniques.
Giortzis et al. [11] studied the same formulations (3.7)-(3.15) and applied branch-and-
bound along with a branching priority rule on an instances using 58 vertices (cv = 4) and
29 existing frequencies. According to them an optimal solution requires 16 frequencies.
3.5.2 Heuristics
The first heuristics for MS-CAP (e.g., Philadelphia instances) were proposed in 1970s.
Box and Zoellner et al. introduced the first useful heuristics [61] [88]. The frequencies
are allocated to the vertices based on some order of the vertices. Sivarajan et al. tested
numerous variants of the algorithm on 13 Philadelphia instances and some of the variants
found to be trivial [109]. None of the tested variants performed better than the other ones.
Smith et al. derived lower bounds are shared with a heuristic [43]. The heuristic first
allocate a subgraph in the graph, and then tries to expand the allocation to complete the
61
allocation with the same span. If such an allocation is not possible they expand the
subgraph with an extra vertex, and repeat the procedure. Optimal solutions are offered for
three Philadelphia instances. Hurley et al. described the FAsoft software system, which is
a frequency allocation planning tool based on these results [165]. They also described
several sequential allocation algorithms (like those by Sivarajan et al. [109], as well as
genetic algorithms (GA), tabu search (TS), and simulated annealing (SA)). Valenzuela et
al. applied genetic algorithms to these instances [34]. An allocation is obtained by
allocating frequencies to the vertices of a graph in a greedy way according to the decided
permutation. They applied the algorithm on the Philadelphia instances (P1-P8) and the
optimal solution was found.
Besides lower bound, a heuristic was also described by Sung et al. that provides an
optimal solution in a particular case [37]. They proved that sequential packing algorithm
proposed by them provides an optimal span if only co-channel constraints are considered,
and the hexagonal cell network contains at the most 3 stripes, i.e., represented by only 3
rows of hexagonal cells. The algorithm is generalized, if adjacent channel constraints are
considered. Two versions of the algorithm (GSP1 and GSP2), are applied on the
instances (P1-P4).
A local search method was discussed by Wang et al. for the MS-CAP. First the vertices
were allocated frequencies according to some order [193]. Next, the allocations of two
different vertices were exchanged till the objective improves. If no improvement is
possible anymore, non-deterioration is permitted to escape from local minima. The
algorithm was tested on two Philadelphia instances and on instances shown in Kim et al.
[166]. Kim et al. [166] introduced a two phase heuristic to find a solution of the minimum
span problem. They assumed a hexagonal grid and used patterns containing number of
cells to which same frequency can be allocated. The algorithm is applied on randomly
generated instances.
In the minimum span problem, the work of Lanfear should also be discussed [188]. In his
complete overview of frequency allocation, four algorithms for the MS-CAP were
proposed: an exact search algorithm i.e. branch-and-bound, tabu search algorithm, a
62
simulated annealing algorithm, and an algorithm based on vertex sequencing. The
simulated annealing algorithm can only be tested on instances with constraints limited to
co-channel and adjacent-channel interference (i.e., dvw ∈ {1, 2} for all {v, w} ∈ E).
For CALMA instances, all heuristics were performed uniformly, and found an optimal
solution. Tabu search was applied by Tiourine et al. [36], [170]. GENET and Tabu search
results were reported for CELAR 05 by Bouju et al. [1]. The potential reduction (PR)
scheme was used by Warners [90] to find a solution to both GRAPH 10 and CELAR 05.
Pasechnik [42] also used potential reduction scheme to solve the minimum span problems
and also the minimum order problems were solved as minimum span instances. For
GRAPH 01, the minimal span of 408 could only be provided, while lower and upper
bounds were also derived for the other instances.
3.6Minimum Blocking Channel Allocation Problem
If all allocations contain some undesirable interference, then a partial allocation that
minimizes the overall blocking probability must be found. In the minimum blocking
channel allocation problem (MB-CAP), the problem is to allocate frequencies in such a
way that no undesirable interference should occur and overall blocking probability is
minimized. Therefore, the problem was defined as [108]:
INSTANCE: Undirected graph G = (V, E ), {v, v} ∈ E, for all v ∈ V, sets Tvw ⊂ Z, {v, w}
∈ E, 0 ∈ Tvw, demand cv ∈ Z+, domain subsets Dv, ⊆ Z+ for all v ∈V, D = Uv∈VDv non-
increasing blocking function bv : Z0+ → Z0
+ for all v∈V, and positive integer K.
QUESTION: Does there present an allocation of subsets f : V → 2D such that,
(i) )(vf = cv,
(ii) F(v) ⊆ Dv,
(iii) ∉− gf Tvw for all {v, w} ∈ E, f ∈ f(v), g ∈ f(w), v ≠ w or f ≠ g , and
(iv) ∑ ∈ ≤Vv
Kvfb )(( ?
The special case in which cv = 1, & bv(0) = 1, bv(1) = 0, | Dv | = 1, Dv = Dw for all v, w∈
V, and Tvw = {0} for all {v, w}∈ E , is equal to the maximum independent set problem. As
63
a result, MB-CAP is NP-complete in general. An integer programming formulation with
nonlinear objective for this problem is:
min ∑∈Vv
vv mb )( (3.16)
mv = v
v
vf cDf
x ≤∑∈
Vv ∈∀ (3.17)
xvf + xwg ≤ 1 { } wv Dg DfEwv , , , ∈∈∈∀
( ) ( ) ( )( )wvgfTgf vw - ≠∨≠∧∈ (3.18)
xvf ∈ {0, 1} Vv ∈∀ , f ∈ Dv (3.19)
The constraints (3.17) show that maximum of cv frequencies should be assigned to v ∈ V.
The value mv is used only to simplify the objective (3.16), which minimizes the overall
blocking probability. The objective (3.16) is a generalized version of the Chang et al.
[108]. They modeled the MB-CAP as a non-linear combinatorial optimization problem.
Their objective function actually represents the blocking probability. In compliance with
Chang et al., let λv, be the traffic demand for cell v in Erlang, and mv the number of
allocated channels. Then for a cell v the blocking probability is given by the Erlang B
formula as
B(λv, mv) = ( ) ( )!
0!
1
v
vvv v
m
mm
kk
k
=
−
∑λλ
The average weighted blocking probability for a vertex v is given by
bv(mv) = wv B(λv, mv)
with wv = λv / ∑ ∈Vvvλ the traffic weighting factor. Since, the function B(λv, mv) is
strictly decreasing and convex in mv, and the objective function can be linearized by the
introduction of coefficients αvm= B(λv, m) - B(λv, m - 1) < 0, and the binary variables yvm
denoting
64
∈≤
=otherwise
Vvgned tos are assifrequenciecmleastatify
vvm
0
1
Then, the objective (3.16) reads
min ∑ ∑∈ =
+
Vv
c
m
vmvmv
v
yw1
1 α (3.20)
and the constraint (3.17) reads
1m
∑∑∈=
≤=v
v
Df
vvf
c
vm cxy Vv ∈∀ (3.21)
Note that, yvm = 1 implies yvm-1 = 1, since the function B(λv, mv) is strictly convex, which
implies that αvm strictly increases over m.
Mathar et al. [160] used the same objective. The objective is then simplified to bv(m) =
cv-m, i.e., the unfulfilled demand is minimized, or equally the number of allocated
frequencies is maximized. Therefore, MB-CAP is also called the maximum service
frequency allocation problem.
3.6.1 Lower Bounds and Exact Methods
Chang et al. first linearize (3.16) to (3.20) [108]. Next, a number of patterns are generated
(i.e., a pair (S, f), subset S ⊂ V and a frequency f ∈ D, which can be allocated without
any interference to all the vertices v ∈ S simultaneously). Then, the problem can be
remodeled and Lagrangean Relaxation is implemented on the new formulation.
Furthermore, a grade-of-service (GoS) is described as updating heuristic and their
algorithm was tested on randomly generated instances using a 7 x 7 hexagonal grid
network.
In addition of using co-channel and adjacent-channel interference constraints, represented
by (3.18), Fischetti et al. [124] also kept in mind that the overall interference has to be
limited to a value L,
)1( vf
Vu Dg
ugvufg xMLxpu
−+≤∑ ∑∈ ∈
vDfVv ∈∈∀ , (3.22)
65
where pvufg is the interference level of combination (v, f) and (u, g), and M is a constant
with respect to interference levels. If frequency f ∈ Dv is selected, the total interference
level should be below L, and if f ∈ Dv is not selected, then the constraint is redundant.
The value L represents the signal-to-noise ratio. Fischetti [124] considered only co-
channel and adjacent-channel interference for finding a solution to MB-CAP. Ivu > 0
represent the actual interference level with the use of same frequency for v and u, and
NFD is the Net Filter Discriminator, which is a decreasing factor for adjacent
frequencies. Then (3.22) is reduced to
∑∈
−+≤
+−+
Vu
vfufufvu
ufvu xMLxxNFD
IxI )1()1( vDfVv ∈∈∀ , (3.23)
Fischetti [124] solved the problem with Branch and Cut. Their instances are acquired
from CSELT (a research laboratory associated with TIM, Italian mobile radio managers)
and include up to 203 vertices. Not all the instances can be solved to optimality. The
same instances have also been examined by Mannino et al. [33] and an enumeration
scheme was presented, within the situation of a core search. The core of the problem was
allocated first, and afterwards extends the allocation to the complete problem, without
extra interference. Their algorithm performs better both in optimality and time, than the
Branch and Cut method of Fischetti et al. on all the instances. Mannino [33] also tested
the core search algorithm on numerous instances from TIM. The overall interference
(3.22) is not taken into consideration in these instances.
The problem of minimizing the unfulfilled demand was also examined by Jaumard et al.
[23] (see also [24], [25]). In addition the demand cv, they also considered a minimum
number of required frequencies c-v, resulting in the extra constraint
∑∈
−≥vDf
vvf cx Vv ∈∀ (3.24)
Three different integer programming formulations were compared, one equivalent to
(3.16)-(3.19) and the formulation of Mehrotra et al. [6] for the graph coloring problem,
66
and two set-covering formulations. The formulations were compared with respect to the
quality of the linear programming relaxation. For the better formulation (one of the set
covering formulations), the integrality gap remains important. The column generation
technique is used to solve the linear programming relaxation, and presented proficient
branching scheme, which is to be used within a framework of branch and cut.
Giortzis et al. [11] solved five instances with minimum of 4 and maximum of 58 vertices
and in between 5 and 29 existing frequencies, with standard branch-and-bound algorithm.
To improve the performance of the algorithm, specialized branching priority was applied
on the variables xvf.
Finally, the MB-CAP was also examined by Kazantzakis et al. [129] and Rouskas et al.
[12]. An integer linear programming formulation was presented, which was similar to
(3.16)-(3.19) for the problem. They solved the linear programming relaxation and added
inequalities for the objective values to be integral. However, if the objective value is
integral, the solution can be fractional. The search for an integral solution is performed
through thorough search of the solution space of program describing all integral solutions
with the specified objective value. Computational results are informed on a small test
problem.
3.6.2 Heuristics
Only one heuristic approach is known for the MB-FAP. Mathar and Mattfeldt [160]
applied simulated annealing to the MB-FAP with the same objective as Chang and Kim
[108]. They only took into account the co-channel interference. The quality of their
solutions is examined through the use of special network structures for which optimal
solutions can be computed efficiently.
3.7Minimum Interference Channel Allocation Problem
In addition to the schemes that minimize the maximum interference level, another
approach is specified which minimize the total sum of interference levels. In the
minimum interference channel allocation problem (MI-CAP), limited number of
67
available frequencies is allocated in such a way to minimize the total sum of interference.
The problem can be defined as
INSTANCE: Undirected graph G = (V, E ), {v, v} ∈ E, for all v ∈ V, sets Tvw ⊂ Z, {v, w}
∈ E, 0 ∈ Tvw, demand cv ∈ Z+, domain subsets Dv, ⊆ Z+ for all v ∈V, D = Uv∈VDv
penalty values pvwfg ∈ Z+, for all {v, w}∈ E, f ∈ Dv, g ∈ Dw, and positive integer K.
QUESTION: Does there present an allocation of subsets f : V → 2D such that,
(i) )(vf = cv,
(ii) F(v) ⊆ Dv, and
(iii) ( )∑ ∑
∈≠∨≠∈∈
≤∈−Ewv
gfwvwggvff
vwgfvw KTgfp},{
)()()(),(
?δ
Here, δ (A) is the Kronecker delta function, δ (A) equal to one if logical condition A is
true and otherwise its value is zero.
In several cases, the MI-CAP is used to find the minimum span of a CAP. In this
particular case, it is required to find an interference-free allocation to the vertices, i.e., if
K = 0. This problem is also recognized as feasibility frequency allocation problem.
FEASIBILITY CHANNEL ALLOCATION:
INSTANCE: Undirected graph G = (V, E ), {v, v} ∈ E, for all v ∈ V, sets Tvw ⊂ Z, {v, w}
∈ E, 0 ∈ Tvw, demand cv ∈ Z+, domain subsets Dv, ⊆ Z+ for all v ∈V, D = Uv∈VDv.
QUESTION: Does there present an allocation of subsets f : V → 2D such that
(i) )(vf = cv,
(ii) F(v) ⊆ Dv, and
(iii) ? ),(),(,},{ gforwvwfgvffEwvallforTgf vw ≠≠∈∈∈∉−
An integer programming formulation for MI-CAP can be specified by introducing new
binary variables zvfwg, for all {v, w} ∈ E , f ∈ Dv, g ∈ Dw, with | f - g| ∈ Tvw, and either v ≠
w or f ≠ g:
==
=otherwise
xandxbothifz
wgvfvwfg
0
1 1 1
68
Then MI-FAP reads
∑ ∑∈
≠∨≠∧∈−∈∈Ewv
gfwvTgfDgDf
vwfgvwfg
vw
wv
zp},{
)(,
min(3.25)
s.t. ∑∈
=vDf
vvf cx Vv ∈∀ (3.26)
xvf + xwg ≤ 1 + zvwfg ∀ {v, w}∈ E, f ∈ Dv, g ∈ Dw
( ) ( ) ( )( )wvgfTgf vw ≠∨≠∧∈− (3.27)
xvf ∈ {0, 1} ∀ v∈V, f ∈ Dv (3.28)zvwfg ∈ {0, 1} ∀ {v, w}∈ E, f ∈ Dv, g ∈ Dw
( ) ( ) ( )( )wvgfTgf vw ≠∨≠∧∈− (3.29)
Constraints (3.27) show that both f and g can be allocated to v and w if and only if zvwfg
equal to one, which express an extra penalty in the objective (3.25). Since we assume
pvwfg > 0, the z = 0 if only one of the x variables in (3.27) is set to 1. In case pvwfg < 0, the
constraints
zvwfg ≤ xvf ∀ {v, w}∈ E, f ∈ Dv, g ∈ Dw (3.30)( ) ( ) ( )( )wvgfTgf vw ≠∨≠∧∈− (3.31)
have to be added to the formulation.
Another way to express (3.27) is with the introduction of the variables zvwfg for all {u, w}
∈ E, f ∈ Dv, g ∈ Dw, and the constraints
∑∈
=wDg
vfwvwfg xcz ∀ {v, w}∈ E, f ∈ Dv (3.32)
In case xvf = 0, then the constraints (3.32) enforce that all the variables zvwfg are set to 0 as
well. In case xvf = 1, the constraints (3.32) guarantee that exactly cw, variables zvwfg are set
to 1; the variables zvwfg with xwg = 1.
69
Aardal et al. [107] presented an easy integer linear programming formulation for the case
cv is set to 1. They also assumed that the interference pvwfg is equal for all |f - g| ∈ Tvw.
Instead of zvfwg, a new binary variable zvw was introduced for every edge {v, w} ∈ E.
=otherwise
Tlate and w viocted for vncies selethe frequeifz
wgvw
0
1
∑∈Ewv
vwvwzp},{
min (3.33)
∑∈
=wDf
vfx 1 Vv ∈∀ (3.34)
xvf + xwg ≤ 1 + zvw ∀ {v, w}∈ E, f ∈ Dv, g ∈ Dw : ( )vwTgf ∈−(3.35)
xvf ∈ {0, 1} ∀ v∈V, f ∈ Dv (3.36)
zvwfg ∈ {0, 1} ∀ {v, w}∈ E (3.37)
3.7.1 Benchmark Instances
Eleven benchmark instances are available with the CALMA project. Both single and
combinations of frequency allocations are penalized in the instances (CELAR 09,
CELAR 10, GRAPH 07, and GRAPH 12). There exists a favorite frequency f* for a
number of vertices, which is not selected against a high penalty qv,. Universal preference
between frequencies may be represented with penalties qvf for all v∈V, f ∈ Dv. In that
case the objective (3.33) is
∑ ∑ ∑∈ ∈ ∈
+Ewv Vv Df
vfvfvwvw
v
xqzp},{
(3.38)
3.7.2 Lower Bounds and Exact Methods
Aardal et al. [107] implemented their Branch-and-Cut framework for MO-CAP, to solve
these instances. Unluckily, they failed to solve any of these instances. For two instances,
they got a non-trivial lower bound through this way. Tiourine et al. [36], [170] developed
70
a relaxation of the problem as a quadratic program. A branch-and-bound and
preprocessing algorithm is used to solve the quadratic program (QP). For two CELAR
instances having vertex penalties qvf they were successful to obtain somewhat good lower
bounds. In case of CELAR 06, for constraint optimization problems, De Givry et al.
[164] testified through lower bounding methods that the value of best known solution is
optimal. The verification of optimality was carried by Russian Doll Search algorithm in
[74] on a network of 40 SPARC 4 workstations.
3.7.3 Heuristics
Tiourine et al. [36], [170] implemented Variable Depth Search and Simulated Annealing
on the CELAR instances and got varying success. Warners [90], [92] and Pasechnik [42]
implemented their potential reduction method to MI-CAP without any big success.
Kapsalis et al. [42] proposed a standard genetic algorithm. A genetic algorithm using
optimized crossover was proposed by Kolen [15] to solve the MI-CAP. Instead of a
standard crossover, the crossover routine produces the finest feasible child of two parents.
To generate a child, we have to compute an MI-CAP with |Dv| = 2 for all v ∈ V. This
problem may be solved to optimality through the polyhedral results (see also [5]).
Implemented on the instances of CALMA project, the best results were gathered through
this way.
The instances of CALMA project are not the only problems that have encouraged
researchers to design algorithms for the MI-CAP. However, only CALMA instances can
be considered as benchmark problems, since for all other instances only a single group of
researchers have investigated them. Entire research on these instances has been
performed in the route of heuristic methods. Particularly, genetic algorithms and tabu
search appears to be very popular for the solving MI-CAP. Tabu Search is used by
Castelino et al. [53] to find an allocation with minimal unweighted interference, i.e., pvw,
= 1 for all {v, w} ∈ E. To check the results on large instances, the results were compared
with a Genetic Algorithms and a steepest descent heuristic. Computational results are
informed for instances having upto 75,306 edges and 726 vertices. In all the cases, the
available frequencies are 50. Castelino et al. [54], [55] applied tabu thresholding [63] on
71
the same instances and surrogate constraints [62] are appended to the tabu thresholding
method.
Tabu search was also used by Hao et al. [89] to calculate realistic instances for a network
(CNET) having 600 transmitters. The minimum interference problem was solved to
minimize the span of allocation. An allocation is described in such a way, so that all co-
site constraints are fulfilled. The length of the tabu-list varies during the search. Dorne et
al. [157], [158] implemented evolutionary search on a CNET instances having 300
vertices and cv ∈ {2,3,4}. They also want to minimize the span of allocation by solving
repeatedly MI-CAPs. A mutation operator was also used that focuses on the change of
contradictory frequencies, whereas Dome et al. compared different schemes to minimize
the co-site interference constraints [158]. The performance of crossover operator was also
investigated using genetic algorithm.
Several genetic algorithms are proposed by Crisan et al., Ngo et al., Kim et al.[30], [94],
[195]. Crisan et al. [30] applied a genetic algorithm to MI-CAP with mutation operators
and tailor-made crossover. Real-life instances were solved through this way with around
5500 transmitters. Lai et al. [195] presented a new genetic algorithm to find a solution of
minimum interference problem. Computational results are presented for 2 instances. Ngo
et al. [35] have also applied a genetic algorithm to solve MI-CAP. Special binary
encoding scheme was used by them to deal with the demand cv for all v ∈ V, and the co-
site interference constraints. Smith [104] presented another genetic algorithm as well. In
this case the adjacent and co-channel interference is reduced by a crossover, whereas the
co-site interference is reduced by mutation operator. According to Kim et al. [94]
interference free allocations are obtained by genetic algorithms. Several crossover and
mutation operators were tested by them for Philadelphia instances, where the span of
existing frequencies is set to the lower bound proposed by Gamst [3]. Sivrajan et al. [109]
introduced these instances and for 5 instances, interference-free allocation is present with
span equivalent to the lower bound.
72
In order to solve same instances, Funabiki et al. [140] proposed a neural network
approach. Hysterses McCulloch-Pitts neuron model was used to solve the feasibility
problem, instead of a Hopfield network. This neural network promises to converge to a
local optimum. With the use of some extra heuristics, they hoped that their method
converts to global optimum, which is true in large percentage of the cases. Kunz [56]
used the first neural network approach, and applied a Hopfield network to solve the
problem. Lochtie et al. [73], [72] also applied a neural network method to the MI-CAP.
Only co-channel interference constraint has been taken into consideration in [73],
whereas in [72] the computed results are extended to include adjacent channel
interference as well. Computed results are reported for an instance of a real-life having 58
cells. Smith et al. [106] used another neural network approach, and they demonstrated a
nonlinear integer programming formulation for the problem, and implemented both a
self-organized neural network and Hopfield network to the problem. Kunz [56] compared
the results with simulated annealing on a Philadelphia instances. As compared to the
standard MI-CAP, the interference depends on the distance between the frequencies, and
the difference between allocated frequencies is inversely proportional penalty.
Young [46] applied the same cost function, and demonstrated a local search framework.
A local search method is also implemented by Park et al. [189]. They changed a local
search method for the fc-coloring problem to the feasibility CAP. As neighborhood they
applied color changing (other color for same vertex) and color interchange (swapping two
colors of two vertices). Yet again the feasibility problem is solved to minimize in the
span. Smith et al. [105] described a simulated annealing approach, implemented on a
point-to-point wireless network.
Finally, Borndorfer et al. [155] extended the graph coloring problem of Brelaz [47] and
Costa [59] to the MI-CAP to solve problem instances of size around 4,240 vertices.
DSATUR heuristic produced the best results when combined with local search. Their
algorithm was compared with an algorithm based on a minimum cost flow and T-
coloring heuristics. This last heuristic was also discussed by Borndorfer et al. [156], and
presented an orientation model for the CAP. This actually becomes the foundation for a
two stage heuristic in which outer and inner optimization problems are solved iteratively.
73
The outer optimization problem decides for each edge in the graph which adjacent vertex
is assigned the higher frequency (orientation). The inner optimization problem is to find
an assignment that respects the orientation. The inner optimization problem can be
viewed as a minimum cost flow problem.
3.8 Dynamic Channel Allocation
The allocation of channels to cells discussed so far has been based on fixed channel
allocation (FCA): groups of channels are permanently allocated to given cells according
to certain reuse pattern. Dynamic Channel Allocation (DCA) refers to a variety of
schemes in which channels are allocated to users in a cell according to varying traffic
demands [27]. The two types of DCA schemes are centralized and distributed. In
Centralized DCA, all the available channels are kept in a single central pool from where
the central computer allocates channels to different cells on demand, and the cells return
the channels to the central pool when the call is finished. In the distributed dynamic
channel allocation (DDCA) scheme, the available channels are divided into multiple
equal size groups. Any cell in the cluster can obtain the channel group if one of its
adjacent cells is not holding the same group. The same channel group can be used by the
two base stations if the distance between these two base stations is more than the
minimum reuse distance. In this scheme each base station keeps the storage information
table which stores information about the channels that are presently used by the cell as
well as by neighboring cells.
The option of using DCA for improving system capacity of cellular systems was
proposed by Cox et al. [41]. Many algorithms have been proposed for DCA so far and
each algorithm has its special attributes, whether it is ease of use or enhanced system
performance under traffic overload. Overload refers to the traffic load greater than the
traffic intensity for which the system has supposedly been designed. This might be due to
a huge number of users than anticipated. When the traffic load on the network goes above
certain value, the call blocking and dropping probability increase. A channel allocation
scheme is said to be better than the other if its blocking-probability is low as compared to
the other.
74
Katzela and Naghshineh [80] gave an overview of DCA and proposed various algorithms
using qualitative comparisons, and DCA added flexibility to the entire process of channel
allocation. Different DCA schemes vary in the channel allocations rules and the results
have shown that all DCA schemes perform better than FCA under low and moderate
traffic loads. At heavy loads, FCA performs better since, at these traffic loads, very few
radio channels are normally found free for allocation to a new calls. In addition, when
channel locking was later introduced in DCA, it worsened the situation, so leading to
performance going down.
While implementing DCA, a cell can borrow channels when required, from neighboring
cells. But when the channels are borrowed, other cells are locked from utilizing these
channels due to reuse constraints. Channel borrowing from neighbors in DCA, therefore,
give rise to locking of channel. Under moderate traffic loads, this present no problem and
DCA can adapt to traffic fluctuations from cell to cell. In heavy traffic load, channel
locking forced cells in the network to borrow even more, which ultimately brings down
the performance somewhat, rather than improving it. Channel locking can be described
by reference to Fig. 3.4, in which channels are allocated to seven cells of each cluster as
shown. Neighboring cells cannot reuse the same channels, but may be reused one step
further away. In Fig 3.4, implementation of a DCA scheme is shown, in which cell 1
borrows a channel c1 from cell 7. Then channel c1 is locked, and is not allowed to be
reused in the neighboring cell 1, as well as cells 7’’ and 7’’’ and even it cannot be reused
by cells in the neighborhood of 7’’ and 7’’’ as well. This problem is called channel-
locking problem, which brings down the performance of DCA under heavy loads, due to
reuse restrictions.
This simple borrowing scheme was very strict, and directional locking strategy was later
introduced to improve some of this problem. Referring to the Fig. 3.4 again, the cells 2’
and 1’ on the faraway side of cell 7’, away from cell 1, can borrow channel x from cell 7’
without violating the reuse constraints. In fact, the use of directional locking improves the
performance of DCA significantly.
75
i- 1
Katzela et al. [80], proposed a variety of DCA schemes. These include different channel
allocation rules; strategies of selecting favorite cells for borrowing a channel; allocation
of radio channels to individual cells, with the remaining of the channels kept in the pool
to be allocated when required; using different borrowing schemes for the inner and outer
areas of cell, etc. The BDCL DCA scheme proposed by Zhang et al. [215] proposed a
borrowing with directional channel locking (BDCL) scheme.
Fig. 3.4: Channel Locking
The entire scheme is explained by using three specific features: channel ordering, specify
locking directions, and instant channel reallocation. In channel ordering scheme, different
channels allocated to various cells are numbered. The lowest-numbered channel is given
the highest priority to be allocated to the next call. On the other hand, top priority is
assigned to highest-numbered radio channel to be borrowed by cells present in
neighborhood. Local calls are then allocated channels in order starting from the lowest-
numbered channel; allocating of borrowed channels start with the highest number
channels. Local calls used Immediate channel reallocation, a scheme proposed to pack
channels nearly together; borrowed channels are also packed together. This feature is
comprised of following parts:
76
i- 1
2'
7
2
3
7
1'
3'
6
1
4
6
5"
4'
5
7"
2"'
3"
7" 3" 1"'
1" 6" 4"
6" 4" 5"'
5"
2"
X
i) Packing of local calls: when a call on a lower channel ends and there is an ongoing
on a higher channel, the ongoing call is then shifted to the free lower channel.
ii) When a locally generated call utilizing a locally allocated nominal channel ends
and there is another ongoing locally generated call using borrowed channel, the
latter is then shifted to the nominal channel.
iii) When a call using a borrowed channel terminates, the borrowed channel is then
released, and there ongoing call utilizing a borrowed-channel of lower-numbered
channel, the ongoing call is then moved to the higher numbered channel.
iv) In an interfering cell, when a channel gets unlocked with the termination of a call,
every call on a higher-order channel or borrowed channel is moved to this
channel.
According to Zhang et al. [215], this DCA scheme shows better results as compared to
FCA under moderate loads.
Yeung et al. [213] proposed an approach on a one-dimensional version of above
mentioned scheme, and showed how performance analysis was carried out. If there are a
2m channels present in the system and m channels are allocated to alternate cells. The
first set of m channels are called the a set, and the remaining channels is called the b set.
Fig. 3.5 shows the allocation of the whole one-dimensional set to cells i − 1, i, and i+1.
Suppose, all the m channels in a particular cell i are busy. The new call arrival will be
blocked in this case, if FCA strategy is used. With DCA, if a channel is available, it may
be borrowed either from i − 1 or from i + 1 by i. But If a channel is borrowed from i − 1
(i + 1), the same channel in i + 1 (i − 1) is then locked. Under this scheme using
directional locking, call blocking in cell i happen if all the 2m channels are in use. Then, a
cell i cannot borrow a channel from neighboring cells, even if free channel is available,
since that channel might be in use in the some other neighboring cell.
77
bb a
i i- 1 i - 1
Fig. 3.5: Channel Allocation in One-dimensional Cellular System
The analysis of this strategy on three cell system and comparison with FCA was
performed by Yeung [213]. The succeeding examination of three-cell system is then
generated a tight upper bound.
This observation was developed by Yeung [213] as follows: For example, One or more
channels are lent by a cell i to its neighbors. It may either borrow or not borrow channels
from its neighbors. Suppose, k channels are lent by cell i to cell i + 1, numbered from m -
k + 1 to m. The cell i + 1 already had m calls, and thus has m + k ongoing calls. If a call
arrives in cell i, there are two possibilities: i) the number of ongoing calls in cell i is less
than m – k, therefore, i may be able to handle the call directly. ii) the cell i has m − k
ongoing calls. In this case, cells i and i + 1 have occupied 2m channels. Therefore, a
channel cannot be borrowed from cell i - 1 by cell i, so the new call is blocked.
Borrowing of channels fails to spread because of this analysis. Thus, the calculation of
blocking probability for three-cell group might be performed by dissociating the group
from the remaining one-dimensional network and handling it separately.
L. Sun et al. [185] presented an integrated artificial intelligence based optimized cellular
radio channel allocation algorithm. The new scheme contains Genetic Algorithm based
channel allocation method, and is compared with both conventional and random channel
allocation methods. The results have presented 30% improvements in signal to noise ratio
and 80% less calls get dropped while using this new method
A cost function based Dynamic Channel Allocation scheme was proposed by M. Bublin
et al. [29] but this scheme has performed well under certain specified loads and for
certain services. This scheme has special cases used minimum interfernce, reuse
partitioning to evaluate the performance. The results have shown that this scheme has
performed substantially better than the other scheme with low computational overhead
and signalization.
78
Azzedine Boukerche et al. [20] reviewed various distributed dynamic channel allocation
algorithms based on mutual exclusion. The first three algorithms were based on co-
channel interference, whereas the fourth algorithm used co-group interference method.
Experiments of these four algorithms were conducted on realistic scenarios and the
results have shown that fourth algorithm gave highest blocking rate and lowest response
time.
Shengming Jiang et al [178] investigated different channel allocation schemes, which
were used in distributed timid dynamic channel allocation with seamless handoff policy
(DCA-DT/SLH), channel carrying first (CCF) and channel carrying last (CCL). The
study has shown that CCL generally outperforms CCF, and DCA-DT/SLH without
channel carrying, handoff calls might show higher call dropping if no priority is given to
handoff calls while such undesirable situations can easily be avoided by channel carrying.
While channel carrying in DCA-DT/SLH performs better than the guard channel (GC) in
FCA and can also slightly improve the performance of GC in DCA-DT/SLH.
Jianchang Yang et.al. [99] presented a fault-tolerant channel allocation algorithm for
cellular network with mobile base stations and studied scheduling algorithms exploiting
the multi-user selection diversity. The channel dynamics were also taken into
consideration using a novel approach based on the level-crossing analysis of stochastic
processes. Then, a connection is made between the Doppler frequency shift, which
indicates the channel temporal correlation, and the average (channel) access time, the
average waiting time between accesses, and the average access rate of active users. These
properties are important for the scheduler design, especially for applications where delay
is a concern. In addition, analytical expressions for the system throughput and the degree
of fairness when users have non-identical average channel conditions are presented.
These expressions quantify the effect of disparateness in users' average channel
conditions on the system performance.
3.9Hybrid Channel Allocation (HCA)
79
HCA schemes are a combination of FCA and DCA schemes, with the traffic channels
divided into fixed and dynamic sets. This means that each cell is given a fixed number of
channels that is exclusively used by the cell. A request for a channel from the dynamic
set is initiated only when a cell has exhausted using all channels in the fixed set. A
channel from the dynamic set can be selected by employing any of the DCA schemes.
The real question is what should be the ratio between the number of fixed and dynamic
channels. The value of the optimal ratio depends on traffic characteristics, and it may be
desirable to vary this value as per estimates of instantaneous load distributions. It has
been observed that for a fixed to dynamic channel ratio of 3:1, the hybrid allocation leads
to better service than the fixed scheme for traffic up to 50%; beyond that load, fixed
schemes perform better. Doing a similar comparison with dynamic schemes, when the
load varies from 15% to 40%, the corresponding best values vary from most to medium
to no dynamic channels. A lot of computation time is required if simulation is to
determine the behavior of a large system, and an analytical approach is desirable.
However, exact analytical models are much more difficult to define for hybrid schemes,
and if data traffic also needs to be incorporated, it is almost impossible to have even an
approximate model.
Farid et al. [66] proposed a new hybrid channel allocation scheme using a distributed
power control for wireless cellular networks. In this scheme, a multi-objective evolution
strategy was devised that actually combines the optimizations of channel allocation and
power control, but a substantial increase in the capacity of the network was witnessed
with the implementation of this scheme.
Joshi et al. [102] tried to reduce the call blocking probability by designing a new hybrid
channel allocation algorithm using a hotspot notification technique. In this scheme, a cell
becomes hotspot when the number of channels present in that cell is not enough to meet
the demand and the call will be either blocked or dropped. In order to minimize the call
blocking or dropping, all the dynamic channels are kept in a central pool, and more then
one channels be allocated to the requesting cell, proportional to the present hotspot level
80
of the cell. The simulation results have shown that the call blocking and dropping rates
are largely reduced.
Helonde et al. [77] presented a new Integer Linear Programming (ILP) technique for
efficient allocation of radio channels to the new calls in order to increase the system
capacity. The ILP formulation was proposed only to satisfy the new calls and no effort
was made for the reassignment of the existing calls. So, this system brings down only the
call blocking rate to quite an extent.
An analytical method for calculating the blocking probability, probability of handoff
failure, probability of forced call termination was developed by Ortigoza et al. [148].
They also suggested a new prioritized handoff dynamic channel allocation scheme. In
this scheme, a modified form of DCA algorithm called compact pattern with maximized
channel borrowing (CPMCB) is presented. These modifications in DCA lead service
providers either to a reduction in infrastructure or to an increase in capacity and grade of
service.
Shirazi [180] gave a new technique in which channel allocations to the new as well as to
the handoff calls in a cellular network is done after satisfying co-channel, adjacent
channel and co-site constraints so that required bandwidth is minimized. A new algorithm
for solving CAP was presented, and Node-color, Node-degree ordering of cells, Row-
wise and Column-wise ordering of calls, and local search are used for finding a solution.
The results have given better solution than the other scheme available in the literature.
3.10 Introduction to an Agent
Different definitions from diverse disciplines have been proposed for the word agent, but
there is no universally accepted definition available for the agent, so, that is why there is
a lot of ongoing debate and controversy on this subject [98], [203]. What agents are
competent of doing has been generally agreed, but people are finding it very difficult to
give a universally accepted definition that is more exact.
81
According to Ferber [67], an agent is an entity (physical or abstract) that can act in its
environment, and directs its activity towards achieving goals. This entity has an
incomplete representation of the environment and be able to communicate with other
agents. The behavior state of the agent is determined through its knowledge, perception,
and its interaction with other agents. Autonomous or independent agents are
computational systems that reside in complex dynamic environment, sense and act
independently in that environment, and by doing this, agents achieve a set of goals or
tasks for which they are created. Jennings [98] stated one of the most widely used
definition: an agent is a computer system that is located in some environment, and is
capable of flexible and autonomous actions in this environment in order to meet its
design objectives. Flexibility means that the system should be social, proactive, and
responsive.
Ferber [70] gave a common definition of an agent:
An agent is a physical or virtual entity
a. which is competent of acting in an environment,
b. which can communicate openly with other agents,
c. which is driven by a set of goals,
d. which have its own resources,
e. which is capable to comprehend its environment,
f. which has only an incomplete representation of its environment,
g. which has skills and can offer services,
h. which may be able to replicate itself,
i. whose behavior runs towards fulfilling the objectives, by taking into account the
resources and skills currently available to it and depending upon its perception of
the environment, its representation, and the communication it receives from other
agents.
Various definitions of the agents given in the literature identified several key properties
that differentiate an intelligent agent ([116], [200], [201], [203]): These key properties
are:
82
• Autonomy: The agents function without the direct involvement of humans or
others, but have some sort of direct control over their actions and internal state
using a set of tendencies. The tendencies are personal goals to be accomplished by
the agent.
• Social ability: Different agents collaborate, delegate, communicate, and negotiate
with other agents.
• Reactivity: The agents perceive their environment, and react to changes in a
timely fashion that occur in it, in order to suit their design objectives.
• Pro-activeness: The agents do not just react in response to the environment; they
are intelligent enough to show goal-directed performance by taking the initiative.
Agents are able to handle complex and high-level tasks. The decision as to how
these tasks are best divided into smaller sub-tasks, and the order, in which these
sub-tasks are best executed, should be made by the agent itself.
• Temporal continuity: Various agents are continuously running processes
• Mobility: an agent has the capability to move itself from one computer to
another, keeping its current state.
• Learning: All the agents have the ability to learn and adapt themselves in order to
fit their environment.
The top level view of the agent is shown in the Fig. 3.6. In this diagram, the agent
generates action output in order to influence its environment. In most of the domains
having moderate complexity, an agent will not have full control but would only have
partial control over its environment, so that it can influence it. Therefore, the same
actions performed twice on the same situations might have completely different effects,
and especially agents might not be successful to have the desired effect. Hence, agents in
all environments should be ready for the possibility of failure.
83
The major problem faced by an agent is that of deciding about the actions it should
execute in order to meet the design objectives. Agent architectures are actually software
architectures for decision support systems (DSS) that are embedded into the environment.
The intricacy of the decision-making process in a decision support system can be affected
by various environmental properties. Russell et al. [168] proposed several classifications
of environment properties.
Fig. 3.6: An Agent in its Environment
They organized the agent environment according to the following properties:
• Accessible vs. inaccessible: If it is feasible to collect the complete information
about the agent’s environment in the moment, then the agent’s environment is
said to be accessible. Normally, only virtual environments are accessible to
agents, because all sensors provide biased and incomplete input. There are so
numerous probable percepts in the real world that it is not possible to read and
process them in real time. In fully accessible agent’s environments, it is not
84
ENVIRONMENT
AGENT
action output
required for the agents to create models in the memories, because it can acquire
any desirable information from the environment at any time.
• Deterministic vs. non-deterministic: if an action performed in the environment
made a distinct effect, the environment is to be deterministic. Distinct effect
means that any action by the agent that leads to the proposed and predictable
results and there is no scope for uncertainty. If the environment is not accessible
for the agent, it will be most likely non-deterministic, atleast from its point of
view.
• Static vs. dynamic: the environment is said to be static, when the agent is the only
entity whose actions changes the environment in the moment. If the state of the
environment is dependent on time, then it is dynamic. Normally, real
environments are dynamic in nature (e.g., traffic in a city) and few artificial
environments (e.g., turn based games) are static.
• Discrete vs. continuous: If the agent just has a definite set of possible actions (i.e.,
agent has number of possible) that it can perform in the moment, then the
environment is said to be discrete. Otherwise, if the agent has infinite options,
then the environment is continuous.
• Episodic vs. non-episodic: In episodic environment, the agent operates in discrete
segments (episodes) that are completely independent of each other. There is no
link between agent's state in one segment and its state in another segment.
3.11 Agent Architectures
Based on the goals, a number of different agent architectures have been proposed [9]
[10].
3.11.1 Reactive Architectures
85
In order to permit good performance in dynamic environment, the reactive agent
architecture was proposed, where the deliberative agents fail to act upon. It is the simplest
architecture for agents. In this, the agent has no decision-taking capability, and it only
reacts to the environment in which it exists. The agent behavior in this architecture is
only a mapping between stimulus and response. The reactive agent architectures are
divided into three sub-categories i.e., purely reactive, simple reactive planning, and
sophisticated reactive planning. Purely reactive agents take action without planning and
do not consist of a symbolic model of the world. The reactive planning technique
includes a symbolic model of the world and used reactive reasoning to choose between
different alternative plans at run-time. While in sophisticated reactive planners, agents
include more complex constructs to handle execution failures. Fig. 3.7 illustrates the
reactive architecture.
Fig. 3.7: Reactive Agent Architecture
As shown in Fig. 3.7, the agent only reads the environment and then one or more actions
are mapped with state of the environment. Given the environment, more than one action
may be suitable in a given environment, and therefore the agent must select the best one.
3.11.2 Deliberative Architectures
86
Environment
Sensors Actuators
Mapping
Agent architectures that are able to maintain and maneuver representations of the world,
without using stimulus-response rules are called deliberative agent architectures. A
deliberative architecture is one that includes some consideration about the alternative
courses of action, before an action is to be performed on a given set of inputs. Instead of
mapping actuators directly with the sensors, the deliberative architecture considers the
states, sensors, past results of particular actions, and additional information that is
required to select the best action to perform. The deliberative architecture is shown in
Fig. 3.8. The method for action selection as shown in Fig. 3.8 is not defined, because it
may possibly be a range of methods including neural network, a production system, or
any other intelligent system.
Fig. 3.8: Deliberative Agent Architecture
3.11.3 Blackboard Architectures
The blackboard architecture is extremely common architecture and is also very
interesting [10]. HEARSAY-II was the first blackboard architecture, and it was a speech
87
Environment
Sensors Actuators
Action Selection
KnowledgeState Goals
Perceive Act
Sensors Actuators
understanding system. This architecture works around a global work area called the
blackboard. The blackboard is a universal work area for a number of agents that operate
cooperatively to solve a particular problem. Therefore, the blackboard consists of
information about the environment, but the cooperative agents produce intermediate work
results. Fig. 3.9 shows an example blackboard architecture that could be applied to an
agent system. In this example, two different agents are employed to sample the
environment through the existing sensors (i.e., the sensor agent), and also through the
actuators available in the system.
The blackboard keeps the current state of the environment that is regularly updated by the
sensor, and when an action has to be performed, the action agent interprets this action
into control of the actuators. One or more reasoning agents actually provide the control of
the agent system. These agents work jointly to accomplish the goals, which would also be
enclosed in the blackboard. In this example, the first reasoning agent might employ the
goal definition behaviors, while the second reasoning agent may possibly implement the
planning portion.
As the blackboard is a universal work area, coordination between the agents should be
provided so that the agents do not step over one another. That is why, agents are
programmed based on their need, e.g., agents can examine the blackboard, and when
information is added, they can ask for the ability to operate. The scheduler can then
decide which agents wish to work on the blackboard, and then activate them accordingly.
The blackboard agent architecture is easily implemented on a multi-threading system.
With every agent can become one or more system threads. That is why; the blackboard
architecture is extremely common for the implementation of agent and non-agent
systems.
88
Environment
Sensors Actuators
BlackboardPerceive Act
SensorAgent
Reasoning Agent
Reasoning Agent
ActionAgent
Sensors Actuators
Fig. 3.9: Blackboard Agent Architecture
3.11.4 Belief-Desire-Intention (BDI) Architecture
BDI (Belief-Desire-Intention) agent architectures are deliberative architectures that
follow the theory of human reasoning and having planning abilities as defined by
Michael Bratman [123]. When agents are modeled within BDI architecture, they
internally indicate their beliefs, desires, and intentions and used practical reasoning to
make a decision about action selection. For an agent, belief means the view of the world
(i.e., what the agent beliefs about the state of the environment), desires are the goals
(what the agent wants to achieve) of an agent, and Intentions indicate that the Beliefs and
Desires are used by agents in order to select one or more actions, to meet the desired
goals (see Fig. 3.10). Therefore, the BDI architecture defines the fundamental
architecture of any deliberative agent. It stores the beliefs (state of the environment),
maintains a desires (set of goals), and finally, a premeditated element that maps beliefs to
desires (to select one or more actions that change the state of the environment based on
the agent’s needs)
89
Sensors Actuators
Desires
Environment
IntentionsBeliefs
Perceptual action input output
a) Horizontal Layer b) Vertical Layer c) Vertical Layer (One pass control) (Two pass control)
Layer n
........
Layer 2
Layer 1
Layer n
........
Layer 2
Layer 1
Layer n
Layer 2
Layer 1
Fig. 3.10: BDI Agent Architecture
Many researchers have accepted that neither pure reasoning approach nor pure behavioral
approach is best suited for building agents that are able to take intelligent autonomous
actions. Intelligent autonomous actions have the capability of both reactive behavior and
reasoning. This has led to the development of variety of hybrid architectures, which try to
combine the essential elements of both deliberative and behavioral systems.
3.12 Hybrid Agents
Based on the requirement that an agent should be capable of representing both reactive
and proactive behavior, separate subsystems have been created to deal with these types of
behaviors. This architecture has different subsystems that are arranged into a set of
interacting layers. In this section, layered architectures: InteRRaP and TouringMachines
are discussed. In order to deal with both reactive and proactive behaviors, there will be at
least two layers. Therefore, different architectures are differentiated in relation to how the
control and information flows within these layers. Following are the two types of control
flow inside the layered agent architecture:
• Horizontal layering: In horizontal layering architecture, each software layer
is directly linked to the sensory input and action output. Therefore, in this case
90
Sensor Input
Action Output
Perceptual action input output
a) Horizontal Layer b) Vertical Layer c) Vertical Layer (One pass control) (Two pass control)
Layer n
........
Layer 2
Layer 1
Layer n
........
Layer 2
Layer 1
Layer n
Layer 2
Layer 1
each layer behaves like an agent by giving suggestions for particular action to
perform.
• Vertical layering: In vertically layered agent architectures, decision making
is made possible through several software layers and each layer deals with the
environment at different levels of abstraction.
The advantage of horizontal layered architecture [145] is its conceptual simplicity: if we
want an agent to display n different types of behavior, then n different layers are
implemented. However, each layer is competing with one another to produce action
suggestions; there are chances that the overall agent behavior may not be consistent. In
order to ensure consistency in the horizontally layered architectures, these types of
architectures normally contain a mediator function, which decides about the particular
control layer to be active at any time. Such a central control can sometimes become very
problematic, and the designers must consider all potential interactions between layers.
Fig. 3.11: Horizontal and Vertical Layering
91
Sensor Input
Action Output
Perceptual action input output
a) Horizontal Layer b) Vertical Layer c) Vertical Layer (One pass control) (Two pass control)
Layer n
........
Layer 2
Layer 1
Layer n
........
Layer 2
Layer 1
Layer n
Layer 2
Layer 1
action output
Perceptual input
Perceptual input
action output
If there are n layers in the agent architecture, and each layer can suggest up to m possible
actions, it means there are mn possible interactions to be considered. This is undoubtedly
very difficult from a design point of view. The presence of mediator function in the agent
architecture also introduces a bottleneck into the decision making process.
These problems are partially solved in vertical layered architectures. The vertically
layered architectures can be subdivided into one-pass and two-pass architectures. In one-
pass architectures, control passes serially through each layer, until it reaches the final
layer where the action output is generated. In two-pass architectures, information first
flows up the top-most layer of the architecture (the first pass) and then control flows back
down.
Fig. 3.12: Horizontal Layered Architecture (Touring Machines)
In one-pass and two-pass vertically layered agent architectures, the complexity of inter-
layers interactions is reduced: as there are n - 1 interfaces present between n layers, and if
each layer is able to suggest m actions, then at the most m2(n - 1) interactions can be
92
Cooperative Planning
Local Planipcation
Behavior
Sensor Input
Action Output
Modling Layer
Planning Layer
Reactive Layer
Control Subsystem
Action SubsystemPerception Subsystem
considered between the layers. It is much simpler than the horizontally layered
architecture. But, this simplicity in the vertical architectures comes at the cost of decrease
in flexibility i.e. in order to take a decision the control has to pas through different layers.
This architecture is also not fault tolerant; the failure of process at any layer is most like
to have serious effects on the performance of an agent.
3.13 Conclusion
In this chapter, a comprehensive survey of the existing channel allocation schemes has
been done. The chapter also discussed various agent architectures that are used to solve
different real time problems. The next chapter presents an Optimized Blocking Dropping
Load Balancing (OBDBLB) algorithm.
Chapter 4
Optimized Blocking Dropping Load Balancing
(OBDLB) Algorithm
4.1Introduction
This chapter builds a specialized model based on hybrid agents and proposes an
Optimized Blocking Dropping Load Balancing (OBDLB) algorithm for efficient channel
allocation.
4.2INTERRAP: Vertical Layered Architecture
INTERRAP is a technique to model resource-bounded interacting agents by associating
reactivity with deliberation and cooperation capabilities [123]. INTERRAP is based on a
BDI architecture, i.e., the informational, motivational, and deliberative state of an agent
[9], which is explained through beliefs, goals, a rather generalized version of plans, and
93
Cooperative Planning
Local Planipcation
Behavior