Next Article in Journal
Modelling Cosmic Springs with Finsler and Generalised Finsler Geometries
Previous Article in Journal
Born to Score? The Relationship between Left-Handedness and Success from the 7-Meter Line
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Adaptive Data Traffic Control Scheme with Load Balancing in a Wireless Network

School of Mathematics and Statistics, Xidian University, Xi’an 710126, China
*
Author to whom correspondence should be addressed.
Symmetry 2022, 14(10), 2164; https://doi.org/10.3390/sym14102164
Submission received: 14 September 2022 / Revised: 3 October 2022 / Accepted: 5 October 2022 / Published: 15 October 2022
(This article belongs to the Section Computer)

Abstract

:
The symmetric wireless network has been expected to be a revolutionary technology for mobile communications. Due to the limited resources of the microbase stations in the wireless network, the way to jointly optimize resource allocation, traffic throughput, latency, and other key performances is a hot research issue. In this paper, we introduce a joint optimization algorithm for improving the performance and balancing the traffic load of the wireless network. For the optimal traffic routing scheme, we transfer the problem to a mixed mathematical programming model. The model contains multiple traffic constraints and a single joint objective; the objective of the joint optimization are data transmission latency, energy consumption of wireless microbase stations, and throughput of links. Moreover, in order to approximately solve the optimization problem, we propose an efficient heuristic traffic transmission and migration scheme with load balancing, called an adaptive data traffic control scheme. The main idea of the proposed scheme is to split the traffic of overloaded microbase stations and links in the symmetric wireless network, so as to achieve load balancing and reduce the energy consumption of microbase stations. At last, the evaluations and simulations verify the proposed algorithm can efficiently optimize the energy allocation of microbase stations, and the network lifetime is increased to 210 rounds. Meanwhile, the network latency is reduced to 2–3 ms, and the network throughput is increased to 1000 Mb in our simulation environment. The constructed traffic control system for the traffic engineering-based wireless network in this paper can serve the intelligent system in the future.

1. Introduction

As a kind of ubiquitously aware, centralized data center (DC) symmetric network [1,2], the wireless network is a fully self-organizing automatic network. The main characteristics of a wireless network are identified as self-management, self-optimization, and automation configuration of the network parameters. Therefore, the research of wireless networks has attracted extensive attention in recent years. As a result, nowadays, wireless networks have a great application foreground in the fields of intelligent society, industry, agriculture, etc. These benefit from the excellent performances of wireless networks, for example, multi-dimensional information collection and transmission [3], end-to-end (E2E) and device-to-device (D2D) transmission with low latency [4].
As of now, the wireless industry may be preparing for a transition to 5G wireless/virtual networks, and it has been widely used in various aspects. Based on the characteristics of high-density deployment, multi-link, and the high mobility of microbase stations (mBSs) in 5G wireless networks, there are three main application scenarios [5]: enhancing mobile broadband (eMBB), ultra-reliable and low latency communication (uRLLC), and massive machine type of communication (mMTC). The comparison of key performance indicators (KPIs) for the three application scenarios is shown in Table 1 [6]. In addition, wireless networks can be used in vehicle-to-everything (V2X), Internet of things (IoT), and other applications [5]. Therefore, the wireless network can not only ensure the technical requirements of different intelligent networks from the application layer, but also realize the logical application isolation of different application scenarios from the network layer.
The main purpose of studying the wireless network is to assist in various aspects of industrial automation, convenience of life, artificial intelligence (AI), the spatial information network of multi-functional satellite platform, the dataset of remote sensing images, and other aspects of vertical services [7]. The vertical services have been involved in all walks of daily life, and further promote the research needs of the wireless network [1,3]. Moreover, the above applications have a high requirement for performance of the wireless network [7]. The constructed network often needs to meet some KPI requirements, such as high throughput, low E2E data transmission latency, low packet drop ration, and energy efficiency of the wireless network. On the other hand, the allocation optimization techniques of limited network resources (i.e., bandwidth, spectrum, energy, communication and computing resources) are also limited to these applications [2], which further increases the requirements of the network topology.
Traffic engineering (TE)-based wireless networks are one of the hot research issues of recent years. In a TE-based wireless network, each microbase station (mBS) needs to transmit the collected data packets from the source mBS to the terminal mBS, and this results in traffic of different sizes occurring simultaneously on network links. However, the network is limited to the maximum allowable traffic rate between two mBSs (i.e., peak rate [8]), and traffic congestion will occur if the traffic rate is greater than the peak rate on a traffic link. The traffic congestion can result in the increase of the network latency or data losses when the traffic arriving at the terminal mBS [9,10,11]. Therefore, it is necessary to migrate the traffic of the congestion links to other links nearby, so as to complete the reconfiguration of the data transmission paths. Because the traffic in the network is constantly changing, the network has low resource utilization and high operating expenses (OPEX) even though the traditional TE architecture can commonly meet the demand of peak rate for network traffic [12,13].
At present, a large number of studies have shown that the traffic routing optimization problem is an NP-hard problem. This is mainly due to the problem of the multiple constraints of non-convex smoothness [14,15,16]. However, there have been many approximate solutions and interesting results [17,18,19,20], in particular for link traffic optimization of slice layers in 5G network architecture. Therefore, our main research objective is to solve the traffic optimization problem of the wireless network. Meanwhile, we can also solve the problem of resource allocation optimization by solving the traffic routing optimization problem.
The main strategy in this paper is to establish a single-objective optimization mathematical model. Although the model is a single objective, several subobjectives are combined by the weighted coefficient. In order to get the best approximation for this optimization objective, we propose an adaptive data traffic control scheme (a-ADTC) to solve the traffic transmission optimization problem in this paper. The proposed a-ADTC algorithm is a heuristic greedy strategy. All in all, compared with some mature traffic routing schemes, the proposed scheme achieves a certain optimization effect.
Let us point out that our work has the following takeaways.
(1) The joint optimization problem of TE, network energy resources, and KPIs is formulated as a mixed mathematical programming model.
(2) Load balancing for wireless network is guaranteed through the effective traffic migration. The traffic migration can effectively reduce the link congestion and improve the utilization rate of mBSs and links in wireless networks.
(3) The corresponding optimization scheme a-ADTC is a solution framework that quickly solves the mathematical model, and the algorithm has good expansibility. The proposed a-ADTC algorithm can provide a theoretical basis for the development of the 6G wireless network and the architecture of urban intelligent transportation.
The rest of the paper is organized as follows. In Section 2, we introduce the related work and current state of the art. In Section 3, we study the traffic routing problem by abstracting it into a topology, and we transform the traffic problem into a mathematical optimization programming. Then an approximate optimization algorithm is introduced. Section 4 is the simulation validation and results discussion. Finally, Section 5 concludes the paper.

2. Related Work

In recent years, a lot of research achievements have been obtained for the TE-based wireless network, and many of them are solved by heuristic algorithms [21,22,23,24,25]. These algorithms have the following advantages: low complexity, easy deployment, and strong application value. As one of the most classical algorithms in a TE-based wireless network, the A* Search algorithm [21] efficiently completes the task of traffic allocation and optimization in network links. In [21], the authors use a two-node storage set to separate the active nodes and sleep nodes, which are the open set and closed set. Then the authors prioritize the importance of nodes and use heuristic algorithms to explore the routing scheme from the source node to the destination node.
According to the instance of TE and traffic matrix measurement, Wang et al. [22] propose a joint optimization model named MLRF for online traffic measurement and TE based on the software defined network (SDN). The core strategy is to first establish a mathematical model with a traffic problem and to transform the problem into a mixed-integer linear programming model. The objective is to maximize the traffic throughput of the wireless network, and the authors use a feasible traffic matrix rule to describe the traffic status of the network. Finally, to solve the model, the authors present an effective heuristic algorithm. The simulation results and application analysis show that the algorithm is a very advanced and practical algorithm. In 5G TE adjustment and migration metro-aggregation networks, Yu et al. [23] propose a dynamic traffic prediction scheme for wavelength division multiplexing (WDM). Based on the metro traffic prediction, this method dynamically migrates the link to meet the dynamic data transmission, which provides an application basis for optimal allocation of TE.
Nowadays, the increasing demands for quality of service (QoS) of smart city construction are notable. In order to provide more reliable and fast communication services, Wang et al. [24] consider the dense and highly dynamic characteristics of cellular network traffic and use an integrated multiple-access edge computing framework to enhance the accuracy of data traffic prediction. Thus, we notice the importance of traffic prediction in the TE-based wireless network, and we find that is worth considering the use of matrix storage technology as an effective prediction scheme.
Furthermore, in the industrial Internet of things (IIoT), a large amount of data traffic will be generated with the rapid increase of intelligent devices. Therefore, the way to distribute this traffic quickly is via the premise of efficient management in IIoT networks. Lin et al. [25] propose an encrypted traffic algorithm based on the flow spatiotemporal features, which improves the adaptive management ability of IIoT effectively. In [25], traffic segmentation, sampling, and vectorization are carried out for the original data stream. In the shunting stage, the traffic is classified efficiently by extracting the time characteristics of the data and introducing the time characteristics of stack bidirectional long short-term memory learning. There are also many algorithms for traffic control of network resource allocation through TE, and these algorithms have been successfully applied to practical applications [26,27,28,29].
Wireless networks support a variety of vertical business services. The network operators allocate the network resources to users when the service users have a resource demand through data traffic. Golkarifard et al. [30] consider the time dynamic features of such requests and then propose a joint optimization method for traffic licensing, resource activation, virtualized network function (VNF) setting, resource allocation, and traffic routing for request of data traffic. Agarwal et al. [31] developed a mathematical model based on traffic queues to match the vertical demands and to optimize the allocation of the network resources in the network.
Eramo et al. [32] proposed an integration algorithm to migrate VNF routes by taking into account the losses of data traffic information, which was caused by the VNF link migration. The research goal of this paper is to minimize the total OPEX caused by energy consumption and reduce the losses of revenue caused by QoS degradation during migration. In order to efficiently coordinate the traffic congestion problem during VNF migration, Pham et al. [33] absorbed a traffic-aware and energy-efficient placement for service chaining TE. In this migration scheme, the authors perform a joint match on the collected data, and thus use a method similar to data aggregation to reduce the redundant data in the links of the network. A traffic prediction scheme [34] is proposed by analyzing the traffic characteristics in the operator network, and then two VNF layout algorithms are designed to accomplish the dynamic VNF instance scaling in operator DCs. Finally, the effectiveness of the dynamic VNF instance scaling system in the resources allocation algorithm is verified through the actual data simulation. There are also some authors who focus on the networked state estimation problem over lossy channels [35,36], and the results are very interesting and provide some references for the problem of traffic estimation in lossy channels.
Much progress has been made in recent work on the TE basis and resource allocation in wireless networks. However, such progress often aims at a single optimization objective and has a good optimization effect, and it is difficult to meet the demands of vertical services. Otherwise, the authors often optimize subobjectives separately. Although multiple KPIs can be optimized at the same time, the algorithm complexity is often too high. To this end, we try to join these KPIs as one objective to optimize. The detailed algorithm is described in the following section.

3. Our Proposed Algorithm

We study the wireless network traffic problem by abstracting it into a topology graph. The purpose of this practice is to facilitate the elaboration of the research problem. In this paper, we transform the traffic problem into a mathematical optimization problem through graph topology, and the details are described as follows.

3.1. Mathematical Modeling of the Problem

Let G ( V , E , B , R ) represent a weighted-topology graph for the wireless network (as shown in Figure 1, where user 1 wants to transmit the data from mBSs 0 to 9), V denotes the set of mBSs, E denotes the set of links (edges), and B and R denote the set of bandwidth and peak rate, respectively. B u , v represents the bandwidth of link ( u , v ) E , and R ( u , v ) represents the peak rate of link ( u , v ) E . X u , v t is a boolean variable to decide whether mBS u selects v as parent or not. If that is the case, X u , v t = 1 . Otherwise X u , v t = 0 . η ( u ) represents the neighbor mBS set of u, τ u , v t is the real-time traffic of link ( u , v ) E at time t. α , β , γ represent the weighting factors for the mixed optimization model.
As shown in Figure 1, we assume the bandwidths of nodes 1 and 4 are 30 Mb, and there is 10 Mb of traffic used at time t. In the next data transmission phase, t + 1 , we assume that more than 20 Mb traffic needs to be connected to the network for transmission; however, the only active nodes in the network are nodes 1 and 4. Obviously, we cannot use this link for data transmission. Otherwise, the link will be congested and data will be lost. Therefore, we need to activate available nodes near each other and migrate some traffic to the new link.
To improve the traffic migration more efficiently, here we construct a mixed optimization programming model for TE. The optimization objective of TE migration is minimizing the energy consumption and the latency of data transmission, maximizing the data throughput of the network. Thus, the objective for the joint optimization problem can be formulated as
min ( u , v ) E α D u , v + β E C u , v + γ ( 1 / T u , v ) ,
where D u , v , E C u , v and T u , v represent the data traffic transmission latency, energy consumption, and throughput of link ( u , v ) , respectively, and D u , v = τ u , v / R u , v .
Denote the remaining energy of link ( u , v ) as E R u , v and we have the following constraint of the energy consumption in link ( u , v ) :
E C u , v < E R u , v .
If there are two mBS nodes v 1 , v 2 η ( u ) to accommodate the traffic and peak rate in the network, it must satisfy
τ u , v t + τ u , v 1 t < R u , v 1 t , τ u , v t + τ u , v 2 t , < R u , v 2 t .
In the network, each mBS only selects one mBS to be its relay parent node for data transmitting, and it is limited to
v η ( u ) X u , v t = 1 .
For mBS u, real-time traffic τ u , v t must satisfy
τ u , v t = 0 ; i f u = v ; i f v η ( u ) .
We notice that real-time traffic τ u , v t in link ( u , v ) at time t should not exceed the maximum rate capacity
t < T τ u , v t 0 T R u , v t d t ,
where T is the deadline of the data transmission.
For the network topology, there is no loop in the data transmission link between the starting mBS and the destination. The constraint can be applied by the following formula:
v η ( u ) τ u , v t = u η ( v ) τ v , u t .
The above joint optimization mathematical programming is an N P h a r d problem. With the exponential growth of data traffic in large-scale wireless networks, the network features such as low latency, high reliability, scalability, high coverage, simple network deployment, and network quality of service have higher requirements for network slice topology and multi-task traffic modeling. Therefore, the corresponding optimization scheme and quick solution framework urgently need to be solved for the constructed model. Furthermore, the above TE-based problems have been coupled to a multi-objective non-convex optimization problem, and the cost of solving the model increases with the increase of network size. To this end, we propose a-ADTC to solve the joint optimization problems.

3.2. The Main Principle of a-ADTC Algorithm

The main principle of a-ADTC algorithm is described as follows.
Figure 2 gives an example for the main principle of a-ADTC algorithm in a TE-based wireless network. In Figure 2, a new user 2 needs to transmit 10 units data from mBSs 0 to 9. If the traffic in link ( u , v ) exceeds the peak rate of this link, the link becomes congested immediately, which will lead to the latency increases of data transmission, and some packets are lost due to packet queuing extrusion. At this juncture, we have to migrate some of the traffic from this link to other links which meet the data transmission conditions. However, the migration is limited to the energy consumption of mBSs and bandwidth of the link. Therefore, we need to find a new data transmission link between mBS u and one mBS in its neighbor set η ( u ) . If we find an appropriate mBS v 1 in η ( u ) whose traffic does not exceed the peak rate, then a part of the traffic in ( u , v ) will be migrated to link ( u , v 1 ) . That is, we complete the migration of the traffic from link ( u , v ) to ( u , v 1 ) . Then we use the two links for data traffic transmission, and thus we balance the traffic load on a local scale and reduce the latency caused by data congestion of links.
Algorithm 1 gives the detailed implementation steps of the proposed a-ADTC algorithm in this paper. Without loss of generality, the main principles of the a-ADTC algorithm are described as follows. In Algorithm 1, we generate a wireless network randomly and record the initial information of each mBS in the wireless network. In this Algorithm, we first input all simulation data and construct an original network topology graph by self-organization. Finally, we output the data that interests us through simulation experiments. All mBSs need to store the data and link information in real time. First, we run the network one round by using the heuristic greedy idea. In this case, the distance between mBSs is mainly considered to construct the original data transmission topology. Then, we calculate and record real-time traffic τ u , v t of link ( u , v ) E at time t (lines 5–7). We make the congestion judgment for each link in the network. If the traffic congestion occurs, we need to migrate some traffic in the congestion link (lines 8–16). If D u , v 2 < D u , v 1 + D v 1 , v 2 , then we can migrate the traffic to link ( u , v 2 ) E . Otherwise, if D u , v 2 > D u , v 1 + D v 1 , v 2 , we cannot migrate the traffic to the shortest link ( u , v 2 ) E , and we need to migrate the traffic from link ( u , v ) E to link u v 1 v 2 , so as to complete the traffic migration (lines 10–16). We evaluate whether the number of mBSs in the maximum connection subgraph reaches 90% after the multiple data transmission paths are established [37]. If the network meets the maximum connectivity, we record the current residual network and construct a hierarchical topology graph (line 17). Otherwise, if the network topology does not meet the requirements for data transmission (mBS is damaged on the network) [38], we stop running the network and output the data.
Algorithm 1:The pseudocode of the a-ADTC algorithm
Require:
  • V , E          //The information of each MBS and link.
  • B u , v          // The bandwidth of link ( u , v ) .
  • R u , v          //The peak rate of link ( u , v ) .
  • η u , v          //The neighbor mBS set of u.
  • τ u , v t          //The real-time traffic of link ( u , v ) .
  • α , β , γ       //The parameters.
Ensure:
    The lifetime, throughput and latency of the wireless network.
1:
Initialization: Initialize the wireless network and construct the network randomly.
2:
t = 1
3:
while mBS is undamaged in the network do
4:
   for all mBSs, record the current residual network and construct a hierarchical topology graph. do
5:
     if the maximum connection subgraph reaches less than 90% then
6:
        Stop running the network and output the data
7:
     else if Calculate the real-time traffic τ u , v t of link ( u , v ) E at time t. then
8:
        Formulate the traffic optimization problem: min ( u , v ) E α D u , v + β E C u , v + γ ( 1 / T u , v ) .
9:
        Make a congestion judgement for each link of the wireless network at time t:
10:
       if the traffic congestion occurs in link ( u , v )  then
11:
          if  D u , v 2 < D u , v 1 + D v 1 , v 2 and v 1 , v 2 η ( u )  then
12:
             Migrate some traffic to ( u , v 2 ) .
13:
          else if D u , v 2 > D u , v 1 + D v 1 , v 2 then
14:
             Migrate some traffic to ( u v 1 v 2 ) .
15:
          end if
16:
        end if
17:
        Evaluate the network.
18:
     end if
19:
      t = t + 1
20:
   end for
21:
end while

3.3. A Flow Chart of a-ADTC Algorithm

Lastly, in order to describe the operation process of the proposed a-ADTC algorithm more simply, a flow chart of a-ADTC algorithm is shown as Figure 3.

4. Validation and Analysis of the Proposed Algorithm

In this section, we perform a lot of repeated simulations to verify the effectiveness of the proposed a-ADTC algorithm by comparison with MLRF algorithm [22] and A* Search algorithm [21]. The concerned KPIs of the comparison mainly include the lifetime, throughput, and latency of the network. Extraordinarily, we also perform the Pareto probability distribution of the lifetime, latency, and throughput for the a-ADTC algorithm under different mBSs, and reflect the performance of the proposed algorithm from the perspective of probability statistics. The simulation environment is a Win7 64-bit system with CPU being Intel Core i5-7500 3.4 GHz, and memory being 4.00 GB. The simulation software used in this research are Visual C++ 6.5 and MATLAB 2017B. In our simulation, we generate 50–400 mBSs in the wireless network and the communication radius for each mBS is 100 m, the link inherent latency is 1 × 10 5 s. The data packet size generated by each mBS is 1024 KB. The channel bandwidth is 20 Mb. The duration of mBSs monitoring data is 1 ms. The initial energy for each mBS is 600 J. The energy consumption for 1 KB packets is 0.001 J [39], and α , β , γ are 0.2, 0.4, and 0.2, respectively.

4.1. Lifetime of the Network

The lifetime of the network represents the run time of the wireless networks, and we use “round” to represent the network run one time and a higher value indicates a better network performance in our simulation. Figure 4 shows the lifetime of MLRF, A* Search and a-ADTC. From Figure 4, we can observe that the proposed algorithm a-ADTC prolongs the lifetime of the network with the increasing number of mBSs.
The results demonstrate that a-ADTC algorithm can achieve better performance in KPIs of energy consumption under the proposed algorithm. Most importantly, we can see from Figure 5, the Pareto probability distribution of the lifetime for the a-ADTC algorithm under 250 mBSs are much better than other numbers. When the lifetime of the wireless network reaches 210 rounds, the optimization efficiency of our proposed algorithm is more than 60%. This means that the optimal number of mBSs is 250 in our simulation. If the number of mBSs in the region is too small, the link of data transmission is too long, which is not conducive to the saving of node energy. Moreover, if there are too many mBSs in the network, it is easy to cause link congestion due to the large amount of data. The congestion data transmission always needs more energy of the mBSs. This shows that the optimization of node deployment in the network is very important for saving the mBS resources and improving the efficiency of data transmission.

4.2. Latency of the Network

To evaluate the improvement performance of the timeliness for network data transmission, we conduct latency simulations under different numbers of mBSs. In Figure 6, we can see that the proposed a-ADTC algorithm has the lower latency compared with the MLRF and A* Search algorithms. Moreover, the latency of the a-ADTC algorithm is always stable and has a narrower fluctuation margin with the increasing number of mBSs. This is because the a-ADTC algorithm can find the optimal data transmission path dynamically and formulate adaptive data traffic rules with lower latency.
As shown in Figure 7, we can also observe that the Pareto probability distributions of the network lifetime for the a-ADTC under 250 and 300 mBSs are much better than other numbers of mBSs. The main reasons are the same as Section 4.1.

4.3. Throughput of the Network

The throughput of the network reflects the strength of the network to carry data. Figure 8 and Figure 9 show the network throughput with different numbers of mBSs in the wireless network. We can see from Figure 8 that the network throughput increases gradually with the increasing number of mBSs for three algorithms. However, the proposed a-ADTC algorithm has the higher throughput than the other two algorithms in the same number of mBSs. This is because the a-ADTC algorithm migrates the traffic of the congestion link and avoids the data losses or damages in the congestion link. Simultaneously, the more mBSs there are, the greater the throughput optimization efficiency.
In summary, the above simulations indicate that the proposed a-ADTC algorithm has a better performance in KPIs. Therefore, the corresponding approximate optimization scheme and quick solution a-ADTC algorithm solves the constructed mathematical model more effectively. The simpler the proposed algorithm is, the easier it is to deploy and minimize the network cost. In addition, the proposed a-ADTC algorithm meets these properties.

4.4. Load-Balancing Experiment

Load balancing is an important aspect to measure to determine the performance of data transmission in the wireless network. Different traffic will cause the unevenness of energy consumption of the mBSs in the network. In our simulation, we use the residual energy of each mBS to show the load balancing of the wireless network. Figure 10, Figure 11 and Figure 12 show the residual energy surface figures of each mBS and the two-dimensional cross-sectional figures under the three-dimensional observation (view [0,0]) when the network runs 100 times.
We can see from Figure 10 that the residual energy surface figure and cross-sectional figure of each mBS of the A* Search algorithm are not smooth and fluctuate greatly. There are many mBSs that consume the energy too fast, and the traffic load is unbalanced. Figure 11 shows that the residual energy surface figure of the MLRF algorithm also has large fluctuation, and a few mBSs have lower energy when the network runs 100 times. Therefore, the MLRF algorithm is significantly better than that of the A* Search algorithm. Moreover, Figure 12 shows that the residual energy surface figure of the proposed a-ADTC algorithm is smoother and has a smaller fluctuation range. When the wireless network runs 100 times, each mBS also has nearly the same residual energy, and that means the traffic load is balanced in each link. The network has better performance in TE, and the network can continue to transfer the data to the destination in an optimal state.
The above experimental results indicate that the energy resources in a small part of mBSs in both the A* Search and MLRF algorithms are likely to be drained quickly, and these mBSs cannot undertake the task of network traffic transmission any more when the network running time reaches 100 times. That means the network traffic loads of the MLRF and A* Search algorithms are unbalanced, which caused the rapid depletion of energy for a part of mBSs because the links have the overloaded traffic. In addition, it is good to see that the proposed a-ADTC algorithm in this paper has relatively balanced residual energy resources for all mBSs, when the network runs 100 rounds.
In conclusion, the simulation results in Figure 10, Figure 11 and Figure 12 verify the effectiveness of the proposed traffic migration algorithm from the load-balancing aspect. Consequently, we need to consider and solve the KPI-aware optimal problem first when making any decisions regarding traffic routing.

4.5. Results Discussion

Section 4.1, Section 4.2, Section 4.3 and Section 4.4 show the simulation comparison results. We find that the maximum optimization rate of the lifetime of the network can reach 60%, compared with the MLRF algorithm. This result is encouraging and fully indicates that some overloaded mBSs are effectively prolonged through traffic migration. Therefore, the wireless networks we construct in this paper are energy efficient and load balancing. Furthermore, the latency of our proposed a-ADTC algorithm is always kept in a small range, that is, 2–3 ms. This fact further proves that the distribution of traffic in the wireless network has a great influence on the link latency. Finally, through the simulation in Section 4.3, we verify that traffic migration can improve the network throughput at the same time. In a word, for some traffic optimization problems in wireless networks, we must evaluate and migrate the traffic on some overloaded mBSs or links, which is more conducive to guarantee the QoS of the network.

5. Conclusions

In this work, we study the optimal traffic routing scheme in a wireless network. We investigate this optimization problem by building a topology, and then formulate a joint single-objective mathematical model. The constructed model is mainly affected by the dynamic traffic and the peak rate limit of the link. To solve this model, we introduce an approximate optimization algorithm, a-ADTC, to solve the mathematical model. We also verify the effectiveness of the proposed algorithm by a significant number of repeated simulations.
In future work, we will further study the traffic routing optimization problems for wireless networks. Furthermore, we will model the multi-objective coupling non-convex network optimization problem. In addition, we will try to explore a more optimized meta-heuristic algorithm to solve the model efficiently. Finally, we will also explore and try to make a breakthrough with regard to the latest optimization technology of resource allocation on the TE-based wireless network.

Author Contributions

Conceptualization, Z.Z.; methodology, Z.Z. and A.D.; validation, Z.Z.; writing—original draft preparation, Z.Z.; writing—review and editing, A.D.; supervision, Z.Z.; project administration, Z.Z.; funding acquisition, Z.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (Grant No. 62202351) and the Fundamental Research Funds for the Central Universities. (Grant No. JB210707).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Huang, Y.; Xu, X.; Li, N.; Ding, H.; Tang, X. Prospect of 5G Intelligent Networks. IEEE Wirel. Commun. 2020, 27, 4–5. [Google Scholar] [CrossRef]
  2. Yaqoob, M.; Gemikonakli, O.; Ever, E. Modelling heterogeneous future wireless cellular networks: An analytical study for interaction of 5G femtocells and macro-cells. Future Gener. Comput. Syst. 2021, 114, 82–95. [Google Scholar] [CrossRef]
  3. 3GPP. Revised SID New Study Item Proposal RAN-Centric Data Collection and Utilization for NR; Technical Report RP-182105; 3GPP: Newport Beach, CA, USA, 2019. [Google Scholar]
  4. Anonymous. Framework for Evaluating Intelligence Levels of Future Networks Including IMT-2020 (Study Group 13); Technical Report ITU-T Y.3173-2020; International Telecommunication Union: Geneva, Switzerland, 2020. [Google Scholar]
  5. Qu, K.; Zhuang, W.; Ye, Q.; Shen, X.; Li, X.; Rao, J. Traffic Engineering for Service-Oriented 5G Networks with SDN-NFV Integration. IEEE Netw. 2020, 34, 234–241. [Google Scholar] [CrossRef]
  6. Tipantuña, C.; Hesselbach, X. Adaptive Energy Management in 5G Network Slicing: Requirements, Architecture, and Strategies. Energies 2020, 13, 3984. [Google Scholar] [CrossRef]
  7. Lin, K.; Li, C.; Rodrigues, J.J.P.C.; Pace, P.; Fortino, G. Data-Driven Joint Resource Allocation in Large-scale Heterogeneous Wireless Networks. IEEE Netw. 2020, 34, 163–169. [Google Scholar] [CrossRef]
  8. Chergui, H.; Verikoukis, C. Big Data for 5G Intelligent Network Slicing Management. IEEE Netw. 2020, 34, 56–61. [Google Scholar] [CrossRef]
  9. Halabian, H. Distributed Resource Allocation Optimization in 5G Virtualized Networks. IEEE J. Sel. Areas Commun. 2019, 37, 627–642. [Google Scholar] [CrossRef]
  10. Yang, S.; Li, F.; Trajanovski, S.; Yahyapour, R.; Fu, X. Recent Advances of Resource Allocation in Network Function Virtualization. IEEE Trans. Parallel Distrib. Syst. 2021, 32, 295–314. [Google Scholar] [CrossRef]
  11. Kawahara, R.; Lua, E.K.; Uchida, M.; Kamei, S.; Yoshino, H. On the Quality of Triangle Inequality Violation Aware Routing Overlay Architecture. In Proceedings of the IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 2761–2765. [Google Scholar] [CrossRef]
  12. Fossati, F.; Moretti, S.; Perny, P.; Secci, S. Multi-Resource Allocation for Network Slicing. IEEE/ACM Trans. Netw. 2020, 28, 1311–1324. [Google Scholar] [CrossRef]
  13. Chang, Z.; Zhang, D.; Hämäläinen, T.; Han, Z.; Ristaniemi, T. Incentive Mechanism for Resource Allocation in Wireless Virtualized Networks with Multiple Infrastructure Providers. IEEE Trans. Mob. Comput. 2020, 19, 103–115. [Google Scholar] [CrossRef] [Green Version]
  14. Addad, R.A.; Bagaa, M.; Taleb, T.; Dutra, D.L.C.; Flinck, H. Optimization Model for Cross-Domain Network Slices in 5G Networks. IEEE Trans. Mob. Comput. 2020, 19, 1156–1169. [Google Scholar] [CrossRef] [Green Version]
  15. Chiha, A.; Van der Wee, M.; Colle, D.; Verbrugge, S. Network Slicing Cost Allocation Model. J. Netw. Syst. Manag. 2020, 28, 627–659. [Google Scholar] [CrossRef]
  16. Borylo, P.; Tornatore, M.; Jaglarz, P.; Shahriar, N.; Chołda, P.; Boutaba, R. Latency and energy-aware provisioning of network slices in cloud networks. Comput. Commun. 2020, 157, 1–19. [Google Scholar] [CrossRef]
  17. Chuah, T.C.; Lee, Y.L. Intelligent RAN Slicing for Broadband Access in the 5G and Big Data Era. IEEE Commun. Mag. 2020, 58, 69–75. [Google Scholar] [CrossRef]
  18. Shahriar, N.; Taeb, S.; Chowdhury, S.R.; Zulfiqar, M.; Tornatore, M.; Boutaba, R.; Mitra, J.; Hemmati, M. Reliable Slicing of 5G Transport Networks With Bandwidth Squeezing and Multi-Path Provisioning. IEEE Trans. Netw. Serv. Manag. 2020, 17, 1418–1431. [Google Scholar] [CrossRef]
  19. Pozza, M.; Nicholson, P.K.; Lugones, D.F.; Rao, A.; Flinck, H.; Tarkoma, S. On Reconfiguring 5G Network Slices. IEEE J. Sel. Areas Commun. 2020, 38, 1542–1554. [Google Scholar] [CrossRef]
  20. Dow, E.M.; Matthews, J.N. WAYFINDER: Parallel virtual machine reallocation through A* search. Memetic Comput. 2016, 8, 255–267. [Google Scholar] [CrossRef]
  21. Shaer, I.; Sidebottom, G.; Haque, A.; Shami, A. Efficient execution plan for egress traffic engineering. Comput. Netw. 2021, 190, 107938. [Google Scholar] [CrossRef]
  22. Wang, X.; Deng, Q.; Ren, J.; Malboubi, M.; Wang, S.; Xu, S.; Chuah, C.N. The Joint Optimization of Online Traffic Matrix Measurement and Traffic Engineering For Software-Defined Networks. IEEE/ACM Trans. Netw. 2020, 28, 234–247. [Google Scholar] [CrossRef]
  23. Yu, H.; Musumeci, F.; Zhang, J.; Tornatore, M.; Bai, L.; Ji, Y. Dynamic 5G RAN slice adjustment and migration based on traffic prediction in WDM metro-aggregation networks. IEEE/OSA J. Opt. Commun. Netw. 2020, 12, 403–413. [Google Scholar] [CrossRef]
  24. Wang, Z.; Hu, J.; Min, G.; Zhao, Z.; Wang, J. Data-Augmentation-Based Cellular Traffic Prediction in Edge-Computing-Enabled Smart City. IEEE Trans. Ind. Inform. 2021, 17, 4179–4187. [Google Scholar] [CrossRef]
  25. Lin, K.; Xu, X.; Gao, H. TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT. Comput. Netw. 2021, 190, 107974. [Google Scholar] [CrossRef]
  26. Li, H.; Cao, J.; Zhu, J.; Liu, Y. Curvature graph neural network. Inf. Sci. 2022, 592, 50–66. [Google Scholar] [CrossRef]
  27. Liu, R.W.; Nie, J.; Garg, S.; Xiong, Z.; Zhang, Y.; Hossain, M.S. Data-Driven Trajectory Quality Improvement for Promoting Intelligent Vessel Traffic Services in 6G-Enabled Maritime IoT Systems. IEEE Internet Things J. 2021, 8, 5374–5385. [Google Scholar] [CrossRef]
  28. Zhang, Z.; Wan, J.; Zhou, M.; Lu, K. Information diffusion-aware likelihood maximization optimization for community detection. Inf. Sci. 2022, 602, 86–105. [Google Scholar] [CrossRef]
  29. Mesodiakaki, A.; Maniotis, P.; Gatzianas, M.; Vagionas, C.; Pleros, N.; Kalfas, G. A Gated Service MAC Protocol for Sub-Ms Latency 5G Fiber-Wireless mmWave C-RANs. IEEE Trans. Wirel. Commun. 2021, 20, 2502–2515. [Google Scholar] [CrossRef]
  30. Golkarifard, M.; Chiasserini, C.F.; Malandrino, F.; Movaghar, A. Dynamic VNF placement, resource allocation and traffic routing in 5G. Comput. Netw. 2021, 188, 107830. [Google Scholar] [CrossRef]
  31. Agarwal, S.; Malandrino, F.; Chiasserini, C.F.; De, S. VNF Placement and Resource Allocation for the Support of Vertical Services in 5G Networks. IEEE/ACM Trans. Netw. 2019, 27, 433–446. [Google Scholar] [CrossRef] [Green Version]
  32. Eramo, V.; Miucci, E.; Ammar, M.; Lavacca, F.G. An Approach for Service Function Chain Routing and Virtual Function Network Instance Migration in Network Function Virtualization Architectures. IEEE/ACM Trans. Netw. 2017, 25, 2008–2025. [Google Scholar] [CrossRef]
  33. Pham, C.; Tran, N.H.; Ren, S.; Saad, W.; Hong, C.S. Traffic-Aware and Energy-Efficient vNF Placement for Service Chaining: Joint Sampling and Matching Approach. IEEE Trans. Serv. Comput. 2020, 13, 172–185. [Google Scholar] [CrossRef]
  34. Tang, H.; Zhou, D.; Chen, D. Dynamic Network Function Instance Scaling Based on Traffic Forecasting and VNF Placement in Operator Data Centers. IEEE Trans. Parallel Distrib. Syst. 2019, 30, 530–543. [Google Scholar] [CrossRef]
  35. Sui, T.; You, K.; Fu, M. Stability conditions for multi-sensor state estimation over a lossy network. Automatica 2015, 53, 1–9. [Google Scholar] [CrossRef]
  36. Sui, T.; Marelli, D.; Sun, X.; Fu, M. Multi-sensor state estimation over lossy channels using coded measurements. Automatica 2020, 111, 108561. [Google Scholar] [CrossRef]
  37. Si, W.; Mburano, B.; Zheng, W.X.; Qiu, T. Measuring Network Robustness by Average Network Flow. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1697–1712. [Google Scholar] [CrossRef]
  38. Basaran, S.T.; Kurt, G.K.; Kschischang, F.R. Wireless Network Reliability Analysis for Arbitrary Network Topologies. IEEE Trans. Veh. Technol. 2022, 71, 2788–2797. [Google Scholar] [CrossRef]
  39. Zhang, Z.; Min, X.; Chen, Y. An Adaptive Control Scheme for Data-Driven Traffic Migration Engineering on 5G Network. Symmetry 2022, 14, 1105. [Google Scholar] [CrossRef]
Figure 1. Example for the TE-based wireless network.
Figure 1. Example for the TE-based wireless network.
Symmetry 14 02164 g001
Figure 2. The main principle of a-ADTC algorithm.
Figure 2. The main principle of a-ADTC algorithm.
Symmetry 14 02164 g002
Figure 3. The flow chart of a-ADTC algorithm.
Figure 3. The flow chart of a-ADTC algorithm.
Symmetry 14 02164 g003
Figure 4. Lifetime of the network.
Figure 4. Lifetime of the network.
Symmetry 14 02164 g004
Figure 5. Pareto probability distribution of the lifetime for a-ADTC.
Figure 5. Pareto probability distribution of the lifetime for a-ADTC.
Symmetry 14 02164 g005
Figure 6. Latency of the network.
Figure 6. Latency of the network.
Symmetry 14 02164 g006
Figure 7. Pareto probability distribution of the latency for a-ADTC.
Figure 7. Pareto probability distribution of the latency for a-ADTC.
Symmetry 14 02164 g007
Figure 8. Throughput of the network.
Figure 8. Throughput of the network.
Symmetry 14 02164 g008
Figure 9. Pareto probability distribution of the throughput for a-ADTC.
Figure 9. Pareto probability distribution of the throughput for a-ADTC.
Symmetry 14 02164 g009
Figure 10. A* Search algorithm. (a) Three-dimensional surface figure of residual energy resources. (b) Two-dimensional cross sectional figure of residual energy (view(0,0)).
Figure 10. A* Search algorithm. (a) Three-dimensional surface figure of residual energy resources. (b) Two-dimensional cross sectional figure of residual energy (view(0,0)).
Symmetry 14 02164 g010
Figure 11. MLRF algorithm. (a) Three-dimensional surface figure of residual energy resources. (b) Two-dimensional cross sectional figure of residual energy (view(0,0)).
Figure 11. MLRF algorithm. (a) Three-dimensional surface figure of residual energy resources. (b) Two-dimensional cross sectional figure of residual energy (view(0,0)).
Symmetry 14 02164 g011
Figure 12. a-ADTC algorithm. (a) Three-dimensional surface figure of residual energy resources. (b) Two-dimensional cross sectional figure of residual energy (view(0,0)).
Figure 12. a-ADTC algorithm. (a) Three-dimensional surface figure of residual energy resources. (b) Two-dimensional cross sectional figure of residual energy (view(0,0)).
Symmetry 14 02164 g012
Table 1. KPIs in three application scenarios.
Table 1. KPIs in three application scenarios.
KPIseMBBuRLLCmMTC
Throughput CapacityHighLow/Medium/HighLow
E2E LatencyMediumLowNo Requirement
MobilityNormalHighLow
Connected DevicesHighMediumHigh
Network Coverage RateHighMediumHigh
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, Z.; Duan, A. An Adaptive Data Traffic Control Scheme with Load Balancing in a Wireless Network. Symmetry 2022, 14, 2164. https://doi.org/10.3390/sym14102164

AMA Style

Zhang Z, Duan A. An Adaptive Data Traffic Control Scheme with Load Balancing in a Wireless Network. Symmetry. 2022; 14(10):2164. https://doi.org/10.3390/sym14102164

Chicago/Turabian Style

Zhang, Zhaohui, and Amin Duan. 2022. "An Adaptive Data Traffic Control Scheme with Load Balancing in a Wireless Network" Symmetry 14, no. 10: 2164. https://doi.org/10.3390/sym14102164

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop