You are on page 1of 7

ITC 11, Minoru Akiyama (Editor)

Elsevier Science Publishers B. V . (North-Holland)


© lAC, 1985
PERFORMANCE EVALUATION OF A NEW LEARNING AUTOMATA BASED ROUTING
ALGORITHM FOR CALLS IN TELEPHONE NETWORKS

M. T. EL-HADIDI* H. M. EL-SAYED* A. Y. BlLAL*'**

* Electronics and Communications Dept. ** National Telecomm. Institute


Cairo University, Giza, Egypt Cairo, Egypt

ABSTRACT Meanwhile, the available routes for a call between


a source and a sink node are determined by the
With the advent of modern technologies such network topology. Let us suppose there are r such
as SPC switching, CCIS signa~ling, and computer- routes. Then, depending on the traffic conditions
ized traffic measurements, efforts have intensi~ in the network and the capacity of links between
fied in search of efficient routing algorithms nodes, some of these routes would be blocked. We
capable of combating overload conditions in the denote by a~. the probability of using the ~th
1.J
telephone network. One such algorithm is present-
route (or more generally the ~ th routing action),
ed in this paper, with its structure conforming
and designate the probability o~a call being
with the recent control methodologies based on
blocked on such a route by P~ •• The problem of ~
learning automata. In addition to its near
call routing consists of assi~~ing values for a .. ,
optimal performance, the proposed algorithm has
i,j = l, ••• ,s; ~ = l, ••• ,r; such that the 1.J
the important feature of being implementable in
network performance is optimized. Clearly, if each
a decentralized form. Extensive computer simulat-
a~. changes with time, the resulting routing
ions have been carried out which clearly demonst- 1.J .
rate the capabilities of the new algorithm. actions would be dynamic. On the other hand, for
a~. equal either to 0 or 1 the actions are
1.J
1. INTRODUCTION deterministic and correspond to the familiar alte-
rnative routing type, whereas for 0 < a~. < 1
1.J
In dealing with overload conditions in
they are probabilistic and correspond to the load-
a telephone network, two approaches have been
sharing type.
generally considered. The first approach is known
as "protective control" and uses methods such as
In what follows, the network performance is
Directional Reservation Equipment and Dynamic
measured in terms of the average number of calls
Overload . Controls to protect the network against
lost over the entire network. Mathematically, this
congestion, by limiting the traffic offered to
can be expressed as follows
i t [lJ, [2J. In the second approach, known as
s r
a . . A .. P~. (a)
"expansive control", the network's capability is ' ~
expanded by rerouting blocked calls over a seque- J(~) L1.) 1.)L 1.J -
(2)
i,j=l ~=l
nce of trunks that are not typically selected
under normal conditions [3J-[5J. Dynamic rerouting
The call routing problem may now be stated as
can be accomplished either on a probabilistic
basis (load-sharing algorithms), or on a determin- Minimize J(a) with respect to ~
istic basis (alternative-routing algorithms). Such
such that ~
- =: { a ~ , i,j=l, ••• ,s;N=l,
o••• }
,r
expansive controls have become feasible recently ij
satisfies
with the advent of modern technologies such as
r
SPC switching, CCIS signalling, and computerized ~
traffic measurements. In the present paper, a new L a .. 1 (3)
1.)
~=l
algorithm for expansive control is proposed. It
has the capability of routing telephone calls
3. SOLUTION OF THE CALL ROUTING PROBLEM
throughout the network in a near optimal manner
and, in addition, can be implemented in a decentr-
To minimize Eq.(2) w.r.t. a subject to
alized form.
constraint (3), one needs to evaluate P~ . first.
The most accurate analysis for the determi~ation
2. THE CALL ROUTING PROBLEM
of P~. is based on a
queuing model for the network.
We consider a general telephone network In sU~h model, call arrivals are assumed to follow
consisting of s source nodes (or exchanges), the Poisson distribution, call durations are assu-
t transit nodes, and s sink nodes. Within this med to be exponential, and the number of calls in
framework, a call is allowed to originate from any the network is assumed to change by at most one
of the source nodes and terminate at any of the call during an infinitismal time interval [6J.
sink nodes. Denoting by Aij the offered traffic A transition probability vector P is then constr-
ucted whose components correspond to all combinat-
between the i th source node and the j th sink
ions of calls on the various routes of the network.
node, the matrix of offered traffic for~e
The dimension of such vector is
network is given by s r
R-
IT IT (N .. + 1) ,
A 1, ••• , s (1)
i,j=l £=1 ~J

4.4A-2-1
ITC 11 Kyoto September 1985

where N~. denotes the capacity of route ~ bet- dPW


ween nod~a i .and j A differntial equation of
0 dJ ~ \ w A uV
--~ A .. P .. + l Ct uv UV--~-
~J ~J
the form P QP has to be subsequently solved in dCt . . u, V w dCt . .
~J ~J
order to get the (s x s x r) unknown blocking pro-
babilities. Besides the problem of large dimension, where
it is very difficult to derive the indicated diff-
erential equation in the cas.e of a whole network dPW dPu~ dYuSl, dPSI,V dYSI,V dPU~ dYU~
uV
(as opposed to a single trunk group). This is ~ + - .- --SI,- - P ~V- - - SI,-
because one should consider the interaction of
;T
oCt •• dY n dCt.. dY n " dCt .. dY n dCt ..
~] uN ~J NV ~J UN ~J
several routes through a common trunk group as
well as the complex dependency of the transition dPSI,v dY~V
PuSl,----SI,- w = SI,
probabilities on ~.
dY n dCt .. (8)
NV ~J
To circumvent the above difficulties, simpl-
ified models have been proposed. Among these is
o otherwise
the so-called network flow-model, which uses the
average network traffics at steady . state for
The P SI,'s and the PSI, 's are to be evaluated by
modelling the system [7Jo Specifically, in a net-
solvigg Eqs. (S-a)- V(S_d), using successive
work satisfying the assumptions of .: (i) call are
approximations say, whereas the derivative terms
assigned single-choice routes on a load-sharing
can be obtained by appropraite algebraic manipul-
basis, and (ii) "downstream" trunk .blocking is
ations of the same equations. (See [llJ for
independent of "upstream" trunk blocking, one can
details) 0
arrive at the following set of equations

P~. Pi~ + P,Q;j - PirP~j (4)


We thus conclude that using a simplified
network model does not - alone - c'ircumvent the
~J
difficulty of solving the nonlinear optimization
s
~ problem in a real-time fashion. Besides the comp-
I
j=l
Ct . . A .. (1 - P~j)
~J ~J
(S-a)
utational difficulties, there is also the requir-
ement that all traffic data at every network node
s
~ (i.e. exchange) be known at some traffic control-
I Ct . . A .. (1 - Pi~)
~J ~J
(S-b)
ler, which is responsible for computing the new
i=l
Ct~.'s. Such centralization of the optimal solution
N. ~ m ~J
Y ~ N.~ can mean tremendous costs that would be associated
i~ / ~ Yi~
N.t
~~.
I
m=O· m!
(S-c) with establishing data links to all exchanges,
and these by themselves can result . in reduced
N~. system reliability. .
N~.
~j
Y J J
~j / I (S-d)
40 A NEW LEARNING AUTOMATA BASED ROUTING
N~.J ,. -0
m- m ~
ALGORITHM
where
The proposed routing algorithm is a modific-
P prob o of a call being blocked
ab ation of the Frank-Wolfe conditional gradient
on trunk ab
technique in such a way that it both simplifies
!::, "fictitious" offered traffic the computational effort as well ,as make's possible
on trunk ab decentralized routing decisions [llJ, [12J More 0

specifically, in the Frank-Wolfe technique the


number of circuits on trunk ab
constraint (3) is satisfied .by expressing the
recursion (6) as
It soon becomes clear that though the dimension of
the equations determining P~. has been greatly
reduced, one should neverth~Iess solve ~a set of
nonlinear algebraic equations in the Ct . . 's o (This (9)
fact remains true for the more general~Jnetwork in ~n
and then choosing --- so as to bring
which assumptions (i) and (ii) are relaxed) The 0
~ " a
call routing problem (2) and (3), in conjunction ~(n)- an 'ilj(~(n» to the boundary of the feasible
with a flow-model description is therefore one set o In the new algorithm, the computation of
of nonlinear optimization. To solve it, one may 'ilJ(Ct) is facilitated by linearizing P~. (Ct) about
use a search technique such as the Frank-wolfe's some- operating point, which then yield§J:-
conditional gradient [8J, or the Rosen" s gradient
projection [9].. In both cases, the gradient 'ilJ (~) SI,
has to be evaluated in order to iteratively update J I I Ct .. A . .
~J ~J
P~.
~J
i, j SI,
the action probability according to
SI, ..
Kij~
~(n+l) = ~(n) - l1 n 'ilJ(~(n) (6) I I Ct .. A .. [K~J + l uVw Ct:)
~J ~J
i,j JI, u,v,w
(In E~. (6)~ ~n denotes the updati~g step at the Consequently,
n th ~terat~on, and VJ(Ct) = {dJ/dCt .. } . . n ) . dJ
-- - ~J ~,J,N

To appreciate the computational effort invol-


ved in calculating (6), we once more consider the
network satisfying assumptions (i) and (ii). Here, (10)

4.4A-2-2
ITC 11 Kyoto September 1985

w
Thus, to evaluate dJ/da one needs only to either the single- or multi-choice type; and
identify the Ki~~ 's uV at the operating point. d) network conditions are continuously monitored
UvW
Recalling that these coefficients actually repres- such that its data is available for outputting
ent the slopes of P~. 's with respect to a
W
's, as desired o
one may justifiably1 use the following li~~ar
J
The network used for the simulation results
recursive estimator
reported below, has 3 source nodes, 4 transit
..~ nodes, and 3 sink nodes. The trunk group capaci-
K1J (n-l) 0 (l-y ) + ties and the load pattern are as given in Tables
uVW ~ 2
~ 1 and 2, respectivelyo The average call duration
P .. (n) P .. (n-l)]
[
1J 1J .Y is T = 100 sec and the permitted routing decisions
w _ a W (n-l) 2 are of the single-choice load-sharing type. After
a (n)
UV uV normal operation for a period of 1150 sec, the
(11) failure of the transit exchange corresponding to
together with k = 1 is simulated. This condition is maintained
for 850 sec during which calls COUld. be routed
if the (m+l) st call through transit nodes 2 and 3 only.
succeeds
A number of simulation experiments were then
if the (m+l) st call
carried out using the proposed routing algorithmo
is blocked
In one experiment, the algorithm performance was
(12)
compared to that of the optimal solution detailed
In the above, n is an index for the updating in Section 3 0 For this purpose, several initial
instant, whereas m is a call dependent index. trials were conducted in order to determine suite
Moreover, Y and Y are constants whose inverses able values for the new algorithm's parameters o
l 2
correspond Eo the estimators' depth of memory. This yielded: Y = 003, Y = .0012, a = 016, and
l 2
meanwhile, P denotes the blocking probability of d = 50 sec. The average number of lost calls over
a trunk group belonging tothe route under 100 replications of simulation runs (each having
consideration. 2000 sec of simulation time), was then obtained
and the results are shown in Figo 1. Also shown
Next, to tackle the problem of centraliza-
in the figure are the results of the off-line
tion, Eqo (9) is approximated as follows :
optimal solution for the routing problem, as ind-
For all i,j £ {l, •• o,s} icated with the dotted lines. It is clear from
Fig. 1 that the automata were able to rapidly
dJ dJ
a~. (n+l) a {a~ . (n) -l} i f - - =min--
"learn" the routing strategy that should be foll-
1J 1J da~. V da~. owed under each network condition, and that these
strategies are very close to the optimal ones.
1J 1J
a~j(n) - a{a~j(n)-o} otherwise
In another simulation experiment, the effect
of varying the values of Y , Y , a, and d was
(13) l 2
studied. For this purpose, the following set of
(The above approximation says that we replace the reference parameter values was chosen: Y = 007,
l
f.I Y = .001, a = 0.1, and d = 50 sec o The results
boundary point a .. (n) - --E dJ/da . . (n) by the
-J..J a -J..) o~tained by separately varying each of these par-
vertix nearest to it in the feasible set.) ameters are shown in 'Figs. 2 - 6. Based on these
figures one may draw the followin conclusions :
Equation (13) represents a linear automaton i) Increasing the depth of memory - which is given
of the reward-inaction type with a learning step by l/Y and 1/Y - leads to a reduction in the
l 2
"a" [lOJ. It is exclusively concerned with the responsiveness of the algorithm to random fluc-
routing of calls between nodes i and j. More- tuations, thereby reducing the variance of
over, by making the realistic assumption that losses at steady state;
ij~ . .
K ~ 0 for those nodes wh1ch are phys1cally ii)Increasing the learning step "a" causes a more
d~~~ant from i and j, the automaton needs only rapid convergence in the event of large amplit-
to receive traffic data frome those nodes in its ude perturbations; however, this is accompanied
immediate vicinity. (See Eqo(lO». Consequently, by an increase in the variance of losses at
decentralization of routing actions can be achieved. steady state;
iii) Decreasing the updating period" d" has an infl-
5. PERFORMANCE EVALUATION VIA COMPUTER uence similar to that of increasing "a".
SIMULATION
It is therefore clear that when choosing the
In order to evaluate the performance of the parameters of the proposed routing algorithm,
a trade-off has to be made between the speed of
proposed routing algorithm" a special interactive
convergence and the steady state performance. In
computer program has been developed in PASCAL [llJ.
It has the 'following features : a) the call inter- addition, the choice of the parameter "d" should
take into account the permissible rate of data
arrival times are exponentially distributed in
accordance with the offered traffic matrix {A .. }; transmission and processing, since this sets
b) the call durations are exponentially distrt~uted a lower limit to "d"o
with an average value T which is the same for
all routes; c) routing strategy is updated period-
icallyevery "d" seconds according to Eq. (13),
with a facility for having routing actions of

4.4A-2-3
ITC 11 Kyoto September 1985

6. CONCLUDING REMARKS REFERENCES

In this paper we have presented a new routing [lJ P. J. Burke, "Automatic overload controls in
algorithm which offers a number of significant a circuit-switched conununications network",
advantages over previously suggested algorithms. in Proc. Nato Electron. Conf., pp. 667-672,
On the one hand, it overcomes the prohibitive December 1968.
computational burden and the inescapable central-
ization requirements, associated with the optimal [2 J L. Ao Gimpelson, "Network management : design
solution of the routing problem using gradient and control of conununications networks",
techniqueso On the other hand, it avoids the need Electrical Conununications, vol o 49,No o 1,
for processing traffic data at the impractically pp. 4-22, Jan. 1974.
high "call-by-call" rate demanded by standard
learning automata techniques [3], [la]. This is [3J K. S. Narendra, E. A. Wright, and Lo G. Mason,
accomplished while maintaining a near optimal "Application of learning automata to telephone
performance that cannot be guaranteed using stand- traffic routing and control", IEEE Trans. on
ard learning automata techniques, especially under Syso, Man, and Cyb., vol SMC-7, No. 11, pp.
heavy traffic conditions o 785-792, November 1977.

[4J E. Szybicki and Ao Bean, "Advanced traffic


routing in local telephone networks; perform-
ance of proposed call routing algorithms", in
Proc. 9 th Int. Teletraffic Congro, Torremo-
linos, Spain, paper 612, October 1979.
TABLE 1 Trunk group capacities
( # of circuits) [5J D. Go Haenschke, Do A. Kettler, and E. Oberer,
"Network management and congestion in the
Transit Exchange UoS o teleconununications network", IEEE Trans o
Source Sink on Conun., vol COM-29, No. 4, pp. 376-385,
Exchange 1 2 3 Exchange April 1981.

1 20/15 12/21 9/30 1 [6J L. Kleinrock, Queuing Systems, vol. 1


2 23/19 14/21 19/20 2 Theory, New York: John Wiley, 1975.

3 15/15 32/9 11/13 3 [7J J o Bernussou, J o Mo Garcia, 10 S. Bonatti,


4 12/21 16/23 42/18 4 and F. LeGall, "Modelling and control of large
scale teleconununication network", IFAC 8 th
Triennial World Congress, vol. x, Kyoto,
Japan, August 1981.

[8J W. Ao Gruver and E. Sachs, Algorithmic Methods


in Optimal Control, London: Pitman Pub o Ltd.,
1980.

[9J A. V. Fiacco and Go Po McCormick, Nonlinear


Progranuning, New York: John Wiley, 1968 0

TABLE 2 Normal load pattern


( in Er1angs) - [lOJ K. So Narendra and Mo A. L. Thathachar,
"Learning automata - a survey", IEEE Trans.
Destination Exchange on Sys., Man, and Cyb., vol SMC-4, No. 4,
Source pp. 323-334, July 1974.
Exchange 1 2 3 4

8 12 [llJ Ho M. El-Sayed, Adaptive and Learning Control


1 6
of Traffic in Telephone Networks, M. Sc.
2 14 7 15 Thesis, Cairo University, Egypt, Jan. 1984.
3 5 15 17
[12J H. Mo El-Sayed, M. T. El-Hadidi, and
4 25 19 6 A. Yo Bilal, "A learning scheme for routing
in telephone networks", in Proc. EUROCON 84
- Computers in Conununications and Control,
Brighton, Britain, September 1984 0

4.4A-2-4
ITC 11 Kyoto September 1985

50

45

40

35
III
0'1
C 30
cO
r-i
H
~ 25
u
~ 20
~
E-t 15
E-t
Ul
o
H 10

o 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
TIME ( 100 SEC.)
Fig. 1 Behaviour of the new routing algorithm including effect of breakdown

50

45

40

35
••• •
~ 30
c
cO

g 25
r-i

u
~ 20

~E-t 15
E-t
Ul
o
H 10

O~~~~--~--~--~~--~--~--~9--~1:0--~11~~1~2~~1;3~1~4~~155~1~6--tl7~]1~8~~19;--;20
o 1 2 3 4 5 6 7 8 TIME ( 100 Sec.)
on the performance of the new routing algorithm
Fig. 2 The effect of parameter Yl

4.4A-2-5
ITC 11 Kyoto September 1985

50

45

40

35
.001
III •• • • Y2
g' 30 .00085
1\1
-O-~~-<>- Y2
r-i
H
~ 25

u
H 20
rr..
~8 15
8
Ul
0
...:l 10

o 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
TIME ( 100 Sec.)
Fig. 3 The effect of parameter Y2 on the performance of the new routing algorithm

50

45

40

35
• • •• a .1

-<>-o--o-~ a .08

U
H
rr.. 20
~8
15
8
Ul
o
...:l
10

o 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 . 17 18 19 20
TIME ( 100 Sec.)
Fig. 4 The effect of decreasing a on the new routing algori tm behaviour

4.4A-2-6
ITC 11 Kyoto September 1985

50

45

40
\
\
35
\
III
\
0'1
• • •• a .1
~
~ 30 I
rl a
H -0- -0- -0- -0- .25 "'t:J
~
25
u
H
rz..
20
~
E-<
E-< 15
Ul
0
H
10

0 1 2 3 4 5 6 7 8 9 10 11 12 13
15 16 17 18 19 20 14
Fig. 5 TIME ( 100 Sec.)
The effect of increasing a on the new routing algorithm behaviour

50

45 ~,
'0. .......
40 ""'0.
\ ,
\
35

•• •• d 50 sec.

d 100 sec.

U
1
I
H
rz.. 20
~
E-< I
E-< 15 I
Ul
o
H I
10

o 1 2 3 4 5 6 7 8 . 9 10 11 12 13 14 15 16 17 18 19 20
~IME ( 100 Sec.)
Fig. 6 The effect of slow updating on the new routing algorithm behaviour

4.4A·2~7

You might also like