Keywords

Introduction

With the rapid development of science and technology and the continuous improvement of people’s living standards, various types of mobile terminal equipment and mobile Internet services are widely used. It is estimated that by 2030, the number of mobile terminals will be close to 100 billion, and mobile service traffic will increase by nearly 20,000 times (Ge et al. 2019; Wang et al. May 2016). It will be difficult for the existing communication system to meet the access requirements of massive terminals and services in the future. In view of this, the fifth generation mobile communication system (5G) (Zhang et al. 2020; Madapatha et al. 2021) emerges as the times require. On the other hand, with the gradual rise of various interactive multimedia services (such as video conferencing and online games, etc.), delay and delay jitter have increasingly become the most important QoS indicators, and become the key to user service experience (Chaudhry et al. 2020a; Ahmad 2015). The current research mainly focuses on the analysis of the delay characteristics of data packets, and there are relatively few studies on delay jitter. Therefore, it is imperative to study the delay jitter for the 5G environment.

The control of service delay and delay jitter is mainly implemented at the network link layer with the packet as the granularity, and the forwarding scheduling and queue management of the data packets are carried out through the network nodes. At present, the results of studying delay jitter performance with packet as granularity are rare. References (Rezaabad et al. 2018; Hore et al. 2021) have explored the network delay jitter characteristics. Reference (Chaudhry et al. 2020b) uses delay mean square error to approximate the delay jitter for multi-hop wireless Mesh networks and obtains the delay jitter by solving the end-to-end delay distribution. It should be noted that most of the literature on delay jitter research is based on single-point systems, such as only studying the delay jitter of wireless access network or wired core network (Tran and Le 2018; Pham et al. 2019). However, the 5G network must be a complex and diverse heterogeneous network, and the backhaul network is an important part. The unified consideration of the access network and the backhaul network can more truly describe the future 5G network.

Therefore, in the assessment of the existing problems, this paper suggests an optimal channel resource allocation algorithm with delay jitter as the optimization index for the 5G hybrid backhaul scenario. Considering the dynamic characteristics of the channel, the delay jitter problem is comprehensively analyzed, the delay jitter index is obtained, and then various backhaul optimization models are constructed. Finally, the hierarchical algorithm is used to solve the problem quickly.

The rest of the chapter is organized as follows: section “Network Scenarios and System Assumptions” covers the 5G network scenario, section “Analysis of Delay Jitter Indicators” includes the analysis of delay jitter indicators, section “Optimization Model Establishments” includes the proposed model description, section “Improved Model Solutions” includes the improved model, section “Simulation Analysis” includes the simulation detail and result analysis, and at last, section “Conclusions” includes the conclusion and future work.

Network Scenarios and System Assumptions

As shown in Fig. 4.1, for a two-layer heterogeneous network scenario, the upper layer is a Backhaul Aggregator Node (BAN). The lower layer is multiple Small-Cell Base stations (SCBS) covered by the BAN. Dedicated optical fibers link the BAN to the rest of the network, and millimeter waves are used for communication with SCBS or end customers (Iradukunda et al. 2021).

Fig. 4.1
A flow diagram has 2 arrays for B A N channel assignment and S C B S channel assignment that leads to modes 1 and 2 with service delay and delay jitter connected via an m m wave link and a microwave link. Below is an interconnected network diagram of various mobile devices.

5G two-layer heterogeneous network scenario

While SCBS uses frequency bands below 6 GHz (Liu et al. 2020) to communicate with users, here, the BAN combines the functions of an aggregator and base station access. Considering the hybrid backhaul scenario, there are two backhaul methods to choose from: the first one, the user can attach to the BAN via a one-hop wireless connection, and the BAN will handle the backup via an Ethernet cable; the second one, the user can access the SCBS to which he belongs, and then owned by.

The SCBS accesses the BAN and the core network through a two-hop wireless link.

Define SCBS set SC = {C1, C2,…, C1,…, CL}, define the user set covered by cell C1 as UE1 = {UE11, UE12,…, UEln,…, UElNl}, where UEln represents the nth user, Nl is the number of users in the cell SC1. It is assumed that all SCBSs have a common channel. Now, the seamless coverage of the entire network is disjoint, that is, UEi⋂UEj = ∅ (i ≠ j). Therefore, the set of users is UE = {UE1, UE2,…, UE1,…, UEL}, then the number of users \(N=\sum_{l=1}^{L}{N}_{l}\).

The access selection vector is defined as

$$ A \, = \{ a_{11} ,a_{12} , \ldots ,a_{{1N_{2} }} ,a_{21} ,a_{22} , \ldots ,a_{{2N_{2} }} , \ldots ,a_{L1} ,a_{L2} , \ldots ,a_{{LN_{L} }} \} $$

Among them, aln = 1 (n ≤ Nl) means that user n in cell C1 accesses the BAN, and the BAN performs the backhaul; aln = 0 (n ≤ Nl) means that the user n in cell C1 accesses the Cl, and the C1 performs the backhaul.

The channel allocation matrix that defines SCBS is

$$B=\left[\begin{array}{c}\begin{array}{c}\begin{array}{cc}{b}_{\mathrm{11,1}}& \begin{array}{cc}{b}_{\mathrm{11,2}}& \begin{array}{cc}\dots & {b}_{11,{M}_{1}}\end{array}\end{array}\end{array}\\ \begin{array}{cc}{b}_{\mathrm{12,1}}& \begin{array}{cc}{b}_{\mathrm{12,2}}& \begin{array}{cc}\dots & {b}_{12,{M}_{1}}\end{array}\end{array}\end{array}\end{array}\\ \begin{array}{c}\begin{array}{cc}\vdots & \begin{array}{cc}\vdots & \begin{array}{cc}{b}_{ln,m}& \vdots \end{array}\end{array}\end{array}\\ \begin{array}{c}\begin{array}{cc}{b}_{1{N}_{1},1}& \begin{array}{cc}{b}_{1{N}_{1},2}& \begin{array}{cc}\dots & {b}_{1{N}_{1},{M}_{1}}\end{array}\end{array}\end{array}\\ \begin{array}{c}\begin{array}{cc}{b}_{\mathrm{21,1}}& \begin{array}{cc}{b}_{\mathrm{21,2}}& \begin{array}{cc}\dots & {b}_{21,{M}_{1}}\end{array}\end{array}\end{array}\\ \begin{array}{c}\begin{array}{cc}{b}_{\mathrm{22,1}}& \begin{array}{cc}{b}_{\mathrm{22,2}}& \begin{array}{cc}\dots & {b}_{22,{M}_{1}}\end{array}\end{array}\end{array}\\ \begin{array}{c}\begin{array}{cc}\vdots & \begin{array}{cc}\vdots & \begin{array}{cc}\dots & \vdots \end{array}\end{array}\end{array}\\ \begin{array}{c}\begin{array}{cc}{b}_{1{N}_{2},1}& \begin{array}{cc}{b}_{2{N}_{2},2}& \begin{array}{cc}\dots & {b}_{2{N}_{2},{M}_{1}}\end{array}\end{array}\end{array}\\ \begin{array}{c}\begin{array}{cc}\vdots & \begin{array}{cc}\vdots & \begin{array}{cc}\dots & \vdots \end{array}\end{array}\end{array}\\ \begin{array}{cc}{b}_{L{N}_{L},1}& \begin{array}{cc}{b}_{L{N}_{L},2}& \begin{array}{cc}\dots & {b}_{L{N}_{L},{M}_{1}}\end{array}\end{array}\end{array}\end{array}\end{array}\end{array}\end{array}\end{array}\end{array}\end{array}\end{array}\right]$$

Among them, bln,m = 1 shows that the bandwidth Wm is allocated to the user UEln, and bln,m = 0 suggests that it is not given. Here, \(W = \left\{ {W_{1} ,W_{2} , \ldots ,W_{{M_{1} }} } \right\}\) denotes the channel vector that SCBS can allocate, and M1 is the total number of SCBS channels.

The BAN channel distribution vector is defined as below, where M2 is the total number of channels in BAN

$$ C = \{ c_{11} ,c_{12} , \ldots ,c_{{1N_{1} }} , \ldots ,a_{11} ,a_{12} , \ldots ,c_{\ln } , \ldots ,c_{{lN_{l} }} , \ldots ,c_{L1} ,c_{L2} , \ldots ,c_{{LN_{L} }} \} $$

The number of BAN channels assigned to UEln is denoted by cln and cln 1(l,n). It’s important to remember that users require a certain quantity of BAN capacity whether they use the BAN backhaul or the SCBS backhaul. cln displays the number of channels assigned to the Cl BAN link in the UEln Cl BAN route for UEln packet transmission if aln is set to 1; otherwise, cln displays the number of channels assigned to the UEln BAN link for UEln data packet transmission if aln is set to 0.

The paper’s method has been based on the following principles:

  1. (1)

    Assuming that the channels are discrete, the BAN can assign different tracks to any SCBS or a particular user. The SCBS can also set other numbers of media to a specific user.

  2. (2)

    For the service uplink transmission scenario, study the delay jitter index based on packet granularity.

  3. (3)

    To simplify interference analysis, we will presume that the BAN and SCBS channels have the same total bandwidth, and the BAN's total bandwidth should be larger than the SCBS's total bandwidth.

  4. (4)

    If the link’s transmission rate is higher than its channel capacity, wireless packet loss will occur; each SCBS has an unlimited wait buffer to prevent packet loss from accumulating (or overcrowding); and if the link experiences packet loss, the transmission mechanism will resume to transmit the packet again.

Analysis of Delay Jitter Indicators

In the wireless communication environment, delay jitter is a physical quantity that measures the delay change experienced by data packets during network transmission—packet delay jitter. Therefore, to analyze the delay jitter problem, it is necessary to examine the delay problem first. Propagation delay and transmission delay are components of link delay. Propagation delays are affected by a number of factors, including the distance over which a signal must travel and the pace at which electromagnetic waves travel. (i.e., the speed of light). Due to the short distances over which 5G signals must travel, transmission delays are negligible. However, data fragment transfer causes a delay, which is known as transmission delay. Therefore, the analysis of the service delay and delay jitter system is analyzed separately below.

Delay Analysis

In this scenario, there are three types of wireless links for UEln: the link \({l}_{ln}^{1}\) for UEln to access BAN, the link for UEln to access SCl \({l}_{ln}^{2}\), and the link for SCl to access BAN correspondingly \({l}_{ln}^{3}\). All link channels are assumed to be subject to small-scale Rayleigh fading. For links \({l}_{ln}^{1}\) and \({l}_{ln}^{3}\), since the same track is not repeatedly allocated in the BAN, there is no interference in the BAN;

Both use millimeter wave communication, and the distance between BANs is relatively long. The above analysis denotes the signal-to-interference noise ratio of the link \({l}_{ln}^{i}\) as \({\mathrm{SINR}}_{ln}^{i}\). If \({\mathrm{SINR}}_{ln}^{i}\) ≥ SINRth, the transmission is considered successful, and the bit error rate \({\mathrm{BER}}_{ln}^{i}\) of the link \({l}_{ln}^{i}\) is calculated.

Channel error correction coding is linked to the data loss rate. It is believed that the capacity of all packages is PL (PL ≥ 3). According to this report, the data package has three mistakes, or bits, and the box is presumed gone. If there is a loss of packets and the data has to be reissued, the packet loss rate is

$$\begin{aligned}{PER}_{ln}^{i}&=1-{(1-{BER}_{ln}^{i})}^{PL}-{C}_{PL}^{1}{(1-{BER}_{ln}^{i})}^{PL-1}\\&\quad{BER}_{ln}^{i}-{C}_{PL}^{2}{(1-{BER}_{ln}^{i})}^{PL-2}{({BER}_{ln}^{i})}^{2}\end{aligned}$$
(4.1)

\({C}_{\uptheta }^{\mathrm{\vartheta }}\) represents the number of combinations to select ϑ elements from θ elements. Link \({l}_{ln}^{i}\) is derived from the packet loss rate average transmission delay for

$$\begin{aligned}{\tau }_{ln}^{i}&=\left(1-{PER}_{ln}^{i}\right)T+{PER}_{ln}^{i}\left(1-{PER}_{ln}^{i}\right)2T+\dots +{\left({PER}_{ln}^{i}\right)}^{RT}\\&\quad\,\left(1-{PER}_{ln}^{i}\right)\left(RT+1\right)T+{\left({PER}_{ln}^{i}\right)}^{RT+1}(RT+1)T\end{aligned}$$
(4.2)

T represents a transmission delay, while RT is the greatest number of retransmissions.

The latency study of the UE → BAN route is straightforward once we move beyond the connection level. With a one-hop wireless link, the latency introduced by the cable central network is negligible and not worth considering. Therefore, for the UE → SC → BAN path, the time for Packet1, Packet2, Packet3, …, Packet k to reach SC1 is\({\tau }_{ln}^{2}\), 2\({\tau }_{ln}^{2}\), 3\({\tau }_{ln}^{2}\), ···, k \({\tau }_{ln}^{2}\) in sequence. If \({\tau }_{ln}^{2}\)\({\tau }_{ln}^{3}\), there is no queue congestion at SCl, so the time to reach BAN is \({\tau }_{ln}^{2}\)+\({\tau }_{ln}^{3}\), 2 \({\tau }_{ln}^{2}\)+\({\tau }_{ln}^{3}\), 3 \({\tau }_{ln}^{2}\)+\({\tau }_{ln}^{3}\),⋯, k \({\tau }_{ln}^{2}\)+\({\tau }_{ln}^{3}\). If \({\tau }_{ln}^{2}\)<\({\tau }_{ln}^{3}\), there is a queuing delay in SCl, so the queuing delay in SClis 0 in sequence, \({\tau }_{ln}^{3}-{\tau }_{ln}^{2}\),2(\({\tau }_{ln}^{3}-{\tau }_{ln}^{2}\)),⋯, (k − 1) (\({\tau }_{ln}^{3}-{\tau }_{ln}^{2}\)), the time for each data packet to arrive at the BAN is is \({\tau }_{ln}^{2}\) + \({\tau }_{ln}^{3}\), \({\tau }_{ln}^{2}\) + \({2\tau }_{ln}^{3}\), \({\tau }_{ln}^{2}\) + \(3{\tau }_{ln}^{3}\),⋯, \({\tau }_{ln}^{2}\) + \(k{\tau }_{ln}^{3}\). Combining the above two situations, the path delay of UE → SC → BAN can be analyzed from the perspective of the expected average; the packet arrival delay interval is max{\({\tau }_{ln}^{2}\),\({\tau }_{ln}^{3}\)}, and the initial delay is \({\tau }_{ln}^{2}\) +\({\tau }_{ln}^{3}\).

Delay Jitter Analysis

Further, the delay jitter of the link \({l}_{ln}^{i}\) can be calculated as

$$\begin{aligned}{\sigma }_{ln}^{i}&=\left(1-{PER}_{ln}^{i}\right){(T-{\tau }_{ln}^{i})}^{2}+{PER}_{ln}^{i}\left(1-{PER}_{ln}^{i}\right){(2T-{\tau }_{ln}^{i})}^{2}+\dots +{({PER}_{ln}^{i})}^{RT}\\&\quad\,\left(1-{PER}_{ln}^{i}\right){[\left(RT+1\right)T-{\tau }_{ln}^{i}]}^{2}+{{(PER}_{ln}^{i})}^{RT+1}{[\left(RT+1\right)T-{\tau }_{ln}^{i}]}^{2}\end{aligned}$$
(4.3)

Among them, \({\tau }_{ln}^{i}\) represents the mean transmission delay of the link \({l}_{ln}^{i}\), \({PER}_{ln}^{i}\) represents the packet loss rate, and T represents the one-time transmission delay. Furthermore, Eq. (4.3) describes the fluctuation degree of the transmission delay of the link \({l}_{ln}^{i}\) relative to the average delay in the form of mathematical variance (Chaudhry et al. 2020b).

Spreading from the link to the path, for the transmission of the first data packet, since there is no waiting delay, each component link can be regarded as independent of each other, so the initial delay jitter of the path is the sum of the delay jitter of each component link. For the transmission of subsequent data packets, there are two situations of queuing and non-queuing at intermediate nodes. The packet retransmission mechanism makes the calculation of waiting delay more complicated. At this time, each component link can be regarded as interrelated, so the path. The delay jitter should be less than the sum of the delay jitters of each component link. For simplicity, this paper uses the maximum delay jitter of each component link to approximate the delay jitter of the entire path.

Analyzing the latency and disturbance on the UE → BAN route (where the BAN immediately backhauls UEln) is straightforward. The cable network's backbone can be reached via a single wireless step. It assumes that the wired connection has no delay jitter, the path wireless. The initial delay jitter and the average delay jitter of the incoming side are both \({\sigma }_{\mathrm{ln}}^{i}\). For the UE → SC → BAN path (i.e., the backhaul path where UEln accesses BAN via SC1), its initial delay jitter is \({\sigma }_{\mathrm{ln}}^{2}\) + \({\sigma }_{\mathrm{ln}}^{3}\), and the average delay jitter of subsequent packets is max (\({\sigma }_{\mathrm{ln}}^{2},{\sigma }_{\mathrm{ln}}^{3}\)).

Optimization Model Establishments

Basic Backhaul Model

The optimization goal can be written as, based on the delay jitter study above:

$$ \begin{aligned} [X^{*} ,Y^{*} ,Z^{*} ] = & \mathop {\arg \min }\limits_{{\forall a_{\ln } ,b_{\ln ,m} ,c_{\ln } }} \left\{ {U = \sum\nolimits_{\forall l} {\sum\nolimits_{\forall l} {(1 - a_{\ln } )} } } \right. \\ & \left. {\left[ {r.\max \left( {\sigma_{\ln }^{2} ,\sigma_{\ln }^{3} } \right)} \right] + a_{\ln } \cdot \sigma_{\ln }^{1} } \right\} \\ \end{aligned} $$
(4.4)

Among them, U represents the optimization objective function of the basic backhaul model, which can be regarded as the sum of the average delay jitter of all user backhaul paths, X*, Y*, and Z* represent the optimal solutions of X, Y, and Z, respectively, and r ≥ 1 is the initial delay jitter compensation factor to reflect the effect of the initial delay jitter. In particular, when max(\({\sigma }_{ln}^{2},{\sigma }_{ln}^{3}\)), the average delay jitter of the two types of paths is the same. In this case, UE → BAN with a more negligible initial delay jitter will be selected as the optimal path.

Then, the basic optimization model can be established:

$$ \mathop {\arg \min }\limits_{{\forall a_{\ln } ,b_{\ln ,m} ,c_{\ln } }} \left\{ {\sum\nolimits_{\forall l} {\sum\nolimits_{\forall l} {(1 - a_{\ln } )\left[ {r.\max \left( {\sigma_{\ln }^{2} ,\sigma_{\ln }^{1} } \right)} \right]} } + a_{\ln } ,\sigma_{\ln }^{1} } \right\} $$
(4.5)
$$ {\text{s}}{.}\;{\text{t}}.\min \left( {\sum\limits_{m = 1}^{{M_{1} }} {b_{\ln ,m} ,a_{\ln } } } \right) = 0,\forall 1,n $$
(4.6)
$$ \sum\limits_{n = 1}^{{N_{l} }} {b_{\ln ,m} } \le 1,\forall l,m $$
(4.7)
$$ \sum\nolimits_{\forall l,n} {c_{\ln } \le M_{2} } $$
(4.8)
$$ a_{\ln } \in \{ 0,1\} ,\forall l,n $$
(4.9)
$$ b_{\ln ,m} \in \{ 0,1\} ,\forall l,n,m $$
(4.10)
$$ c_{\ln } \ge 1,\forall l,n $$
(4.11)

Based on Eq. (4.6), UEln uses either the SCBS backhaul (for which the SCBS allocates multiple bandwidths) or the BAN backhaul (for which the SCBS does not assign a channel). According to Eq. (4.7), in order to prevent intra-cell crosstalk, each track within a given cell is only shared by a single user. In Eq. (4.8), M2 is the highest number of channels that can be provided by BAN, so the number of channels allotted by BAN must be less than or equal to M2. Equations (4.9) and (4.10) define the value space of aln and bln,m. Finally, Eq. (4.11) indicates that the BAN bandwidth needs to be allocated no matter how the user is backhauled.

Improved Model 1

The basic model only optimizes the delay jitter and ignores the optimization of a service delay, so the delay interval constraint of the backhaul path of user UEln is added:

$$ (1 - a_{\ln } )\left[ {r.\max \left( {\sigma_{\ln }^{2} ,\sigma_{\ln }^{3} } \right)} \right] + a_{\ln } \cdot \tau_{\ln }^{1} \le \varepsilon_{\ln } ,\forall l,n $$
(4.12)

Among them, εln represents the maximum delay constraint to ensure the basic delay requirements of the business. Therefore, an improved model 1 is constructed:

$$ \mathop {\arg \min }\limits_{{\forall a_{\ln } ,b_{\ln ,m} ,c_{\ln } }} \left\{ {\sum\nolimits_{\forall l} {\sum\nolimits_{\forall l} {(1 - a_{\ln } )} \left[ {r.\max \left( {\sigma_{\ln }^{2} ,\sigma_{\ln }^{3} } \right)} \right]} + a_{\ln } \cdot \sigma_{\ln }^{1} } \right\} $$
(4.13)
$$ {\text{s}}.{\text{t}}.\;\min \left( {\sum\limits_{m = 1}^{{M_{1} }} {b_{\ln ,m} ,a_{\ln } } } \right) = 0,\forall 1,{\text{n}} $$
(4.14)
$$ \sum\limits_{n = 1}^{{N_{1} }} {b_{\ln ,m} \le \;1,\forall l,m} $$
(4.15)
$$ \sum\nolimits_{\forall l,n} {c_{\ln } \le M_{2} } $$
(4.16)
$$ (1 - a_{\ln } )\left[ {r.\max \left( {\sigma_{\ln ,}^{2} \sigma_{\ln ,}^{3} } \right)} \right] + a_{\ln } .\;\tau_{\ln }^{1} \le \varepsilon_{\ln } ,\forall l,n $$
(4.17)
$$ a_{\ln } \in \{ 0,1\} ,\forall l,n $$
(4.18)
$$ b_{\ln ,m} \in \{ 0,1\} ,\forall l,n,m $$
(4.19)
$$ c_{\ln } \ge 1,\forall l,n $$
(4.20)

Improved Model 2

When the number of users exceeds the number of available channels on the network (that is, the network is overloaded), the above model will face an unsolvable problem, namely:

$$N=\sum_{l=1}^{L}{N}_{l}>{M}_{2}$$
(4.21)

At this time, even if cln = 1(∀l,n), there is still \(\sum\nolimits_{\forall 1,n} {c_{\ln } = N > M_{2} }\).

Since there is insufficient BAN route to satisfy all demands, the admittance control system must be triggered, disappointing some users. As for which users are dismissed and how resources are allocated to admit users, an improvement model 2 needs to be established:

$$ \arg \min \left\{ {U + w\left( {M_{2} - \sum\nolimits_{\forall l,n} {c_{\ln } } } \right)} \right\} $$
(4.22)
$$ {\text{s}}.{\text{t}}.\;\min \left( {\sum\limits_{m = 1}^{{M_{1} }} {b_{\ln ,m} ,a_{\ln } } } \right) = 0,\forall 1,n $$
(4.23)
$$ \sum\limits_{n = 1}^{{N_{l} }} {b_{\ln ,m} \le 1,\forall l,m} $$
(4.24)
$$ \sum\nolimits_{\forall l,n} {c_{\ln } \le M_{2} } $$
(4.25)
$$ (1 - a_{\ln } )\left[ {r.\max \left( {\sigma_{\ln }^{2} ,\sigma_{\ln }^{3} } \right)} \right] + a_{\ln } .\;\tau_{\ln }^{1} \le \varepsilon_{\ln } ,\forall l,n $$
(4.26)
$$ a_{\ln } \in \{ 0,1\} ,\forall l,n $$
(4.27)
$$ b_{\ln ,m} \in \{ 0,1\} ,\forall l,n,m $$
(4.28)
$$ c_{\ln } \ge 0,\forall l,n $$
(4.29)

where ω is the adjustment factor, if ω is small, U is inclined to be optimized; if ω is large, \(M_{2} - \sum\nolimits_{\forall l,n} {c_{\ln } }\) is inclined to be optimized to allocate resources to users as much as possible under the premise of ensuring a solution. Also, if cln = 0, the user request is denied.

Improved Model Solutions

Modified Model 1 and Modified Model 2 are fundamentally integer programming. To solve the above models quickly, according to their mathematical characteristics, corresponding solving algorithms are designed based on stratification and branch and bound.

Improved Model 1 Solution

Modified Model 1 consists of the Boolean vector X, the Boolean matrix Solution Y, and the number vector Z. This leads to the optimization problem being decomposed into its component parts. First, the initialization process is given as follows:

Initialization:

  1. 1.

    Generate X = zeros(1, N), Y = zeros(N, M1),

  2. 2.

    Z = ones(1, N)

  3. 3.

    Input: W, C, L, Nl, M1

  4. 4.

    for bln ∈ Y, Wm ∈ W

  5. 5.

    \(if\left(m=\left(\sum_{l=1}^{l-1}{N}_{l}+n\right)\mathrm{mod}{M}_{1}\right)||((\sum_{l=1}^{l-1}{N}_{l}+n)/{M}_{1}\in {N}^{*})\)

  6. 6.

    then bln,m ← 1 end if

  7. 7.

    end for

  8. 8.

    for Wm \(\in \) W, Cl \(\in \) C

  9. 9.

    if \(\sum_{n=1}^{{N}_{l}}{b}_{ln,m}\ge 2\)

  10. 10.

    then bln,m = find(bln,m = 1); bln,m ← 0; aln ← 1 end if

  11. 11.

    end for

  12. 12.

    Output: Initial solution X,Y,Z

In the first layer, solve for the vector X. Vector X according to Eq. (4.18) to construct multiple subproblems. Each iteration can obtain an optimal solution to the current optimization problem. Among them, \({ff}_{ln}\) represents the value of the formula on the left side of Eq. (4.17), and \({ff}_{0}\) represents its minimum value. In the algorithm, \({f}_{0}\) and { \({f}_{ln}\)} represent the objective function value of the current feasible solution. The first layer of explanation that is, Algorithm 1, is as follows:

Algorithm 1 Algorithm for Computing X Vector

Input: X, Y, Z, M 2 , R, RT, PL

Calculate f 0 ;

  1. 1.

    for aln ∈ X

  2. 2.

    if aln = 0 then

  3. 3.

    aln ← 1; bln,m = find(bln,m = 1); bln,m ← 0;

  4. 4.

    Calculate \({ff}_{\mathrm{ln}}\), \({f}_{\mathrm{ln}}\);

  5. 5.

    if (\({ff}_{\mathrm{ln}}\)\({\varepsilon }_{\mathrm{ln}}\))&&(\({f}_{\mathrm{ln}}\)<\({f}_{0}\)) then

  6. 6.

    \({f}_{0}\) ← \({f}_{\mathrm{ln}}\);

  7. 7.

    else bln,m ← 1; aln ← 0; end if

  8. 8.

    end if

  9. 9.

    end for

  10. 10.

    Output: optimized value X*Y, \({f}_{0}\)

Matrix Y must be solved in the second layer. Using the first layer’s answer, the remaining channels in the cell have been allocated so as to fulfill the algorithm (17). Users who access SCBS get more channels, which will reduce the packet loss rate accordingly. The second layer of the solution that is, Algorithm 2, is as follows:

Algorithm 2 Algorithm for Computing Y Matrix

Input: X *, Y , Z , W , f 0 , N l , M 2 , ε ln , R , RT, PL

  1. 1.

    for aln ∈ X

  2. 2.

    if aln = 0 then

  3. 3.

    bln,m = find(bln,m = 1);

  4. 4.

    for Wm ∈ W

  5. 5.

    if (Wm ≠ Wm)&&\( (\sum_{{n}{\prime}=1}^{{N}_{l}}{b}_{{\mathrm{ln}}^{\mathrm{^{\prime}}}m}=0)\) then

  6. 6.

    bln,m ← 1; bln,m ← 0; Compute fm;

  7. 7.

    if fm < f0 then f0 ← fm;

  8. 8.

    else bln,m ← 0, bln,m ← 1 end if

  9. 9.

    end if

  10. 10.

    end for

  11. 11.

    end if

  12. 12.

    end for

  13. 13.

    for aln ∈ X

  14. 14.

    if aln = 0 then

  15. 15.

    while \({ff}_{\mathrm{ln}}\)> εln

  16. 16.

    bln,m = find(bln,m = 1);

  17. 17.

    for Wm ∈ W

  18. 18.

    if (Wm ≠ Wm)&&\((\sum_{{n}{\prime}=1}^{{N}_{l}}{b}_{{\mathrm{ln}}^{\mathrm{^{\prime}}}m}=0)\) then

  19. 19.

    bln,m ← 1; Calculate \({ff}_{\mathrm{ln},m}\); bln,m ← 0 end if

  20. 20.

    end for

  21. 21.

    \({ff}_{\mathrm{ln},{m}^{*}}\) = arg min(\({ff}_{\mathrm{ln},m}\)); bln,m* ← 1;

  22. 22.

    end while

  23. 23.

    end if

  24. 24.

    end for

  25. 25.

    for Wm ∈ W, aln ∈ X

  26. 26.

    if aln = 0 then

  27. 27.

    Set B_temp = find(bln,m = 1);

  28. 28.

    if (bln,m ∉ B_temp)&&\((\sum_{{n}{\prime}=1}^{{N}_{l}}{b}_{{\mathrm{ln}}^{\mathrm{^{\prime}}}m}=0)\) then

  29. 29.

    bln,m ← 1; Calculate fln,m, ffln,m; bln,m ← 0; end if

  30. 30.

    end if

  31. 31.

    [fln,m*] = arg min(fln,m);

  32. 32.

    if (ffln,m* ≤ εln)&&(fln,m* < f0) then

  33. 33.

    f0 = fln,m*, bln,m* ← 1 end if

  34. 34.

    end for

  35. 35.

    Output: optimized value of Y*

In this step, solve the matrix Z. After the first and second layers are solved, the current optimization problem becomes a pure integer programming problem. The remaining channels of the BAN are allocated, and one remaining channel is allocated for each traversal. The third layer of the solution that is, Algorithm 3 is as follows:

Algorithm 3 Algorithm for Computing Z Vector

Input: X*, Y*, Z, f0, L, Nl, M2, εln, r2, RT, PL

  1. 1.

    while \(\sum_{l=1}^{L}\sum_{n=1}^{{N}_{l}}{c}_{ln}<{M}_{2}\)

  2. 2.

    for cln ∈ Z

  3. 3.

    Z′ ← Z; cln = cln + 1; compute fln, ffln; Z ← Z′;

  4. 4.

    end for

  5. 5.

    [fl*n*] = arg min(fln);

  6. 6.

    if (ffl*n* ≤ εln)&&(fl*n* < f0) then

  7. 7.

    f0 ← fl*n*; cl*n* = cl*n* + 1 end if

  8. 8.

    end while

  9. 9.

    Output: optimized value of Z*

The above method for finding a solution can be seen to break down the initial issue into a set of three progressively more difficult challenges iteratively solved according to the characteristics of the solution space. The related problem's optimal solution can be obtained using the branch and bound method, and the iterative solution can gradually converge to the optimal solution of the original problem.

Improved Model 2 Solution

Based on the solution technique of the improved model 1, based on the mathematical characteristics of the enhanced model 2, a three-layer solution technique of the improved model 2 is proposed:

In the first layer, solve the matrix X. Relax (25) and set ω = 0. The solution method is the same as algorithm 1 of the enhanced model 1.

In the second layer, solve matrix Y. The solution process is the same as algorithm 2 of the enhanced model 1.

In the third level, the vector Z must be resolved. It is required to reevaluate the limits of Eq. (4.25) based on the answers found in the first and second layers and to conduct N−M2 repetitions. At each step, the person with the largest delay fluctuation in the present optimization outcome is dropped. Algorithm 4 describes the method used to find the answer.

Algorithm 4 Algorithm for Solving Z Vector

Input: X*, Y*, Z, L, Nl, M1, M2, ω, εln, r, RT, PL

  1. 1.

    While \(\sum_{l=1}^{L}\sum_{n=1}^{{N}_{l}}{a}_{\mathrm{ln}}+\sum_{l=1}^{L}\sum_{n=1}^{{N}_{l}}\sum_{m=1}^{{M}_{1}}{b}_{\mathrm{ln},m}>{M}_{2}\) do

  2. 2.

    for aln ∈ X

  3. 3.

    if aln = 1 then aln ← 0;

  4. 4.

    Algorithm 1; Algorithm 2;

  5. 5.

    compute fln; aln ← 1;

  6. 6.

    else for bln,m ∈ Y

  7. 7.

    Set B_temp = find(bln,m = 1);

  8. 8.

    for bln,m ∈ B_temp then bln,m ← 0 end for

  9. 9.

    Algorithm 1; Algorithm 2; Calculate fln;

  10. 10.

    for bln,m ∈ B_temp then bln,m ← 0 end for

  11. 11.

    end for

  12. 12.

    end if

  13. 13.

    end for

  14. 14.

    [fl*n*] = arg max(fln); al*n* ← 0;

  15. 15.

    bl*n*, 1 ← 0, bl*n*,2 ← 0, …, bl*n*,M1 ← 0;

  16. 16.

    end while

  17. 17.

    for aln ∈ X

  18. 18.

    if (aln = 0)&&\((\sum_{m=1}^{{M}_{1}}{b}_{\mathrm{ln},m}=0)\) then cln ← 0 end if

  19. 19.

    end for

  20. 20.

    Output: optimized solution Z*

Simulation Analysis

The BAN is positioned in the middle of a 500 m * 500 m, and all four are placed evenly at regular intervals. To ensure complete coverage, the SCBS has a typical contact radius of 175 m. Each of the N customers corresponds to one of the N SCBSs, and the N transmission channels are modeled as Rayleigh fading channels. Furthermore, the network’s performance will be directly affected by the value of the number of retransmissions RT: a large RT will increase the transmission delay but decrease the packet loss rate, while a small RT will decrease the transmission delay but increase the packet loss rate. To find a happy medium between transmission lag and packet loss in a real-world system, try RT = 5. Table 4.1 shows additional simulation parameters.

Table 4.1 Parameters used in simulation

In this paper, we propose the Improved Model 1-Based Solved Algorithm (IM1SA) and the Improved Model 2-Based Solved Algorithm (IM2SA) as two versions of a model-based solved algorithm for wireless backhaul optimization, and we model their performance using three distinct algorithms to evaluate their effectiveness. WBOASBS (Gu et al. 2018) is the wireless backhaul optimization algorithm for single backhaul scenarios, and it belongs to the first class of algorithms. This approach was developed for a particular kind of communication scenario. (that is, all users access the BAN through SCBS for backhaul). The second category of method is the Wireless Backhaul Optimization method for Static Channel Scenarios (WBOASCS) (Zhang et al. 2020). To optimize channel allocation, the third type of algorithm, WBOABIDJ, uses an average delay jitter index that does not take into account channel dynamics. This algorithm is considered for hybrid backhaul scenarios (which include two types of backhaul methods). All three categories of algorithms are very similar to the one presented in this article, and each one is developed with the help of MATLAB. Delay jitter is used as an efficiency metric to evaluate the aforementioned methods. Jitter in this context refers to the time it takes to implement the outcomes of channel distribution derived from various methods into a working network. The typical user delay fluctuation number is determined.

In the situation of minimal service demand, Fig. 4.2 compares the delay jitter of IM1SA, the other three kinds of algorithms, and the number of users (the number of users is less than M2). Increasing the number of users N causes the delay jitter of the four distinct methods to rise steadily, as shown below for varying values of M1; when the number of users is small, the network load is low, and the network performance is at a better level (that is, the link packet loss rate is standard), at this time, the delay jitter of the same algorithm under different M1 is very close; when the number of users is large, the network load is high, and the network performance deteriorates (that is, the link packet loss rate is high), At this time, the higher M1, the smaller the delay jitter of the same algorithm; in any case, the delay jitter performance of IM1SA is always optimal (Table 4.2).

Fig. 4.2
A multi-line graph of delay versus traffic load. It plots I M 1 S A where M 1 = 100, W B O A S B S where M 1 = 150, W B O A S C S where M 1 = 150, and W B O A B I D J where M 1 = 150 with an increasing trend.

Comparison of delay and jitter of four types of algorithms (low business load)

Table 4.2 Comparison of delay and jitter of four types of algorithms (low business load)

The modeling findings for the light traffic burden scenario are not shown in Fig. 4.2. Once the number of users rises above M2, all four kinds of algorithms will be unable to optimize the system; in other words, they will be useless in an overloaded system. As a result, IM2SA is proposed in this article. In the event of a heavy service demand, the delay fluctuation of IM2SA varies as shown in Fig. 4.3. (that is, the number of users is more significant than M2). As the number of users on IM2SA grows, the delay fluctuation will only vary within a narrow range. The IM2SA delay fluctuation decreases as the number of users, N, increases. Admission management and channel allocation can be efficiently executed by IM2SA.

Fig. 4.3
A multi-line graph of delay versus traffic load. It plots 3 connected lines of I M 2 S A where M 1 = 100, 125, and 150 with a constant trend and minor fluctuations.

IM2SA delay jitter results (high traffic load)

In the case of IM2SA, the delay jitter performance based on IM2SA is always maintained at a certain level without deterioration (Tables 4.3 and 4.4).

Table 4.3 IM2SA delay jitter results (high traffic load)
Table 4.4 IM2SA evaluation over network parameter

Figure 4.4 shows the different results of the network parameter of IM2SA with the number of users in the case of a high service load (that is, the number of users is more significant than M2). It can be seen that the packet delivery ratio, end-to-end delay, and load of IM2SA fluctuates within a specific range with the increase in the number of users N. Given the number of users, the delay jitter of IM2SA shows a downward trend with the rise in M1. IM2SA can effectively carry out admission control and allocate channels reasonably.

Fig. 4.4
A grouped 3 D bar graph of rate versus 4 network scenarios of I M 1 S A, W B O A S B S, W B O A S C S, and W B O A B I D J with different M 1 values. It plots P D R, end-to-end delay, and load. P D R is the highest in I M 1 S A, and end-to-end and load are the highest in W B O A B I D J.

IM2SA evaluation over network parameter

Conclusions

For 5G dynamic diverse situations, this article suggests an optimization method for wireless backhaul that takes delay uncertainty into account. Backhaul optimization metrics are created, and a fundamental backhaul model is built, based on a methodical study of service delay and delay instability in active diverse techniques. Additionally, an optimized model 1 and an optimized model 2 are developed from the vantage points of delay optimization and network overflow, respectively, and a hierarchy method is suggested to handle them efficiently. This article uses a program to demonstrate the efficacy of the method.