105902-9393 IJET-IJENS

5
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:02 55 I J E N S 2010 IJENS April IJENS © - IJET 9393 - 02 59 10 A Proposed Model for Optimizing the Flow of Pilgrims between Holy Sites During Hajj Using Traffic Congestion Control Omar Tayan {otayan@tai bahu.e du.sa} College of Computer Science and Engineering, Department of Computer Science, Taibah University, K.S.A. AbstractThe use of computer simulations for modeling the behavior of pre-existing/inaccessible products/real-life scenarios is increasing in academia and industry. The advantages of computer modeling and simulation are numerous, and include; controlled experimentation on a pre-existing/in-accessible real- life scenario without disturbing the real-life system, time- and space-compression of a real-life system and sensitivity analysis of selected key parameters. The need for such advanced computational techniques for behavioral analysis is increasing in the domain of traffic congestion and control, which has particular significance in an attempt to optimize the movement/flow of traffic in various applications. This study is particularly concerned with optimizing the flow of pilgrims between Holy sites during the Hajj period, which remains a relatively unexplored optimization problem of key significance for the well-being of approximately three-million people each year. The aim of this study is to introduce a new model for optimizing the flow/transportation of pilgrims between the various Holy sites through the deployment of existing techniques in a new application-domain. Mature computer-science literature are considered here for modeling the Makkah road network using the widely applicable concept of queuing and polling systems from computer science and engineering. A further contribution of this paper is that key benefits are obtained by employing a distributed approach to traffic management, including increased efficiency of the available road network, thereby resulting with a decrease in the delays encountered and pollution emitted as a consequence of the inefficient flow of traffic. Index Term-- congestion-awareness algorithm, congestion control, modeling, wireless sensor network application. I. INTRODUCTION Significant progress in computer modeling and simulation techniques are paving the way for the widespread use of highly efficient computational techniques for modeling inaccessible artifacts/real-life scenarios and determine whether a planned change to the artifact/scenario can be implemented while producing the desired results. For instance, the use of computer simulations for modeling the behavior of pre- existing/inaccessible products/real-life scenarios is expected to increase in academia and industry. Numerous advantages emerge through the use of modeling and simulation, including, controlled experimentation on an pre-existing/in-accessible real-life scenario without disturbing the real-life system, time- and space-compression of a real-life system and sensitivity analysis of selected key parameters. Hence, computer modeling and simulation is an attractive option and is particularly well-suited for numerous applications that include: banks, hospitals, airports, manufacturing systems, and computer and communication systems. The importance of computer modeling and simulation is that they can be used to optimize management decisions made prior to implementing any change in a real-life scenario/artifact, thereby resulting in cost, time and resource optimization. The need for such advanced computational techniques for behavioral analysis is increasing in the domain of traffic congestion and control, which has particular significance in the attempt to optimize the movement/flow of pilgrims between Holy sites on the Makkah road network during the Hajj period. The following sections provide an overview description of the problem domain, the applied methodology and a proposed model for the design and implementation of a fair congestion-aware access protocol for potential deployment onto key sites during the annual Hajj. II. MOTIVATION AND OVERVIEW A key aim of this study is to introduce models that optimize the flow/transportation of pilgrims between the various Holy sites through the use of sophisticated computer modeling and simulation techniques. Modeling techniques are considered here in order to simulate the Makkah road network using the widely applicable concept of queuing and polling systems from computer science and engineering. The use of such modeling techniques in this study is imperative, thereby allowing much of the relevant computer networking literature, including standard and adapted/optimized protocols, to be applied with great effect in this study. Makkah’s road network can then be modeled with the application of standard/optimized and novel medium access (fairness) protocols, in which multiple access points onto the road network 1 are modeled as nodes/queues in the queuing system that compete for access to some shared resource (modeled as servers). For example, an example of this scenario is observed (Fig. 1) when several branch roads converge into a single road/fewer roads. 1 In reality, wireless sensor networks (WSNs) would be employed to measure the traffic levels at traffic points - illustrated using red circles in Fig.2.

description

ijens

Transcript of 105902-9393 IJET-IJENS

Page 1: 105902-9393 IJET-IJENS

International Journal of Engineering & Technology IJET-IJENS Vol:10 No:02 55

I J E N S 2010 IJENS AprilIJENS © -IJET 9393-025910

A Proposed Model for Optimizing the Flow of Pilgrims between Holy Sites During Hajj Using

Traffic Congestion Control Omar Tayan

{[email protected]} College of Computer Science and Engineering,

Department of Computer Science, Taibah University, K.S.A. Abstract— The use of computer simulations for modeling the

behavior of pre-existing/inaccessible products/real-life scenarios is increasing in academia and industry. The advantages of computer modeling and simulation are numerous, and include; controlled experimentation on a pre-existing/in-accessible real-

life scenario without disturbing the real-life system, time- and space-compression of a real-life system and sensitivity analysis of selected key parameters. The need for such advanced

computational techniques for behavioral analysis is increasing in the domain of traffic congestion and control, which has particular significance in an attempt to optimize the movement/flow of traffic in various applications. This study is

particularly concerned with optimizing the flow of pilgrims between Holy sites during the Hajj period, which remains a relatively unexplored optimization problem of key significance

for the well-being of approximately three-million people each year. The aim of this study is to introduce a new model for optimizing the flow/transportation of pilgrims between the various Holy sites through the deployment of existing techniques

in a new application-domain. Mature computer-science literature are considered here for modeling the Makkah road network using the widely applicable concept of queuing and polling

systems from computer science and engineering. A further contribution of this paper is that key benefits are obtained by employing a distributed approach to traffic management, including increased efficiency of the available road network,

thereby resulting with a decrease in the delays encountered and pollution emitted as a consequence of the inefficient flow of traffic. Index Term-- congestion-awareness algorithm, congestion

control, modeling, wireless sensor network application. I. INTRODUCTION

Significant progress in computer modeling and

simulation techniques are paving the way for the widespread

use of highly efficient computational techniques for modeling

inaccessible artifacts/real-life scenarios and determine whether

a planned change to the artifact/scenario can be implemented

while producing the desired results. For instance, the use of

computer simulations for modeling the behavior of pre-

existing/inaccessible products/real-life scenarios is expected to

increase in academia and industry. Numerous advantages

emerge through the use of modeling and simulation, including,

controlled experimentation on an pre-existing/in-accessible

real-life scenario without disturbing the real-life system, time-

and space-compression of a real-life system and sensitivity

analysis of selected key parameters.

Hence, computer modeling and simulation is an

attractive option and is particularly well-suited for numerous

applications that include: banks, hospitals, airports,

manufacturing systems, and computer and communication

systems. The importance of computer modeling and

simulation is that they can be used to optimize management

decisions made prior to implementing any change in a real-life

scenario/artifact, thereby resulting in cost, time and resource

optimization. The need for such advanced computational

techniques for behavioral analysis is increasing in the domain

of traffic congestion and control, which has particular

significance in the attempt to optimize the movement/flow of

pilgrims between Holy sites on the Makkah road network

during the Hajj period. The following sections provide an

overview description of the problem domain, the applied

methodology and a proposed model for the design and

implementation of a fair congestion-aware access protocol for

potential deployment onto key sites during the annual Hajj.

II. MOTIVATION AND OVERVIEW

A key aim of this study is to introduce models that

optimize the flow/transportation of pilgrims between the

various Holy sites through the use of sophisticated computer

modeling and simulation techniques. Modeling techniques are

considered here in order to simulate the Makkah road network

using the widely applicable concept of queuing and polling

systems from computer science and engineering. The use of

such modeling techniques in this study is imperative, thereby

allowing much of the relevant computer networking literature,

including standard and adapted/optimized protocols, to be

applied with great effect in this study. Makkah’s road network

can then be modeled with the application of

standard/optimized and novel medium access (fairness)

protocols, in which multiple access points onto the road

network1 are modeled as nodes/queues in the queuing system

that compete for access to some shared resource (modeled as

servers). For example, an example of this scenario is observed

(Fig. 1) when several branch roads converge into a single

road/fewer roads.

1 In reality, wireless sensor networks (WSNs) would be employed to

measure the traffic levels at traffic points - illustrated using red circles in Fig.2.

Page 2: 105902-9393 IJET-IJENS

International Journal of Engineering & Technology IJET-IJENS Vol:10 No:02 56

I J E N S 2010 IJENS AprilIJENS © -IJET 9393-025910

Fig. 1. A map-view of the Makkah road network highlighting competing

access to a shared resource (map-image obtained from [11]).

The study compares a number of potential transport

protocols suitable for the Hajj environment, before justifying the most appropriate/efficient protocol that optimizes the flow

of pilgrims between the various Holy sites. Hence, it is

evident that this study is highly significant in any effort to

manage the traffic flow of pilgrims and therefore provides

much potential for application. Key benefits would be

obtained by employing a distributed scheme to traffic

management, including increased efficiency of the available

road network, thereby resulting with a decrease in the delays

encountered and pollution emitted as a consequence of the

inefficient flow of traffic. A number of related research-approaches have been

considered for the problem of traffic management, with the

most notable being the use of traffic lights with sensor devices

that open the gate for incoming traffic based on some

parameter value [1]. Such an approach is comparable to

intermediate routing in a queuing system. On the contrary, the

model presented here applies the concept of queuing systems

in order to evaluate a novel distributed approach that provides

a medium access (fairness) mechanism for traffic at key entry

points in addition to intermediate points within the road

network. This study aims to investigate the performance of

various protocols in terms of achieving the most

efficient/optimal road access/utilization mechanism, in which

performance is considered as the average waiting times of

pilgrims within each queue and within the system as a whole

from the point of entry to the point of exit on the road

network. Hence, this study focuses on congestion awareness

algorithms for Hajj traffic on the Makkah road network.

III. METHODOLOGY AND DESIGN

This study considers the use of queuing and polling

systems in order to construct an abstract model of the traffic

flow between Holy-sites in Makkah during the Hajj season.

The following discussion examines the significance of

queuing and polling systems in this study. Polling systems have been studied extensively since

several decades ago, and consequently, a rich source of

knowledge has emerged in the use of polling models for a

variety of applications. Polling is a process whereby a

token/query is issued and broadcast to all networked nodes in

order to receive status information of each node [2] and

thereby determine which node is most eligible for access to a

shared-medium based on some medium-access control

scheme. Essentially, all polling systems consist of a single

source that is shared between multiple access queues [3, 4].

Fig. 2 shows a similar scenario in the study of Hajj traffic

flow and congestion control, whereby many frequently used

sections in the road network involve numerous roads merging

into a single road as a point-of-entry into a particular site. A large number of studies can be found on the use of

polling systems to model a variety of applications in many

disciplines. Much literature exists on the use of polling

systems for modeling token-passing communication networks

with various polling schemes [2, 14], and is also found in the

modeling of more general applications involving the 'multiple-

access' problem for a shared resource [13]. In all the relevant

literature surveyed, polling systems were broadly classified

according to following characteristics that include [4, 8, 9];

continuous- or discrete-time systems, queuing buffer capacity,

queue service discipline, switch-over times, symmetric or

asymmetric properties, cyclic/non-cyclic service order

discipline, exact or approximate analysis. The characteristics

of the polling system used to model the Hajj traffic scenario is

considered in more detail. First, the polling system comprises a number of source

generation processes to represent the incoming arrival traffic

Fig. 2. Overview of a simplified recurring scenario in the Hajj Traffic

Congestion /pattern from numerous roads as in a multi-queue system,

leading to a single/or fewer roads, considered as the shared

medium that provides access to a Holy site. Fig. 2 shows a

server attending each of the queues as they compete for

access to a shared road/medium. Pilgrim vehicles, including

buses, cars/vans etc, are modeled as variable-length

container objects in the model, as opposed to modeling the

movement of masses of individuals, and thereby avoiding

ambiguities in statistical data requirements and essential

modeling assumptions. Hence, incoming traffic can be

Page 3: 105902-9393 IJET-IJENS

International Journal of Engineering & Technology IJET-IJENS Vol:10 No:02 57

I J E N S 2010 IJENS AprilIJENS © -IJET 9393-025910

classified as discrete-event arrivals. The exhaustive (followed by the gated scheme) is the most

efficient service discipline when finite queue-lengths are

used (as required in this study). Polling systems are

associated with server switch-over times that correspond to

the time interval between the service completion time at a

queue, and the consequent arrival time of the free token at

the next transmitting queue. In this study, the arrival rates,

service time distributions, and switch-over time distributions

are non-uniform between queues as in an asymmetric

system. Cyclic service-order disciplines are used by the

server to allow data-gathering/request packets to rotate

between the competing stations in order to collate current

queue occupancy values, rate-of-arrivals, rate-of-departures

etc statistics from each station. Cyclic polling systems

employ a round-robin algorithm and a single server that

serves multiple container objects (gated or exhaustive

disciplines) on each queue visit. On the other hand, a non-

cyclic service-order discipline is required to serve queues

randomly, based on station requests for instance. Hence, the

dynamic service-order of queues can be classified as a

probabilistic polling scheme employing distributed and

stochastic algorithms, depending on the system state. For

instance, a service policy of particular interest in this study

is to observe the contents of each queue with the decision of

service allocation determined based on the highest queue

occupancy. An advantage of dynamic service orders is that they are sensitive to the actual system state.

An alternative approach to dynamic service orders

would be to employ queue priority schemes. Queue service

mechanisms permit the prioritization of queues according to

key design parameters, thereby achieving improved system

performance. Important design parameters in such systems

include; visit order used, the frequency and duration of visits

at queues and the order of packet/message service within each

queue. The operation of the proposed polling system is as

follows. Initially, the study aims to focus on modeling the

convergence of the road network from Mina to Arafat,

followed by Arafat to Muzdalifah, pending on the availability

of statistical data. However, it is noted that the convergence

scenario could be modeled more generally by observing that

any number of converging roads (modeled as queues or

stations/nodes) compete for access to a single/fewer point(s)

of entry, as in a cyclic interconnection of nodes towards a

single/fewer server(s). Thereafter, a request packet circulates

through the network of stations/nodes in a cyclic discipline in

order to obtain the necessary statistical data representing the

state of each node. The data collected describing the state of

the system is then used to serve a particular queue based on

queue-occupancy. Evidently, the engineering characteristics/

design of Makkah’s roads between particular sites -of-interest

have a significant effect on the design of the model. For

instance, as the width of any convergent road increases (as in

the left of Fig. 2), the queue lengths decrease before attaining

the same queue-occupancy threshold. This scenario

effectively demonstrates the case where each road may

possess multiple lanes of traffic. Hence, for purposes of

medium access fairness, this study considers the queue-

occupancy values/threshold without regard to the queue-

lengths in order to account for the varying dimensions of road

designs. As the circulating packet updates the state

information, the system determines the most eligible queue or

service on the next switch-over. Notably, the stochastic

service discipline employed resembles the random polling

schemes used in many stochastic data-traffic computer-

network models [8].

IV. DESIGN AND IMPLEMENTATION

In the proposed protocol, access fairness to the road

resources is achieved by regulating traffic flow using a

distributed view of the queue loadings, whereby all affected

nodes are able to support/oppose required queue-flow services

[5, 8, 9]. Hence, the queuing model implementation must

allow intermediate nodes to decide whether they support or

oppose/reject each proposed queue-flow. The protocol would

then accept or reject, the proposed queue-flow by considering

its own local perception of the loading at the queue and the

stance taken by each affected node. Advantageously,

distributed protocols can be employed to establish queue-flow

request services, thereby removing the need for a central

management node. In this approach, the packet request

structure consists of M partitions, each corresponding to one

node, with the request packet circulating between the road

Fig. 3. Token-format that circulates between converging road access-

points access points as in a logical interconnection of ring nodes

(Fig. 3). Each partition is an N-bit binary counter that counts

the number of opposition-nodes encountered by each

(queue/station) flow request. N is the bit-length of each

request in the request field of the packet, relative to the

queuing-network size, 2N

−1

. Hence, an N-bit counter is

required for each node in a 2( N

−1)

-node circular-road access

network, where each subfield is initialized to the reset state

(e.g. 000 for an interconnection of 4-nodes), indicating no

requests waiting. Fig. 3 illustrates the request-token/packet

format that circulates between converging roads/nodes,

designated for use with inter-connected communicating

wireless sensor nodes and base stations. In practice, the

proposed congestion-awareness protocol would then be

applied as the medium access sub-layer that uses statistical

data obtained from the wireless sensor nodes for intelligently

Page 4: 105902-9393 IJET-IJENS

International Journal of Engineering & Technology IJET-IJENS Vol:10 No:02 58

I J E N S 2010 IJENS AprilIJENS © -IJET 9393-025910

controlling traffic light signals between the competing access

points. Therefore, the main hardware requirements incurred

here would involve the costs for the wireless sensor network,

comprising wireless sensor nodes and base/field stations,

connected to an end-user/server for data-processing and data-

storage/retrieval. A similar concept of employing wireless

sensor networks for data-monitoring applications has

previously emerged in the literature and include; vehicle

monitoring applications [15], industrial-monitoring

applications [16] and wild-land cultural heritage sites

monitoring [17]. When a node transmits a connection request, it sets its

subfield to a binary 100. A reset value (000) at the request

field is only obtained at initialization or when no request was

sent; the reset value (000) cannot otherwise be obtained

regardless of the number of rejections made. Each reject-

request on a request subtracts from the correct value of the

field associated with the request. Hence, the maximum

number of rejections made on any request would only reduce

the request subfield to 001. A clear benefit of this approach is

that the cell collects more management information regarding

the state of the network nodes as it circulates through the ring.

Furthermore, by counting the number of rejections on each

request, it has become possible to consider other factors for

deciding upon flow-request acceptance or rejection at each

source-node/queue-access-point. For example, in a network

whose access nodes are prioritized, it may be necessary that

high priority nodes/access-points are able to proceed with a

flow-request acceptance even after a majority of nodes have

rejected the request. Hence, this approach provides a

distributed-view of the state of competing roads/stations

through control/management information from the sensor

nodes deployed at access-points to a shared road. Thereafter, a

decision can be made on an order of service of the competing

access-stations/queues (either manually or using automation)

according to some selected parameter(s) such as instantaneous

and average queue-lengths or average queuing-delays for

instance. This section also proposes an enhanced extension of the

above congestion-awareness protocol which conveys precise

details of nodes with opposing signals for each flow-request in

the system. Advantageously, such a system enables precise

data-gathering statistics regarding the state of each node at

any point in time. However, the resultant complex request-

packet structure associated with this protocol entails the

drawbacks of significantly extra logic (electronic) circuitry for

processing, loss of simplicity and increased-costs, rendering

this enhanced protocol less -efficient overall for the target

application-domain.

V. DISCUSSION AND CONCLUSION

The previous section has described a new approach that

provides a traffic-congestion awareness protocol, in which the

number of rejections on each queue-flow request is monitored

to yield a greater insight of the state of each node. Initial work

on the congestion-awareness protocol considers the effect of

varying the number of proposed node-rejections for each

queue-flow request before blocking the request, the effect of

varying queue-thresholds (maximum permitted number of

container objects before requesting to release traffic - ’queue-

flow’), and the effect of varying the number of container

objects to release following a queue-flow request acceptance.

It is expected that as the queue-loadings and queue arrival-

rates increase, more nodes shall propose to reject other queue-

flow requests in order to prevent their queues exceeding the

queue-threshold. Furthermore, it is expected that if the

rejection-threshold was increased (such that more proposed

rejections are required for each queue-flow in order to block

the request), traffic throughput would also increase with a

slight increase of the mean delay at each node/queue. An

increase in the queue-length threshold was expected to yield

an increase in the mean queuing delays encountered, whilst

reducing the number of proposed rejections for each queue-

flow request.

In short, this study has investigated access control and

fairness protocol for Makkah’s road network between Holy

sites during the significant annual event of Hajj. A fair

mechanism of controlling road access and preventing node

starvation, whilst limiting the delay in the network could be

achieved using the proposed traffic congestion-awareness

protocol.

REFERENCES [1] Intelligent system for the management of traffic lights in Medina , K.

AlAwfi, Proceedings of the Second Scientific Research Forum on Madinah Al-Munawwarrah, Madinah Al-Munawwarrah, 2008.

[2] Optimal Polling in Communication networks, A.A. Rescigno, IEEE Transactions on Parallel and Distributed Systems, Vol. 8, Issue 5, 1997.

[3] Teletraffic Theory and Applications , H. Akimaru, K. Kawashima, Published by Springer 1999.

[4] Queuing Analysis of Polling Models, H. Takagi, Proceedings of ACM Computing Surveys, Vol. 20, No. 1, March 1988.

[5] Traffic Regulation and Control in the Manhattan Street Network , O. Tayan, D. Harle, Proceedings of Networking 2004, Third International IFIP-TC6 Networking Conference, Athens, May 2004.

[6] Electronic Tracking of Pilgrims, Proceedings of the Second Scientific Re-search Forum on Madinah Al-Munawwarrah, Madinah Al-Munawwarrah, 2008.

[7] Traffic Engineering Analysis , chapter 6, in Kutz, M., ’Handbook of Transportation Engineers’, Abdulhai, B., Kattan, L., McGraw Hill Publishing, ISBN: 0071391223, November, 2003.

[8] Waiting Time Estimates in Symmetric ATM- Oriented Rings with the

Destination Release of Used Slots, M. Zafir-Vukotic, IEEE/ACM

Transactions on Networking, Volume 7, Number 2, April 1999, pp251-261.

[9] Exemplar High-Speed Network Architectures: A Modern Approach to Networking, O. Tayan, Lambert Academic Publishers, Published December 2009.

[10] Polling Systems: Modeling and Optimization , H. Levy and M. Sidi, IEEE Transactions on Communications, Vol. 38, No. 10, October 1990.

[11] Makkah Map-View Image, http://www.hajis.co.uk/images/pop-ups/maps/makkahmap.gif, <last accessed 5/4/10>.

[12] Ubiquitious Computing for Safe and Efficient Pilgrimage Operations, E. Abuelela, Proceedings of the Second Scientific Research Forum on Al-Madinah Al-Munawwarrah, Madinah Al-Munawwarrah, 2008.

[13] On the performance of protocols for collecting responses over a multiple-access channel, M.H. Ammar, G.N. Rouskas, IEEE Transactions on Communications, Vol. 43, Issue 234, 1995.

[14] Polling systems with server timeouts and their application to token passing networks, E. De Souza e Silva, H.R. Gail, R.R. Muntz, IEEE Transactions on Networking, Vol. 3, Issue 5, 1995.

[15] A Vehicular Monitoring System with Power-Efficient Wireless Sensor Networks, Jatuporn Chinrungrueng, Udomporn Sununtachaikul, Satien

Page 5: 105902-9393 IJET-IJENS

International Journal of Engineering & Technology IJET-IJENS Vol:10 No:02 59

I J E N S 2010 IJENS AprilIJENS © -IJET 9393-025910

Triamlumlerd, Proceedings of the 6th

International Conference on ITS Telecommunications, 2006.

[16] Performance Measurements of CSMA/CA-Based Wireless Sensor Networks for Industrial Applications, M. Bertocco, G. Gamba, A. Sona, S. Vitturi, Proceedings of the Instrumentation and Measurement Technology Conference, 2007.

[17] A Wireless Sensor System for Long-Term Microclimate Monitoring in Wildland Cultural Heritage Sites, Xia Ming, Dong Yabo, Lu Dongming, Xue Ping, Liu Gang, Proceedings of the International Symposium on Parallel and Distributed Processing with Applications, 2008.