^{1}

^{*}

^{2}

^{*}

^{2}

^{3}

^{4}

In the mobile radio industry, planning is a fundamental step for the deployment and commissioning of a Telecom network. The proposed models are based on the technology and the focussed architecture. In this context, we introduce a comprehensive single-lens model for a fourth generation mobile network, Long Term Evolution Advanced Network (4G/LTE-A) technology which includes three sub assignments: cells in the core network. In the resolution, we propose an adaptation of the Genetic Evolutionary Algorithm for a global resolution. This is a combinatorial optimization problem that is considered as difficult. The use of this adaptive method does not necessarily lead to optimal solutions with the aim of reducing the convergence time towards a feasible solution.

Since the advent of telecommunication networks; it is from the 90s that the mobile radio industry has experienced significant developments in terms of technology and subscriber. The success of wireless technologies and mobile communications has determined the existence of a variety of standards that allow users to access a range of services provided [

The LTE architecture, named Evolved Packet System (EPS) shown in _{2} interface (optional). It is connected to the core network, the EPC, by the S_{1} interface precisely to the MME (Mobility Management Entity) in the control plane (Control) and the SGW (Serving GateWay) in the user plane (data plan). The essential functioning of the EPC is provided by three entities namely: MME, SGW and the access gateway to the data network (PGW: Packet data GateWay), S_{5 }interface permits to interconnect S-GW and PGW equipment in the plans of control and data. In addition, we have two entities of the control plane, the flows regulation control function and pricing: (Policy Control and Charging Rules Function: PCRF), the entity contains the rules for modulating bandwidth and applying a pricing (depending on the time, the user’s credit and his subscription type) and the Home Subscriber Server (HSS) that is a central database containing customer information, location information of mobile, etc. [

Planning a mobile network is to identify all the hardware and software of these systems, positions them, interconnect them and uses them optimally, respecting, among other things, a series of constraints linked to the quality of service [

The network planning process is a complex issue both long and expensive which is performed before the networking service. To reduce the complexity, there is a multitude of proposed models in the literature, often subdivided into sub-problem and solved separately. The model concerning the allocation of cells to the core network switches has been most studied in 2G [

Solving by sub-problem the planning process, the interactions between the different levels of the network are not taken onto account. Local optimization of the network is observed at the expense of other parts. St. Hilaire in [

Network planning based on the LTE will require new approaches taking into account the VoLTE (Voice over LTE) which enables to route the packet-switched telephony on IP in LTE network [

There are four types of potential deployment architectures of the LTE-A technology core network (EPC) [

The rest of the document is organized according to the following plan. We will first consider the different planning models in literature, and then the problem description followed of modelling and the implementation of the model. The presentations computational results will be analyzed. Finally, the conclusion and the presentation of the prospects for further work will conclude this document.

The mobile network planning is the subject of intense research activity because of the expansion of technological standards.

In the literature, there are several planning models. They usually depend on three factors: technology, network architecture and finally the approach to solve the planning model in question.

For the first generation (1G), second-generation (2G) and third generation (3G) networks, a series of research conducted aimed in most cases to reduce equipment costs under the constraint of quality of service provided. The models are often subdivided into three problems in order to reduce the complexity.

- The sub-problem of cell planning [

- The sub-problem of access network planning [

- The sub-problem of core network planning [

However, some researchers have proposed comprehensive planning models in order to mathematically formalize the entire network by integrating all the problems raised under a unique model and fully resolved [

Although researches on the design and 5G tests in laboratories are expanding when the first deployments of this technology are planned by 2020 [

The Long Term Evolution Advanced Technology is relatively new with a new engineering (provision of all services by the IP route or packet switching), many different approaches to planning LTE network are available in the literature Most planning models proposed deal largely with Access Network (E-UTRAN).

e.g. Zuozhou Li and Li Shudong, in [

Kurt Majewski and Michael Koonert, in [

Deployment architectures | Centralized functions | Distributed functions |
---|---|---|

Completely centralized | SGSN + GGSN MME + SGW + PGW | |

Completely distributed | MME + SGSN + GGSN SGW + PGW | |

Centralized bearer/distributed control (traditional 3G) | SGW + PGW + GGSN | MME + SGSN |

Centralized control/distributed bearer | MME | PGW + SGW |

On the other hand, J. Gu. et al. in [

In the same vein, Li et al. [

As for Jailani et al. [

In order to overcome the shortcomings in the models [

All previously listed planning models are for the radio access network including the traffic realized. However, some authors as S. Germine [

On the other hand Eunice A. et al. in [

Also Xueyi L. et al. In [

Pasandideh, MR and Marc St-Hilaire in [

Finally, Dababneh et al. [

Analysis of the work presented in the literature

As we have seen, there are various models developed to assist the planner in his decision making and minimize network costs. However, most of the models for 4G/LTE-A are not complete, they are treated separately by optimizing part of the network at the expense of others ignoring the interactions between the different parts of the network or whether they relate to another technology other than the Long Term Evolution Advanced.

In the current context where the deployment of this technology is underway in most countries around the world; And if we offered a comprehensive planning model that integrates all the parts of the problem since the cells in the heart network connections minimizing costs and operations due to handover to enable mobile operators to offer all the services there including voice packet switch?

In the following section, we will define the problem and the mathematical model.

It is obvious that the deployment of the technology Long Term Evolution Advanced (LTE-A) requires a thorough study on the assessment of network performance (wide coverage, high speed, mobility management at high speed ...). These studies will allow better sizing operators of the network so that the constraints on the quality of service are met. This is most important with the convergence to an IP network while where all services are offered via a single support IP-based switching.

In this paper, we propose a comprehensive framework for planning a network 4G/LTE-A, otherwise, a planning cell in the heart network through the access network. It takes into account the principles of managing the mobility of users established in the specifications of technology Long Term Advanced. This model although complex to the advantage of offering a complete solution and has the advantage of preserving the interactions between different parts of the network. In the resolution, we will use the genetic evolutionary algorithm.

The 4G LTE-Advanced network is a flat network all IP. The geographical area is divided into small area called hexagonal cells, the centre of which is the eNode B which may be interconnected via the X_{2} interface, themselves connected to the SGW in the user plan (through the S_{1-}U interface) and the control plan MME to the S_{1}-MME interface. The SGW are connected to the MME in the control plan by the S_{11} interface and PGW user plan by the S_{5} interface. The PGW are connected to other external networks by SGi interface (

In this article, we propose a comprehensive planning model of LTE Advanced network architecture based on a “centralized control, distributed bearer” [

The functional entity centralized control of MME is responsible for:

-To treat signalling exchange between the handheld and the EPC;

-To establish a user session and select the SGW and PGW entities that will be used to implement the data transport channel during a query.

Thus we abstract equipment HSS and PCRF (

The problem of an Advanced LTE mobile network planning is a complex issue. However to make it affordable, it can be divided into three sub problems compared to three levels in the architecture of the network 4G/LTE-A of

-Cells planning is to interconnect the eNode B together with the X_{2} interface (optional). This sub problem is to minimize the total cost of the network by minimizing the costs of connection and costs associated with handoff operations;

-Planning the access network is to assign the eNode B to SGW through the S_{1-}U interface in the data plan. This sub problem is to get a better latency (optimizing link costs between these two entities and reduce the costs of complex operations of handoff following a change of SGW);

-Core network planning is to interconnect the SGW to PGW through the S_{5} interface in the user plan (data plan). The objective of this sub-problem is protocol to reduce costs of network to enable reliable transmission of data packet transport IP over the whole network.

To model our problem, the following assumptions about the network architecture must be considered:

The network consists of n eNode B installed in each one of the network cells, s SGW and pPGW which are respectively identified by the indices 1 to 3 so that:

- I = { 1 , 2 , 3 , ⋯ , n } the set of eNode B.

- J = { 1 , 2 , 3 , ⋯ , s } the set of SGW.

- K = { 1 , 2 , 3 , ⋯ , p } the set of PGW.

- To each eNode B in the center of a cell is connected to a single SGW and can be interconnected with other eNode B in cells;

- Each is connected to a SGW and PGW one;

- Each SGW and PGW to a well determined capacity;

- The position of the eNode B, SGW and PGW are known;

- The total capacity of the links connected to an entity (SGW and PGW)cannot exceed the capacity of this entity (bit per second).

Finally, the problem of global planning is divided into three sub problems:

The interconnection of the eNode B among them, the assignment of the eNode B to PGW, and SGW assignment to PGW.

Consider the constant parameters:

C i i ′ 11 : The link cost between eNode B i (i є I) and eNode B i' (i' є I) withi ≠ i'.

C i j 12 : The link between the eNode B i (i є I) and the SGWj (j є J).

C j k 23 : The link between the SGW j (j є J) and thePGW k (k є K).

h 11 i i ′ : The cost ofhandoffoperation per unit time between the eNode B i and i' with no change of SGW.

h ′ 11 i i ′ : The cost of a handoff complex operation per unit of time report between the eNode B i and i' without SGW.

h 21 i i ′ : The cost of single handoff operation per unit time between the eNode B i and i' involving a change of SGW.

h ′ 21 i i ′ : The cost of handoff complex operation per unit time between the eNode B i and i' involving a change of SGW.

Φ 11 i i ′ = h ′ 11 i i ′ − h 11 i i ′ represents the reduced cost per unit of time of a complex handoff between two eNode B i and i' with SGW not changing.

Φ 21 i i ′ j = h ′ 21 i i ′ − h 21 i i ′ represents the reduced cost per unit of time of a complex handoff between eNode B i and i' with a change of SGW.

ω 2 j : The maximum capacity of the entity SGW J in (bps: bit per second).

ω 3 k : The maximum capacity of the entity PGW k in (bps: bit per second).

γ 12 i j : The data volume supported by the interface S_{1} between the eNode B i and entity SGW j.

γ 23 j k : The data volume supported by the interface S_{5} between the entities SGW j and PGW k.

Consider the following decisions variables:

x 11 i i ′ = { 1 if theeNodeB i ( i ∈ I ) isconnectedtotheeNodeB i ′ ( i ′ ∈ I ) et i ≠ i ′ 0 otherwise

x 12 i j = { 1 if theeNodeB i ( i ∈ I ) isconnectedtoSGW j ( j ∈ J ) 0 otherwise

x 23 j k = { 1 if theentitySGW j ( j ∈ J ) isconnectedto theentityPGW k ( k ∈ K ) 0 otherwise

To better understand the cost incurred by a handoff operation with change of SGW, we define the following additional variables:

z 12 i i ′ j and y 12 i i ′ : representing the cost allocation of eNode B i ∈ I et i ′ ∈ I au SGW j ∈ J .

So

z 12 i i ′ j = x i j 12 ⋅ x i ′ j 12 ; ∀ i ≠ i ′ ; i e t i ′ ∈ I e t j ∈ J (1)

So that:

y 12 i i ′ = ∑ j ∈ J z 12 i i ′ j ; ∀ i ≠ i ′ ; i e t i ′ ∈ I e t j ∈ J , (2)

y 12 i i ′ = { 1 iftheeNodeB i and i ′ ( i ≠ i ′ ) arebothconnectedtoonlyasingle andsame SGWamongthe j ( j ∈ J ) SGW 0 otherwise

The total cost of the objective function F is the sum of total depreciation costs of connections and reduced costs per unit time of the handoff operations throughout the network defined below:

F = ∑ i ∈ I ∑ i ′ ∈ I i ≠ i ′ c 11 i i ′ x 11 i i ′ + ∑ i ∈ I ∑ j ∈ J c 12 i j x 12 i j + ∑ j ∈ J ∑ k ∈ K c 23 j k x 23 j k + ∑ i ∈ I ∑ i ′ ∈ I i ≠ ϕ 11 i i ′ ( 1 − x 11 i i ′ ) + ∑ i ∈ I ∑ i ′ ∈ I i ≠ i ′ Φ 12 i i ′ ( 1 − y 12 i i ′ ) (3)

Then it will minimize the cost function F defined in (3) under the following constraints:

§ The constraints on the uniqueness of the assignments:

- Each SGW is interconnected to one and a single other eNode B

∑ i ′ ∈ I x 11 i i ′ = 1 ; ∀ i ∈ I (4)

- Each eNode B must be assigned to only one SGW

∑ j ∈ J x 12 i j = 1 ; ∀ i ∈ I (5)

- Each SGW must be assigned to one PGW

∑ k ∈ K x 23 j k = 1 ; ∀ j ∈ J (6)

§ The constraint on the ability of nodes (SGW and PGW)

The network is flat in IP. There is only one type of traffic flowing across the network. The data are carried by IP. The signalling messages in the MME control plane are not taken into account.

The constraints on the ability of these different nodes are defined below:

§ The Constraint on the ability of SGW: The amount of data coming from i eNode B should not exceed the capacity of SGW.

∑ i ∈ I γ 12 i j x 12 i j ≤ ω 2 j ; ∀ j ∈ J (7)

§ The Constraint on the ability of PGW: The amount of data coming from j SGW does not exceed the capacity of the p PGW.

∑ j ∈ J γ 23 j k x 23 j k ≤ ω 3 k ; ∀ k ∈ K (8)

§ Nonlinear constraints

Relation (1) is nonlinear. Therefore, the problem cannot be solved with traditional methods of linear programming. Thus Merchant and Senguptain [

z 12 i i ′ j ≤ x 12 i j ; ∀ i ≠ i ′ and i , i ′ ∈ I ; j ∈ J (9)

z 12 i i ′ j ≤ x 12 i ′ j ; ∀ i ≠ i ′ and i , i ′ ∈ I ; j ∈ J (10)

z 12 i i ′ j ≥ x 12 i j + x 12 i ′ j − 1 ; ∀ i ≠ i ′ and i , i ′ ∈ I ; j ∈ J (11)

z 12 i i ′ j ≥ 0 with ( i ≠ i ′ and i ; i ′ ∈ I ) and j ∈ J (12)

Summary of the planning problem formulation

The proposed model is an objective function of cost minimization under the constraints:

- From the uniqueness of assignment between entities located at each level of the architecture;

- From SGW and PGW nodes Capacity in the data plane user of the core network.

Thus, we have:

Min F = ∑ i ∈ I ∑ i ′ ∈ I i ≠ i ′ c 11 i i ′ x 11 i i ′ + ∑ i ∈ I ∑ j ∈ J c 12 i j x 12 i j + ∑ j ∈ J ∑ k ∈ K c 23 j k x 23 j k + ∑ i ∈ I ∑ i ′ ∈ I i ≠ ϕ 11 i i ′ ( 1 − x 11 i i ′ ) + ∑ i ∈ I ∑ i ′ ∈ I i ≠ i ′ Φ 12 i i ′ ( 1 − y 12 i i ′ ) (3)

∑ i ′ ∈ I x 11 i i ′ = 1 ; ∀ i ∈ I (4)

∑ j ∈ J x 12 i j = 1 ; ∀ i ∈ I (5)

∑ k ∈ K x 23 j k = 1 ; ∀ j ∈ J (6)

∑ i ∈ I γ 12 i j x 12 i j ≤ ω 2 j ; ∀ j ∈ J (7)

∑ j ∈ J γ 23 j k x 23 j k ≤ ω 3 k ; ∀ k ∈ K (8)

z 12 i i ′ j ≤ x 12 i j ; ∀ i ≠ i ′ and i , i ′ ∈ I ; j ∈ J (9)

z 12 i i ′ j ≤ x 12 i ′ j ; ∀ i ≠ i ′ and i , i ′ ∈ I ; j ∈ J (10)

z 12 i i ′ j ≥ x 12 i j + x 12 i ′ j − 1 ; ∀ i ≠ i ′ and i , i ′ ∈ I ; j ∈ J (11)

z 12 i i ′ j ≥ 0 with ( i ≠ i ′ and i ; i ′ ∈ I ) and j ∈ J (12)

(3) Reflects the objective function to minimize: The first three terms respectively represent, the total cost allocations between the eNode B in the cells, the total cost of the eNode B and SGW assignments in the access network and the total cost of the SGW and PGW assignments in the core network. The fourth and fifth terms respectively represent the reduced cost per unit of time of complex handoff without involvement of the SGW in the cells, and the reduced cost per unit of time of complex handoff with a change of SGW in the access network.

(4), (5) and (6) represent the constraints linked to the assignments uniqueness and we only successively have an eNode B that can only be interconnected to one and only one other eNode B in the cells, each eNode B should be assigned to one and only one SGW finally in the core network each SGW must be assigned to one and only one PGW. (7) and (8) impose the constraint on the capacity of PGW and SGW.

Finally constraints (9), (10), (11) and (12) are linearized to be equivalent to (1) to reduce the problem to an integer programming [

Despite the transmutations carried out, the problem of allocation in an LTE-A network is still quite complex to solve. In the following section, we study the complexity of the model established in (3) to show that it is more convenient to use a heuristic to solve our model to obtain a feasible solution close to the optimum in a reasonable computation time.

Complexity Study of the Planning Model

The study of the complexity of the mathematical model set up in (3) is influenced by the three (3) levels seen in the architecture and the numbers of equipment available (

Indeed, it’s about making a triple assignment, first the interconnection between eNode B in the cells, and then a sub allocation of eNode B in the sub SGW access network, and finally a sub allocation of SGW the PGW at the core network level. And by analyzing more closely the second sub assignment, with the eNode B to PGW in terms of data users plane in the access network, we notice that it is similar to the cell assignment problem to switches in work carried out for second generation mobile networks [

In our case, we have in the first eNode B n sub assignment that we want to connect at the cell level, which will require an algorithm with exhaustive enumeration of combination analysis to solve part of the problem. Then we must also affect the eNode B n to SGW s in the sub access network, which will also focus on examining s^{n} combinations, finally the assignment of s SGW top PGW at the core network level will also focus on examining another p^{s} combinations. With this computing time which raises exponentially, we would not be able to find a solution in a reasonable time. On this basis, we concluded that we are faced with a hard-NP problem. Therefore, we search rather close to the optimum solution by developing heuristics or metaheuristics for its practical problem solving in a reasonable computing time.

Among the known heuristics, we have chosen the genetic algorithm approach presented in the next section.

The genetic algorithm belongs to the class of evolutionary algorithms developed separately and almost simultaneously, by different scientists:

- The evolutionary programming (L. Fogel 1966) [

- Strategies of evolution (J. Rechenberg 1973) [

- Genetic algorithms (J. Holland 1975) [

The objective is to obtain a feasible solution to an optimization problem when it cannot be solved with an exact method in a reasonable time. From 1990, these three fields have been grouped under the Anglo-Saxon term of Evolutionary Computation.

In our article, we treat genetic algorithms based on Neo-Darwinism that is the union of the theory of evolution and modern genetics. They are built on different techniques derived from it: crossing, mutation, selection...

Genetic algorithms all follow the same principle [

Intuitively, a large population with a large number of generations must be able to lead to a more refined solution hoping that the last generation will contain the right solution, however, is not necessarily the best.

In our adaptation, we chose to make a non-binary coding of chromosomes [

Each chromosome of the population defines a feasible solution of the problem

For example, for our case, assuming a network 7 eNode B, 4 SGW and PGW 3.

A representation of the chromosome in

Each chromosome being a configuration after three sub assignments would be:

- The length of the chains in the cells and the access network is equal to the number of eNode B because all eNode B should be interconnected and be assigned to the SGW.

- The length of the chains at the heart network is equal to the number of SGW because all the SGW must be assigned to PGW.

Thus, the length of the chromosome for our adaptation is equal to twice the number of eNode B added to the number of SGW.

The reading of chromosomes is from left to right; so:

- The first bit of chromosome contains the number of an eNode B to which the eNode B 1 is connected.

- The eighth bit contains the number of a SGW which the eNode B 1 is assigned in the access network.

- The fifteenth bit contains the number of a PGW which is assigned a SGW in the heart network.

This configuration represents a given topology (one assignment scheme) and respects the constraints of single assignment but not the constraint on the ability of the switches (SGW and PGW).

The first member of the initial population is that obtained when the three sub assignments are made according to the metric of the smallest Euclidean distance. When an entity to allocate (eNode B respectively SGW) is equidistant from two or more other entities (eNode B respectively PGW), is assigned to the first in the order specified by the problem. This first chromosome is created deterministically. The other elements (chromosomes) of the population are randomly created respecting the principle of non-duplication (each chromosome is unique). This principle ensures heterogeneity of the population, thus good coverage of space to explore.

The population size is fixed and must be inferior or equal to all possible assignments to maintain the principle of unduplicated population.

Therefore, they must verify the feasibility of each solution, that is to say, the constraint on the ability of the switches. Indeed, in every generation, the population must be made feasible solution after application of genetic operators so that the latest generation of the best contains chromosomes than those of previous generations.

The operation is to create two new solutions (children) exchanging one or more genes of two existing solutions (Parents).

To do so, we randomly generate an integer in each of the intervals:

-[1, number of eNode B], at the cell level and the access network.

-[1, number of SGW], in the core network.

These numbers will match the crossing position for the two selected parents’ chromosomes. Each crossing new solutions are created. The new solutions will be retained if they are feasible.

Mutation is the process whereby the value of a random gene in a chromosome is regenerated. This process occasionally occurs in a genetic algorithm. By randomly changing the value of a bit in a string, the mutation is useful to bring genetic material that would have been forgotten by operators of selection and breeding. This operator mutates, under a certain probability, elements of the population.

To do so, a mutation position is identified by randomly generating a positive integer in the following intervals:

-[1, number of eNode B], at the cell level and the access network.

-[1, number of SGW], in the core network.

Then, the variable corresponding to the selected position is randomly generated within the following ranges:

-[Min_N˚ eNode B, max_N˚ eNode B], at the cell level.

-[Min_N˚ SGW, max_N˚ SGW], in the access network.

-[Min_N˚ PGW, PGW max_N˚], in the core network.

NB: min_N˚ and max_N˚ are respectively the values that can take the various entities.

A key element of the genetic algorithm is the evaluation function or fitness of the individual that is the cost of the network configuration it represents. It is on this basis rests the choice of candidates.

The evaluation is to determine whether the chromosomes meet the constraint on the ability of switches and to determine which has the lowest cost while respecting the constraint of capacity switches.

The objective of the selection operator is to build a new population from the population obtained after application of the mutation and crossover. Overall, we want to calculate a probability of selection for each individual of the population is even higher than the value of his fitness is good. The percentage is calculated for each chromosome compared to the total fitness.

The simplest way to define the probability of selection is to make it directly proportional to its fitness.

Let f(i) the value of the fitness of individual i (i = 1, 2...total pop). One can then define ps(i), the individual probability of selecting i, as follows:

p s ( i ) = f ( i ) ∑ k = 1 T o t a l _ p o p f ( k )

Once the selection probabilities are calculated for all individuals in the population, it remains to be using it to build the next population.

The generation number is set initially. In every generation a new population is created. The size of the population is kept for each generation.

By the same principle, starting from a population of initial solution (checking the capacity of the switches), propagation is by growing two individuals and is applied to the two individuals chosen generic operators: the crossing and mutation. Reproduction gives two children who are placed in the new population. Repeating playback until we have completed the new (the size of the population should remain constant).

Once reached, we replace the old population by the new one, and the process is repeated according to the number of generation set.

NB: In every generation, we save the best individual and at the end we chose the best.

The performance of the adaptation of the genetic algorithm is based essentially on a good choice of its parameters. In the absence of actual data, our experiment was performed by considering a number of tests generated by a Matlab program.

We will make considerations as in some previous work. The cost of link between the various entities is proportional to the distance separating them, with a coefficient of proportionality equal to unity [

- Traffic Modelling

Traffic in a telecommunications network is the volume of information transported or processed by the network. Unlike the 3G UMTS technology in a 4G/LTE-A network, there is only one type of traffic that transport data in packet form between the EPC and the mobile terminal. And as users’ behaviour is random, we consider that traffic follows a Markov chain in continuous time through a process of birth and death. As there are no mathematical laws to model accurately the behaviour of the packet-switched traffic in a 4G network, suppose that all the cells in our network are considered queues M/M/1 forming a Jackson network [

Thus, the process of arrival of data packets is fish α_{i} rate and tenure of the cell follows an exponential law of parameter μ_{i} ( and μ_{i} is strictly positive). A steady state (μ_{i}_{.}/α_{i} ≤ 1).

To facilitate the generation of data for our simulations, we make the assumptions below:

- The f_{i} data rates from a cell i with mean gamma distribution and variance equal to unity.

- The service time (residence time: for example, the talking time or download time of a file) data within cells are distributed according to an exponential law of parameter equal to unity.

- If a cell j has neighbour k, [0,1] is divided into k + 1 in k intervals by choosing random number uniformly distributed between 0 and 1. At the end of the period of service in the cell j, the data packets may either be transferred to the i^{th} neighbour ( i = 1 , 2 , 3 , ⋯ , k ) with a probability of transfer equal to the length of the i^{th} interval, be closed with a probability equal to the length of the k + 1^{th} interval.

To find the volume of data and the coherent succession rate, the α_{i} rate data in cells at equilibrium are obtained by solving the following system:

f i = α i − ∑ j = 1 n α i r i j a v e c i = 1 , 2 , ⋯ , n

where n is the number of network cells and r_{ij}, the probability of handover between cells i and j.

f_{i} being the traffic data rate from cell i.

It is selected as the data volume of an eNode B, the average length of its queue.

The succession rate is defined by: h_{ij} = f_{i}r_{ij}.

・ All sSGW have the same capacity packet M_{0} calculated as follows for the purposes of the simulation:

M 0 = 1 s ( 1 + k 100 ) ∑ i = 1 n f i

where k is uniformly distributed between 10 and 50, which ensures an overall surplus of 10 to 50% of the capacity of SGW compared to the data volume of the eNode B.

・ All p PGW have the same capacity M_{1} calculated as follows:

M 1 = 1 p ( 1 + k ′ 100 ) ∑ i = 1 n M 0

where k' is uniformly distributed between 10 and 50, which ensures an overall surplus of 10% to 50% of the capacity of PGW relative to the volume data from the SGW.

In order to verify the performance of our adaptation, a series of experiment was performed.

Considering a network of 15 eNode B-7 SGW-5 PGW, we generated the data needed to experience using a program Matlab R2015b. The program is executed on a computer whose characteristics are: Intel^{®}Core™ i3-3110M CPU@2.40 GHz 2.40 GHz.

The parameters used for the simulation of our adaptation are:

- Population size: 80.

- Number of generation: 45.

- Crossing probability: 0.9.

- Mutation probability: 0.2.

- Inversion probability: 0.25.

We executed our adaptation respecting the simulation parameters set out above (Test N˚1).

The results show that the algorithm performs well because the optimum is reached in the last generation (

Comment: We note that the process starts with a value of 1207.2 units in the first generation. This optimum undergoes an increase of 0.25% or an evaluation of 1210.2 units in the second generation from the optimum value to the first generation.

A marked improvement in the optimum value of 0.42% was observed in the third generation or an evaluation of 1205.1 units. From the third generation, the algorithm performs very well, and we get good value for the optimum in the 45^{th} generation of 870.2 units, an improvement of 27.79% and 27.91% compared to the optimum of the first generation. This improvement is due to the fact that only feasible solutions were chosen to form a new population.

Study of the influence of the population on the optimum value

2^{nd} series of experiments with a population equal to 60 chromosomes (

Comment: We note that keeping the same parameters except the population size this time that equals 60 (Test N˚. 2). We obtain the optimum in the 45^{th} generation of a value of 942.8 units except that it is not better compared with that found previously in

3^{rd} series of experiments for an estimated population of 40 chromosomes (

Comment: We repeated this same experience to a size of the estimated population of 40 chromosomes (Test No. 3), made the observation that if the algorithm performs well but also the optimum value is degraded; an increase of 14.76% relative to the optimum test N˚ 1 of the first experiment and 5.92% relative to the optimum test N˚2 of the second experiment.

Thus, a large population ensures good exploration of the search space, which allows to have a refined optimal solution. However, a small population could lead so quickly to a good solution provided that operators are judiciously applied.

Finally, the experiments have shown that the processing time increases with a growth in population, this is probably due to the heterogeneity of the members in population.

Thus, concerning the search space, the algorithm explores the neighbourhood of each feasible solution to determine the global optimum.

In this article, we proposed a mathematical model to solve the problem of a mobile Long Term Evolution Advanced network planning which we have solved with the genetic algorithm in a global context by considering three sub assignments. The genetic approach we proposed provides an optimal solution after a number of generations. However, it depends on the size of the population. It is observed that the bigger the exploration space is the more we hope to have a refined solution. However, it is important to note that our approach to the design of the model excludes the interfaces defined in the architecture of control plan of an LTE-A network [