On Mean Rate Policing with a Bursty Traffic Specification & Allocation (BTSA) Policer Function
|
|
- Lynn Boyd
- 6 years ago
- Views:
Transcription
1 On Mean Rate Policing with a Bursty Traffic Specification & Allocation (BTSA) Policer Function Tariq M. Jadoon & David A. Harle Communications Division, Department of Electronic & Electrical Engineering, University of Strathclyde, Glasgow G1 1XW, UK. Tel: Ext. 08 Fax: tjadoon@comms.eee.strath.ac.uk D.A.Harle@comms.eee.strath.ac.uk ABSTRACT This paper evaluates the performance of a Bursty Traffic Specification & Allocation (BTSA) policer function as a mean rate policer for packet voice, still picture video services and on-off sources with arbitrary distributions of the off periods. Scenarios considered include varying the mean burst duration, mean silence period, etc. over nominal values based on a MMDP model of packet voice and still picture video services. For on-off traffic models with arbitrary distributions the squared co-efficient of variation of the off periods is varied such that the mean rate remains constant but the squared coefficient of inter arrival times of cells varies. The study investigates the effectiveness of the BTSA policer for mean rate policing. The work discusses and compares the results produced in previous studies using analytical and simulation techniques. Introduction The Asynchronous Transfer Mode (ATM) offers a flexible solution to the diverse requirements of an Integrated Broadband Network (IBN). It is envisaged that services with a broad range of traffic characteristics will be statistical multiplexed onto a common resource. It is hoped that the statistical multiplexing the traffic cell streams will make it possible to dynamically allocate bandwidth on demand. Resource Allocation to guarantee the negotiated Quality of Service (QoS) will be based on the traffic contract between the user and the network. The traffic contract takes place during the connection establishment phase. The traffic contract, as specified in ITU-T Recommendation I.371 [1], consists of the connection traffic descriptor, the requested QoS class and the definition of a compliant connection. Usage parameter control (UPC) or policing functions will ensure that the network users conform to their traffic contract, i.e., the parameters defined for that connection at call set-up. This ensures that the unintentional or malicious behaviour of some users will not result in a performance degradation for other users. An ATM cell stream generated by a customer will be subjected to UPC functions at the ATM User Network Interface (UNI) before it is allowed to enter the public ATM network and at Network Network Interfaces (NNIs) between networks by the network providers. Policing may also take place at the customer premises access network if the implications of breaking the traffic contract are severe. This implies that the tariff structure will play a major role in shaping ATM customer cell streams. It has been shown that the effective bandwidth of a source just depends on the customer's expected mean rate []. Thus, policing the expected mean rate, although believed by some to be impractical, would result in a more efficient utilisation of network resources provided that the customers adhere to their expected mean rates for the duration of the call. 3/1
2 Basic Requirements for Policer Mechanism The UPC function will extract essential information from the cell header, i.e. the connection identifier (VPI/VCI number) and the cell loss indicator (CLP bit). With this information, it will test the validity of the cell and take a decision about its fate. Ideally, the policing mechanism should be transparent for those connections that respect their traffic contract. On the other hand, it should rapidly detect any violating traffic and act by discarding/tagging cells or in extreme cases dropping the connection altogether. This intelligent function which separates conforming functions from non-conforming cells is called the police criterion calculator (PCC) [3]. Numerous mechanisms (criteria) have been proposed. They most commonly involve [4]: window method, which limits the number of cells in a time window a leaky bucket method, which increments a counter for the arrival of each cell and periodically decrements this counter. The optimum dimensioning and effectiveness of a policing mechanism depends heavily on the source traffic characteristics and its QoS requirements. There are two fundamentally opposite approaches for specifying traffic parameters. One approach is a statistical approach based on the stochastic traffic parameters and the other is an operational approach defined by means of a rule [5]. Deterministic rule based traffic descriptors offer advantages over statistical based traffic descriptors. In the main, it is difficult to estimate the statistics of real time traffic a priori without monitoring the traffic over long periods of time in order to detect, with some confidence, whether the negotiated parameters of the traffic contract have been respected. There are two fundamental problems, which give rise to a certain probability of incorrect policing decisions, with respect to mean rate policing, which have been discussed in previous literature [6-8]. The characteristics of the source must be estimated on the basis of a relatively short sample. A large sampling time increases the reaction time of the policing mechanisms. Inaccuracies and uncertainties in the knowledge about relevant parameters, in the establishment phase of the call, cause the margins between the policed bit-rate and the actual bit rate to increase. This results in a loss of effectiveness of the policing mechanism. The mean bit rate can be abstracted from historical information or measurement. When policing a single VC, it is possible at call set up for the user to declare the type of service that they require. With this information the network dimensions its policing mechanisms according to a set of default nominal parameters that have been established through modelling and/or measurement for that particular type of service. If the source deviates from these nominal parameters, the policing mechanism comes into action by marking or dropping cells. ATM Connection Descriptors According to the ATM-Forum User Network Interface Specification [10], an ATM connection can be described by four parameters: the peak cell rate (PCR), the cell delay variation (CDV) tolerance, the sustainable cell rate (SCR) and the maximum burst size (MBS). A reference constant bit rate stream (CBR) may experience CDV due to actions of the ATM layer such as cell multiplexing, physical layer overheads, insertion of operation and maintenance (OAM) cells, etc. As a result, policing mechanisms may observe some cells arriving at a higher bit rate than the declared PCR. This necessitates the consideration of a CDV tolerance for the policer. A variable bit rate (VBR) connection will be characterised by both a PCR and a SCR. VBR traffic is bursty in nature, i.e. the PCR is different from the mean cell rate. This means that a source may transmit at the PCR for a while and then transmit at a lower rate or not transmit at all for a while. The maximum size of the burst at the PCR is the MBS. 3/
3 Traffic Source Models Packet Voice & Still Picture Video Services A two-phase burst/silence model shown in Fig. 1 has been used for evaluating the effectiveness of the BTSA policing function as a mean rate policer. This model has been used in earlier publications [7-9] for packetised voice and still picture video services. The cell arrival process can be characterised as Markov Modulated Deterministic Process (MMDP). During the burst phase, the source emits cells at a constant cell emission rate b, i.e. the PCR, for a negative exponential distribution of time with mean h. The burst is then followed by a negative exponential distributed silence period with mean k. The traffic sources can be characterised by the following set of parameters: peak (burst) cell emission rate [b] mean burst duration [h] mean silence duration [k] mean cycle duration [c = h+k] Table 1 mean source burstiness [X = (h+k)/h] mean source cell rate [ m = b.h/(h+k)] mean burst length in cells [t = b.h] Traffic Parameters MMDP h k Parameter Packet Voice Still Picture b 83 cells/sec 508 cells/sec h 35 ms 500 ms burst silence k 650 ms ms m 9 cells/sec 604 cells/sec Fig. 1: Two-phase Burst Silence Source Model X.85 3 Table Table summarises the traffic source characteristics for packet voice and still picture video services. On-Off Traffic Models with Arbitrary Distributions It has been suggested that future ATM traffic will be better characterised by two alternating on and off periods [11]. Initial results [1] from high performance computing networks like the VISTAnet Gigabit Network indicate that the active period has a constant distribution while the silence period may be characterised by a uniform, geometric or hyper-geometric distribution. Following a similar analysis to that described in [11], consider an on-off traffic model with a constant on period and a uniform off period. The model can be characterised by the following parameters: burst length (h M ) slots minimum off time (k m ) slots ( km km + 1) 1 maximum off time (k M ) slots var (off) = 1 k mean off time k = M + k m ( k 1 1 slots cs M km + ) = 3( km + km) Table 3 Traffic Parameters 3/3
4 In Table, var(off) is the variance of the off times and (c s ) is the squared co-efficient of variation of the off times i.e., variance/mean. The mean cell rate (m) in cells/slot is given by hm m = hm + k A surprising result from [11] shows that the squared co-efficient of variation of the inter arrival times of cells, which is a good measure of the burstiness depends on only the first two moments and not on the shape of the independent renewal distributions of the on-off times. The BTSA Policer The bursty traffic specification and allocation (BTSA) approach simply consists of a two stage continuous state leaky bucket policer [13]. The leaky buckets of the BTSA policer are in cascade (Fig. ). The user specifies the PCR, the expected average or SCR and a MBS. The network uses these parameters to set up a two stage policer. In the first stage, the peak rate monitor tests any violations to the PCR. In the second stage, a leaky bucket with a leaky rate equal to the SCR and the capacity of the bucket associated with the MBS polices the mean bit rate and maximum burst size. (1) ATM cells N = Bucket size a = Leaky rate Fig. : N1 a1 N a Peak rate monitor Mean rate monitor BTSA Policer Mechanism The Leaky Bucket Mechanism The virtual scheduling algorithm and the continuous state leaky bucket are two equivalent versions of a parameterised conformance testing algorithm which have been proposed in ITU-T Recommendation I.371 [1] to cope with cell delay variation (CDV). The continuous state leaky bucket consists of a counter which is incremented by arriving cells and decrements periodically as long as the value of the counter is positive. If the instantaneous cell arrival rate is greater than the decrementation rate, the counter value starts to increase until a pre-defined upper limit. Suitable action (e.g. discarding or marking) is taken on any subsequent cells until the counter has fallen below its limit. The increase in the value of the counter is analogous to a bucket filling up and an upper limit for the counter to the capacity of the bucket which results in spill over when overfilled. Dimensioning the Buckets The Peak Rate Monitor Previous works [6,14-15] have analysed the CDV caused by various topologies in the access network (e.g. FIFO multiplexors, buses, etc.) and have given some typical values that could be used as defaults for the bucket depths required to achieve a given target cell loss probability within a CDV tolerance. Their results suggest that CDV mainly depends on the load on the access multiplexor. The analysis in [6] consists of a single reference Constant Bit Source (CBR) connected to a simple First-In-First-Out (FIFO) queue offered various streams of traffic. This is motivated by the use of simple multiplexors and the fact that a switch can be modelled as a transparent cross connect with output buffers. The results indicate the worst case CDV, i.e. the CDV when the multiplexor is running at full load and the background traffic is Poissonian. The analysis uses the Kingman bound [16] for the tail behaviour of GI/G/1 queues in heavy traffic which can be applied to GI/D/1 queue to calculate the bucket size for a given target cell loss probability. This 3/4
5 effectively means that if the bucket depths are set using a fixed leaky rate, with a given cell loss target, the source can be policed and, thus, guarantee that the losses will not be more than the cell loss target. If we set the leaky rate a to 95% efficiency, theoretically it would be possible for a stream with a constant cell rate of 5% higher than the peak cell rate to pass through the policer unchecked. Due to the clumping and dispersion of cells caused by the multiplexing devices and other network functions we have to account for CDV. Thus setting a = b/0.95, we get a CDV tolerance of 0.6 ms, and bucket depths of and 4 for the packet voice and still picture services respectively and using the analysis from [6] a target cell loss probability of Working at higher efficiencies, e.g. 99% would not be fruitful as the CDV tolerance would go to an unacceptably high values. Mean Rate Monitor In [8] we see that, for a given set of nominal source parameters, to obtain an acceptable less loss probability at nominal conditions, the size of the LB threshold counter is very high. For the case of Packet Voice it is 98.5 t o or 881 cells at a leaky rate of a = 1.09m o. Similarly for Still Picture, we have 3.01t o or cells at a leaky rate of a = 1.1m o. Clearly these values for the threshold counter are very high and would result in a very slow reacting policing mechanism. One option is to increase the leaky rate of the mean rate policer and reduce the value of the threshold counter, such that we still have a target cell loss probability of less than 10-6 for the nominal parameters. RESULTS Packet Voice & Still Picture Video Services The effectiveness of the BTSA policer can be evaluated by varying the source traffic parameters over the nominal source parameters. Ideally the cell loss probability should be close to 10-8 for the nominal parameters and be the exact fraction of violating cells for peak and mean bit rates greater than the nominal values. There are two scenarios for which the tests were performed for packet voice and still picture video services. The mean burst duration h, of the source, is varied over the nominal burst duration h o, such that the burst cell rate b o remains constant. This is effectively an increase in the mean cell rate m over the nominal mean cell rate m o. The mean silence duration k, of the source, is varied over the nominal silence duration k o, such that the burst cell rate b o remains constant. This is also, in effect, an increase in the mean cell rate m over the nominal mean cell rate m o. Simulation results for the case of a threshold counter equal to 0 t o and a leak rate a = 1.m o are given for packet voice and still picture services in Fig. 3 and Fig. 4 respectively From the results shown in Fig. 3 and Fig. 4, it can be seen that for a BTSA policer function, the cell loss probability is 10-7 for nominal parameters and increases dramatically for changes in the aforementioned parameters over the nominal values. This demonstrates the ability of a BTSA policer to perform mean bit rate policing effected by changes in the mean burst h and silence duration k, while the burst cell rate remains within the peak policed cell rate. Thus, by dimensioning the two stages of the BTSA policer, such that the peak rate monitor has a fast reacting leaky bucket with a small bucket size and a leaky rate close to the peak cell rate and the mean rate monitor has a large bucket size and a leaky rate slightly higher than but close to the mean cell rate, we can satisfactorily achieve peak and mean rate policing for packet voice and still picture video services. 3/5
6 Fig. 3: BTSA Performance characteristics (CLP Vs. m) for Packet Voice service. Fig. 4 BTSA Performance characteristics (CLP Vs. m) for Still Picture service. 3/6
7 On-Off Traffic Models with Arbitrary Distributions Consider a BTSA policer with its leaky buckets dimensioned such that the maximum burst size that can pass through the policer at the peak cell rate is (h M ). For no cell loss to occur, k m k bound, where k bound is the time required (expressed in slots) to empty the mean rate monitor after the completion of a burst. k bound = h M ( 1 a), () a (recall that a is the leaky rate of the mean rate monitor of the BTSA policer). Defining x as the width of the uniformly distributed off period, i.e. x = k M - k m. The cell loss probability (CLP) can be expressed as: max 0, k k max 0, k k x bound + bound m CLP = or x x Assuming a constant on period of 40 slots and a uniform off period with a mean equal to 100 slots. Fig. 5 shows the CLP expressed as a function of the width x, for leaky rates a, ranging from 1.05m to 1.3m. From Fig. 5, it can be observed that there is great variation in the CLP as the variance of the off periods changes. Thus, cell streams having the same burstiness as defined by the peak/mean cell rate but different widths of the off period would require different leaky rates in the mean rate monitor to achieve no cell loss for nominal parameters. The SCR dimensions a. For cell streams with a low to moderate x/k, the SCR is comparable with the mean cell rate m. (3) 0.5 CLP Vs x for a = (1.05m -1.3m) 0.4 m1 05 ( x) m1 1 ( x) 0.3 CLP m1 ( x) m1 3 ( x) x width (x) Fig. 5: Cell loss probability Vs width x for h M = 40 slots, k =100 slots These results can be extended to on-off traffic with off period distributions which are symmetrical about their mean. The CLP would be given by probability that the off period is less than k bound. The BTSA policer can detect changes in the mean rate when variations in the traffic stream cause k m to reduce below k bound. Thus, it can effectively police the mean rate if the variance or squared co-efficient of variation of the off period does not significantly change during the course of the connection. However, it would be 3/7
8 ineffective in detecting an increase in the mean cell rate if the mean off period and the width x decreased simultaneously such that condition for no cell loss, i.e., k m k bound, is not violated. For geometrically distributed off periods with a mean off time k slots. The probability that an off period is N slots in duration is P[k = N] = pq N-1, where p = 1/k, q = 1-p and N = 1,,3,... Once again, if k bound is defined as the time required expressed in slots to empty the mean rate monitor after the completion of a burst. The probability of cell loss can be evaluated as: kbound p q n= 1 Summing the simple geometric series (4), results in: n 1 (4) CLP = 1 q kbound (5) For example consider a constant on period of 40 slots and a uniform off period with a mean equal to 100 slots. The CLP from (5) would be 0.51 for a= 1.3m and 0.01 for a = 3.33m. Thus, if the BTSA policer's monitors are dimensioned such that the maximum burst size that can pass through the policer at the peak cell rate is MBS, and the mean rate monitor has a leaky rate equal to the SCR, which is set slightly greater than the mean cell rate of the source. The CLP, for constant on periods and geometrically distributed off periods, is unacceptably high. In this case, it is not possible to reduce the CLP to below 10-7 for nominal parameters by increasing the SCR. For nominal parameters, the CLP could be reduced by increasing the virtual bucket size of the mean rate monitor, but doing so would result in the possibility of bursts longer than what have been contracted, entering the network unchecked. This renders the BTSA policer incapable of handling traffic with constant on periods and geometrically distributed off periods. CONCLUSIONS The effectiveness of a BTSA policer has been evaluated for packet voice, still picture video and on-off traffic with constant on periods and uniform or geometrically distributed off periods. It has been observed that by dimensioning the two stages of the BTSA policer such that: the peak rate monitor has a small bucket depth and its leaky rate set slightly higher than the peak cell rate to account for CDV, the mean rate monitor has a large bucket size with a leaky rate set slightly higher than but close to the mean cell rate, We can satisfactorily achieve peak and mean rate policing for packet voice, still picture video services and on-off traffic with constant on periods and uniformly distributed off periods provided that the variance of the off periods does not significantly change during the duration of the call. However, for on-off traffic with constant on periods and geometrically distributed off periods the BTSA policer cannot be simultaneously dimensioned to police a MBS and a mean cell rate. REFERENCES [1] ITU-T: Recommendation I.371. 'Traffic Control and Congestion Control in B-ISDN', Geneva [] F.P. Kelly, "Tariffs, Policing and Admission Control for Multiservice Networks", 10th UK Teletraffic Symposium, [3] Kees van der Wal et. al., "Implementation of a Police Criterion Calculator based on the Leaky Bucket Algorithm", IEEE GLOBECOM'93, pp /8
9 [4] L. G. Cuthbert & J. C. Sapanel, "ATM The Broadband Telecommunications Solution", IEE' 93, ISBN [5] Martin de Prycker, "Asynchronous Transfer Mode solution for B-ISDN", Ellis Horwood Limited' 93, ISBN [6] Peter Key, 'An Introduction to ATM Performance Issues and Modelling', Tutorial, IFIP Workshop TC6, nd Workshop on Performance Modelling & Evaluation of ATM Networks, July 1994, University of Bradford, UK. [7] E. P. Rathgeb, "Modelling and Performance Comparison of Policing Mechanisms for ATM Networks", IEEE Journal on Selected Areas in Communications, Vol. 9, No 3, April 1991; pp [8] M. Butto, E. Caverolla & A. Tonietti, "Effectiveness of the Leaky Bucket Policing Mechanism in ATM Networks", IEEE Journal on Selected Areas in Communications, Vol. 9, No 3, April 1991; pp [9] T.M. Jadoon & D.A. Harle, "Performance Comparison of a Peak Bit Rate & Burst Traffic Specification & Allocation Policer Functions", Singapore ICCS'94, Vol.., pp [10] ATM Forum, 'ATM UNI Specification (Ver. 3.0)', [11] Sebastian Galmes, Harry G. Perros & Ramon Puigjaner, "Analysis of Burstiness for On-Off Traffic Models with Arbitrary Distributions", IFIP Workshop TC6, nd Workshop on Performance Modelling & Evaluation of ATM Networks, July 1994, University of Bradford, UK. [1] D.S. Holtsinger, Harry G. Perros & Arne A. Nilsson, "Analysis of Traffic Measurements in the VISTAnet Gigabit Networking Testbed", Technical Report, TR-93/11, Department of Computer Science, North Carolina State University, [13] J. S. Turner, "Managing Bandwidth in ATM Networks with Bursty Traffic", IEEE Network, September 199, pp [14] A. Skliros, "Dimensioning the CDV tolerance parameter (τ) for ATM Multiplexers", 10th UK Teletraffic Symposium, [15] A. Atkinson, "Cell Delay Variation Introduced from an ATM Access Multiplexer", 11th UK Teletraffic Symposium, [16] J.F.C. Kingman, "Inequalities in the theory of queues", Journal Royal.Statistical Society Series B, No. 3, pp , /9
Rec. ITU-R S RECOMMENDATION ITU-R S.1424
Rec. ITU-R S.1424 1 RECOMMENDATION ITU-R S.1424 AVAILABILITY OBJECTIVES FOR A HYPOTHETICAL REFERENCE DIGITAL PATH WHEN USED FOR THE TRANSMISSION OF B-ISDN ASYNCHRONOUS TRANSFER MODE IN THE FSS BY GEOSTATIONARY
More informationRaj Jain. The Ohio State University
VBR Voice over ATM: Analysis of Multiplexing Gain and Effect of Scheduling & Drop Policies Jayaraman Iyer,, Sohail Munir Sudhir Dixit, Nokia Research Center Contact: Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/
More informationEXTENDING THE EFFECTIVE-BANDWIDTH CONCEPT TO NETWORKS WITH PRIORITY CLASSES. Arthur W. Berger 1 and Ward Whitt 2 AT&T Labs.
EXTENDING THE EFFECTIVE-BANDWIDTH CONCEPT TO NETWORKS WITH PRIORITY CLASSES by Arthur W. Berger 1 and Ward Whitt 2 AT&T Labs March 25, 1998 IEEE Communications Magazine 36 (1998) 78 84 1 Room 1K-211, Holmdel,
More informationCell Scheduling and Bandwidth Allocation for a Class of VBR Video Connections
Cell Scheduling and Bandwidth Allocation for a Class of VBR Video Connections Tao Yang *, Danny H.K. Tsang #, and Susan Y. Li * * Department of Industrial Engineering Technical University of ova Scotia
More informationTELETRAFFIC ISSUES IN HIGH SPEED CIRCUIT SWITCHED DATA SERVICE OVER GSM
TELETRAFFIC ISSUES IN HIGH SPEED CIRCUIT SWITCHED DATA SERVICE OVER GSM Dayong Zhou and Moshe Zukerman Department of Electrical and Electronic Engineering The University of Melbourne, Parkville, Victoria
More informationRESOURCE ALLOCATION IN CELLULAR WIRELESS SYSTEMS
RESOURCE ALLOCATION IN CELLULAR WIRELESS SYSTEMS Villy B. Iversen and Arne J. Glenstrup Abstract Keywords: In mobile communications an efficient utilisation of the channels is of great importance. In this
More informationDYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS
DYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS Mark Dale Comtech EF Data Tempe, AZ Abstract Dynamic Bandwidth Allocation is used in many current VSAT networks as a means of efficiently allocating
More informationOutline of the Lecture
CS311: DATA COMMUNICATION Multiplexing by Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Web: http://home.iitj.ac.in/~manaskhatua http://manaskhatua.github.io/
More informationThe L*IP Access System
*IP Satellite System The *IP Access System Prototype built for ESA, ARTES-5 contract Meshed MF-TDMA, over GEO Optimized for IP QoS DAMA MF-TDMA modem supports up to 4 Msymb/s QPSK, Turbo codec Fade mitigation
More informationCommunication Analysis
Chapter 5 Communication Analysis 5.1 Introduction The previous chapter introduced the concept of late integration, whereby systems are assembled at run-time by instantiating modules in a platform architecture.
More informationModeling the impact of buffering on
Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput
More informationMultiplexing. Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur
CS311: DATA COMMUNICATION Multiplexing Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur e-mail: manaskhatua@iitj.ac.in Outline of the Lecture What is Multiplexing and why is it used? Basic
More informationMultiuser Scheduling and Power Sharing for CDMA Packet Data Systems
Multiuser Scheduling and Power Sharing for CDMA Packet Data Systems Sandeep Vangipuram NVIDIA Graphics Pvt. Ltd. No. 10, M.G. Road, Bangalore 560001. sandeep84@gmail.com Srikrishna Bhashyam Department
More informationIntroduction to the challenges of current GSM and GPRS planning. Technical Presentation
Introduction to the challenges of current GSM and GPRS planning Technical Presentation Prof. Dr. Fred Wagen Senior Consultant Lausanne, Switzerland wagen@wavecall.ch Prof. in telecommunication at the Univ.
More informationJoint DAMA-TCP protocol optimization through multiple cross layer interactions in DVB RCS scenario
Joint DAMA-TCP protocol optimization through multiple cross layer interactions in DVB RCS scenario M. Luglio, F. Zampognaro Electronics Engineering Department University of Rome Tor Vergata Rome, Italy
More informationThe strictly non-blocking condition for three-stage networks
The strictly non-blocking condition for three-stage networks Martin Collier and Tommy Curran chool of Electronic Engineering, Dublin City University, Ireland Abstract A criterion for a three-stage network
More informationEmpirical Probability Based QoS Routing
Empirical Probability Based QoS Routing Xin Yuan Guang Yang Department of Computer Science, Florida State University, Tallahassee, FL 3230 {xyuan,guanyang}@cs.fsu.edu Abstract We study Quality-of-Service
More informationP. 241 Figure 8.1 Multiplexing
CH 08 : MULTIPLEXING Multiplexing Multiplexing is multiple links on 1 physical line To make efficient use of high-speed telecommunications lines, some form of multiplexing is used It allows several transmission
More information10 In-service monitoring techniques for cell transfer delay and cell delay variation in ATM networks
10 In-service monitoring techniques for cell transfer delay and cell delay variation in ATM networks C. Roppel Deutsche Telekom, Forschungs- und Technologiezentrum P. 0. Box 10 00 03, D-64276 Darmstadt,
More informationCapacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,
More informationRESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS
Abstract of Doctorate Thesis RESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS PhD Coordinator: Prof. Dr. Eng. Radu MUNTEANU Author: Radu MITRAN
More informationSimulation Analysis of the Long Term Evolution
POSTER 2011, PRAGUE MAY 12 1 Simulation Analysis of the Long Term Evolution Ádám KNAPP 1 1 Dept. of Telecommunications, Budapest University of Technology and Economics, BUTE I Building, Magyar tudósok
More informationDelay Performance Modeling and Analysis in Clustered Cognitive Radio Networks
Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon
More informationABSTRACT. Algorithm for Packet-Switched Network Transmission. (Under the direction
ABSTRACT BLAKE, STEVEN LANGLEY. Optimized Two-Layer DCT-Based Video Compression Algorithm for Packet-Switched Network Transmission. (Under the direction of Dr. Tony L. Mitchell and Dr. Sarah A. Rajala)
More informationRECOMMENDATION ITU-R S.1420 PERFORMANCE FOR BROADBAND INTEGRATED SERVICES DIGITAL NETWORK ASYNCHRONOUS TRANSFER MODE VIA SATELLITE
Rec. ITU-R S.1420 1 RECOMMENDATION ITU-R S.1420 PERFORMANCE FOR BROADBAND INTEGRATED SERVICES DIGITAL NETWORK ASYNCHRONOUS TRANSFER MODE VIA SATELLITE (Questions ITU-R 78/4 and ITU-R 75/4) (1999) Rec.
More informationOptimum Rate Allocation for Two-Class Services in CDMA Smart Antenna Systems
810 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 5, MAY 2003 Optimum Rate Allocation for Two-Class Services in CDMA Smart Antenna Systems Il-Min Kim, Member, IEEE, Hyung-Myung Kim, Senior Member,
More informationResearch Article Implementing Statistical Multiplexing in DVB-H
Hindawi Publishing Corporation International Journal of Digital Multimedia Broadcasting Volume 29, Article ID 261231, 15 pages doi:1.1155/29/261231 Research Article Implementing Statistical Multiplexing
More informationLoad Balancing for Centralized Wireless Networks
Load Balancing for Centralized Wireless Networks Hong Bong Kim and Adam Wolisz Telecommunication Networks Group Technische Universität Berlin Sekr FT5 Einsteinufer 5 0587 Berlin Germany Email: {hbkim,
More informationCombined Rate and Power Adaptation in DS/CDMA Communications over Nakagami Fading Channels
162 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 48, NO. 1, JANUARY 2000 Combined Rate Power Adaptation in DS/CDMA Communications over Nakagami Fading Channels Sang Wu Kim, Senior Member, IEEE, Ye Hoon Lee,
More informationModule 3: Physical Layer
Module 3: Physical Layer Dr. Associate Professor of Computer Science Jackson State University Jackson, MS 39217 Phone: 601-979-3661 E-mail: natarajan.meghanathan@jsums.edu 1 Topics 3.1 Signal Levels: Baud
More informationPower Management in Energy Harvesting Sensor Networks
Power Management in Energy Harvesting Sensor Networks Aman Kansal, Jason Hsu, Sadaf Zahedi and Mani B Srivastava Power management is an important concern in sensor networks, because a tethered energy infrastructure
More informationDesign & Performance Study of a Flexible
Design & Performance Study of a Flexible Trac Shaper for High Speed Networks S. Radhakrishnan S. V. Raghavan, Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India
More informationCellular systems 02/10/06
Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from
More informationQuality-of-Service Provisioning for Multi-Service TDMA Mesh Networks
Quality-of-Service Provisioning for Multi-Service TDMA Mesh Networks Petar Djukic and Shahrokh Valaee 1 The Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto
More informationEffect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm
Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco QUINTYNE Department of Computer Science, Physics and Mathematics, University of the West Indies Cave Hill,
More informationOptimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic
Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic Mohammad Katoozian, Keivan Navaie Electrical and Computer Engineering Department Tarbiat Modares University, Tehran,
More informationScheduling on Overlapping Bonded Channels
Scheduling on Overlapping Bonded Channels Fair queuing strategies for single channels Assumptions: Each flow has its own queue from which packets are scheduled. Each queue has a limited capacity. Packets
More informationMobile Terminal Energy Management for Sustainable Multi-homing Video Transmission
1 Mobile Terminal Energy Management for Sustainable Multi-homing Video Transmission Muhammad Ismail, Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, an energy management sub-system
More informationIJPSS Volume 2, Issue 9 ISSN:
INVESTIGATION OF HANDOVER IN WCDMA Kuldeep Sharma* Gagandeep** Virender Mehla** _ ABSTRACT Third generation wireless system is based on the WCDMA access technique. In this technique, all users share the
More informationAnalysis and Improvements of Linear Multi-user user MIMO Precoding Techniques
1 Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques Bin Song and Martin Haardt Outline 2 Multi-user user MIMO System (main topic in phase I and phase II) critical problem Downlink
More informationEffective prediction of dynamic bandwidth for exchange of Variable bit rate Video Traffic
Effective prediction of dynamic bandwidth for exchange of Variable bit rate Video Traffic Mrs. Ch.Devi 1, Mr. N.Mahendra 2 1,2 Assistant Professor,Dept.of CSE WISTM, Pendurthy, Visakhapatnam,A.P (India)
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationPerformance Evaluation of Bit Division Multiplexing combined with Non-Uniform QAM
Performance Evaluation of Bit Division Multiplexing combined with Non-Uniform QAM Hugo Méric Inria Chile - NIC Chile Research Labs Santiago, Chile Email: hugo.meric@inria.cl José Miguel Piquer NIC Chile
More informationBandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation
Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Xiliang Liu Joint work with Kaliappa Ravindran and Dmitri Loguinov Department of Computer Science City University of New
More informationBASIC CONCEPTS OF HSPA
284 23-3087 Uen Rev A BASIC CONCEPTS OF HSPA February 2007 White Paper HSPA is a vital part of WCDMA evolution and provides improved end-user experience as well as cost-efficient mobile/wireless broadband.
More informationBandwidth utilization is the wise use of available bandwidth to achieve specific goals.
Note Bandwidth Utilization: Multiplexing and Spreading Bandwidth utilization is the wise use of available bandwidth to achieve specific goals. Efficiency can be achieved by multiplexing; i.e., sharing
More informationMulti-user Space Time Scheduling for Wireless Systems with Multiple Antenna
Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Vincent Lau Associate Prof., University of Hong Kong Senior Manager, ASTRI Agenda Bacground Lin Level vs System Level Performance
More informationFramework for Performance Analysis of Channel-aware Wireless Schedulers
Framework for Performance Analysis of Channel-aware Wireless Schedulers Raphael Rom and Hwee Pink Tan Department of Electrical Engineering Technion, Israel Institute of Technology Technion City, Haifa
More informationUE Counting Mechanism for MBMS Considering PtM Macro Diversity Combining Support in UMTS Networks
IEEE Ninth International Symposium on Spread Spectrum Techniques and Applications UE Counting Mechanism for MBMS Considering PtM Macro Diversity Combining Support in UMTS Networks Armando Soares 1, Américo
More informationOPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS
9th European Signal Processing Conference (EUSIPCO 0) Barcelona, Spain, August 9 - September, 0 OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS Sachin Shetty, Kodzo Agbedanu,
More informationAn ATM Traffic Shaper for Delay-Sensitive and Delay-Insensitive VBR Serv:ices*
An ATM Traffic Shaper for Delay-Sensitive and Delay-nsensitive VBR Serv:ices* Mingfu Li Dept. of Electrical Engineering, Rm. 554 National Taiwan University, Taipei, Taiwan, R.O.C. mf @eagle. ee.nt u.edu,
More informationA Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information
A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu
More informationODMA Opportunity Driven Multiple Access
ODMA Opportunity Driven Multiple Access by Keith Mayes & James Larsen Opportunity Driven Multiple Access is a mechanism for maximizing the potential for effective communication. This is achieved by distributing
More informationIMPROVEMENT OF CALL BLOCKING PROBABILITY IN UMTS
International Journal of Latest Research in Science and Technology Vol.1,Issue 3 :Page No.299-303,September-October (2012) http://www.mnkjournals.com/ijlrst.htm ISSN (Online):2278-5299 IMPROVEMENT OF CALL
More informationNew Cross-layer QoS-based Scheduling Algorithm in LTE System
New Cross-layer QoS-based Scheduling Algorithm in LTE System MOHAMED A. ABD EL- MOHAMED S. EL- MOHSEN M. TATAWY GAWAD MAHALLAWY Network Planning Dep. Network Planning Dep. Comm. & Electronics Dep. National
More informationTELECOMMUNICATION SYSTEMS
TELECOMMUNICATION SYSTEMS By Syed Bakhtawar Shah Abid Lecturer in Computer Science 1 MULTIPLEXING An efficient system maximizes the utilization of all resources. Bandwidth is one of the most precious resources
More informationTSIN01 Information Networks Lecture 9
TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information
More informationOffice: Room 517 (Bechtel) Office Hours: MWF 10 : :00 and by appointment (send ) Extension: 3538
American University of Beirut Department of Electrical and Computer Engineering EECE 450 Computer Networks Spring 2004 Course Syllabus Catalog Description Data communications. Network architectures. Error
More informationOFDM Pilot Optimization for the Communication and Localization Trade Off
SPCOMNAV Communications and Navigation OFDM Pilot Optimization for the Communication and Localization Trade Off A. Lee Swindlehurst Dept. of Electrical Engineering and Computer Science The Henry Samueli
More informationPerformance Analysis of Transmissions Opportunity Limit in e WLANs
Performance Analysis of Transmissions Opportunity Limit in 82.11e WLANs Fei Peng and Matei Ripeanu Electrical & Computer Engineering, University of British Columbia Vancouver, BC V6T 1Z4, canada {feip,
More informationPacketizing Voice for Mobile Radio
Packetizing Voice for Mobile Radio M. R. Karim, Senior Member, IEEE Present cellular systems use conventional analog fm techniques to transmit speech.' A major source of impairment in cellular systems
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION CCITT E.713 THE INTERNATIONAL TELEGRAPH AND TELEPHONE CONSULTATIVE COMMITTEE (11/1988) SERIES E: OVERALL NETWORK OPERATION, TELEPHONE SERVICE, SERVICE OPERATION AND
More informationComputing Call-Blocking Probabilities in LEO Satellite Networks: The Single-Orbit Case
332 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 51, NO. 2, MARCH 2002 Computing Call-Blocking Probabilities in LEO Satellite Networks: The Single-Orbit Case Abdul Halim Zaim, George N. Rouskas, Senior
More informationColor of Interference and Joint Encoding and Medium Access in Large Wireless Networks
Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Nithin Sugavanam, C. Emre Koksal, Atilla Eryilmaz Department of Electrical and Computer Engineering The Ohio State
More informationPerformance Evaluation of Public Access Mobile Radio (PAMR) Systems with Priority Calls
Performance Evaluation of Public Access obile Radio (PAR) Systems with Priority Calls Francisco Barceló, Josep Paradells ept. de atemàtica Aplicada i Telemàtica (Unicersitat Politècnica de Catalunya) c/
More informationDownlink Erlang Capacity of Cellular OFDMA
Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,
More informationAACHENER BEITRAGE ZUR INFORMATIK
AACHENER BEITRAGE ZUR INFORMATIK Herausgeber der Reihe: Prof. Dr. rer. nat. Klaus Indermark, Lehrstuhl fur Informatik II Prof. Dr.-Ing. Manfred NagI, Lehrstuhl fur Informatik III Prof. Dr. rer. nat. Otto
More information) #(2/./53 $!4! 42!.3-)33)/.!4! $!4! 3)'.!,,).' 2!4% ()'(%2 4(!. KBITS 53).' K(Z '2/50 "!.$ #)2#5)43
INTERNATIONAL TELECOMMUNICATION UNION )454 6 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU $!4! #/--5.)#!4)/. /6%2 4(% 4%,%(/.%.%47/2+ 39.#(2/./53 $!4! 42!.3-)33)/.!4! $!4! 3)'.!,,).' 2!4% ()'(%2 4(!.
More informationPROBABILITY DISTRIBUTION OF THE INTER-ARRIVAL TIME TO CELLULAR TELEPHONY CHANNELS
PROBABILITY DISTRIBUTION OF THE INTER-ARRIVAL TIME TO CELLULAR TELEPHONY CHANNELS Francisco Barceló, José Ignacio Sánchez Dept. de Matemática Aplicada y Telemática, Universidad Politécnica de Cataluña
More informationTR V1.1.1 ( )
Technical Report 2-wire analogue voice band interfaces; Terminal Equipment transmitting voice signals; Test simulation for level limitation requirements 2 Reference DTR/ATA-005080 (an000ics.pdf) Keywords
More informationMobile Network Evolution Part 1. GSM and UMTS
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
More informationPerformance Analysis of Finite Population Cellular System Using Channel Sub-rating Policy
Universal Journal of Communications and Network 2): 74-8, 23 DOI:.389/ucn.23.27 http://www.hrpub.org Performance Analysis of Finite Cellular System Using Channel Sub-rating Policy P. K. Swain, V. Goswami
More informationA Polling Based Approach For Delay Analysis of WiMAX/IEEE Systems
A Polling Based Approach For Delay Analysis of WiMAX/IEEE 802.16 Systems Archana B T 1, Bindu V 2 1 M Tech Signal Processing, Department of Electronics and Communication, Sree Chitra Thirunal College of
More informationMultiplexing Concepts and Introduction to BISDN. Professor Richard Harris
Multiplexing Concepts and Introduction to BISDN Professor Richard Harris Objectives Define what is meant by multiplexing and demultiplexing Identify the main types of multiplexing Space Division Time Division
More informationObjectives, characteristics and functional requirements of wide-area sensor and/or actuator network (WASN) systems
Recommendation ITU-R M.2002 (03/2012) Objectives, characteristics and functional requirements of wide-area sensor and/or actuator network (WASN) systems M Series Mobile, radiodetermination, amateur and
More informationFIBER OPTICS. Prof. R.K. Shevgaonkar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture: 22.
FIBER OPTICS Prof. R.K. Shevgaonkar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture: 22 Optical Receivers Fiber Optics, Prof. R.K. Shevgaonkar, Dept. of Electrical Engineering,
More informationIEEE C802.16maint-07/033
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Some Clarifications on CIDs and SFIDs and Suggested Modifications 2007-04-17 Source(s) Dr.T.R.Padmanabhan
More informationChapter 8 Traffic Channel Allocation
Chapter 8 Traffic Channel Allocation Prof. Chih-Cheng Tseng tsengcc@niu.edu.tw http://wcnlab.niu.edu.tw EE of NIU Chih-Cheng Tseng 1 Introduction What is channel allocation? It covers how a BS should assign
More informationKing Fahd University of Petroleum & Minerals Computer Engineering Dept
King Fahd University of Petroleum & Minerals Computer Engineering Dept COE 342 Data and Computer Communications Term 021 Dr. Ashraf S. Hasan Mahmoud Rm 22-144 Ext. 1724 Email: ashraf@ccse.kfupm.edu.sa
More informationRECOMMENDATION ITU-R SM Frequency channel occupancy measurements
Rec. ITU-R SM.1536 1 RECOMMENDATION ITU-R SM.1536 Frequency channel occupancy measurements (2001) The ITU Radiocommunication Assembly, considering a) that some administrations assign the same frequency
More informationLecture 21: Links and Signaling
Lecture 21: Links and Signaling CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wed 3/15 Lecture 21 Overview Quality of Service Signaling Channel characteristics Types of physical media Modulation
More informationAbstract. Marío A. Bedoya-Martinez. He joined Fujitsu Europe Telecom R&D Centre (UK), where he has been working on R&D of Second-and
Abstract The adaptive antenna array is one of the advanced techniques which could be implemented in the IMT-2 mobile telecommunications systems to achieve high system capacity. In this paper, an integrated
More informationLecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday
Lecture 7: Centralized MAC protocols Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday Centralized MAC protocols Previous lecture contention based MAC protocols, users decide who transmits when in a decentralized
More informationSelf-Management for Unified Heterogeneous Radio Access Networks. Symposium on Wireless Communication Systems. Brussels, Belgium August 25, 2015
Self-Management for Unified Heterogeneous Radio Access Networks Twelfth ISWCS International 2015 Symposium on Wireless Communication Systems Brussels, Belgium August 25, 2015 AAS Evolution: SON solutions
More informationThe Last Mile Problem
The Last Mile Problem LAN, MAN, WAN how to connect private users at home to such networks? Problem of the last mile: somehow connect private homes to the public Internet without laying many new cables
More informationCapacity of Packetized Voice Services over Time-Shared Wireless Packet Data Channels
of Packetized Voice Services over Time-Shared Wireless Packet Data Channels Patrick Hosein Ericsson Inc. 512 Wateridge Vista Dr., San Diego, CA 92121. Email: patrick.hosein@ericsson.com Abstract In traditional
More informationTechnical Aspects of LTE Part I: OFDM
Technical Aspects of LTE Part I: OFDM By Mohammad Movahhedian, Ph.D., MIET, MIEEE m.movahhedian@mci.ir ITU regional workshop on Long-Term Evolution 9-11 Dec. 2013 Outline Motivation for LTE LTE Network
More informationCHAPTER 7 ROLE OF ADAPTIVE MULTIRATE ON WCDMA CAPACITY ENHANCEMENT
CHAPTER 7 ROLE OF ADAPTIVE MULTIRATE ON WCDMA CAPACITY ENHANCEMENT 7.1 INTRODUCTION Originally developed to be used in GSM by the Europe Telecommunications Standards Institute (ETSI), the AMR speech codec
More informationA two Layer Guaranteed and Sustained Rate based Scheduler for IEEE based WiMAX Networks
A two Layer Guaranteed and Sustained Rate based Scheduler for IEEE 802.16-2009 based WiMAX Networks Volker Richter, Rico Radeke, and Ralf Lehnert Technische Universität Dresden Dresden, Mommsenstrasse
More informationManaging Capacity for a Real Multi-Service UMTS/HSPA Radio Access Network
Managing Capacity for a Real Multi-Service UMTS/HSPA Radio Access Network Marta de Oliveira Veríssimo marta.verissimo@tecnico.ulisboa.pt Instituto Superior Técnico, Lisboa, Portugal November 1 Abstract
More informationUNIT 6 ANALOG COMMUNICATION & MULTIPLEXING YOGESH TIWARI EC DEPT,CHARUSAT
UNIT 6 ANALOG COMMUNICATION & MULTIPLEXING YOGESH TIWARI EC DEPT,CHARUSAT Syllabus Multiplexing, Frequency-Division Multiplexing Time-Division Multiplexing Space-Division Multiplexing Combined Modulation
More informationCapacity Enhancement in Wireless Networks using Directional Antennas
Capacity Enhancement in Wireless Networks using Directional Antennas Sedat Atmaca, Celal Ceken, and Ismail Erturk Abstract One of the biggest drawbacks of the wireless environment is the limited bandwidth.
More informationDistributed Power Control in Cellular and Wireless Networks - A Comparative Study
Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular
More informationTHE DESIRE to provide different quality-of-service (QoS) Effective Bandwidths with Priorities
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 6, NO. 4, AUGUST 1998 447 Effective Bandwidths with Priorities Arthur W. Berger, Senior Member, IEEE, and Ward Whitt, Associate Member, IEEE Abstract The notion
More informationOPTIMIZING APPLICATIONS AND DATA LINKS FOR HF RADIO INTERMEDIATE TERM VARIATION: CAN YOU RIDE THE WAVE?
OPTIMIZING APPLICATIONS AND DATA LINKS FOR HF RADIO INTERMEDIATE TERM VARIATION: CAN YOU RIDE THE WAVE? Steve Kille Isode Ltd Hampton, UK steve.kille@isode.com SUMMARY HF Radio transmission is subject
More informationA Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information
A Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information Jun Zhou Department of Computer Science Florida State University Tallahassee, FL 326 zhou@cs.fsu.edu Xin Yuan
More informationRECOMMENDATION ITU-R M.1391 METHODOLOGY FOR THE CALCULATION OF IMT-2000 SATELLITE SPECTRUM REQUIREMENTS
Rec. ITU-R M.1391 1 RECOMMENDATION ITU-R M.1391 METHODOLOGY FOR THE CALCULATION OF IMT-2000 SATELLITE SPECTRUM REQUIREMENTS Rec. ITU-R M.1391 (1999 1 Introduction International Mobile Telecommunications
More informationS Simulation program SEAMCAT
S-72.333 Post Graduate Course in Radiocommunications Spring 2001 Simulation program SEAMCAT (The Spectrum Engineering Advanced Monte Carlo Analysis Tool) Pekka Ollikainen pekka.ollikainen@thk.fi Page 1
More informationPolitecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. E2 Multiplexing
Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione E2 Multiplexing Exercise 1 A TDM multiplexing system has a frame with 10 slots and in each slots 128 bits area transmitted. The
More informationDIGITAL Radio Mondiale (DRM) is a new
Synchronization Strategy for a PC-based DRM Receiver Volker Fischer and Alexander Kurpiers Institute for Communication Technology Darmstadt University of Technology Germany v.fischer, a.kurpiers @nt.tu-darmstadt.de
More information