On Mean Rate Policing with a Bursty Traffic Specification & Allocation (BTSA) Policer Function

Size: px
Start display at page:

Download "On Mean Rate Policing with a Bursty Traffic Specification & Allocation (BTSA) Policer Function"

Transcription

1 On Mean Rate Policing with a Bursty Traffic Specification & Allocation (BTSA) Policer Function Tariq M. Jadoon & David A. Harle Communications Division, Department of Electronic & Electrical Engineering, University of Strathclyde, Glasgow G1 1XW, UK. Tel: Ext. 08 Fax: tjadoon@comms.eee.strath.ac.uk D.A.Harle@comms.eee.strath.ac.uk ABSTRACT This paper evaluates the performance of a Bursty Traffic Specification & Allocation (BTSA) policer function as a mean rate policer for packet voice, still picture video services and on-off sources with arbitrary distributions of the off periods. Scenarios considered include varying the mean burst duration, mean silence period, etc. over nominal values based on a MMDP model of packet voice and still picture video services. For on-off traffic models with arbitrary distributions the squared co-efficient of variation of the off periods is varied such that the mean rate remains constant but the squared coefficient of inter arrival times of cells varies. The study investigates the effectiveness of the BTSA policer for mean rate policing. The work discusses and compares the results produced in previous studies using analytical and simulation techniques. Introduction The Asynchronous Transfer Mode (ATM) offers a flexible solution to the diverse requirements of an Integrated Broadband Network (IBN). It is envisaged that services with a broad range of traffic characteristics will be statistical multiplexed onto a common resource. It is hoped that the statistical multiplexing the traffic cell streams will make it possible to dynamically allocate bandwidth on demand. Resource Allocation to guarantee the negotiated Quality of Service (QoS) will be based on the traffic contract between the user and the network. The traffic contract takes place during the connection establishment phase. The traffic contract, as specified in ITU-T Recommendation I.371 [1], consists of the connection traffic descriptor, the requested QoS class and the definition of a compliant connection. Usage parameter control (UPC) or policing functions will ensure that the network users conform to their traffic contract, i.e., the parameters defined for that connection at call set-up. This ensures that the unintentional or malicious behaviour of some users will not result in a performance degradation for other users. An ATM cell stream generated by a customer will be subjected to UPC functions at the ATM User Network Interface (UNI) before it is allowed to enter the public ATM network and at Network Network Interfaces (NNIs) between networks by the network providers. Policing may also take place at the customer premises access network if the implications of breaking the traffic contract are severe. This implies that the tariff structure will play a major role in shaping ATM customer cell streams. It has been shown that the effective bandwidth of a source just depends on the customer's expected mean rate []. Thus, policing the expected mean rate, although believed by some to be impractical, would result in a more efficient utilisation of network resources provided that the customers adhere to their expected mean rates for the duration of the call. 3/1

2 Basic Requirements for Policer Mechanism The UPC function will extract essential information from the cell header, i.e. the connection identifier (VPI/VCI number) and the cell loss indicator (CLP bit). With this information, it will test the validity of the cell and take a decision about its fate. Ideally, the policing mechanism should be transparent for those connections that respect their traffic contract. On the other hand, it should rapidly detect any violating traffic and act by discarding/tagging cells or in extreme cases dropping the connection altogether. This intelligent function which separates conforming functions from non-conforming cells is called the police criterion calculator (PCC) [3]. Numerous mechanisms (criteria) have been proposed. They most commonly involve [4]: window method, which limits the number of cells in a time window a leaky bucket method, which increments a counter for the arrival of each cell and periodically decrements this counter. The optimum dimensioning and effectiveness of a policing mechanism depends heavily on the source traffic characteristics and its QoS requirements. There are two fundamentally opposite approaches for specifying traffic parameters. One approach is a statistical approach based on the stochastic traffic parameters and the other is an operational approach defined by means of a rule [5]. Deterministic rule based traffic descriptors offer advantages over statistical based traffic descriptors. In the main, it is difficult to estimate the statistics of real time traffic a priori without monitoring the traffic over long periods of time in order to detect, with some confidence, whether the negotiated parameters of the traffic contract have been respected. There are two fundamental problems, which give rise to a certain probability of incorrect policing decisions, with respect to mean rate policing, which have been discussed in previous literature [6-8]. The characteristics of the source must be estimated on the basis of a relatively short sample. A large sampling time increases the reaction time of the policing mechanisms. Inaccuracies and uncertainties in the knowledge about relevant parameters, in the establishment phase of the call, cause the margins between the policed bit-rate and the actual bit rate to increase. This results in a loss of effectiveness of the policing mechanism. The mean bit rate can be abstracted from historical information or measurement. When policing a single VC, it is possible at call set up for the user to declare the type of service that they require. With this information the network dimensions its policing mechanisms according to a set of default nominal parameters that have been established through modelling and/or measurement for that particular type of service. If the source deviates from these nominal parameters, the policing mechanism comes into action by marking or dropping cells. ATM Connection Descriptors According to the ATM-Forum User Network Interface Specification [10], an ATM connection can be described by four parameters: the peak cell rate (PCR), the cell delay variation (CDV) tolerance, the sustainable cell rate (SCR) and the maximum burst size (MBS). A reference constant bit rate stream (CBR) may experience CDV due to actions of the ATM layer such as cell multiplexing, physical layer overheads, insertion of operation and maintenance (OAM) cells, etc. As a result, policing mechanisms may observe some cells arriving at a higher bit rate than the declared PCR. This necessitates the consideration of a CDV tolerance for the policer. A variable bit rate (VBR) connection will be characterised by both a PCR and a SCR. VBR traffic is bursty in nature, i.e. the PCR is different from the mean cell rate. This means that a source may transmit at the PCR for a while and then transmit at a lower rate or not transmit at all for a while. The maximum size of the burst at the PCR is the MBS. 3/

3 Traffic Source Models Packet Voice & Still Picture Video Services A two-phase burst/silence model shown in Fig. 1 has been used for evaluating the effectiveness of the BTSA policing function as a mean rate policer. This model has been used in earlier publications [7-9] for packetised voice and still picture video services. The cell arrival process can be characterised as Markov Modulated Deterministic Process (MMDP). During the burst phase, the source emits cells at a constant cell emission rate b, i.e. the PCR, for a negative exponential distribution of time with mean h. The burst is then followed by a negative exponential distributed silence period with mean k. The traffic sources can be characterised by the following set of parameters: peak (burst) cell emission rate [b] mean burst duration [h] mean silence duration [k] mean cycle duration [c = h+k] Table 1 mean source burstiness [X = (h+k)/h] mean source cell rate [ m = b.h/(h+k)] mean burst length in cells [t = b.h] Traffic Parameters MMDP h k Parameter Packet Voice Still Picture b 83 cells/sec 508 cells/sec h 35 ms 500 ms burst silence k 650 ms ms m 9 cells/sec 604 cells/sec Fig. 1: Two-phase Burst Silence Source Model X.85 3 Table Table summarises the traffic source characteristics for packet voice and still picture video services. On-Off Traffic Models with Arbitrary Distributions It has been suggested that future ATM traffic will be better characterised by two alternating on and off periods [11]. Initial results [1] from high performance computing networks like the VISTAnet Gigabit Network indicate that the active period has a constant distribution while the silence period may be characterised by a uniform, geometric or hyper-geometric distribution. Following a similar analysis to that described in [11], consider an on-off traffic model with a constant on period and a uniform off period. The model can be characterised by the following parameters: burst length (h M ) slots minimum off time (k m ) slots ( km km + 1) 1 maximum off time (k M ) slots var (off) = 1 k mean off time k = M + k m ( k 1 1 slots cs M km + ) = 3( km + km) Table 3 Traffic Parameters 3/3

4 In Table, var(off) is the variance of the off times and (c s ) is the squared co-efficient of variation of the off times i.e., variance/mean. The mean cell rate (m) in cells/slot is given by hm m = hm + k A surprising result from [11] shows that the squared co-efficient of variation of the inter arrival times of cells, which is a good measure of the burstiness depends on only the first two moments and not on the shape of the independent renewal distributions of the on-off times. The BTSA Policer The bursty traffic specification and allocation (BTSA) approach simply consists of a two stage continuous state leaky bucket policer [13]. The leaky buckets of the BTSA policer are in cascade (Fig. ). The user specifies the PCR, the expected average or SCR and a MBS. The network uses these parameters to set up a two stage policer. In the first stage, the peak rate monitor tests any violations to the PCR. In the second stage, a leaky bucket with a leaky rate equal to the SCR and the capacity of the bucket associated with the MBS polices the mean bit rate and maximum burst size. (1) ATM cells N = Bucket size a = Leaky rate Fig. : N1 a1 N a Peak rate monitor Mean rate monitor BTSA Policer Mechanism The Leaky Bucket Mechanism The virtual scheduling algorithm and the continuous state leaky bucket are two equivalent versions of a parameterised conformance testing algorithm which have been proposed in ITU-T Recommendation I.371 [1] to cope with cell delay variation (CDV). The continuous state leaky bucket consists of a counter which is incremented by arriving cells and decrements periodically as long as the value of the counter is positive. If the instantaneous cell arrival rate is greater than the decrementation rate, the counter value starts to increase until a pre-defined upper limit. Suitable action (e.g. discarding or marking) is taken on any subsequent cells until the counter has fallen below its limit. The increase in the value of the counter is analogous to a bucket filling up and an upper limit for the counter to the capacity of the bucket which results in spill over when overfilled. Dimensioning the Buckets The Peak Rate Monitor Previous works [6,14-15] have analysed the CDV caused by various topologies in the access network (e.g. FIFO multiplexors, buses, etc.) and have given some typical values that could be used as defaults for the bucket depths required to achieve a given target cell loss probability within a CDV tolerance. Their results suggest that CDV mainly depends on the load on the access multiplexor. The analysis in [6] consists of a single reference Constant Bit Source (CBR) connected to a simple First-In-First-Out (FIFO) queue offered various streams of traffic. This is motivated by the use of simple multiplexors and the fact that a switch can be modelled as a transparent cross connect with output buffers. The results indicate the worst case CDV, i.e. the CDV when the multiplexor is running at full load and the background traffic is Poissonian. The analysis uses the Kingman bound [16] for the tail behaviour of GI/G/1 queues in heavy traffic which can be applied to GI/D/1 queue to calculate the bucket size for a given target cell loss probability. This 3/4

5 effectively means that if the bucket depths are set using a fixed leaky rate, with a given cell loss target, the source can be policed and, thus, guarantee that the losses will not be more than the cell loss target. If we set the leaky rate a to 95% efficiency, theoretically it would be possible for a stream with a constant cell rate of 5% higher than the peak cell rate to pass through the policer unchecked. Due to the clumping and dispersion of cells caused by the multiplexing devices and other network functions we have to account for CDV. Thus setting a = b/0.95, we get a CDV tolerance of 0.6 ms, and bucket depths of and 4 for the packet voice and still picture services respectively and using the analysis from [6] a target cell loss probability of Working at higher efficiencies, e.g. 99% would not be fruitful as the CDV tolerance would go to an unacceptably high values. Mean Rate Monitor In [8] we see that, for a given set of nominal source parameters, to obtain an acceptable less loss probability at nominal conditions, the size of the LB threshold counter is very high. For the case of Packet Voice it is 98.5 t o or 881 cells at a leaky rate of a = 1.09m o. Similarly for Still Picture, we have 3.01t o or cells at a leaky rate of a = 1.1m o. Clearly these values for the threshold counter are very high and would result in a very slow reacting policing mechanism. One option is to increase the leaky rate of the mean rate policer and reduce the value of the threshold counter, such that we still have a target cell loss probability of less than 10-6 for the nominal parameters. RESULTS Packet Voice & Still Picture Video Services The effectiveness of the BTSA policer can be evaluated by varying the source traffic parameters over the nominal source parameters. Ideally the cell loss probability should be close to 10-8 for the nominal parameters and be the exact fraction of violating cells for peak and mean bit rates greater than the nominal values. There are two scenarios for which the tests were performed for packet voice and still picture video services. The mean burst duration h, of the source, is varied over the nominal burst duration h o, such that the burst cell rate b o remains constant. This is effectively an increase in the mean cell rate m over the nominal mean cell rate m o. The mean silence duration k, of the source, is varied over the nominal silence duration k o, such that the burst cell rate b o remains constant. This is also, in effect, an increase in the mean cell rate m over the nominal mean cell rate m o. Simulation results for the case of a threshold counter equal to 0 t o and a leak rate a = 1.m o are given for packet voice and still picture services in Fig. 3 and Fig. 4 respectively From the results shown in Fig. 3 and Fig. 4, it can be seen that for a BTSA policer function, the cell loss probability is 10-7 for nominal parameters and increases dramatically for changes in the aforementioned parameters over the nominal values. This demonstrates the ability of a BTSA policer to perform mean bit rate policing effected by changes in the mean burst h and silence duration k, while the burst cell rate remains within the peak policed cell rate. Thus, by dimensioning the two stages of the BTSA policer, such that the peak rate monitor has a fast reacting leaky bucket with a small bucket size and a leaky rate close to the peak cell rate and the mean rate monitor has a large bucket size and a leaky rate slightly higher than but close to the mean cell rate, we can satisfactorily achieve peak and mean rate policing for packet voice and still picture video services. 3/5

6 Fig. 3: BTSA Performance characteristics (CLP Vs. m) for Packet Voice service. Fig. 4 BTSA Performance characteristics (CLP Vs. m) for Still Picture service. 3/6

7 On-Off Traffic Models with Arbitrary Distributions Consider a BTSA policer with its leaky buckets dimensioned such that the maximum burst size that can pass through the policer at the peak cell rate is (h M ). For no cell loss to occur, k m k bound, where k bound is the time required (expressed in slots) to empty the mean rate monitor after the completion of a burst. k bound = h M ( 1 a), () a (recall that a is the leaky rate of the mean rate monitor of the BTSA policer). Defining x as the width of the uniformly distributed off period, i.e. x = k M - k m. The cell loss probability (CLP) can be expressed as: max 0, k k max 0, k k x bound + bound m CLP = or x x Assuming a constant on period of 40 slots and a uniform off period with a mean equal to 100 slots. Fig. 5 shows the CLP expressed as a function of the width x, for leaky rates a, ranging from 1.05m to 1.3m. From Fig. 5, it can be observed that there is great variation in the CLP as the variance of the off periods changes. Thus, cell streams having the same burstiness as defined by the peak/mean cell rate but different widths of the off period would require different leaky rates in the mean rate monitor to achieve no cell loss for nominal parameters. The SCR dimensions a. For cell streams with a low to moderate x/k, the SCR is comparable with the mean cell rate m. (3) 0.5 CLP Vs x for a = (1.05m -1.3m) 0.4 m1 05 ( x) m1 1 ( x) 0.3 CLP m1 ( x) m1 3 ( x) x width (x) Fig. 5: Cell loss probability Vs width x for h M = 40 slots, k =100 slots These results can be extended to on-off traffic with off period distributions which are symmetrical about their mean. The CLP would be given by probability that the off period is less than k bound. The BTSA policer can detect changes in the mean rate when variations in the traffic stream cause k m to reduce below k bound. Thus, it can effectively police the mean rate if the variance or squared co-efficient of variation of the off period does not significantly change during the course of the connection. However, it would be 3/7

8 ineffective in detecting an increase in the mean cell rate if the mean off period and the width x decreased simultaneously such that condition for no cell loss, i.e., k m k bound, is not violated. For geometrically distributed off periods with a mean off time k slots. The probability that an off period is N slots in duration is P[k = N] = pq N-1, where p = 1/k, q = 1-p and N = 1,,3,... Once again, if k bound is defined as the time required expressed in slots to empty the mean rate monitor after the completion of a burst. The probability of cell loss can be evaluated as: kbound p q n= 1 Summing the simple geometric series (4), results in: n 1 (4) CLP = 1 q kbound (5) For example consider a constant on period of 40 slots and a uniform off period with a mean equal to 100 slots. The CLP from (5) would be 0.51 for a= 1.3m and 0.01 for a = 3.33m. Thus, if the BTSA policer's monitors are dimensioned such that the maximum burst size that can pass through the policer at the peak cell rate is MBS, and the mean rate monitor has a leaky rate equal to the SCR, which is set slightly greater than the mean cell rate of the source. The CLP, for constant on periods and geometrically distributed off periods, is unacceptably high. In this case, it is not possible to reduce the CLP to below 10-7 for nominal parameters by increasing the SCR. For nominal parameters, the CLP could be reduced by increasing the virtual bucket size of the mean rate monitor, but doing so would result in the possibility of bursts longer than what have been contracted, entering the network unchecked. This renders the BTSA policer incapable of handling traffic with constant on periods and geometrically distributed off periods. CONCLUSIONS The effectiveness of a BTSA policer has been evaluated for packet voice, still picture video and on-off traffic with constant on periods and uniform or geometrically distributed off periods. It has been observed that by dimensioning the two stages of the BTSA policer such that: the peak rate monitor has a small bucket depth and its leaky rate set slightly higher than the peak cell rate to account for CDV, the mean rate monitor has a large bucket size with a leaky rate set slightly higher than but close to the mean cell rate, We can satisfactorily achieve peak and mean rate policing for packet voice, still picture video services and on-off traffic with constant on periods and uniformly distributed off periods provided that the variance of the off periods does not significantly change during the duration of the call. However, for on-off traffic with constant on periods and geometrically distributed off periods the BTSA policer cannot be simultaneously dimensioned to police a MBS and a mean cell rate. REFERENCES [1] ITU-T: Recommendation I.371. 'Traffic Control and Congestion Control in B-ISDN', Geneva [] F.P. Kelly, "Tariffs, Policing and Admission Control for Multiservice Networks", 10th UK Teletraffic Symposium, [3] Kees van der Wal et. al., "Implementation of a Police Criterion Calculator based on the Leaky Bucket Algorithm", IEEE GLOBECOM'93, pp /8

9 [4] L. G. Cuthbert & J. C. Sapanel, "ATM The Broadband Telecommunications Solution", IEE' 93, ISBN [5] Martin de Prycker, "Asynchronous Transfer Mode solution for B-ISDN", Ellis Horwood Limited' 93, ISBN [6] Peter Key, 'An Introduction to ATM Performance Issues and Modelling', Tutorial, IFIP Workshop TC6, nd Workshop on Performance Modelling & Evaluation of ATM Networks, July 1994, University of Bradford, UK. [7] E. P. Rathgeb, "Modelling and Performance Comparison of Policing Mechanisms for ATM Networks", IEEE Journal on Selected Areas in Communications, Vol. 9, No 3, April 1991; pp [8] M. Butto, E. Caverolla & A. Tonietti, "Effectiveness of the Leaky Bucket Policing Mechanism in ATM Networks", IEEE Journal on Selected Areas in Communications, Vol. 9, No 3, April 1991; pp [9] T.M. Jadoon & D.A. Harle, "Performance Comparison of a Peak Bit Rate & Burst Traffic Specification & Allocation Policer Functions", Singapore ICCS'94, Vol.., pp [10] ATM Forum, 'ATM UNI Specification (Ver. 3.0)', [11] Sebastian Galmes, Harry G. Perros & Ramon Puigjaner, "Analysis of Burstiness for On-Off Traffic Models with Arbitrary Distributions", IFIP Workshop TC6, nd Workshop on Performance Modelling & Evaluation of ATM Networks, July 1994, University of Bradford, UK. [1] D.S. Holtsinger, Harry G. Perros & Arne A. Nilsson, "Analysis of Traffic Measurements in the VISTAnet Gigabit Networking Testbed", Technical Report, TR-93/11, Department of Computer Science, North Carolina State University, [13] J. S. Turner, "Managing Bandwidth in ATM Networks with Bursty Traffic", IEEE Network, September 199, pp [14] A. Skliros, "Dimensioning the CDV tolerance parameter (τ) for ATM Multiplexers", 10th UK Teletraffic Symposium, [15] A. Atkinson, "Cell Delay Variation Introduced from an ATM Access Multiplexer", 11th UK Teletraffic Symposium, [16] J.F.C. Kingman, "Inequalities in the theory of queues", Journal Royal.Statistical Society Series B, No. 3, pp , /9

Rec. ITU-R S RECOMMENDATION ITU-R S.1424

Rec. ITU-R S RECOMMENDATION ITU-R S.1424 Rec. ITU-R S.1424 1 RECOMMENDATION ITU-R S.1424 AVAILABILITY OBJECTIVES FOR A HYPOTHETICAL REFERENCE DIGITAL PATH WHEN USED FOR THE TRANSMISSION OF B-ISDN ASYNCHRONOUS TRANSFER MODE IN THE FSS BY GEOSTATIONARY

More information

Raj Jain. The Ohio State University

Raj Jain. The Ohio State University VBR Voice over ATM: Analysis of Multiplexing Gain and Effect of Scheduling & Drop Policies Jayaraman Iyer,, Sohail Munir Sudhir Dixit, Nokia Research Center Contact: Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/

More information

EXTENDING THE EFFECTIVE-BANDWIDTH CONCEPT TO NETWORKS WITH PRIORITY CLASSES. Arthur W. Berger 1 and Ward Whitt 2 AT&T Labs.

EXTENDING THE EFFECTIVE-BANDWIDTH CONCEPT TO NETWORKS WITH PRIORITY CLASSES. Arthur W. Berger 1 and Ward Whitt 2 AT&T Labs. EXTENDING THE EFFECTIVE-BANDWIDTH CONCEPT TO NETWORKS WITH PRIORITY CLASSES by Arthur W. Berger 1 and Ward Whitt 2 AT&T Labs March 25, 1998 IEEE Communications Magazine 36 (1998) 78 84 1 Room 1K-211, Holmdel,

More information

Cell Scheduling and Bandwidth Allocation for a Class of VBR Video Connections

Cell Scheduling and Bandwidth Allocation for a Class of VBR Video Connections Cell Scheduling and Bandwidth Allocation for a Class of VBR Video Connections Tao Yang *, Danny H.K. Tsang #, and Susan Y. Li * * Department of Industrial Engineering Technical University of ova Scotia

More information

TELETRAFFIC ISSUES IN HIGH SPEED CIRCUIT SWITCHED DATA SERVICE OVER GSM

TELETRAFFIC ISSUES IN HIGH SPEED CIRCUIT SWITCHED DATA SERVICE OVER GSM TELETRAFFIC ISSUES IN HIGH SPEED CIRCUIT SWITCHED DATA SERVICE OVER GSM Dayong Zhou and Moshe Zukerman Department of Electrical and Electronic Engineering The University of Melbourne, Parkville, Victoria

More information

RESOURCE ALLOCATION IN CELLULAR WIRELESS SYSTEMS

RESOURCE ALLOCATION IN CELLULAR WIRELESS SYSTEMS RESOURCE ALLOCATION IN CELLULAR WIRELESS SYSTEMS Villy B. Iversen and Arne J. Glenstrup Abstract Keywords: In mobile communications an efficient utilisation of the channels is of great importance. In this

More information

DYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS

DYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS DYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS Mark Dale Comtech EF Data Tempe, AZ Abstract Dynamic Bandwidth Allocation is used in many current VSAT networks as a means of efficiently allocating

More information

Outline of the Lecture

Outline of the Lecture CS311: DATA COMMUNICATION Multiplexing by Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Web: http://home.iitj.ac.in/~manaskhatua http://manaskhatua.github.io/

More information

The L*IP Access System

The L*IP Access System *IP Satellite System The *IP Access System Prototype built for ESA, ARTES-5 contract Meshed MF-TDMA, over GEO Optimized for IP QoS DAMA MF-TDMA modem supports up to 4 Msymb/s QPSK, Turbo codec Fade mitigation

More information

Communication Analysis

Communication Analysis Chapter 5 Communication Analysis 5.1 Introduction The previous chapter introduced the concept of late integration, whereby systems are assembled at run-time by instantiating modules in a platform architecture.

More information

Modeling the impact of buffering on

Modeling the impact of buffering on Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput

More information

Multiplexing. Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur

Multiplexing. Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur CS311: DATA COMMUNICATION Multiplexing Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur e-mail: manaskhatua@iitj.ac.in Outline of the Lecture What is Multiplexing and why is it used? Basic

More information

Multiuser Scheduling and Power Sharing for CDMA Packet Data Systems

Multiuser Scheduling and Power Sharing for CDMA Packet Data Systems Multiuser Scheduling and Power Sharing for CDMA Packet Data Systems Sandeep Vangipuram NVIDIA Graphics Pvt. Ltd. No. 10, M.G. Road, Bangalore 560001. sandeep84@gmail.com Srikrishna Bhashyam Department

More information

Introduction to the challenges of current GSM and GPRS planning. Technical Presentation

Introduction to the challenges of current GSM and GPRS planning. Technical Presentation Introduction to the challenges of current GSM and GPRS planning Technical Presentation Prof. Dr. Fred Wagen Senior Consultant Lausanne, Switzerland wagen@wavecall.ch Prof. in telecommunication at the Univ.

More information

Joint DAMA-TCP protocol optimization through multiple cross layer interactions in DVB RCS scenario

Joint DAMA-TCP protocol optimization through multiple cross layer interactions in DVB RCS scenario Joint DAMA-TCP protocol optimization through multiple cross layer interactions in DVB RCS scenario M. Luglio, F. Zampognaro Electronics Engineering Department University of Rome Tor Vergata Rome, Italy

More information

The strictly non-blocking condition for three-stage networks

The strictly non-blocking condition for three-stage networks The strictly non-blocking condition for three-stage networks Martin Collier and Tommy Curran chool of Electronic Engineering, Dublin City University, Ireland Abstract A criterion for a three-stage network

More information

Empirical Probability Based QoS Routing

Empirical Probability Based QoS Routing Empirical Probability Based QoS Routing Xin Yuan Guang Yang Department of Computer Science, Florida State University, Tallahassee, FL 3230 {xyuan,guanyang}@cs.fsu.edu Abstract We study Quality-of-Service

More information

P. 241 Figure 8.1 Multiplexing

P. 241 Figure 8.1 Multiplexing CH 08 : MULTIPLEXING Multiplexing Multiplexing is multiple links on 1 physical line To make efficient use of high-speed telecommunications lines, some form of multiplexing is used It allows several transmission

More information

10 In-service monitoring techniques for cell transfer delay and cell delay variation in ATM networks

10 In-service monitoring techniques for cell transfer delay and cell delay variation in ATM networks 10 In-service monitoring techniques for cell transfer delay and cell delay variation in ATM networks C. Roppel Deutsche Telekom, Forschungs- und Technologiezentrum P. 0. Box 10 00 03, D-64276 Darmstadt,

More information

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,

More information

RESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS

RESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS Abstract of Doctorate Thesis RESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS PhD Coordinator: Prof. Dr. Eng. Radu MUNTEANU Author: Radu MITRAN

More information

Simulation Analysis of the Long Term Evolution

Simulation Analysis of the Long Term Evolution POSTER 2011, PRAGUE MAY 12 1 Simulation Analysis of the Long Term Evolution Ádám KNAPP 1 1 Dept. of Telecommunications, Budapest University of Technology and Economics, BUTE I Building, Magyar tudósok

More information

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon

More information

ABSTRACT. Algorithm for Packet-Switched Network Transmission. (Under the direction

ABSTRACT. Algorithm for Packet-Switched Network Transmission. (Under the direction ABSTRACT BLAKE, STEVEN LANGLEY. Optimized Two-Layer DCT-Based Video Compression Algorithm for Packet-Switched Network Transmission. (Under the direction of Dr. Tony L. Mitchell and Dr. Sarah A. Rajala)

More information

RECOMMENDATION ITU-R S.1420 PERFORMANCE FOR BROADBAND INTEGRATED SERVICES DIGITAL NETWORK ASYNCHRONOUS TRANSFER MODE VIA SATELLITE

RECOMMENDATION ITU-R S.1420 PERFORMANCE FOR BROADBAND INTEGRATED SERVICES DIGITAL NETWORK ASYNCHRONOUS TRANSFER MODE VIA SATELLITE Rec. ITU-R S.1420 1 RECOMMENDATION ITU-R S.1420 PERFORMANCE FOR BROADBAND INTEGRATED SERVICES DIGITAL NETWORK ASYNCHRONOUS TRANSFER MODE VIA SATELLITE (Questions ITU-R 78/4 and ITU-R 75/4) (1999) Rec.

More information

Optimum Rate Allocation for Two-Class Services in CDMA Smart Antenna Systems

Optimum Rate Allocation for Two-Class Services in CDMA Smart Antenna Systems 810 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 5, MAY 2003 Optimum Rate Allocation for Two-Class Services in CDMA Smart Antenna Systems Il-Min Kim, Member, IEEE, Hyung-Myung Kim, Senior Member,

More information

Research Article Implementing Statistical Multiplexing in DVB-H

Research Article Implementing Statistical Multiplexing in DVB-H Hindawi Publishing Corporation International Journal of Digital Multimedia Broadcasting Volume 29, Article ID 261231, 15 pages doi:1.1155/29/261231 Research Article Implementing Statistical Multiplexing

More information

Load Balancing for Centralized Wireless Networks

Load Balancing for Centralized Wireless Networks Load Balancing for Centralized Wireless Networks Hong Bong Kim and Adam Wolisz Telecommunication Networks Group Technische Universität Berlin Sekr FT5 Einsteinufer 5 0587 Berlin Germany Email: {hbkim,

More information

Combined Rate and Power Adaptation in DS/CDMA Communications over Nakagami Fading Channels

Combined Rate and Power Adaptation in DS/CDMA Communications over Nakagami Fading Channels 162 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 48, NO. 1, JANUARY 2000 Combined Rate Power Adaptation in DS/CDMA Communications over Nakagami Fading Channels Sang Wu Kim, Senior Member, IEEE, Ye Hoon Lee,

More information

Module 3: Physical Layer

Module 3: Physical Layer Module 3: Physical Layer Dr. Associate Professor of Computer Science Jackson State University Jackson, MS 39217 Phone: 601-979-3661 E-mail: natarajan.meghanathan@jsums.edu 1 Topics 3.1 Signal Levels: Baud

More information

Power Management in Energy Harvesting Sensor Networks

Power Management in Energy Harvesting Sensor Networks Power Management in Energy Harvesting Sensor Networks Aman Kansal, Jason Hsu, Sadaf Zahedi and Mani B Srivastava Power management is an important concern in sensor networks, because a tethered energy infrastructure

More information

Design & Performance Study of a Flexible

Design & Performance Study of a Flexible Design & Performance Study of a Flexible Trac Shaper for High Speed Networks S. Radhakrishnan S. V. Raghavan, Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India

More information

Cellular systems 02/10/06

Cellular systems 02/10/06 Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from

More information

Quality-of-Service Provisioning for Multi-Service TDMA Mesh Networks

Quality-of-Service Provisioning for Multi-Service TDMA Mesh Networks Quality-of-Service Provisioning for Multi-Service TDMA Mesh Networks Petar Djukic and Shahrokh Valaee 1 The Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto

More information

Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm

Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco QUINTYNE Department of Computer Science, Physics and Mathematics, University of the West Indies Cave Hill,

More information

Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic

Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic Mohammad Katoozian, Keivan Navaie Electrical and Computer Engineering Department Tarbiat Modares University, Tehran,

More information

Scheduling on Overlapping Bonded Channels

Scheduling on Overlapping Bonded Channels Scheduling on Overlapping Bonded Channels Fair queuing strategies for single channels Assumptions: Each flow has its own queue from which packets are scheduled. Each queue has a limited capacity. Packets

More information

Mobile Terminal Energy Management for Sustainable Multi-homing Video Transmission

Mobile Terminal Energy Management for Sustainable Multi-homing Video Transmission 1 Mobile Terminal Energy Management for Sustainable Multi-homing Video Transmission Muhammad Ismail, Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, an energy management sub-system

More information

IJPSS Volume 2, Issue 9 ISSN:

IJPSS Volume 2, Issue 9 ISSN: INVESTIGATION OF HANDOVER IN WCDMA Kuldeep Sharma* Gagandeep** Virender Mehla** _ ABSTRACT Third generation wireless system is based on the WCDMA access technique. In this technique, all users share the

More information

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques 1 Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques Bin Song and Martin Haardt Outline 2 Multi-user user MIMO System (main topic in phase I and phase II) critical problem Downlink

More information

Effective prediction of dynamic bandwidth for exchange of Variable bit rate Video Traffic

Effective prediction of dynamic bandwidth for exchange of Variable bit rate Video Traffic Effective prediction of dynamic bandwidth for exchange of Variable bit rate Video Traffic Mrs. Ch.Devi 1, Mr. N.Mahendra 2 1,2 Assistant Professor,Dept.of CSE WISTM, Pendurthy, Visakhapatnam,A.P (India)

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Performance Evaluation of Bit Division Multiplexing combined with Non-Uniform QAM

Performance Evaluation of Bit Division Multiplexing combined with Non-Uniform QAM Performance Evaluation of Bit Division Multiplexing combined with Non-Uniform QAM Hugo Méric Inria Chile - NIC Chile Research Labs Santiago, Chile Email: hugo.meric@inria.cl José Miguel Piquer NIC Chile

More information

Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation

Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Xiliang Liu Joint work with Kaliappa Ravindran and Dmitri Loguinov Department of Computer Science City University of New

More information

BASIC CONCEPTS OF HSPA

BASIC CONCEPTS OF HSPA 284 23-3087 Uen Rev A BASIC CONCEPTS OF HSPA February 2007 White Paper HSPA is a vital part of WCDMA evolution and provides improved end-user experience as well as cost-efficient mobile/wireless broadband.

More information

Bandwidth utilization is the wise use of available bandwidth to achieve specific goals.

Bandwidth utilization is the wise use of available bandwidth to achieve specific goals. Note Bandwidth Utilization: Multiplexing and Spreading Bandwidth utilization is the wise use of available bandwidth to achieve specific goals. Efficiency can be achieved by multiplexing; i.e., sharing

More information

Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna

Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Vincent Lau Associate Prof., University of Hong Kong Senior Manager, ASTRI Agenda Bacground Lin Level vs System Level Performance

More information

Framework for Performance Analysis of Channel-aware Wireless Schedulers

Framework for Performance Analysis of Channel-aware Wireless Schedulers Framework for Performance Analysis of Channel-aware Wireless Schedulers Raphael Rom and Hwee Pink Tan Department of Electrical Engineering Technion, Israel Institute of Technology Technion City, Haifa

More information

UE Counting Mechanism for MBMS Considering PtM Macro Diversity Combining Support in UMTS Networks

UE Counting Mechanism for MBMS Considering PtM Macro Diversity Combining Support in UMTS Networks IEEE Ninth International Symposium on Spread Spectrum Techniques and Applications UE Counting Mechanism for MBMS Considering PtM Macro Diversity Combining Support in UMTS Networks Armando Soares 1, Américo

More information

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS 9th European Signal Processing Conference (EUSIPCO 0) Barcelona, Spain, August 9 - September, 0 OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS Sachin Shetty, Kodzo Agbedanu,

More information

An ATM Traffic Shaper for Delay-Sensitive and Delay-Insensitive VBR Serv:ices*

An ATM Traffic Shaper for Delay-Sensitive and Delay-Insensitive VBR Serv:ices* An ATM Traffic Shaper for Delay-Sensitive and Delay-nsensitive VBR Serv:ices* Mingfu Li Dept. of Electrical Engineering, Rm. 554 National Taiwan University, Taipei, Taiwan, R.O.C. mf @eagle. ee.nt u.edu,

More information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu

More information

ODMA Opportunity Driven Multiple Access

ODMA Opportunity Driven Multiple Access ODMA Opportunity Driven Multiple Access by Keith Mayes & James Larsen Opportunity Driven Multiple Access is a mechanism for maximizing the potential for effective communication. This is achieved by distributing

More information

IMPROVEMENT OF CALL BLOCKING PROBABILITY IN UMTS

IMPROVEMENT OF CALL BLOCKING PROBABILITY IN UMTS International Journal of Latest Research in Science and Technology Vol.1,Issue 3 :Page No.299-303,September-October (2012) http://www.mnkjournals.com/ijlrst.htm ISSN (Online):2278-5299 IMPROVEMENT OF CALL

More information

New Cross-layer QoS-based Scheduling Algorithm in LTE System

New Cross-layer QoS-based Scheduling Algorithm in LTE System New Cross-layer QoS-based Scheduling Algorithm in LTE System MOHAMED A. ABD EL- MOHAMED S. EL- MOHSEN M. TATAWY GAWAD MAHALLAWY Network Planning Dep. Network Planning Dep. Comm. & Electronics Dep. National

More information

TELECOMMUNICATION SYSTEMS

TELECOMMUNICATION SYSTEMS TELECOMMUNICATION SYSTEMS By Syed Bakhtawar Shah Abid Lecturer in Computer Science 1 MULTIPLEXING An efficient system maximizes the utilization of all resources. Bandwidth is one of the most precious resources

More information

TSIN01 Information Networks Lecture 9

TSIN01 Information Networks Lecture 9 TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information

More information

Office: Room 517 (Bechtel) Office Hours: MWF 10 : :00 and by appointment (send ) Extension: 3538

Office: Room 517 (Bechtel) Office Hours: MWF 10 : :00 and by appointment (send  ) Extension: 3538 American University of Beirut Department of Electrical and Computer Engineering EECE 450 Computer Networks Spring 2004 Course Syllabus Catalog Description Data communications. Network architectures. Error

More information

OFDM Pilot Optimization for the Communication and Localization Trade Off

OFDM Pilot Optimization for the Communication and Localization Trade Off SPCOMNAV Communications and Navigation OFDM Pilot Optimization for the Communication and Localization Trade Off A. Lee Swindlehurst Dept. of Electrical Engineering and Computer Science The Henry Samueli

More information

Performance Analysis of Transmissions Opportunity Limit in e WLANs

Performance Analysis of Transmissions Opportunity Limit in e WLANs Performance Analysis of Transmissions Opportunity Limit in 82.11e WLANs Fei Peng and Matei Ripeanu Electrical & Computer Engineering, University of British Columbia Vancouver, BC V6T 1Z4, canada {feip,

More information

Packetizing Voice for Mobile Radio

Packetizing Voice for Mobile Radio Packetizing Voice for Mobile Radio M. R. Karim, Senior Member, IEEE Present cellular systems use conventional analog fm techniques to transmit speech.' A major source of impairment in cellular systems

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION CCITT E.713 THE INTERNATIONAL TELEGRAPH AND TELEPHONE CONSULTATIVE COMMITTEE (11/1988) SERIES E: OVERALL NETWORK OPERATION, TELEPHONE SERVICE, SERVICE OPERATION AND

More information

Computing Call-Blocking Probabilities in LEO Satellite Networks: The Single-Orbit Case

Computing Call-Blocking Probabilities in LEO Satellite Networks: The Single-Orbit Case 332 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 51, NO. 2, MARCH 2002 Computing Call-Blocking Probabilities in LEO Satellite Networks: The Single-Orbit Case Abdul Halim Zaim, George N. Rouskas, Senior

More information

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Nithin Sugavanam, C. Emre Koksal, Atilla Eryilmaz Department of Electrical and Computer Engineering The Ohio State

More information

Performance Evaluation of Public Access Mobile Radio (PAMR) Systems with Priority Calls

Performance Evaluation of Public Access Mobile Radio (PAMR) Systems with Priority Calls Performance Evaluation of Public Access obile Radio (PAR) Systems with Priority Calls Francisco Barceló, Josep Paradells ept. de atemàtica Aplicada i Telemàtica (Unicersitat Politècnica de Catalunya) c/

More information

Downlink Erlang Capacity of Cellular OFDMA

Downlink Erlang Capacity of Cellular OFDMA Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,

More information

AACHENER BEITRAGE ZUR INFORMATIK

AACHENER BEITRAGE ZUR INFORMATIK AACHENER BEITRAGE ZUR INFORMATIK Herausgeber der Reihe: Prof. Dr. rer. nat. Klaus Indermark, Lehrstuhl fur Informatik II Prof. Dr.-Ing. Manfred NagI, Lehrstuhl fur Informatik III Prof. Dr. rer. nat. Otto

More information

) #(2/./53 $!4! 42!.3-)33)/.!4! $!4! 3)'.!,,).' 2!4% ()'(%2 4(!. KBITS 53).' K(Z '2/50 "!.$ #)2#5)43

) #(2/./53 $!4! 42!.3-)33)/.!4! $!4! 3)'.!,,).' 2!4% ()'(%2 4(!. KBITS 53).' K(Z '2/50 !.$ #)2#5)43 INTERNATIONAL TELECOMMUNICATION UNION )454 6 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU $!4! #/--5.)#!4)/. /6%2 4(% 4%,%(/.%.%47/2+ 39.#(2/./53 $!4! 42!.3-)33)/.!4! $!4! 3)'.!,,).' 2!4% ()'(%2 4(!.

More information

PROBABILITY DISTRIBUTION OF THE INTER-ARRIVAL TIME TO CELLULAR TELEPHONY CHANNELS

PROBABILITY DISTRIBUTION OF THE INTER-ARRIVAL TIME TO CELLULAR TELEPHONY CHANNELS PROBABILITY DISTRIBUTION OF THE INTER-ARRIVAL TIME TO CELLULAR TELEPHONY CHANNELS Francisco Barceló, José Ignacio Sánchez Dept. de Matemática Aplicada y Telemática, Universidad Politécnica de Cataluña

More information

TR V1.1.1 ( )

TR V1.1.1 ( ) Technical Report 2-wire analogue voice band interfaces; Terminal Equipment transmitting voice signals; Test simulation for level limitation requirements 2 Reference DTR/ATA-005080 (an000ics.pdf) Keywords

More information

Mobile Network Evolution Part 1. GSM and UMTS

Mobile Network Evolution Part 1. GSM and UMTS Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems

More information

Performance Analysis of Finite Population Cellular System Using Channel Sub-rating Policy

Performance Analysis of Finite Population Cellular System Using Channel Sub-rating Policy Universal Journal of Communications and Network 2): 74-8, 23 DOI:.389/ucn.23.27 http://www.hrpub.org Performance Analysis of Finite Cellular System Using Channel Sub-rating Policy P. K. Swain, V. Goswami

More information

A Polling Based Approach For Delay Analysis of WiMAX/IEEE Systems

A Polling Based Approach For Delay Analysis of WiMAX/IEEE Systems A Polling Based Approach For Delay Analysis of WiMAX/IEEE 802.16 Systems Archana B T 1, Bindu V 2 1 M Tech Signal Processing, Department of Electronics and Communication, Sree Chitra Thirunal College of

More information

Multiplexing Concepts and Introduction to BISDN. Professor Richard Harris

Multiplexing Concepts and Introduction to BISDN. Professor Richard Harris Multiplexing Concepts and Introduction to BISDN Professor Richard Harris Objectives Define what is meant by multiplexing and demultiplexing Identify the main types of multiplexing Space Division Time Division

More information

Objectives, characteristics and functional requirements of wide-area sensor and/or actuator network (WASN) systems

Objectives, characteristics and functional requirements of wide-area sensor and/or actuator network (WASN) systems Recommendation ITU-R M.2002 (03/2012) Objectives, characteristics and functional requirements of wide-area sensor and/or actuator network (WASN) systems M Series Mobile, radiodetermination, amateur and

More information

FIBER OPTICS. Prof. R.K. Shevgaonkar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture: 22.

FIBER OPTICS. Prof. R.K. Shevgaonkar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture: 22. FIBER OPTICS Prof. R.K. Shevgaonkar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture: 22 Optical Receivers Fiber Optics, Prof. R.K. Shevgaonkar, Dept. of Electrical Engineering,

More information

IEEE C802.16maint-07/033

IEEE C802.16maint-07/033 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Some Clarifications on CIDs and SFIDs and Suggested Modifications 2007-04-17 Source(s) Dr.T.R.Padmanabhan

More information

Chapter 8 Traffic Channel Allocation

Chapter 8 Traffic Channel Allocation Chapter 8 Traffic Channel Allocation Prof. Chih-Cheng Tseng tsengcc@niu.edu.tw http://wcnlab.niu.edu.tw EE of NIU Chih-Cheng Tseng 1 Introduction What is channel allocation? It covers how a BS should assign

More information

King Fahd University of Petroleum & Minerals Computer Engineering Dept

King Fahd University of Petroleum & Minerals Computer Engineering Dept King Fahd University of Petroleum & Minerals Computer Engineering Dept COE 342 Data and Computer Communications Term 021 Dr. Ashraf S. Hasan Mahmoud Rm 22-144 Ext. 1724 Email: ashraf@ccse.kfupm.edu.sa

More information

RECOMMENDATION ITU-R SM Frequency channel occupancy measurements

RECOMMENDATION ITU-R SM Frequency channel occupancy measurements Rec. ITU-R SM.1536 1 RECOMMENDATION ITU-R SM.1536 Frequency channel occupancy measurements (2001) The ITU Radiocommunication Assembly, considering a) that some administrations assign the same frequency

More information

Lecture 21: Links and Signaling

Lecture 21: Links and Signaling Lecture 21: Links and Signaling CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wed 3/15 Lecture 21 Overview Quality of Service Signaling Channel characteristics Types of physical media Modulation

More information

Abstract. Marío A. Bedoya-Martinez. He joined Fujitsu Europe Telecom R&D Centre (UK), where he has been working on R&D of Second-and

Abstract. Marío A. Bedoya-Martinez. He joined Fujitsu Europe Telecom R&D Centre (UK), where he has been working on R&D of Second-and Abstract The adaptive antenna array is one of the advanced techniques which could be implemented in the IMT-2 mobile telecommunications systems to achieve high system capacity. In this paper, an integrated

More information

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday Lecture 7: Centralized MAC protocols Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday Centralized MAC protocols Previous lecture contention based MAC protocols, users decide who transmits when in a decentralized

More information

Self-Management for Unified Heterogeneous Radio Access Networks. Symposium on Wireless Communication Systems. Brussels, Belgium August 25, 2015

Self-Management for Unified Heterogeneous Radio Access Networks. Symposium on Wireless Communication Systems. Brussels, Belgium August 25, 2015 Self-Management for Unified Heterogeneous Radio Access Networks Twelfth ISWCS International 2015 Symposium on Wireless Communication Systems Brussels, Belgium August 25, 2015 AAS Evolution: SON solutions

More information

The Last Mile Problem

The Last Mile Problem The Last Mile Problem LAN, MAN, WAN how to connect private users at home to such networks? Problem of the last mile: somehow connect private homes to the public Internet without laying many new cables

More information

Capacity of Packetized Voice Services over Time-Shared Wireless Packet Data Channels

Capacity of Packetized Voice Services over Time-Shared Wireless Packet Data Channels of Packetized Voice Services over Time-Shared Wireless Packet Data Channels Patrick Hosein Ericsson Inc. 512 Wateridge Vista Dr., San Diego, CA 92121. Email: patrick.hosein@ericsson.com Abstract In traditional

More information

Technical Aspects of LTE Part I: OFDM

Technical Aspects of LTE Part I: OFDM Technical Aspects of LTE Part I: OFDM By Mohammad Movahhedian, Ph.D., MIET, MIEEE m.movahhedian@mci.ir ITU regional workshop on Long-Term Evolution 9-11 Dec. 2013 Outline Motivation for LTE LTE Network

More information

CHAPTER 7 ROLE OF ADAPTIVE MULTIRATE ON WCDMA CAPACITY ENHANCEMENT

CHAPTER 7 ROLE OF ADAPTIVE MULTIRATE ON WCDMA CAPACITY ENHANCEMENT CHAPTER 7 ROLE OF ADAPTIVE MULTIRATE ON WCDMA CAPACITY ENHANCEMENT 7.1 INTRODUCTION Originally developed to be used in GSM by the Europe Telecommunications Standards Institute (ETSI), the AMR speech codec

More information

A two Layer Guaranteed and Sustained Rate based Scheduler for IEEE based WiMAX Networks

A two Layer Guaranteed and Sustained Rate based Scheduler for IEEE based WiMAX Networks A two Layer Guaranteed and Sustained Rate based Scheduler for IEEE 802.16-2009 based WiMAX Networks Volker Richter, Rico Radeke, and Ralf Lehnert Technische Universität Dresden Dresden, Mommsenstrasse

More information

Managing Capacity for a Real Multi-Service UMTS/HSPA Radio Access Network

Managing Capacity for a Real Multi-Service UMTS/HSPA Radio Access Network Managing Capacity for a Real Multi-Service UMTS/HSPA Radio Access Network Marta de Oliveira Veríssimo marta.verissimo@tecnico.ulisboa.pt Instituto Superior Técnico, Lisboa, Portugal November 1 Abstract

More information

UNIT 6 ANALOG COMMUNICATION & MULTIPLEXING YOGESH TIWARI EC DEPT,CHARUSAT

UNIT 6 ANALOG COMMUNICATION & MULTIPLEXING YOGESH TIWARI EC DEPT,CHARUSAT UNIT 6 ANALOG COMMUNICATION & MULTIPLEXING YOGESH TIWARI EC DEPT,CHARUSAT Syllabus Multiplexing, Frequency-Division Multiplexing Time-Division Multiplexing Space-Division Multiplexing Combined Modulation

More information

Capacity Enhancement in Wireless Networks using Directional Antennas

Capacity Enhancement in Wireless Networks using Directional Antennas Capacity Enhancement in Wireless Networks using Directional Antennas Sedat Atmaca, Celal Ceken, and Ismail Erturk Abstract One of the biggest drawbacks of the wireless environment is the limited bandwidth.

More information

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular

More information

THE DESIRE to provide different quality-of-service (QoS) Effective Bandwidths with Priorities

THE DESIRE to provide different quality-of-service (QoS) Effective Bandwidths with Priorities IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 6, NO. 4, AUGUST 1998 447 Effective Bandwidths with Priorities Arthur W. Berger, Senior Member, IEEE, and Ward Whitt, Associate Member, IEEE Abstract The notion

More information

OPTIMIZING APPLICATIONS AND DATA LINKS FOR HF RADIO INTERMEDIATE TERM VARIATION: CAN YOU RIDE THE WAVE?

OPTIMIZING APPLICATIONS AND DATA LINKS FOR HF RADIO INTERMEDIATE TERM VARIATION: CAN YOU RIDE THE WAVE? OPTIMIZING APPLICATIONS AND DATA LINKS FOR HF RADIO INTERMEDIATE TERM VARIATION: CAN YOU RIDE THE WAVE? Steve Kille Isode Ltd Hampton, UK steve.kille@isode.com SUMMARY HF Radio transmission is subject

More information

A Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information

A Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information A Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information Jun Zhou Department of Computer Science Florida State University Tallahassee, FL 326 zhou@cs.fsu.edu Xin Yuan

More information

RECOMMENDATION ITU-R M.1391 METHODOLOGY FOR THE CALCULATION OF IMT-2000 SATELLITE SPECTRUM REQUIREMENTS

RECOMMENDATION ITU-R M.1391 METHODOLOGY FOR THE CALCULATION OF IMT-2000 SATELLITE SPECTRUM REQUIREMENTS Rec. ITU-R M.1391 1 RECOMMENDATION ITU-R M.1391 METHODOLOGY FOR THE CALCULATION OF IMT-2000 SATELLITE SPECTRUM REQUIREMENTS Rec. ITU-R M.1391 (1999 1 Introduction International Mobile Telecommunications

More information

S Simulation program SEAMCAT

S Simulation program SEAMCAT S-72.333 Post Graduate Course in Radiocommunications Spring 2001 Simulation program SEAMCAT (The Spectrum Engineering Advanced Monte Carlo Analysis Tool) Pekka Ollikainen pekka.ollikainen@thk.fi Page 1

More information

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. E2 Multiplexing

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. E2 Multiplexing Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione E2 Multiplexing Exercise 1 A TDM multiplexing system has a frame with 10 slots and in each slots 128 bits area transmitted. The

More information

DIGITAL Radio Mondiale (DRM) is a new

DIGITAL Radio Mondiale (DRM) is a new Synchronization Strategy for a PC-based DRM Receiver Volker Fischer and Alexander Kurpiers Institute for Communication Technology Darmstadt University of Technology Germany v.fischer, a.kurpiers @nt.tu-darmstadt.de

More information