Submit Search
Upload
Capacity utilization and admission control in the downlinkof WMAX
•
0 likes
•
26 views
M
marwaeng
Follow
Capacity utilization and admission control in the downlinkof WMAX
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 8
Download now
Download to read offline
Recommended
Performance Evaluation of Iptv over Wimax Networks Under Different Terrain En...
Performance Evaluation of Iptv over Wimax Networks Under Different Terrain En...
International Journal of Engineering Inventions www.ijeijournal.com
Throughput Calculation for LTE TDD and FDD System
Throughput Calculation for LTE TDD and FDD System
Sukhvinder Singh Malik
GSM RF Interview Q&A
GSM RF Interview Q&A
Yayvo.com
Gsm optimization
Gsm optimization
Ahmed Ramadan
Basic of LTE
Basic of LTE
Razib Mollick
Gsm rf interview questions
Gsm rf interview questions
radira03
Lte advanced coverage enhancements
Lte advanced coverage enhancements
S.c. Lu
LTE Advanced Technology Introduction
LTE Advanced Technology Introduction
Going LTE
Recommended
Performance Evaluation of Iptv over Wimax Networks Under Different Terrain En...
Performance Evaluation of Iptv over Wimax Networks Under Different Terrain En...
International Journal of Engineering Inventions www.ijeijournal.com
Throughput Calculation for LTE TDD and FDD System
Throughput Calculation for LTE TDD and FDD System
Sukhvinder Singh Malik
GSM RF Interview Q&A
GSM RF Interview Q&A
Yayvo.com
Gsm optimization
Gsm optimization
Ahmed Ramadan
Basic of LTE
Basic of LTE
Razib Mollick
Gsm rf interview questions
Gsm rf interview questions
radira03
Lte advanced coverage enhancements
Lte advanced coverage enhancements
S.c. Lu
LTE Advanced Technology Introduction
LTE Advanced Technology Introduction
Going LTE
01 01 bss signaling fundamental
01 01 bss signaling fundamental
Ericsson Saudi
WLAN at 60GHz -Whitepaper from R&S-1 ma220 2e_wlan_11ad_wp
WLAN at 60GHz -Whitepaper from R&S-1 ma220 2e_wlan_11ad_wp
Saurabh Verma
Slide 11516
Slide 11516
Virak Sou
Comparison of LTE and WiMAX
Comparison of LTE and WiMAX
Cisco Service Provider
Telecom ppt
Telecom ppt
ArdenTelecom
5 g ran_jnn_atal_fdp
5 g ran_jnn_atal_fdp
SureshaVSathegala
Concentric & Dual Band Cells
Concentric & Dual Band Cells
Faraz Husain
BSNL TRAINING PPT
BSNL TRAINING PPT
Manideep Srirangam
Digital cellular networks GSM
Digital cellular networks GSM
RAVIKIRAN ANANDE
Wcdma radio functionality
Wcdma radio functionality
ruto123
gsm-network-optimization
gsm-network-optimization
Muhammad Yahya
Analysis WiMax vs LTE
Analysis WiMax vs LTE
Mario Eguiluz Alebicto
HANDOFF
HANDOFF
AJAL A J
LTE - Long Term Evolution
LTE - Long Term Evolution
Arief Gunawan
4/5G Cross-Border coordination in Bahrain E field trigger levels
4/5G Cross-Border coordination in Bahrain E field trigger levels
roberto ercole
Gsm interview question
Gsm interview question
Abhishek Pathak
3 G Interview
3 G Interview
Amit Sharma
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
IJERA Editor
3G basic good
3G basic good
Jit Pal Dhanjal
Gsm radio-interface
Gsm radio-interface
Mustaf Mohamed
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
ijwmn
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Editor IJCATR
More Related Content
What's hot
01 01 bss signaling fundamental
01 01 bss signaling fundamental
Ericsson Saudi
WLAN at 60GHz -Whitepaper from R&S-1 ma220 2e_wlan_11ad_wp
WLAN at 60GHz -Whitepaper from R&S-1 ma220 2e_wlan_11ad_wp
Saurabh Verma
Slide 11516
Slide 11516
Virak Sou
Comparison of LTE and WiMAX
Comparison of LTE and WiMAX
Cisco Service Provider
Telecom ppt
Telecom ppt
ArdenTelecom
5 g ran_jnn_atal_fdp
5 g ran_jnn_atal_fdp
SureshaVSathegala
Concentric & Dual Band Cells
Concentric & Dual Band Cells
Faraz Husain
BSNL TRAINING PPT
BSNL TRAINING PPT
Manideep Srirangam
Digital cellular networks GSM
Digital cellular networks GSM
RAVIKIRAN ANANDE
Wcdma radio functionality
Wcdma radio functionality
ruto123
gsm-network-optimization
gsm-network-optimization
Muhammad Yahya
Analysis WiMax vs LTE
Analysis WiMax vs LTE
Mario Eguiluz Alebicto
HANDOFF
HANDOFF
AJAL A J
LTE - Long Term Evolution
LTE - Long Term Evolution
Arief Gunawan
4/5G Cross-Border coordination in Bahrain E field trigger levels
4/5G Cross-Border coordination in Bahrain E field trigger levels
roberto ercole
Gsm interview question
Gsm interview question
Abhishek Pathak
3 G Interview
3 G Interview
Amit Sharma
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
IJERA Editor
3G basic good
3G basic good
Jit Pal Dhanjal
Gsm radio-interface
Gsm radio-interface
Mustaf Mohamed
What's hot
(20)
01 01 bss signaling fundamental
01 01 bss signaling fundamental
WLAN at 60GHz -Whitepaper from R&S-1 ma220 2e_wlan_11ad_wp
WLAN at 60GHz -Whitepaper from R&S-1 ma220 2e_wlan_11ad_wp
Slide 11516
Slide 11516
Comparison of LTE and WiMAX
Comparison of LTE and WiMAX
Telecom ppt
Telecom ppt
5 g ran_jnn_atal_fdp
5 g ran_jnn_atal_fdp
Concentric & Dual Band Cells
Concentric & Dual Band Cells
BSNL TRAINING PPT
BSNL TRAINING PPT
Digital cellular networks GSM
Digital cellular networks GSM
Wcdma radio functionality
Wcdma radio functionality
gsm-network-optimization
gsm-network-optimization
Analysis WiMax vs LTE
Analysis WiMax vs LTE
HANDOFF
HANDOFF
LTE - Long Term Evolution
LTE - Long Term Evolution
4/5G Cross-Border coordination in Bahrain E field trigger levels
4/5G Cross-Border coordination in Bahrain E field trigger levels
Gsm interview question
Gsm interview question
3 G Interview
3 G Interview
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
3G basic good
3G basic good
Gsm radio-interface
Gsm radio-interface
Similar to Capacity utilization and admission control in the downlinkof WMAX
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
ijwmn
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Editor IJCATR
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
Editor IJMTER
Paper id 2720146
Paper id 2720146
IJRAT
27 122-1-pb
27 122-1-pb
Mahendra Sisodia
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
ijngnjournal
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
ijwmn
Mtnl ppt
Mtnl ppt
srk-live
Mtnl ppt
Mtnl ppt
srk-live
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...
IRJET Journal
4G technology
4G technology
Atul Kumar
4G Mobile Communications
4G Mobile Communications
Md. Mashiur Rahman
4g wireless technology
4g wireless technology
hardik_khengar
An Ex Ante Forecast On Economically Engineered Bit Rates For IPTV Service Via...
An Ex Ante Forecast On Economically Engineered Bit Rates For IPTV Service Via...
Sandra Long
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
IJCNC
Evaluation and Design an Efficient Mobile WiMax Architecture Using Coded OFDM...
Evaluation and Design an Efficient Mobile WiMax Architecture Using Coded OFDM...
IRJET Journal
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
CSCJournals
Simulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical Layer
IOSR Journals
N010328691
N010328691
IOSR Journals
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET Journal
Similar to Capacity utilization and admission control in the downlinkof WMAX
(20)
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
Paper id 2720146
Paper id 2720146
27 122-1-pb
27 122-1-pb
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
Mtnl ppt
Mtnl ppt
Mtnl ppt
Mtnl ppt
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...
4G technology
4G technology
4G Mobile Communications
4G Mobile Communications
4g wireless technology
4g wireless technology
An Ex Ante Forecast On Economically Engineered Bit Rates For IPTV Service Via...
An Ex Ante Forecast On Economically Engineered Bit Rates For IPTV Service Via...
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
Evaluation and Design an Efficient Mobile WiMax Architecture Using Coded OFDM...
Evaluation and Design an Efficient Mobile WiMax Architecture Using Coded OFDM...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Simulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical Layer
N010328691
N010328691
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
Recently uploaded
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
koyaldeepu123
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Recently uploaded
(20)
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Capacity utilization and admission control in the downlinkof WMAX
1.
International Review on
Computers and Software (I.RE.CO.S), Vol. 5, N. 2 March 2010. Manuscript received and revised February 2010, accepted March 2010 Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved CAPACITY UTILIZATION AND ADMISSION CONTROL IN THE DOWNLINK OF MOBILE WIMAX D. S. Shu’aibu, S. K. Syed-Yusof and N. Fisal Abstract – WiMAX is a broadband wireless technology that uses base station like the present GSM. WiMAX offers services to different traffic classes with different quality of services requirements. Unlike GSM, five different traffics were identified in WiMAX in which all subscribers can be in any of the traffics. These traffics are either constant bit rate application or variable bit rate. In this paper, we present a call admission control that divides the total bandwidth capacity (bit rate) of the down link in to constant bit rate traffics and variable bit rate traffics within the base station coverage and those out of coverage area through the relay station. The relay station is assumed to decode and forward. Eight different traffics were randomly deployed a number of times, in to the sector of the cell of the base station and the relay station. The traffics were admitted based on their signal to noise ratio (SNR), bit rate and availability of the bandwidth on the down link sub-frame. The results showed that the propose admission policy utilizes the capacity more efficiently and the bandwidth is well managed compare to the conventional policy in WiMAX system. Keywords: admission control, bandwidth management, blockage, Data rate, policy, QoS, rejection, andTraffics. Nomenclature BE Best effort UGS Unsolicited Grand Service rtPs Real time polling service nrtPs None real time polling service ertPs Extended real time polling service cbr Constant bit rate vbr Variable bit rate QoS Quality of service SNR Signal to noise ratio cbr Constant bit rate vbr variable bit rate J Total data rate capacity nslot Total no of down link slots nsubch Total no of downlink sub-channels nDLOFDMA Total OFDMA symbol in the downlink DLsub Total number of downlink subcarriers ncs no. of subcarriers per sub-channels nif no. of information bits per subcarrier Cr coding rate M number of symbols fD frame duration nf no of frame per second TDcbr Total capacity of cbr for base station TDvbr Total capacity of vbr for base station TDrly Total capacity of Relay station TDrly(cbr), TDrly(vbr) cbr and vbr capacity in relay station I. Introduction WiMAX is the next-generation of the wireless broadband technology designed to enable pervasive, high-speed mobile internet access to a very large coverage area. WiMAX has the solution of the problems of non-coverage area in the rural community [1]. It has radius coverage of several kilometers at data rate of about 75Mbps [1], [2]. WiMAX provides service to many devices like notebook personal computer; handset, Smartphone and some consumers’ electronics such as gaming devices, cameras, camcorder, and music player. It is the first of all IP mobile internet solution enabling efficient and scalable networks for data, video and voice [3]. It is the only wireless MAN that operates at scalable bandwidth, different mode of access (OFDM and OFDMA) and also it uses different value of cyclic prefix [1], [4], [5], [6], [7]. It supports QoS on the wireless domain and interfaces for ATM, IP, E1/T1 and Ethernet. Due to its functionality, it supports several broadband services like voice over IP and video on demand [2]. WiMAX forum in [1] has identified and classified the traffics expected in WiMAX in to five categories. These are;- Unsolicited grand service (UGS), Real time polling service (rtPs), non-real time polling service (nrtPs), best
2.
D. S. Shu’aibu,
S. K. Syed-Yusof and N. Fisal Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved International Review on Computers and Software, Vol. 5, N. 2 effort (BE) and extended real time polling service (ertps). These traffics are randomly deployed into the coverage area of WiMAX and request for entry in to the network. There is a need to have proper and efficient policy on how these traffics can be admitted in to the network. Admission control can be consider as one of such policy which is a trade of whether to optimize the revenue or to satisfied the subscribers’ requirements. A lot of researches were conducted in the area of admission control of wireless and wire communication system. In [8] admission policy was considered to be optimization problems in which utility and fairness constrained greedy revenue algorithm was used, the problem here is that there is no demarcation between the constant bit rate application and variable bit rate application, thus the bandwidth is not properly optimized because a lot of variable bit rate applications will consumed the bandwidth as such the revenue may not be optimized. In [9] adaptive power allocation was combine with work in [8] and the same policy was implemented. In [10] possibility of providing access to the base station (BS) by applying ad-hoc network to extend the service to subscribers outside the BS coverage with other mobile station in the relay coverage area was considered. Giving admission by ad-hoc network does not grantee good quality of service. Admission control for multimedia application in cellular networks using semi Markov decision model was used in [11], the target was to get optimal policy that seeks to optimized blocking probability but in the same paper it was started that optimal policy cannot be implemented in a real system. Admission control for MPEG-4 videoconference traffics was considered in [12] over next generation cellular wireless network a good quality of services was grantee to all videoconference users, what happen if other traffics joint the network? In [13] admission control was investigated when it comes to hand-over from one base station to the target base station by adaptively adjusting the guard channel of the target BS this may not work well with some traffic. None real time traffic bandwidth was adaptively reduce by using fuzzy logic in [14] the problem with this is that if the channel changes, the nrtps traffic may eventually be blocked. A parameter call load factor was used to estimate the network congestion in [15], every time there is request for entry in to the network the parameter is calculated and then compare with a certain threshold value before admission this is additional over head. In this paper, admission control in downlink of mobile WiMAX (IEEE802.16e) is considered by divide the total bandwidth into constant bit rate & variable bit rate applications through base station and those traffics at the extended coverage area of base station, which are also constant bit rate & variable bit rate applications. The traffics applications have four access zones depending on where the traffic is and its type. The rest of the report is organized in the following format; section II deals with the traffics in mobile WiMAX, proposed admission control policy in section III, simulation results was in section IV, the report is concluded in V. II. TRAFFICS IN MOBILE WIMAX The traffic classes in mobile WiMAX are classified in to five categories, as showing in Table 1, quality of service required by each of this traffic is indicated on the same table 1. TABLE I WIMAX APPLICATION CLASSES Application Bandwidth guideline Latency Jitter guideline Multiplayer interactive gaming 50-85 kbps <150ms <100ms VoIP & Video Conference 4-384 kbps <150m <50msec Streaming Media 5kbps – 2Mbps N/A <100ms Web Browsing and Instant message 10kbps – 2Mbps N/A N/A Media content downloads >2Mbps N/A N/A The following 8 specific traffics were extracted from [1] for the purpose of this work. Table 2 gives the specific traffic type extracted from [1] except for relay station which was assumed TABLE 2 TRAFFIC LOAD USED IN THE DOWNLINK SUB-FRAME Traffic / Application Bandwidth Requirement Service Application Type Traffic 1 Multiplayer interactive gaming 60 kbps rtPs vbr Traffic 2 Web Browsing 100 kbps BE vbr Traffic 3 Video Conference 384 kbps rtPs vbr Traffic 4 Streaming media 2000kbps rtPs vbr Traffic 5 Music / Speech Traffic 6 Instant message Traffic 7 Media content downloads 128kbps 10kbps nrtPs vbr BE vbr
3.
D. S. Shu’aibu,
S. K. Syed-Yusof and N. Fisal Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved International Review on Computers and Software, Vol. 5, N. 2 Traffic 8 VoIP Traffic 9 Relay station (vbr) Traffic 10 Relay station (cbr) 2000kbps 22.8kbps >200kbps 22.8kbps nrtPs vbr UGS/ertPs cbr rtPs/nrtPs/BE vbr UGS/ertPs cbr The traffics in table 2 above were randomly deployed into the coverage area of the base station, and relay station. The relay station is modeled to give a maximum bandwidth of 200kbps per vbr application traffic;. The bit rate for each variable bit rate application was chosen gives the required quality of service. A typical business- quality videoconference runs at 384kbps can deliver TV- quality video at 25 to 30 frames per second. For music/ speech to have CD quality it is subjective but 128kbps MP3 is sufficient [1]. A cbr with 22.8Kbps can give audio quality like GSM [1]. II.1 Downlink Data Rate The frame of WiMAX is divided in to the uplink and the downlink, with 5ms duration. When using time division duplex (TDD) the frame is divided along the time axis. A total of 47 OFDMA symbols are available on the frame. It’s divided into n & 47-n where n is total number of OFDMA symbol in the uplink and 47-n is for the downlink [1]. The downlink data rate is computed once the frame size, and other parameters on the frame, modulation and coding rate are known [16] the formulae is; ymbolno_OFDMA_s bitsformation_ * _ _ in periodsymbol ssubcarrierdata J (1) Where J, is the physical data rate capacity in bits per second. The data subcarriers depend on the bandwidth and the FFT size. The information bits depend on the type of modulation used and the coding rate [16], [17]. WiMAX uses 4-different types of modulation BPSK, QPSK, 16-QAM and 64-QAM, BPSK is used in mobile WiMAX for control message transmission. To assign a particular types of modulation, SNR is used as given in [2], [5] as shown in table 3. TABLE 3 REQUIRED SNR AT THE RECEIVER FOR EACH MODULATION SCHEME Modulation Scheme CODING RATE SNR (dB) BPSK ½ 6.4 QPSK ½ 9.4 QPSK ¾ 11.2 16-QAM ½ 16.4 16-QAM ¾ 18.2 64-QAM 64-QAM 2/3 ¾ 22.7 24.4 In some case when the signal to noise ratio is very good a coding rate of 5/6 of 64-QAM can be use [6], [7]. The receiver (ss) always feedback the channel state information to the base station via pilot subcarriers, this help the base station to determine the type of modulation scheme to be assign to the receiver. Mobile WiMAX use OFDMA access mode where by the minimum resource that can be allocated to any subscriber station (ss) is a slot [1]. Figure 1gives the existing frame structure [1] and the DL burst for different traffic users. The users are randomly assigned to a slot without considering the type of traffics. Figure 2 gives the propose frame structure in which similar traffics are confine in one segment. Figure 1 Existing frame structure
4.
D. S. Shu’aibu,
S. K. Syed-Yusof and N. Fisal Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved International Review on Computers and Software, Vol. 5, N. 2 Figure 2 Propose frame structure II.2 Data Rate Modeling In mobile WiMAX, the frame has different types of permutation, the partial usage sub channelization (PUSC), full usage sub channelization (FUSC), tile usage sub channelization (TUSC) and the Band Adaptive modulation and coding Band AMC. The total physical downlink data rate depends on the type of permutation. In this paper PUSC was use as the permutation for all subcarriers in the downlink whereby a slot is defined as two OFDMA symbol by one sub- channel. The total downlink rate capacity is derived as follows;- Let be the total number of slot in the downlink sub-frame. 2 * _ OFDMADLsubch slot nn n (2) Where subchn is total number of sub-channel and OFDMADLn _ is number of OFDMA symbols in the downlink, hence the total down link subcarriers )( subDL is computed as csslotsub nnDL * (3) csn is the number of subcarriers per subchannel. The total information bits carried by each subcarriers is given by ifn with coding rate rC )(log* 2 Mcn rif (4) M is the number of symbols. If Df is the frame duration and fn is the number of frames per second then, D f f n 1 (5) Hence substitute (2,3,4 and 5) in to (1) we have the total downlink physical data rate capacity as, fifsub nnDLJ ** (6) This total capacity in the propose admission control is subdivide as follows;- Let cbrTD be the total bit rate capacity allocated to constant bit rate application through base station, as shown in figure 2 with red JxTDcbr * (7) For variable bit rate application, let the total allocation capacity be vbrTD as shown in figure 2 blue area hence JyTDvbr * (8) Then the relay station capacity allocated is given by, JzTDrly * (9) Such that 1)( zyx x, y and z are fraction of the total capacity The relay capacity is subdivided among the traffics applications as in the propose policy as follows; rlycbrrly TDxTD *1)( (10) Where )(cbrrlyTD is capacity allocated to constant bit rate application through relay station as shown shaded white and the last compartment is given by rlycbrrly TDyTD *1)( (11) Is the capacity allocation for variable bit rate in relay station as shown shaded with yellow color. Provided that 1)11( yx The total downlink rate capacity is then formulated as optimization problem using equation 7, 8 and 9 the total downlink bit rate is formulated in (12) to maximize the number of users. )max( 111 N i rly N i vbr N i cbr TDTDTDJ (12) where N is the respective number of traffics (users) in each partition. Equation (12) is further expanded to include equations 10 & 11 actual traffics and other control variable as follows
5.
D. S. Shu’aibu,
S. K. Syed-Yusof and N. Fisal Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved International Review on Computers and Software, Vol. 5, N. 2 )..... .............max( 1 )( 1 )( 1 1 N i vbrrly N i cbrrly N i N i vbrcbr TDtpTDp TDtpTDpJ (13) Where p is admission matrix indicator which shows that traffic is admitted or not, the matrix p is given by whether the traffic is within the base station or relay station. If =0 the traffic is within the base station coverage, otherwise is at relay station coverage. U is a traffic matrix, this indicate type of traffic been admitted µ5)T µ1 is for cbr at base station, µ4 is for vbr at relay station. Seven different traffics types in vbr are used so matrix t is use to identify the exact traffic. Hence matrix t has seven elements this matrix indicate one out of traffic class from the seven traffic with variable bit rate. For example if p =( 1 0 0 0 0) and µ=(1 0 0 0 0)T , it means that a traffic has been admitted within the base station coverage and the traffic is cbr application. But for variable traffic matrix t must be define, as example if p = (0 0 0 1 1), µ= (0 0 0 1 0)T and t = (0 0 1 0 0 0 0) this means a vbr application has been admitted through relay station and the application is videoconference. III Admission Control Policy In the propose admission control policy, we made the following assumptions (i) No provision for handover traffics (ii) the life time of a traffic admitted is long enough and (iii) the base station can provide enough power to all admitted traffics. The propose policy is on the physical layer of mobile WiMAX. 1 Let Pj be the total capacity of the downlink. 2 Let Px, Py, Pz and Pi represent four different capacity of pj such that 2.1 px+py+pz+pi ≤ pj 2.2 let x, y z and i be the four traffic type 2.3 Deploy traffics randomly If traffic is x type Allocate x in Px such that ∑n x=1 Px ≤ TDcbr Elseif traffic is y type Allocate y in py such that ∑n y=1 Py ≤ TDvbr ElseIf traffic is z type Allocate z in pz such that ∑n z=1 Pz ≤ TDrly(cbr) ElseIf traffic is i type Allocate i in pi such that ∑n i=1 Pi ≤ TDrly(vbr) Else Reject the traffic End IV Simulation and Analysis of the Results The program was run for 30, 50, 100, and 150 traffics several times. Table 4 gives the simulation parameters used. TABLE 4 SIMULATION PARAMETERS OF THE DOWNLINK SUB-FRAME Parameters Settings FFT Size 512 Bandwidth 5MHz DL / UL ratio 35 / 12 No. of DL Subchannels 15 Data Subcarriers Frame duration Frame modulation Scheme Total DL Capacity Modulation Scheme for the 360 5mS 64-QAM 5/6 Coding rate 12.8Mbs QPSK, 16-QAM & 64-QAM The program was run while were randomly deployed and requesting for entry in to the network with random SNR through base station and the extended coverage of relay station. The propose admission policy was used based on the propose policy and existing policy to admit a traffic. If the capacity allocated to given section in the propose policy cannot accommodate a particular traffic request the traffic is rejected and wait for the next traffic with less capacity requirement in term of bandwidth. Figure 3, 5, 7 & 9 shows the results of comparison between the propose system policy in which the total capacity is divided into four and the existing one in which the whole capacity is used without division for 30, 50, 100 & 150 traffic users. Figure 5, 7 & 9 shows that the propose policy outperformed the existing one in term of number of blockage as shown. Figure 4, 6, 8 & 10 shows the performance of various traffics in their respective segments for 30, 50, 100 & 150 users in the propose admission policy. Figure 11 & 12 gives the statistical data for the number of admitted traffics and number of rejected / blockage traffics for 30, 50, 100 & 150 users on both policies. It can be seen that the
6.
D. S. Shu’aibu,
S. K. Syed-Yusof and N. Fisal Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved International Review on Computers and Software, Vol. 5, N. 2 propose admission policy performed better than the existing one. 0 5 10 15 20 25 30 0 2 4 6 8 10 12 14 x 10 6 no of traffics capacityinbps graph for 30 random traffics for two the policies Propose policy Existing policy Figure 3 traffics shown across the two policies for 30 traffics 0 5 10 15 0 1 2 3 4 5 6 7 8 9 x 10 6 no of traffics Capacityinbps graph for 30 random traffics vbr at base station cbr at base station vbr relaystation cbr relay station Figure 4, traffics across the 4 sections for 30 traffic users 0 5 10 15 20 25 30 35 0 2 4 6 8 10 12 14 x 10 6 no of traffics Capacityinbps graph for 50 random traffics for the two policies Propose policy Existing policy Figure 5 traffics shown across the two policies for 50 traffic users 0 5 10 15 20 0 1 2 3 4 5 6 7 8 9 x 10 6 no of traffics Capacityinbps graph for 50 random Traffic vbr at base station cbr at base station vbr relay station cbr relay station Figure 6, traffics across the 4 sections for 50 traffic users 0 10 20 30 40 50 0 2 4 6 8 10 12 14 x 10 6 no of traffics Capacityinbps graph for 100 random traffics for two the policies Propose policy Existing policy
7.
D. S. Shu’aibu,
S. K. Syed-Yusof and N. Fisal Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved International Review on Computers and Software, Vol. 5, N. 2 Figure 7 traffics shown across the two policies for 100 users 0 5 10 15 20 25 30 0 1 2 3 4 5 6 7 8 9 x 10 6 no of traffics Capacityinbps graph for 100 random traffics vbr at the base station cbr at the base station vbr relay station cbr relay station Figure 8, traffics across the 4 sections for 100 users 0 10 20 30 40 50 60 0 2 4 6 8 10 12 14 x 10 6 no of traffics Capacityinbps graph for 150 random traffics for two the policies Propose policy Existing policy Figure 9 traffics shown across the two policies for 150 users 0 5 10 15 20 25 30 35 40 0 1 2 3 4 5 6 7 8 9 x 10 6 no of traffics capacityinbps graph for 150 random traffics vbr at base station cbr at base station vbr relay station cbr relay station Figure 10, Traffics across 4 sections for 150 users 1 2 3 4 0 10 20 30 40 50 60 70 80 90 100 Simulation of 4 scenario NumberofadmittedTraffics Using existing policy Using Propose policy Figure 11, Statistic of admitted traffics in the two policies 1 2 3 4 0 20 40 60 80 100 120 Simulation 4 Scenario Numberofblockedtraffics Using existing policy Using Propose policy Figure 12, Statistic of number of blockage traffics in the two policies
8.
D. S. Shu’aibu,
S. K. Syed-Yusof and N. Fisal Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved International Review on Computers and Software, Vol. 5, N. 2 V Conclusions In this paper a propose system policy of admission control is presented, the proposed system performed better than the existing system policy in term of number of blockage and capacity utilization. The propose system ensure that it can provide a quality of service in terms of bit rate requirements for each traffics. The propose system has a better bandwidth management because the number of traffics admitted is higher compare to the number of traffics in the existing one when the same traffics are randomly deployed. The propose scheme consider only one QoS parameter in WiMAX which is the bandwidth. We also make assumption that there is no hand over traffics from neighboring base station and all the traffics pass through the admission control. Acknowledgment The authors would like to thank all those who contributed toward making this research successful. Also, we would like to thanks to all the reviewers for their insightful comment. This work was sponsored by the research management unit, Universiti Teknologi Malaysia. References [1] WiMAX Forum, Krishna Ramadas and Raj Jain, “WiMAX System Evaluation Methodology” version 2.1 July 2008 [2] Fabricio Lira F. and Paulo Cardieri “Coverage prediction and performance Evaluation of Wireless Metropolitan Area Networks based on IEEE802.16” Journal of Communication and Information systems VoL. 20 No 3, 2005 Page 132-140. [3] http://www.intel.com/technology/wimax/index.htm [4] IEEE802.16-2004, “IEEE Standard for Local and Metropolitan Area 200 Networks –Part 16: Air Interface for Fixed Broadband Wireless Access Systems”, October 2004. [5] IEEE Std. 802.16e, “IEEE Standard for local and metropolitan area networks, part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Band and Corrigendum 1”, May 2005. [6] L. Nuaymi, “WiMAX Technology for Broadband wireless Access” John Wiley & Sons Ltd, the atrium, Southern gate, Chichester, West Sussex PO198SQ, England 2007. [7] J.G. Andrews, A.Ghosh, and R. Muhamed, “Fundamentals of WiMAX understanding Broadband Wireless Networking” Pearson Education, Inc. one lake street upper saddle river, NJ07458 USA. [8] Bo Rong, Yi Qian and Kejia Lu “Downlink Call admission Control in Multiservice WiMAX Networks” IEEE Communication Society International Conference on Communication ICC 2007 proceedings pg 5082-5087. [9] Bo Rong, Yi Qian and Hsiao-Hwa Chen “Adaptive power allocation and call admission control in multiservice WiMAX Access Networks” IEEE Wireless Communication pg 14-19. February 2007 [10] Anas M, A.A Zaidan, B.B. zaidan and Laiha M K, “Towards for Admission Control in WiMAX Relay Station Mesh Network for Mobile Stations out of Coverage Using Ad-Hoc” World Academy of Science, Engineering and Technology Vol 54 pg 463 – 467. 2009 [11] Glancio H.S.C, Carlos R.L.F, Joao C.W, A.C. Rita, C.M. Rodrigoes and Solon V.C. “Optimal call admission control and bandwidth adaptation in multimedia cellular mobile network” Proceedings 12th International Conference, ASMTA, 2005. [12] Aggelos Lazaris, Polychronis Koutsakis “Pricing-based call admission control for wireless MPEG-4 traffic” Computer Communications Vol 32 pg 1781-1789, 2009 [13] Tuna Tuglu and Cem Ersay “ A new call admission control based on mobile position estimation in DS-CDMA systems” Wireless network 2005 pg 341-351, 2005 [14] Paolo Dini and Roberto Cusani “A fuzzy logic Approach to solve call admission control Issues in CDMA system” EUSFLAT – LFA, pg 797-802 2005 [15] H. Holma and A. Toskala “WCDMA for UMTS Radio Access for third generation mobile Communication” John Wiley & Sons 2000 [16] IEEE802.16e Mobile WiMAX “Part 1 Technical overview and performance evaluation August 2006 pg 17-19. [17] A. Ebian, M.Shokair and K.H. Awadalla “Performance Evaluation of WiMAX system using convolutional product code (cpc)” Progress in Electromagnetic research C Vol 5 pg 125-133, 2008 Dahiru Sani Shuaibu received his B.Eng and M.Eng from Bayero University Kano Nigeria in the year 1999 and 2005 respectively. He has been working with Bayero University since 2001 as a lecture. He is currently doing his Ph.D at Universiti Teknologi Malaysia in Telamatic research group. He is a member of Nigerian Society of Engineers and a member Council for the Regulation of Registered Engineers in Nigeria (COREN). His research interest are radio resource managements and OFDMA based system Sharifah Kamilah Bnt Syed Yusof received BSc (cum laude) in Electrical Engineering from Geoge Washington University USA in 1988 and obtained her MEE and Ph.D in 1994 and 2006 respectively from universiti Tecknologi Malaysia. She is currently working as a Senior lecturer with the department of Radio Communication, Faculty of Electrical Engineering Universiti Teknologi Malaysia. Her research interest includes OFDMA based system, Software define Radio and Cognitive radio. Norsheila Fisal received her B.Sc. in Electronic Communication from the University of Salford, Manchester, U.K. in 1984. M.Sc. degree in Telecommunication Technology, and PhD degree in Data Communication from the University of Aston, Birmingham, U.K. in 1986 and 1993, respectively. Currently, she is a Professor with the Faculty of Electrical Engineering, University Technology Malaysia and Director of Telematic Research Group (TRG) Laboratory. Her Professional Affiliations are with Member of Institute Electrical and Electronic Engineers (IEEE), Member of Malaysian National Confederation of Computers (MNCC), Member of Institute For Information Processing (IFIP) and Member of Board of Engineer Malaysia.
Download now