SlideShare a Scribd company logo
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 4, Ver. I (Jul - Aug .2015), PP 04-11
www.iosrjournals.org
DOI: 10.9790/2834-10410411 www.iosrjournals.org 4 | Page
A Bandwidth Degradation Technique to Reduce Call Dropping
Probability in Mobile Network Systems
CH.Monica1, K.V.L.Bhavani2
Student M.Tech(ECE)1,Associate professor2, ECE Department, Aditya Institute of Technology and
Management, Tekkali
Abstract: In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data
over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A
generic video telephony may require more than 40 kbps whereas a low motion video telephony may require
about 25 kbps for data transmission. From the designing point of view these requirements demands for an
alternative resource planning, especially for bandwidth allocation in wireless networks. In wireless network
where bandwidth is a scare resource, the system may need to block incoming user if all of the bandwidth has
been used to provide highest quality of service to existing users. However this bandwidth resource planning may
be unacceptable for larger application. A degradable approach to multiple users can be made on bandwidth
allocation to reduce the blocking probability without degrading the quality of service to existing users to an
unacceptable level. This work aims towards a realization of a mobile network using W-CDMA multi access
technique supporting multilevel quality of services. The bandwidth allocation to multiple users is adjusted
dynamically according to the required network condition so as to increase bandwidth utilization. The work
analyze the performance deriving the degradation period ratio,degradation bandwidth and propagation delay
and throughput for the implemented wireless network.The proposed work is aim to implement on Matlab tool.
For its functional verification considering various mobility patterns.
I. Introduction
Cellular wireless technology today has become the prevalent technology for wireless networking. Not
only mobile phones but also other types of devices such as laptops and Personal Digital Assistant (PDA) can
connect to Internet via cellular infrastructure. These mobile devices are often capable of running multimedia
applications (e.g., video, images). Therefore, cellular networks need to provide quality of service (QoS)
guarantee to different types of data traffic in a mobile environment. A call admission control (CAC) scheme
aims at maintaining the delivered QoS to the different calls (or users) at the target level by limiting the number
of ongoing calls in the system. One major challenge in designing a CAC arises due to the fact that the cellular
network has to service two major types of calls: new calls and handoff calls. The QoS performances related to
these two types of calls are generally measured by new call blocking probability and handoff call dropping
probability. In general, users are more sensitive to dropping of an ongoing and handed over call than blocking a
new call. Therefore, a CAC scheme needs to prioritize handoff calls over new calls by minimizing handoff-
dropping probability. Again, bandwidth adaptation and scheduling are necessary mechanisms for achieving high
utilization of the wireless resources (e.g., channel bandwidth) while satisfying the QoS requirements for the
users. These two techniques are closely related to call admission control, and in fact these three mechanisms
jointly determine the call-level and the packet-level QoS for the different types of traffic in the cellular wireless
air interface. For example, upon arrival of a new call or handoff call, bandwidth adaptation can be performed to
degrade the channel allocations for some calls (still maintaining the QoS requirements) so that the new call can
be admitted. Scheduling mechanisms impact the packet-level system dynamics (e.g., queuing behavior), and
therefore, packet-level QoS. The packet-level dynamics can be exploited for designing efficient call admission
control methods. The call admission control (CAC) and the adaptive channel adaptation (ACA) mechanisms are
generally treated as the network layer (above layer-2) functionalities in the wireless transmission protocol stack.
The scheduling and the adaptive modulation and coding (AMC) are layer-2 and layer-1 (i.e., physical
functionalities, respectively.
II. QOS in wireless communication
Many real-time applications can use different encoding schemes according to their desired quality and
generate traffic with different bandwidth requirements. For example, generic video telephony may require more
than 40 KBPS, but low-motion video telephony requiring about 25 KBPS may be acceptable . From the
standpoint of a system administrator, this property provides an alternative for resource planning, especially for
bandwidth allocation in wireless networks. In wireless networks where the bandwidth is a scarce resource, the
system may need to block incoming users if all of the bandwidth has been used up to provide the highest QoS to
A Bandwidth Degradation Technique to Reduce Call Dropping Probability in…
DOI: 10.9790/2834-10410411 www.iosrjournals.org 5 | Page
existing users. However, if these users can be degraded to a lower QoS level, it is possible to reduce the
blocking probability without degrading the QoS of existing users to an “unacceptable” level. Various
approaches and algorithms adopting this idea have been proposed. A graceful degradation mechanism is
proposed in to increase bandwidth utilization by adaptively adjusting bandwidth allocation according to user-
specified loss profiles. Thus, a system could free some bandwidth for new users by lowering the QoS levels of
existing users.
III. Problem Statement
The desired quality and generated traffic varies with the requirement with this bandwidth. A generic
video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25
kbps for data transmission these requirements demands for an especially Alternative resource planning for
bandwidth allocation in wireless network there bandwidth is scare resource, the system may need to block
incoming user if all of the bandwidth has been used to provide highest quality of service to existing users.
However this bandwidth resource planning may be unacceptable for larger application. If these users can be
degraded to a lower QoS level, it is possible to reduce the blocking probability without degrading the QoS of
existing users to an “Unacceptable.” Various approaches and algorithms adopting this idea have been proposed
a graceful degradation mechanism is proposed to increase bandwidth allocation by adjusting bandwidth
utilization by adaptively adjusting bandwidth allocation according user specified profiles. Thus, a system could
free some bandwidth for new users. Senetal proposed an optimal degradation strategy by maximizing a revenue
function and Sherifetal [3] an adaptive resource algorithm to maximize band width utilization and attempted to
achieve fairness with a generic algorithm. In terms of bandwidth utilization or service provider’s revenue can be
improved significantly by allowing QoS degradation.
IV. Approach
In this work an optimal degradation strategy by adaptive resource allocation algorithm to maximize
bandwidth utilization and attempted to achieve fairness in multi user communication. the system performance,
in terms of bandwidth utilization or service provider’s, can be improved significantly by allowing QoS
degradation. Moreover, the potential dropping due to such cell crossings (i.e., handoffs) has to be taken into
account. The forced-termination (or dropping) probability is a widely used metric to represent the compromise
of QoS due to user mobility. This probability should be made as small as possible because admitting a user and
then terminating his session before its completion would make the user even unhappier. In order to reduce this
probability, many admission control algorithms give handoff users priority over new users.
A wireless network in which the base station takes charge of both admission control and bandwidth
allocation for mobile users in its cell. While residing in the cell of a base station, a mobile user communicates
with others via that base station. A “wireless network” can be a conventional cellular phone network or an office
building with interconnected IEEE 802.11 wireless LANs. In such a network, a mobile user could either be
successfully handed off to a new base station or simply dropped when it is about to leave the present cell. As
mentioned in the introduction, we give handoff users priority over new users since dropping a handoff is usually
less desirable and less tolerable than blocking new users. This is achieved by restricting a new user into the cell
once the total number of users or the total occupied bandwidth exceeds a pre specified threshold, Nthresh.
Handed-off and newly initiated users are treated equally once they are admitted into a cell. We are primarily
interested in quality-degradable connections as long as the resultant quality is within the user specified QoS
profile. The only QoS requirement we discuss here is the bandwidth. For example, it can be a video streaming
application with multiple transmission rates depending on the encoding schemes and resolution. We assume that
there are K different quality levels. The bandwidth requirement of the quality level is denoted as Wi and
Wax=W1 >Wi >WK= Wmin. With such a degree of freedom, a base station may try to degrade the quality
levels of some existing users in order to admit more users so as to improve the overall system performance. For
example, we may be able to achieve high bandwidth utilization and maintain a small blocking and/or forced
termination probability. We assume that the arrivals of new users into a cell is a Poisson process with a rate
λ0.The Poisson process works well in modeling call arrivals in a public telephone network. Even though recent
studies found that the “packet” arrival process in the Internet switches/routers is not Poisson, the network traces
also show that the user-generated connection requests, such as Telnet or FTP connection requests can still be
modeled as a Poisson process. Since we mainly focus on the admission control and bandwidth allocation, which
are the “connection-level” (as opposed to “packet-level”) resource management, the Poisson process is still a
good approximation for our purpose. For mathematical tractability, we also assume the lifetime of each
connection to be exponentially distributed with means 1/μ0. Note that the exponential distribution has been used
to accurately model the intervals of talk spurt and silence in a phone call. Thus, this assumption captures the
reality of some real-time applications. To evaluate the effects of user mobility on system performance, we use
the cell-sojourn time,the time a user stays in a cell to account for his mobility. As far as connection-level
A Bandwidth Degradation Technique to Reduce Call Dropping Probability in…
DOI: 10.9790/2834-10410411 www.iosrjournals.org 6 | Page
resource management is concerned, the cell-sojourn time and connection lifetime together determine the
duration for which a user will occupy the bandwidth in a cell.
A connection with n handoffs
we assume that these two random variables are independent. Thus, the probability that a mobile user will
experience handoffs H times can calculated as where Tr is the remaining cell-sojourn time in the cellwhere
P(H=n) = P(Tr+T1+T2+…….Tn-1)<Tc<P(Tr+T1+T2+…….Tn-1)
a user’s connection is initiated, Ti is the cell-sojourn time the ith cell, and Tc is the connection lifetime.
Furthermore, if we consider the potential forced termination during a handoff (i.e., a handoff drop), the handoff
rate can be derived as
λh = η (1- pb) λo
μ
o+ ηp
f
Where pf is the probability of terminating handoff users and pb the probability of blocking new
users. The handoff rate is a function of pf which itself is also a function of λh but it can still be solved
recursively. The channel-holding time of an admitted user in a cell,the time he occupies some bandwidth in that
cell can be computed by taking the minimum of the remaining connection lifetime and cell-sojourn time. Since
we assume that both connection lifetime and cell-sojourn time are exponentially distributed, the distribution of
channel-holding time can derived as fco= (μo+η) e-(μo+η) t
under the proposed degradation scheme, both blocking
and forced-termination probabilities can be improved. However, some users may receive severely degraded
QoS. In the following section, we investigate the tradeoffs among the QoS metrics, especially between the
blocking probability and the other three QoS metrics.
If at a time more number of users wants to transmit their information allocating their bandwidth
suitably to equal to channel bandwidth. At this instant some amount of quality degrades to each user but at a
time all users can access the network without time delays. With this allocation bandwidth must be adjusted so
that call of user is not blocked.
In this work, the adaptive bandwidth allocation for QoS provisioning in wireless/mobile networks is presented.
For a code division multiple access (CDMA) system, the wideband CDMA can be used for service
degrade/upgrade; for a time division multiple access (TDMA) system (e.g., Bluetooth), service degrade/ upgrade
can be achieved by an adequate assignment of time slots (i.e., polling policy) .
BANDWIDTH ADAPTION ALGORITH
We consider a fairness-based bandwidth adaptation algorithm, which works in such a way that the
allocated bandwidth to the ongoing calls will not differ from each other by more than one step. The bandwidth
of an ongoing call is also allowed to be degraded below bandwidth requirement breq to minimize new call
blocking and handoff call dropping probabilities.
Let wallc and ballc denote the expected band-width for an incoming call and the bandwidth vector of
ongoing calls, respectively. When a call arrives, the cell performs admission control by checking whether the
total number of ongoing calls is less than the threshold t. If this condition is satisfied or if the incoming call is a
handoff call, the cell tries to allocate maximum bandwidth to the incoming call; otherwise, the incoming new
call is blocked. However, if the available bandwidth is not enough to allocate maximum bandwidth to an
incoming call, the adaptation algorithm is invoked. The adaptation algorithm will randomly select an ongoing
call with the current maximum bandwidth (i.e., max (ballc)) and de-grade allocated bandwidth of that call one
step. At this point, expected bandwidth for incoming call increases one step. This operation is iteratively
A Bandwidth Degradation Technique to Reduce Call Dropping Probability in…
DOI: 10.9790/2834-10410411 www.iosrjournals.org 7 | Page
performed until the expected bandwidth for an incoming call is equal to the current minimum bandwidth of all
ongoing calls (i.e., min (ballc)). In contrast, if every call has the minimum band-width b1, none of the ongoing
call can be degraded. Therefore, an incoming call is dropped. For call thinning scheme, line 1 of this algorithm
would be changed to admit the user
If ((incoming is a new call) and (number of ongoing calls <K)
{
If (available bandwidth > or = bmax)
Then assign bmax to incoming call
Else
{
ballocated = 0
for (t=1,t<N, t++)
While (ballocated <bmin and nt >0)
{
randomly degrade one of nt connections
by amount of bdegrade
bdegrade= min (bmin, bt- bmin)
ballocated = ballocated + bdegrade
}
}
}
Else
reject incoming call
The Concept Of Spread Spectrum System
The capacity of any communications channel is defined by Shannon’s channel capacity formula …….
QOS MEASURES
Degradation ratio (DR):The fraction of time a user receives degraded qos. Since we are considering multi level
Qos system,DR is defined as
if a user receives level-i QoS for Ti seconds.
Throughput:It gives the account of number of packets arrived at received. It measures the efficiency of system.
Throughput= (number of bits received / number of bits send)*100
Degraded bandwidth (DB): It is measure of amount of bandwidth degraded from existing users. If number of
users enters in the channel are increased then bandwidth degraded is increase. The degradation is stops for a user
if he reaches the minimum bandwidth (b1).
Multi Path Combining:
 Multipath: reflection, diffraction, and dispersion of the signal energy caused by natural obstacles such as
buildings or hills, or multiple copies of signals sent intentionally (soft handover)
 Rake receiver used to combine different path components: each path is despread separately by “fingers” of
the Rake receiver and then combined .
 Possible due to “low autocorrelation” of spreading code
A Bandwidth Degradation Technique to Reduce Call Dropping Probability in…
DOI: 10.9790/2834-10410411 www.iosrjournals.org 8 | Page
WCDMA Transmission Module:
Fig: WCDMA Transmission Module
Ovsf Generator:
Transmissions from a single source are separated by channelization codes
Scrambling Codes:
Scrambling codes make the direct sequence CDMA (DS-CDMA)technique more effective in a
multipath environment
Lfsr (Linear Feed Back Shift Register):
LFSR sequence through (2ⁿ -1) states, where n is the number of registers in the LFSR. The contents of the
registers are shifted right by one position at each clock cycle.
Summer: Adaptive power control schemes are employed in CDMA technology for efficient transmission of
messages.
A Bandwidth Degradation Technique to Reduce Call Dropping Probability in…
DOI: 10.9790/2834-10410411 www.iosrjournals.org 9 | Page
Modulation:
The differentially coherent PSK (DPSK) signaling scheme makes use of a clever technique designed to
get around the need for a coherent reference signal at the receiver.
V. Result Analysis
1 2 3 4
0
50
100
150
Throughput = (recived data)/(generated data)*100
1 Group= 3 users
Throughput Plot for the communication system with user arrival/Removal
Number of groups
Throughput
A Bandwidth Degradation Technique to Reduce Call Dropping Probability in…
DOI: 10.9790/2834-10410411 www.iosrjournals.org 10 | Page
0 1 2 3 4 5 6 7 8 9
-0.4
-0.3
-0.2
-0.1
0
0.1
0.2
0.3
0.4
DR =((sum(wmax-wi)/wmax)*Ti)/(sum(Ti))
Degradation Ratio Plot for the communication system with user arrival/removal
Number of Users
DegradationRatio
0 1 2 3 4 5 6 7 8 9
-16
-14
-12
-10
-8
-6
-4
-2
0
2
4
x 10
4
Allocated Bandwidth = AW+wd(degrade),AW+wr(upgrade)
Degraded Bandwith wrt 1st group for the communication system
Number of Users
degradedbandwidth
1 2
0
0.2
0.4
0.6
0.8
1
1.2
1.4
Propogation delay for the communication system
Groups *(Scaled)
PropogationDelay
CONV
DBWA
A Bandwidth Degradation Technique to Reduce Call Dropping Probability in…
DOI: 10.9790/2834-10410411 www.iosrjournals.org 11 | Page
VI. Conclusion
In this paper, we derived an analytical model for a wireless network which uses adaptive bandwidth
allocation to provide users multilevel QoS. Four performance metrics—Throughput, propagation delay,
degraded bandwidth, degradation ratio are observed.. The performance plots obtained gives that with increase in
load with respect to time the through put levels maintains constant because of increase in compression level
which could be controlled by adaptive band width allocation method.
The performance is evaluated over WCDMA architecture by adding or removing different group of
users to evaluate the algorithm efficiency. The metrics used to evaluate the performance are throughput,
propagation delay, degradation ratio allocated bandwidth degradation is observed to outperform the existing
fixed bandwidth allocation technique.
References
[1]. S. Sen, J. Jawanda, K. Basu, and S. Das, “Quality-of Service Degradation Strategies in Multimedia Wireless Network,” Proc.IEEE
Vehicular Technology Conf., vol. 3, pp. 1884-1888, May 1998.
[2]. S. Singh, “Quality of Service Guarantees in Mobile Computing,” Computer Comm., no. 19, pp. 359-371, 1996.
[3]. M.R. Sherif, I.W. Habib, M.N. Nagshineh, and P.K. Kermani,“Adaptive Allocation of Resources and Call Admission Control for
Wireless ATM Using Generic Algorithm,” IEEE J. Selected Areas in Comm., vol. 18, no. 2, pp. 268 -282, Feb. 2000.
[4]. T. Kwon, Y. Choi, C. Bisdikian, and M. Naghshineh, “Call Admission Control for Adaptive Multimedia in Wireless/Mobile
Network,” Proc. First ACM Int’l Workshop Wireless Mobile Multimedia, pp. 111-116, Oct. 1998.
[5]. S. Choi and K.G. Shin, “Location/Mobility-Dependent Bandwidth Adaptation in QoS-Sensitive Cellular Networks,” Proc. IEEE
Vehicular Technology Conf., vol. 3, pp. 1593-1597, 2001.
[6]. Y.B Lin, S. Mohan, and A. Noerpel, “Queuing Priority Channel assignment Strategy for PCS Handoff and Initial Access,” IEEE
Trans. Vehicular Technology, vol. 43, no. 3, pp. 704-712, Aug. 1994.
[7]. R. Ramjee, R. Nagarajan, and D. Towsley, “On Optimal Call Admission Control in Cellular Networks,” Proc. IEEE INFOCOM
’96, vol. 1, pp. 43-50, 1996.
[8]. K. Mitchell and K. Sohraby, “An Analysis of the Effects of mobility on Bandwidth Allocation Strategies in Multi-Class Cellular
Wireless Networks,” Proc. IEEE INFOCOM ’01, vol. 2,pp. 1075-1084, 2001.
[9]. A. Sutoving and J.M. Peha, “Novel Heuristic for Call Admission Control in Cellular Systems,” Proc. IEEE Int’l Conf. Universal
Personal Comm., vol. 1, pp. 129-133, 1997.

More Related Content

What's hot

RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
ijwmn
 
Cellular qos
Cellular qosCellular qos
Optimal bandwidth allocation with
Optimal bandwidth allocation withOptimal bandwidth allocation with
Optimal bandwidth allocation with
IJCNCJournal
 
An efficient model for reducing soft blocking probability in wireless cellula...
An efficient model for reducing soft blocking probability in wireless cellula...An efficient model for reducing soft blocking probability in wireless cellula...
An efficient model for reducing soft blocking probability in wireless cellula...
ijwmn
 
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...
IJNSA Journal
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
acijjournal
 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
cscpconf
 
QoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
QoS Based Capacity Enhancement for WCDMA Network with Coding SchemeQoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
QoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
VLSICS Design
 
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Editor IJCATR
 
Proposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidthProposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidth
ijcsity
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
Reducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdReducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive threshold
ijistjournal
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET Journal
 
Jg3416751681
Jg3416751681Jg3416751681
Jg3416751681
IJERA Editor
 
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
iosrjce
 
Quality of service improvement, Handoff Prioritization and Channel utilizatio...
Quality of service improvement, Handoff Prioritization and Channel utilizatio...Quality of service improvement, Handoff Prioritization and Channel utilizatio...
Quality of service improvement, Handoff Prioritization and Channel utilizatio...
IJERA Editor
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 

What's hot (18)

RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
 
Cellular qos
Cellular qosCellular qos
Cellular qos
 
Optimal bandwidth allocation with
Optimal bandwidth allocation withOptimal bandwidth allocation with
Optimal bandwidth allocation with
 
An efficient model for reducing soft blocking probability in wireless cellula...
An efficient model for reducing soft blocking probability in wireless cellula...An efficient model for reducing soft blocking probability in wireless cellula...
An efficient model for reducing soft blocking probability in wireless cellula...
 
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
 
QoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
QoS Based Capacity Enhancement for WCDMA Network with Coding SchemeQoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
QoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
 
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
 
Proposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidthProposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidth
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Reducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdReducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive threshold
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
 
Jg3416751681
Jg3416751681Jg3416751681
Jg3416751681
 
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
 
Quality of service improvement, Handoff Prioritization and Channel utilizatio...
Quality of service improvement, Handoff Prioritization and Channel utilizatio...Quality of service improvement, Handoff Prioritization and Channel utilizatio...
Quality of service improvement, Handoff Prioritization and Channel utilizatio...
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 
(part-2)Book
(part-2)Book(part-2)Book
(part-2)Book
 

Viewers also liked

Power-Quality-Improvement-Using-PI-and-Fuzzy-Logic-Controllers-Based-Shunt-Ac...
Power-Quality-Improvement-Using-PI-and-Fuzzy-Logic-Controllers-Based-Shunt-Ac...Power-Quality-Improvement-Using-PI-and-Fuzzy-Logic-Controllers-Based-Shunt-Ac...
Power-Quality-Improvement-Using-PI-and-Fuzzy-Logic-Controllers-Based-Shunt-Ac...Atul Sharma
 
J018127176.publishing paper of mamatha (1)
J018127176.publishing paper of mamatha (1)J018127176.publishing paper of mamatha (1)
J018127176.publishing paper of mamatha (1)
IOSR Journals
 
G017633943
G017633943G017633943
G017633943
IOSR Journals
 
B011120510
B011120510B011120510
B011120510
IOSR Journals
 
A017230107
A017230107A017230107
A017230107
IOSR Journals
 
I1304026367
I1304026367I1304026367
I1304026367
IOSR Journals
 
C010211624
C010211624C010211624
C010211624
IOSR Journals
 
F017544247
F017544247F017544247
F017544247
IOSR Journals
 
A010630103
A010630103A010630103
A010630103
IOSR Journals
 
C1803061620
C1803061620C1803061620
C1803061620
IOSR Journals
 
D1304012025
D1304012025D1304012025
D1304012025
IOSR Journals
 
Intelligent Fault Identification System for Transmission Lines Using Artifici...
Intelligent Fault Identification System for Transmission Lines Using Artifici...Intelligent Fault Identification System for Transmission Lines Using Artifici...
Intelligent Fault Identification System for Transmission Lines Using Artifici...
IOSR Journals
 
J012537580
J012537580J012537580
J012537580
IOSR Journals
 
H0213337
H0213337H0213337
H0213337
IOSR Journals
 
A012250107
A012250107A012250107
A012250107
IOSR Journals
 
A017240107
A017240107A017240107
A017240107
IOSR Journals
 
F012142530
F012142530F012142530
F012142530
IOSR Journals
 
F010433136
F010433136F010433136
F010433136
IOSR Journals
 

Viewers also liked (20)

Power-Quality-Improvement-Using-PI-and-Fuzzy-Logic-Controllers-Based-Shunt-Ac...
Power-Quality-Improvement-Using-PI-and-Fuzzy-Logic-Controllers-Based-Shunt-Ac...Power-Quality-Improvement-Using-PI-and-Fuzzy-Logic-Controllers-Based-Shunt-Ac...
Power-Quality-Improvement-Using-PI-and-Fuzzy-Logic-Controllers-Based-Shunt-Ac...
 
J018127176.publishing paper of mamatha (1)
J018127176.publishing paper of mamatha (1)J018127176.publishing paper of mamatha (1)
J018127176.publishing paper of mamatha (1)
 
G017633943
G017633943G017633943
G017633943
 
B011120510
B011120510B011120510
B011120510
 
A017230107
A017230107A017230107
A017230107
 
I1304026367
I1304026367I1304026367
I1304026367
 
C010211624
C010211624C010211624
C010211624
 
F017544247
F017544247F017544247
F017544247
 
A010630103
A010630103A010630103
A010630103
 
ECE610 IEEE
ECE610 IEEEECE610 IEEE
ECE610 IEEE
 
C0941217
C0941217C0941217
C0941217
 
C1803061620
C1803061620C1803061620
C1803061620
 
D1304012025
D1304012025D1304012025
D1304012025
 
Intelligent Fault Identification System for Transmission Lines Using Artifici...
Intelligent Fault Identification System for Transmission Lines Using Artifici...Intelligent Fault Identification System for Transmission Lines Using Artifici...
Intelligent Fault Identification System for Transmission Lines Using Artifici...
 
J012537580
J012537580J012537580
J012537580
 
H0213337
H0213337H0213337
H0213337
 
A012250107
A012250107A012250107
A012250107
 
A017240107
A017240107A017240107
A017240107
 
F012142530
F012142530F012142530
F012142530
 
F010433136
F010433136F010433136
F010433136
 

Similar to B010410411

END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...
END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...
END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...
IJNSA Journal
 
D1102031727
D1102031727D1102031727
D1102031727
IOSR Journals
 
A reservation-based call admission control scheme and system modeling in 4G v...
A reservation-based call admission control scheme and system modeling in 4G v...A reservation-based call admission control scheme and system modeling in 4G v...
A reservation-based call admission control scheme and system modeling in 4G v...
Perumalraja Rengaraju
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
IJERA Editor
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445IJRAT
 
Ijartes v1-i3-001
Ijartes v1-i3-001Ijartes v1-i3-001
Ijartes v1-i3-001
IJARTES
 
Improved qo s support for wimax networks a survey
 Improved qo s support for wimax networks a survey Improved qo s support for wimax networks a survey
Improved qo s support for wimax networks a survey
Alexander Decker
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
IJARIIT
 
Regressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurementsRegressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurements
IJCNCJournal
 
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedinAsoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedinAsoka Korale
 
Practical active network services within content-aware gateways
Practical active network services within content-aware gatewaysPractical active network services within content-aware gateways
Practical active network services within content-aware gateways
Tal Lavian Ph.D.
 
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
Editor IJMTER
 
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkAdaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
IJCNCJournal
 
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
IJCNCJournal
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
TTA_TNagar
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
TTA_TNagar
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
ijasuc
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
ijasuc
 

Similar to B010410411 (20)

QoS in an LTE network
QoS in an LTE networkQoS in an LTE network
QoS in an LTE network
 
END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...
END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...
END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...
 
D1102031727
D1102031727D1102031727
D1102031727
 
A reservation-based call admission control scheme and system modeling in 4G v...
A reservation-based call admission control scheme and system modeling in 4G v...A reservation-based call admission control scheme and system modeling in 4G v...
A reservation-based call admission control scheme and system modeling in 4G v...
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
 
Ijartes v1-i3-001
Ijartes v1-i3-001Ijartes v1-i3-001
Ijartes v1-i3-001
 
Improved qo s support for wimax networks a survey
 Improved qo s support for wimax networks a survey Improved qo s support for wimax networks a survey
Improved qo s support for wimax networks a survey
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
Regressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurementsRegressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurements
 
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedinAsoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
 
Practical active network services within content-aware gateways
Practical active network services within content-aware gatewaysPractical active network services within content-aware gateways
Practical active network services within content-aware gateways
 
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
 
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkAdaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
 
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

B010410411

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 4, Ver. I (Jul - Aug .2015), PP 04-11 www.iosrjournals.org DOI: 10.9790/2834-10410411 www.iosrjournals.org 4 | Page A Bandwidth Degradation Technique to Reduce Call Dropping Probability in Mobile Network Systems CH.Monica1, K.V.L.Bhavani2 Student M.Tech(ECE)1,Associate professor2, ECE Department, Aditya Institute of Technology and Management, Tekkali Abstract: In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25 kbps for data transmission. From the designing point of view these requirements demands for an alternative resource planning, especially for bandwidth allocation in wireless networks. In wireless network where bandwidth is a scare resource, the system may need to block incoming user if all of the bandwidth has been used to provide highest quality of service to existing users. However this bandwidth resource planning may be unacceptable for larger application. A degradable approach to multiple users can be made on bandwidth allocation to reduce the blocking probability without degrading the quality of service to existing users to an unacceptable level. This work aims towards a realization of a mobile network using W-CDMA multi access technique supporting multilevel quality of services. The bandwidth allocation to multiple users is adjusted dynamically according to the required network condition so as to increase bandwidth utilization. The work analyze the performance deriving the degradation period ratio,degradation bandwidth and propagation delay and throughput for the implemented wireless network.The proposed work is aim to implement on Matlab tool. For its functional verification considering various mobility patterns. I. Introduction Cellular wireless technology today has become the prevalent technology for wireless networking. Not only mobile phones but also other types of devices such as laptops and Personal Digital Assistant (PDA) can connect to Internet via cellular infrastructure. These mobile devices are often capable of running multimedia applications (e.g., video, images). Therefore, cellular networks need to provide quality of service (QoS) guarantee to different types of data traffic in a mobile environment. A call admission control (CAC) scheme aims at maintaining the delivered QoS to the different calls (or users) at the target level by limiting the number of ongoing calls in the system. One major challenge in designing a CAC arises due to the fact that the cellular network has to service two major types of calls: new calls and handoff calls. The QoS performances related to these two types of calls are generally measured by new call blocking probability and handoff call dropping probability. In general, users are more sensitive to dropping of an ongoing and handed over call than blocking a new call. Therefore, a CAC scheme needs to prioritize handoff calls over new calls by minimizing handoff- dropping probability. Again, bandwidth adaptation and scheduling are necessary mechanisms for achieving high utilization of the wireless resources (e.g., channel bandwidth) while satisfying the QoS requirements for the users. These two techniques are closely related to call admission control, and in fact these three mechanisms jointly determine the call-level and the packet-level QoS for the different types of traffic in the cellular wireless air interface. For example, upon arrival of a new call or handoff call, bandwidth adaptation can be performed to degrade the channel allocations for some calls (still maintaining the QoS requirements) so that the new call can be admitted. Scheduling mechanisms impact the packet-level system dynamics (e.g., queuing behavior), and therefore, packet-level QoS. The packet-level dynamics can be exploited for designing efficient call admission control methods. The call admission control (CAC) and the adaptive channel adaptation (ACA) mechanisms are generally treated as the network layer (above layer-2) functionalities in the wireless transmission protocol stack. The scheduling and the adaptive modulation and coding (AMC) are layer-2 and layer-1 (i.e., physical functionalities, respectively. II. QOS in wireless communication Many real-time applications can use different encoding schemes according to their desired quality and generate traffic with different bandwidth requirements. For example, generic video telephony may require more than 40 KBPS, but low-motion video telephony requiring about 25 KBPS may be acceptable . From the standpoint of a system administrator, this property provides an alternative for resource planning, especially for bandwidth allocation in wireless networks. In wireless networks where the bandwidth is a scarce resource, the system may need to block incoming users if all of the bandwidth has been used up to provide the highest QoS to
  • 2. A Bandwidth Degradation Technique to Reduce Call Dropping Probability in… DOI: 10.9790/2834-10410411 www.iosrjournals.org 5 | Page existing users. However, if these users can be degraded to a lower QoS level, it is possible to reduce the blocking probability without degrading the QoS of existing users to an “unacceptable” level. Various approaches and algorithms adopting this idea have been proposed. A graceful degradation mechanism is proposed in to increase bandwidth utilization by adaptively adjusting bandwidth allocation according to user- specified loss profiles. Thus, a system could free some bandwidth for new users by lowering the QoS levels of existing users. III. Problem Statement The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25 kbps for data transmission these requirements demands for an especially Alternative resource planning for bandwidth allocation in wireless network there bandwidth is scare resource, the system may need to block incoming user if all of the bandwidth has been used to provide highest quality of service to existing users. However this bandwidth resource planning may be unacceptable for larger application. If these users can be degraded to a lower QoS level, it is possible to reduce the blocking probability without degrading the QoS of existing users to an “Unacceptable.” Various approaches and algorithms adopting this idea have been proposed a graceful degradation mechanism is proposed to increase bandwidth allocation by adjusting bandwidth utilization by adaptively adjusting bandwidth allocation according user specified profiles. Thus, a system could free some bandwidth for new users. Senetal proposed an optimal degradation strategy by maximizing a revenue function and Sherifetal [3] an adaptive resource algorithm to maximize band width utilization and attempted to achieve fairness with a generic algorithm. In terms of bandwidth utilization or service provider’s revenue can be improved significantly by allowing QoS degradation. IV. Approach In this work an optimal degradation strategy by adaptive resource allocation algorithm to maximize bandwidth utilization and attempted to achieve fairness in multi user communication. the system performance, in terms of bandwidth utilization or service provider’s, can be improved significantly by allowing QoS degradation. Moreover, the potential dropping due to such cell crossings (i.e., handoffs) has to be taken into account. The forced-termination (or dropping) probability is a widely used metric to represent the compromise of QoS due to user mobility. This probability should be made as small as possible because admitting a user and then terminating his session before its completion would make the user even unhappier. In order to reduce this probability, many admission control algorithms give handoff users priority over new users. A wireless network in which the base station takes charge of both admission control and bandwidth allocation for mobile users in its cell. While residing in the cell of a base station, a mobile user communicates with others via that base station. A “wireless network” can be a conventional cellular phone network or an office building with interconnected IEEE 802.11 wireless LANs. In such a network, a mobile user could either be successfully handed off to a new base station or simply dropped when it is about to leave the present cell. As mentioned in the introduction, we give handoff users priority over new users since dropping a handoff is usually less desirable and less tolerable than blocking new users. This is achieved by restricting a new user into the cell once the total number of users or the total occupied bandwidth exceeds a pre specified threshold, Nthresh. Handed-off and newly initiated users are treated equally once they are admitted into a cell. We are primarily interested in quality-degradable connections as long as the resultant quality is within the user specified QoS profile. The only QoS requirement we discuss here is the bandwidth. For example, it can be a video streaming application with multiple transmission rates depending on the encoding schemes and resolution. We assume that there are K different quality levels. The bandwidth requirement of the quality level is denoted as Wi and Wax=W1 >Wi >WK= Wmin. With such a degree of freedom, a base station may try to degrade the quality levels of some existing users in order to admit more users so as to improve the overall system performance. For example, we may be able to achieve high bandwidth utilization and maintain a small blocking and/or forced termination probability. We assume that the arrivals of new users into a cell is a Poisson process with a rate λ0.The Poisson process works well in modeling call arrivals in a public telephone network. Even though recent studies found that the “packet” arrival process in the Internet switches/routers is not Poisson, the network traces also show that the user-generated connection requests, such as Telnet or FTP connection requests can still be modeled as a Poisson process. Since we mainly focus on the admission control and bandwidth allocation, which are the “connection-level” (as opposed to “packet-level”) resource management, the Poisson process is still a good approximation for our purpose. For mathematical tractability, we also assume the lifetime of each connection to be exponentially distributed with means 1/μ0. Note that the exponential distribution has been used to accurately model the intervals of talk spurt and silence in a phone call. Thus, this assumption captures the reality of some real-time applications. To evaluate the effects of user mobility on system performance, we use the cell-sojourn time,the time a user stays in a cell to account for his mobility. As far as connection-level
  • 3. A Bandwidth Degradation Technique to Reduce Call Dropping Probability in… DOI: 10.9790/2834-10410411 www.iosrjournals.org 6 | Page resource management is concerned, the cell-sojourn time and connection lifetime together determine the duration for which a user will occupy the bandwidth in a cell. A connection with n handoffs we assume that these two random variables are independent. Thus, the probability that a mobile user will experience handoffs H times can calculated as where Tr is the remaining cell-sojourn time in the cellwhere P(H=n) = P(Tr+T1+T2+…….Tn-1)<Tc<P(Tr+T1+T2+…….Tn-1) a user’s connection is initiated, Ti is the cell-sojourn time the ith cell, and Tc is the connection lifetime. Furthermore, if we consider the potential forced termination during a handoff (i.e., a handoff drop), the handoff rate can be derived as λh = η (1- pb) λo μ o+ ηp f Where pf is the probability of terminating handoff users and pb the probability of blocking new users. The handoff rate is a function of pf which itself is also a function of λh but it can still be solved recursively. The channel-holding time of an admitted user in a cell,the time he occupies some bandwidth in that cell can be computed by taking the minimum of the remaining connection lifetime and cell-sojourn time. Since we assume that both connection lifetime and cell-sojourn time are exponentially distributed, the distribution of channel-holding time can derived as fco= (μo+η) e-(μo+η) t under the proposed degradation scheme, both blocking and forced-termination probabilities can be improved. However, some users may receive severely degraded QoS. In the following section, we investigate the tradeoffs among the QoS metrics, especially between the blocking probability and the other three QoS metrics. If at a time more number of users wants to transmit their information allocating their bandwidth suitably to equal to channel bandwidth. At this instant some amount of quality degrades to each user but at a time all users can access the network without time delays. With this allocation bandwidth must be adjusted so that call of user is not blocked. In this work, the adaptive bandwidth allocation for QoS provisioning in wireless/mobile networks is presented. For a code division multiple access (CDMA) system, the wideband CDMA can be used for service degrade/upgrade; for a time division multiple access (TDMA) system (e.g., Bluetooth), service degrade/ upgrade can be achieved by an adequate assignment of time slots (i.e., polling policy) . BANDWIDTH ADAPTION ALGORITH We consider a fairness-based bandwidth adaptation algorithm, which works in such a way that the allocated bandwidth to the ongoing calls will not differ from each other by more than one step. The bandwidth of an ongoing call is also allowed to be degraded below bandwidth requirement breq to minimize new call blocking and handoff call dropping probabilities. Let wallc and ballc denote the expected band-width for an incoming call and the bandwidth vector of ongoing calls, respectively. When a call arrives, the cell performs admission control by checking whether the total number of ongoing calls is less than the threshold t. If this condition is satisfied or if the incoming call is a handoff call, the cell tries to allocate maximum bandwidth to the incoming call; otherwise, the incoming new call is blocked. However, if the available bandwidth is not enough to allocate maximum bandwidth to an incoming call, the adaptation algorithm is invoked. The adaptation algorithm will randomly select an ongoing call with the current maximum bandwidth (i.e., max (ballc)) and de-grade allocated bandwidth of that call one step. At this point, expected bandwidth for incoming call increases one step. This operation is iteratively
  • 4. A Bandwidth Degradation Technique to Reduce Call Dropping Probability in… DOI: 10.9790/2834-10410411 www.iosrjournals.org 7 | Page performed until the expected bandwidth for an incoming call is equal to the current minimum bandwidth of all ongoing calls (i.e., min (ballc)). In contrast, if every call has the minimum band-width b1, none of the ongoing call can be degraded. Therefore, an incoming call is dropped. For call thinning scheme, line 1 of this algorithm would be changed to admit the user If ((incoming is a new call) and (number of ongoing calls <K) { If (available bandwidth > or = bmax) Then assign bmax to incoming call Else { ballocated = 0 for (t=1,t<N, t++) While (ballocated <bmin and nt >0) { randomly degrade one of nt connections by amount of bdegrade bdegrade= min (bmin, bt- bmin) ballocated = ballocated + bdegrade } } } Else reject incoming call The Concept Of Spread Spectrum System The capacity of any communications channel is defined by Shannon’s channel capacity formula ……. QOS MEASURES Degradation ratio (DR):The fraction of time a user receives degraded qos. Since we are considering multi level Qos system,DR is defined as if a user receives level-i QoS for Ti seconds. Throughput:It gives the account of number of packets arrived at received. It measures the efficiency of system. Throughput= (number of bits received / number of bits send)*100 Degraded bandwidth (DB): It is measure of amount of bandwidth degraded from existing users. If number of users enters in the channel are increased then bandwidth degraded is increase. The degradation is stops for a user if he reaches the minimum bandwidth (b1). Multi Path Combining:  Multipath: reflection, diffraction, and dispersion of the signal energy caused by natural obstacles such as buildings or hills, or multiple copies of signals sent intentionally (soft handover)  Rake receiver used to combine different path components: each path is despread separately by “fingers” of the Rake receiver and then combined .  Possible due to “low autocorrelation” of spreading code
  • 5. A Bandwidth Degradation Technique to Reduce Call Dropping Probability in… DOI: 10.9790/2834-10410411 www.iosrjournals.org 8 | Page WCDMA Transmission Module: Fig: WCDMA Transmission Module Ovsf Generator: Transmissions from a single source are separated by channelization codes Scrambling Codes: Scrambling codes make the direct sequence CDMA (DS-CDMA)technique more effective in a multipath environment Lfsr (Linear Feed Back Shift Register): LFSR sequence through (2ⁿ -1) states, where n is the number of registers in the LFSR. The contents of the registers are shifted right by one position at each clock cycle. Summer: Adaptive power control schemes are employed in CDMA technology for efficient transmission of messages.
  • 6. A Bandwidth Degradation Technique to Reduce Call Dropping Probability in… DOI: 10.9790/2834-10410411 www.iosrjournals.org 9 | Page Modulation: The differentially coherent PSK (DPSK) signaling scheme makes use of a clever technique designed to get around the need for a coherent reference signal at the receiver. V. Result Analysis 1 2 3 4 0 50 100 150 Throughput = (recived data)/(generated data)*100 1 Group= 3 users Throughput Plot for the communication system with user arrival/Removal Number of groups Throughput
  • 7. A Bandwidth Degradation Technique to Reduce Call Dropping Probability in… DOI: 10.9790/2834-10410411 www.iosrjournals.org 10 | Page 0 1 2 3 4 5 6 7 8 9 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 DR =((sum(wmax-wi)/wmax)*Ti)/(sum(Ti)) Degradation Ratio Plot for the communication system with user arrival/removal Number of Users DegradationRatio 0 1 2 3 4 5 6 7 8 9 -16 -14 -12 -10 -8 -6 -4 -2 0 2 4 x 10 4 Allocated Bandwidth = AW+wd(degrade),AW+wr(upgrade) Degraded Bandwith wrt 1st group for the communication system Number of Users degradedbandwidth 1 2 0 0.2 0.4 0.6 0.8 1 1.2 1.4 Propogation delay for the communication system Groups *(Scaled) PropogationDelay CONV DBWA
  • 8. A Bandwidth Degradation Technique to Reduce Call Dropping Probability in… DOI: 10.9790/2834-10410411 www.iosrjournals.org 11 | Page VI. Conclusion In this paper, we derived an analytical model for a wireless network which uses adaptive bandwidth allocation to provide users multilevel QoS. Four performance metrics—Throughput, propagation delay, degraded bandwidth, degradation ratio are observed.. The performance plots obtained gives that with increase in load with respect to time the through put levels maintains constant because of increase in compression level which could be controlled by adaptive band width allocation method. The performance is evaluated over WCDMA architecture by adding or removing different group of users to evaluate the algorithm efficiency. The metrics used to evaluate the performance are throughput, propagation delay, degradation ratio allocated bandwidth degradation is observed to outperform the existing fixed bandwidth allocation technique. References [1]. S. Sen, J. Jawanda, K. Basu, and S. Das, “Quality-of Service Degradation Strategies in Multimedia Wireless Network,” Proc.IEEE Vehicular Technology Conf., vol. 3, pp. 1884-1888, May 1998. [2]. S. Singh, “Quality of Service Guarantees in Mobile Computing,” Computer Comm., no. 19, pp. 359-371, 1996. [3]. M.R. Sherif, I.W. Habib, M.N. Nagshineh, and P.K. Kermani,“Adaptive Allocation of Resources and Call Admission Control for Wireless ATM Using Generic Algorithm,” IEEE J. Selected Areas in Comm., vol. 18, no. 2, pp. 268 -282, Feb. 2000. [4]. T. Kwon, Y. Choi, C. Bisdikian, and M. Naghshineh, “Call Admission Control for Adaptive Multimedia in Wireless/Mobile Network,” Proc. First ACM Int’l Workshop Wireless Mobile Multimedia, pp. 111-116, Oct. 1998. [5]. S. Choi and K.G. Shin, “Location/Mobility-Dependent Bandwidth Adaptation in QoS-Sensitive Cellular Networks,” Proc. IEEE Vehicular Technology Conf., vol. 3, pp. 1593-1597, 2001. [6]. Y.B Lin, S. Mohan, and A. Noerpel, “Queuing Priority Channel assignment Strategy for PCS Handoff and Initial Access,” IEEE Trans. Vehicular Technology, vol. 43, no. 3, pp. 704-712, Aug. 1994. [7]. R. Ramjee, R. Nagarajan, and D. Towsley, “On Optimal Call Admission Control in Cellular Networks,” Proc. IEEE INFOCOM ’96, vol. 1, pp. 43-50, 1996. [8]. K. Mitchell and K. Sohraby, “An Analysis of the Effects of mobility on Bandwidth Allocation Strategies in Multi-Class Cellular Wireless Networks,” Proc. IEEE INFOCOM ’01, vol. 2,pp. 1075-1084, 2001. [9]. A. Sutoving and J.M. Peha, “Novel Heuristic for Call Admission Control in Cellular Systems,” Proc. IEEE Int’l Conf. Universal Personal Comm., vol. 1, pp. 129-133, 1997.