WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
PERFORMANCE COMPARISON OF PACKET SCHEDULING ALGORITHMS FOR VIDEO TRAFFIC IN L...ijmnct
In this paper we have studied downlink packet scheduling algorithms proposed for LTE cellular networks.
The study emphasize on three most promising scheduling algorithms such as: FLS, EXP rule and LOG rule.
The performance of these three algorithms is conducted over video traffic in a vehicular environment using
LTE-Sim simulator. The simulation was setup with varying number of users from 10 - 60 in fixed bounded
regions of 1 km radius. The main goal this study is to provide results that will help in the design process of
packet scheduler for LTE cellular networks, aiming to get better overall performance users. Simulation
results show that, the FLS scheme outperforms in terms of average system throughput, average packet
delay, PLR; and with a satisfactory level of fairness index.
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...ijasuc
This paper proposes a fair and efficient QoS scheduling scheme for IEEE 802.16 BWA systems that
satisfies both throughput and delay guarantee to various real and non-real time applications. The proposed
QoS scheduling scheme is compared with an existing QoS scheduling scheme proposed in literature in
recent past. Simulation results show that the proposed scheduling scheme can provide a tight QoS
guarantee in terms of delay, delay violation rate and throughput for all types of traffic as defined in the
WiMAX standard, thereby maintaining the fairness and helps to eliminate starvation of lower priority
class services. Bandwidth utilization of the system and fairness index of the resources are also
encountered to validate the QoS provided by our proposed scheduling scheme.
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
In this paper, an application-based QoS evaluation approach for heterogeneous networks is proposed.It is possible to expand the network capacity and coverage in a dynamic fashion by applying heterogeneous wireless network architecture. However, the Quality of Service (QoS) evaluation of this type of network architecture is very challenging due to the presence of different communication technologies. Different communication technologies have different characteristics and the applications that utilize them have unique QoS requirements. Although, the communication technologies have different performance measurement parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration based on the performance of applications running on them. Using such applicationbased QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. Through simulation studies, we show that the application performance based assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
PERFORMANCE COMPARISON OF PACKET SCHEDULING ALGORITHMS FOR VIDEO TRAFFIC IN L...ijmnct
In this paper we have studied downlink packet scheduling algorithms proposed for LTE cellular networks.
The study emphasize on three most promising scheduling algorithms such as: FLS, EXP rule and LOG rule.
The performance of these three algorithms is conducted over video traffic in a vehicular environment using
LTE-Sim simulator. The simulation was setup with varying number of users from 10 - 60 in fixed bounded
regions of 1 km radius. The main goal this study is to provide results that will help in the design process of
packet scheduler for LTE cellular networks, aiming to get better overall performance users. Simulation
results show that, the FLS scheme outperforms in terms of average system throughput, average packet
delay, PLR; and with a satisfactory level of fairness index.
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...ijasuc
This paper proposes a fair and efficient QoS scheduling scheme for IEEE 802.16 BWA systems that
satisfies both throughput and delay guarantee to various real and non-real time applications. The proposed
QoS scheduling scheme is compared with an existing QoS scheduling scheme proposed in literature in
recent past. Simulation results show that the proposed scheduling scheme can provide a tight QoS
guarantee in terms of delay, delay violation rate and throughput for all types of traffic as defined in the
WiMAX standard, thereby maintaining the fairness and helps to eliminate starvation of lower priority
class services. Bandwidth utilization of the system and fairness index of the resources are also
encountered to validate the QoS provided by our proposed scheduling scheme.
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
In this paper, an application-based QoS evaluation approach for heterogeneous networks is proposed.It is possible to expand the network capacity and coverage in a dynamic fashion by applying heterogeneous wireless network architecture. However, the Quality of Service (QoS) evaluation of this type of network architecture is very challenging due to the presence of different communication technologies. Different communication technologies have different characteristics and the applications that utilize them have unique QoS requirements. Although, the communication technologies have different performance measurement parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration based on the performance of applications running on them. Using such applicationbased QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. Through simulation studies, we show that the application performance based assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS cscpconf
A wireless ad-hoc network is a collection of nodes which are selfconfiguring,
connected by wireless links. The nodes are free to move randomly and
organize themselves arbitrarily; thus, the network's topology may change rapidly and
unpredictably. These kinds of networks are very flexible and they do not require any
existing infrastructure. Therefore, ad-hoc wireless networks are suitable for temporary
communication links. The biggest challenge in these kinds of networks is to find a path
between the communication end points of nodes that are mobile. Due to the limited
transmission range of wireless interfaces, the communication traffic has to be relayed
over several intermediate nodes to enable the communication between two nodes.
Therefore, these kinds of networks are also called multi-hop ad-hoc networks. The
proposed model is designed to improve the problems of real-time event-based
communication. It improves the packet delivery ratio by prior prediction and reduces
end-to-end packet delay. This in turn improves performance of the routing process
significantly and increases the Quality of Service (QoS).
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
Abstract One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way. Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput.
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...ijdpsjournal
The key concern on the bandwidth allocation and scheduling for non real time traffic are the fulfillment of its minimum throughput requirement and improvement of bandwidth utilization with acceptable delay. This paper proposes a simple and efficient scheduling framework for allocating bandwidth to non real time
polling service (nrtPS) users in IEEE 802.16 networks. In this framework, jointly selective repeat ARQ at the MAC layer and adaptive modulation and coding techniques at the physical are considered. Numerical simulations demonstrate that the proposed scheduling approach provides a graceful compromise between bandwidth utilization and packet delivery delay while maintaining the minimum throughput requirements of nrtPS applications. Thus proves the efficiency of the proposed framework. The simulation is done for unicast scenario.
QoS Based Capacity Enhancement for WCDMA Network with Coding SchemeVLSICS Design
The wide-band code division multiple access (WCDMA) based 3G and beyond cellular mobile wireless networks are expected to provide a diverse range of multimedia services to mobile users with guaranteed quality of service (QoS). To serve diverse quality of service requirements of these networks it necessitates new radio resource management strategies for effective utilization of network resources with coding schemes. Call admission control CAC) is a significant component in wireless networks to guarantee quality of service requirements and also to enhance the network resilience. In this paper capacity enhancement for WCDMA network with convolutional coding scheme is discussed and compared with block code and without coding scheme to achieve a better balance between resource utilization and quality of service provisioning. The model of this network is valid for the real-time (RT) and non-real-time (NRT) services having different data rate. Simulation results demonstrate the effectiveness of the network using convolutional code in terms of capacity enhancement and QoS of the voice and video services.
Improved Algorithm for Throughput Maximization in MC-CDMAVLSICS Design
The Multi-Carrier Code Division Multiple Access (MC-CDMA) is becoming a very significant downlink multiple access technique for high-rate data transmission in the fourth generation wireless communication systems. By means of efficient resource allocation higher data rate i.e. throughput can be achieved. This paper evaluates the performance of group (subchannel) allocation criteria employed in downlink transmission, which results in throughput maximization. Proposed algorithm gives the modified technique of sub channel allocation in the downlink transmission of MC-CDMA systems. Simulation are carried out for all the three combining schemes, results shows that for the given power and BER proposed algorithm comparatively gives far better results .
In this project, we proposed a framework to support heterogenous traffic with different QoS demand in
WiMAX. This framework dynamically changes the bandwidth allocation (BA) for ongoing and new arrival
connections based on network condition and service demand. The objective is to efficiently use the
available bandwidth and provide QoS support in a fair manner. Dynamic allocation of spectrum prior to
transmission can mitigate the starvation problem of Non Real time application. The WFQ based dynamic
bandwidth allocation framework uses architecture that has packet scheduler scheme (PS), call admission
policy and a dynamic bandwidth allocation mechanism. By the simulation result we have showed that this
architecture could provide QoS support by being fair to all classes of services.
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
Multi-Radio Multi-Channel Wireless Mesh Network (MRMC-WMN) has been considered as one of the key technology for the enhancement of network performance. It is used in a number of real-time applications such as disaster management system, transportation system and health care system. MRMC-WMN is a multi-hop network and allows simultaneous data transfer by using multiple radio interfaces. All the radio interfaces are typically assigned with different channels to reduce the effect of co-channel interference. In MRMC-WMN, when two nodes transmit at the same channel in the range of each other, generates co-channel interference and degrades the network throughput. Co-channel interference badly affects the capacity of each link that reduces the overall network performance. Thus, the important task of channel assignment algorithm is to reduce the co-channel interference and enhance the network performance. In this paper, the problem of channel assignment has been addressed for MRMC-WMN. We have proposed an Interference Aware, Topology, Power and Flow Control (ITPFC) Channel Assignment algorithm for MRMC-WMN. This algorithm assignes the suitable channels to nodes, which provides better link capacity and reduces the co-channel interference. In the previous work performance of the proposed algorithm has been evaluated for a network of 30 nodes. The aim of this paper is to further evaluate the performance of proposed channel assignment algorithm for 40 and 50 nodes network. The results obtained from these networks show the consistent performance in terms of throughput, delay, packet loss and number of channels used per node as compared to LACA, FCPRA and IATC Channel Assignment algorithms.
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
Positioning techniques have been a common objective since the early development of wireless networks. However, current positioning methods in cellular networks, for instance, are still primarily focused on the use of the Global Navigation Satellite System (GNSS), which has several limitations, like high power drainage and failure in indoor scenarios. This study introduces a novel approach employing standard LTE signaling in order to provide high accuracy positioning estimation. The proposed technique is designed in analogy to the human sound localization system, eliminating the need of having information from three spatially diverse Base Stations (BSs). This is inspired by the perfect human 3D sound localization with two ears. A field study is carried out in a dense urban city to verify the accuracy of the proposed technique, with more than 20 thousand measurement samples collected. The achieved positioning accuracy is meeting the latest Federal Communications Commission (FCC) requirements in the planner dimension.
To accommodate real-time multimedia applications that achieve Quality of Service (QOS) requirements in
a wireless ad-hoc network, a QOS control mechanisms is needed. Correspondence over such networks
must consider other aspects in regard to network properties; that the time it takes to send a message and
reach its destination faces different variables from one message to the other in a short time. Therefore, the
equation of calculating the time required to resend the message must be able to contain the worst case and
acknowledges different features for the network. The objective of this paper is to improve retransmission
time calculation adaptability when occurring using Transmission Control Protocol (TCP) over wireless Ad
hoc networks. Hence, it aims to obtain more accurate time to ensure retransmission time occurring in
accordance to the network environment variables efficiently.
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
In Wireless Sensors Networks (WSN) based application, a large number of sensor devices must be deployed. Energy efficiency and network lifetime are the two most challenging issues in WSN. As a consequence, the main goal is to reduce the overall energy consumption using clustering protocols which have to ensure reliability and connectivity in large-scale WSN. This work presents a new clustering and routing algorithm based on the properties of the sensor networks. The main goal of this work is to extend the network lifetime via charge equilibration in the WSN. According to many errors with sensing devices and to have greater data accuracy, we use a quorum mechanism. The proposed algorithms are evaluated widely and the results are compared with related works. The experimental results show that the proposed algorithm provides an effective improvement in terms of energy consumption, data accuracy and network lifetime.
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
Recently, mobile networks have been overloaded
with a considerable amount of data traffic. The current paper
proposes a management service for mobile environments,
using policies and quality metrics, which ensure a better usage
of network resources with a more fine-grained management
based on flows with different classes of service and
transmission rates. This management of flows is supported
through a closed innovative control loop among a flexible
brokerage service in the network, and agents at the mobile
terminals. It also allows the terminals to make well-informed
decisions about their connections to enhance the number of
connected flows per technology and the individual service level
offered to each flow. Our results indicate that the proposed
solution optimizes the usage of available 4G network resources
among a high number of differentiated flows in several
scenarios where access technologies are extremely overloaded
whilst protecting, through a low complexity scheme, the flows
associated to users that have celebrated more expensive
contracts with their network operators.
Adaptive resource allocation and internet traffic engineering on data networkcsandit
This research paper describes the issues of bandwidth allocation, optimum capacity allocation,network operational cost reduction, and improve Internet user experience. Traffic engineering (TE) is used to manipulate network traffic to achieve certain requirements and meets certain
needs. TE becomes one of the most important building blocks in the design of the Internet backbone infrastructure. Research objective: efficient allocation of bandwidth across multiple paths. Optimum path selection. Minimize network traffic delays and maximize bandwidth utilization over multiple network paths. The bandwidth allocation is performed proportionally over multiple paths based on the path capacity.
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
The proportional fair (PF) scheduling algorithm com
promises between cell throughput and fairness. Many
research findings have been published by various re
searchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken
the practical route to analyse the algorithm based
on
three types of subscription. In this benchmarking s
tudy, the user subscriptions are differentiated as
Gold,
Silver and Bronze schemes and they are provisioned
with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major rol
e in determining the throughput. So in order to ens
ure
fairness among different subscriptions even in the
bad channel conditions and to deliver the provision
ed
throughputs certain priorities are attached with th
e subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offe
red by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assig
ned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities
assigned to subscribers determines the fairness in
the
unfavourable channel conditions - Bronze (high), Si
lver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of
three types of subscribers for nearly two hours in
the
live single cell network without any heterogeneous
cells influencing it. Furthermore, the results are
compared with the simulation results.
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc. has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes. The classes are: Bandwidth Reservation (BR), Bandwidth Degradation (BD), BR and BD and Non-BR and Non-BD (NBR-NBD). In each of the classification, the operation procedure, strengths and weaknesses of each scheme has been discussed. Furthermore, a comparative analysis of these schemes is also presented. The analysis provides insight into the challenges in the design of CAC by highlighting open research issues for future directions.
An optimum dynamic priority-based call admission control scheme for universal...TELKOMNIKA JOURNAL
The dynamism associated with quality of service (QoS) requirement for traffic emanating from smarter end users devices founded on the internet of things (IoTs) drive, places a huge demand on modern telecommunication infrastructure. Most telecom networks, currently utilize robust call admission control (CAC) policies to ameliorate this challenge. However, the need for smarter CAC has becomes imperative owing to the sensitivity of traffic currently being supported. In this work, we developed a prioritized CAC algorithm for third Generation (3G) wireless cellular network. Based on the dynamic priority CAC (DP-CAC) model, we proposed an optimal dynamic priority CAC (ODP-CAC) scheme for Universal Mobile Telecommunication System (UMTS). We then carried out simulation under heavy traffic load while also exploiting renegotiation among different call traffic classes. Also, we introduced queuing techniques to enhance the new calls success probability while still maintaining a good handoff failure across the network. Results show that ODP-CAC provides an improved performance with regards to the probability of call drop for new calls, network load utilization and grade of service with average percentage value of 15.7%, 5.4% and 0.35% respectively.
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS cscpconf
A wireless ad-hoc network is a collection of nodes which are selfconfiguring,
connected by wireless links. The nodes are free to move randomly and
organize themselves arbitrarily; thus, the network's topology may change rapidly and
unpredictably. These kinds of networks are very flexible and they do not require any
existing infrastructure. Therefore, ad-hoc wireless networks are suitable for temporary
communication links. The biggest challenge in these kinds of networks is to find a path
between the communication end points of nodes that are mobile. Due to the limited
transmission range of wireless interfaces, the communication traffic has to be relayed
over several intermediate nodes to enable the communication between two nodes.
Therefore, these kinds of networks are also called multi-hop ad-hoc networks. The
proposed model is designed to improve the problems of real-time event-based
communication. It improves the packet delivery ratio by prior prediction and reduces
end-to-end packet delay. This in turn improves performance of the routing process
significantly and increases the Quality of Service (QoS).
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
Abstract One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way. Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput.
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...ijdpsjournal
The key concern on the bandwidth allocation and scheduling for non real time traffic are the fulfillment of its minimum throughput requirement and improvement of bandwidth utilization with acceptable delay. This paper proposes a simple and efficient scheduling framework for allocating bandwidth to non real time
polling service (nrtPS) users in IEEE 802.16 networks. In this framework, jointly selective repeat ARQ at the MAC layer and adaptive modulation and coding techniques at the physical are considered. Numerical simulations demonstrate that the proposed scheduling approach provides a graceful compromise between bandwidth utilization and packet delivery delay while maintaining the minimum throughput requirements of nrtPS applications. Thus proves the efficiency of the proposed framework. The simulation is done for unicast scenario.
QoS Based Capacity Enhancement for WCDMA Network with Coding SchemeVLSICS Design
The wide-band code division multiple access (WCDMA) based 3G and beyond cellular mobile wireless networks are expected to provide a diverse range of multimedia services to mobile users with guaranteed quality of service (QoS). To serve diverse quality of service requirements of these networks it necessitates new radio resource management strategies for effective utilization of network resources with coding schemes. Call admission control CAC) is a significant component in wireless networks to guarantee quality of service requirements and also to enhance the network resilience. In this paper capacity enhancement for WCDMA network with convolutional coding scheme is discussed and compared with block code and without coding scheme to achieve a better balance between resource utilization and quality of service provisioning. The model of this network is valid for the real-time (RT) and non-real-time (NRT) services having different data rate. Simulation results demonstrate the effectiveness of the network using convolutional code in terms of capacity enhancement and QoS of the voice and video services.
Improved Algorithm for Throughput Maximization in MC-CDMAVLSICS Design
The Multi-Carrier Code Division Multiple Access (MC-CDMA) is becoming a very significant downlink multiple access technique for high-rate data transmission in the fourth generation wireless communication systems. By means of efficient resource allocation higher data rate i.e. throughput can be achieved. This paper evaluates the performance of group (subchannel) allocation criteria employed in downlink transmission, which results in throughput maximization. Proposed algorithm gives the modified technique of sub channel allocation in the downlink transmission of MC-CDMA systems. Simulation are carried out for all the three combining schemes, results shows that for the given power and BER proposed algorithm comparatively gives far better results .
In this project, we proposed a framework to support heterogenous traffic with different QoS demand in
WiMAX. This framework dynamically changes the bandwidth allocation (BA) for ongoing and new arrival
connections based on network condition and service demand. The objective is to efficiently use the
available bandwidth and provide QoS support in a fair manner. Dynamic allocation of spectrum prior to
transmission can mitigate the starvation problem of Non Real time application. The WFQ based dynamic
bandwidth allocation framework uses architecture that has packet scheduler scheme (PS), call admission
policy and a dynamic bandwidth allocation mechanism. By the simulation result we have showed that this
architecture could provide QoS support by being fair to all classes of services.
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
Multi-Radio Multi-Channel Wireless Mesh Network (MRMC-WMN) has been considered as one of the key technology for the enhancement of network performance. It is used in a number of real-time applications such as disaster management system, transportation system and health care system. MRMC-WMN is a multi-hop network and allows simultaneous data transfer by using multiple radio interfaces. All the radio interfaces are typically assigned with different channels to reduce the effect of co-channel interference. In MRMC-WMN, when two nodes transmit at the same channel in the range of each other, generates co-channel interference and degrades the network throughput. Co-channel interference badly affects the capacity of each link that reduces the overall network performance. Thus, the important task of channel assignment algorithm is to reduce the co-channel interference and enhance the network performance. In this paper, the problem of channel assignment has been addressed for MRMC-WMN. We have proposed an Interference Aware, Topology, Power and Flow Control (ITPFC) Channel Assignment algorithm for MRMC-WMN. This algorithm assignes the suitable channels to nodes, which provides better link capacity and reduces the co-channel interference. In the previous work performance of the proposed algorithm has been evaluated for a network of 30 nodes. The aim of this paper is to further evaluate the performance of proposed channel assignment algorithm for 40 and 50 nodes network. The results obtained from these networks show the consistent performance in terms of throughput, delay, packet loss and number of channels used per node as compared to LACA, FCPRA and IATC Channel Assignment algorithms.
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
Positioning techniques have been a common objective since the early development of wireless networks. However, current positioning methods in cellular networks, for instance, are still primarily focused on the use of the Global Navigation Satellite System (GNSS), which has several limitations, like high power drainage and failure in indoor scenarios. This study introduces a novel approach employing standard LTE signaling in order to provide high accuracy positioning estimation. The proposed technique is designed in analogy to the human sound localization system, eliminating the need of having information from three spatially diverse Base Stations (BSs). This is inspired by the perfect human 3D sound localization with two ears. A field study is carried out in a dense urban city to verify the accuracy of the proposed technique, with more than 20 thousand measurement samples collected. The achieved positioning accuracy is meeting the latest Federal Communications Commission (FCC) requirements in the planner dimension.
To accommodate real-time multimedia applications that achieve Quality of Service (QOS) requirements in
a wireless ad-hoc network, a QOS control mechanisms is needed. Correspondence over such networks
must consider other aspects in regard to network properties; that the time it takes to send a message and
reach its destination faces different variables from one message to the other in a short time. Therefore, the
equation of calculating the time required to resend the message must be able to contain the worst case and
acknowledges different features for the network. The objective of this paper is to improve retransmission
time calculation adaptability when occurring using Transmission Control Protocol (TCP) over wireless Ad
hoc networks. Hence, it aims to obtain more accurate time to ensure retransmission time occurring in
accordance to the network environment variables efficiently.
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
In Wireless Sensors Networks (WSN) based application, a large number of sensor devices must be deployed. Energy efficiency and network lifetime are the two most challenging issues in WSN. As a consequence, the main goal is to reduce the overall energy consumption using clustering protocols which have to ensure reliability and connectivity in large-scale WSN. This work presents a new clustering and routing algorithm based on the properties of the sensor networks. The main goal of this work is to extend the network lifetime via charge equilibration in the WSN. According to many errors with sensing devices and to have greater data accuracy, we use a quorum mechanism. The proposed algorithms are evaluated widely and the results are compared with related works. The experimental results show that the proposed algorithm provides an effective improvement in terms of energy consumption, data accuracy and network lifetime.
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
Recently, mobile networks have been overloaded
with a considerable amount of data traffic. The current paper
proposes a management service for mobile environments,
using policies and quality metrics, which ensure a better usage
of network resources with a more fine-grained management
based on flows with different classes of service and
transmission rates. This management of flows is supported
through a closed innovative control loop among a flexible
brokerage service in the network, and agents at the mobile
terminals. It also allows the terminals to make well-informed
decisions about their connections to enhance the number of
connected flows per technology and the individual service level
offered to each flow. Our results indicate that the proposed
solution optimizes the usage of available 4G network resources
among a high number of differentiated flows in several
scenarios where access technologies are extremely overloaded
whilst protecting, through a low complexity scheme, the flows
associated to users that have celebrated more expensive
contracts with their network operators.
Adaptive resource allocation and internet traffic engineering on data networkcsandit
This research paper describes the issues of bandwidth allocation, optimum capacity allocation,network operational cost reduction, and improve Internet user experience. Traffic engineering (TE) is used to manipulate network traffic to achieve certain requirements and meets certain
needs. TE becomes one of the most important building blocks in the design of the Internet backbone infrastructure. Research objective: efficient allocation of bandwidth across multiple paths. Optimum path selection. Minimize network traffic delays and maximize bandwidth utilization over multiple network paths. The bandwidth allocation is performed proportionally over multiple paths based on the path capacity.
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
The proportional fair (PF) scheduling algorithm com
promises between cell throughput and fairness. Many
research findings have been published by various re
searchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken
the practical route to analyse the algorithm based
on
three types of subscription. In this benchmarking s
tudy, the user subscriptions are differentiated as
Gold,
Silver and Bronze schemes and they are provisioned
with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major rol
e in determining the throughput. So in order to ens
ure
fairness among different subscriptions even in the
bad channel conditions and to deliver the provision
ed
throughputs certain priorities are attached with th
e subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offe
red by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assig
ned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities
assigned to subscribers determines the fairness in
the
unfavourable channel conditions - Bronze (high), Si
lver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of
three types of subscribers for nearly two hours in
the
live single cell network without any heterogeneous
cells influencing it. Furthermore, the results are
compared with the simulation results.
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc. has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes. The classes are: Bandwidth Reservation (BR), Bandwidth Degradation (BD), BR and BD and Non-BR and Non-BD (NBR-NBD). In each of the classification, the operation procedure, strengths and weaknesses of each scheme has been discussed. Furthermore, a comparative analysis of these schemes is also presented. The analysis provides insight into the challenges in the design of CAC by highlighting open research issues for future directions.
An optimum dynamic priority-based call admission control scheme for universal...TELKOMNIKA JOURNAL
The dynamism associated with quality of service (QoS) requirement for traffic emanating from smarter end users devices founded on the internet of things (IoTs) drive, places a huge demand on modern telecommunication infrastructure. Most telecom networks, currently utilize robust call admission control (CAC) policies to ameliorate this challenge. However, the need for smarter CAC has becomes imperative owing to the sensitivity of traffic currently being supported. In this work, we developed a prioritized CAC algorithm for third Generation (3G) wireless cellular network. Based on the dynamic priority CAC (DP-CAC) model, we proposed an optimal dynamic priority CAC (ODP-CAC) scheme for Universal Mobile Telecommunication System (UMTS). We then carried out simulation under heavy traffic load while also exploiting renegotiation among different call traffic classes. Also, we introduced queuing techniques to enhance the new calls success probability while still maintaining a good handoff failure across the network. Results show that ODP-CAC provides an improved performance with regards to the probability of call drop for new calls, network load utilization and grade of service with average percentage value of 15.7%, 5.4% and 0.35% respectively.
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksIJAEMSJORNAL
Abstract— In Next generation wireless Networks, the received signals (RSS) from different networks do not have a same meaning since each network is composed of its specific characteristics and there is no common pilot signal. Then, RSS comparisons are insufficient for handoff decision and may be inefficient and impractical. A more complex decision criterion that combines a large number of parameters or factors such as monetary cost, bandwidth, and power consumption and user profile is necessary. Though there are a lot works available for vertical handoff decision (VHD) for wireless networks, the selection of best network is still challenging problem. In this paper we propose a Fuzzy based vertical handoff decision controller (FVHDC) Which performs handover decision based on the output of fuzzy based rules.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...IJCNCJournal
Recently, mobile traffic is growing rapidly and spectrum resources are becoming scarce in wireless networks. Due to this, the wireless network capacity will not meet the traffic demand. To address this problem, using cellular systems in an unlicensed spectrum emerged as an effective solution. In this case, cellular systems need to coexist with Wi-Fi and other systems. For that, we propose an efficient channel assignment method for Wi-Fi AP and cellular NB, based on the DRL method. To train the DDQN model, we implement an emulator as an environment for spectrum sharing in densely deployed NB and APs in wireless heterogeneous networks. Our proposed DDQN algorithm improves the average throughput from 25.5% to 48.7% in different user arrival rates compared to the conventional method. We evaluated the generalization performance of the trained agent, to confirm channel allocation efficiency in terms of average throughput under the different user arrival rates.
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...IJCNCJournal
Recently, mobile traf ic is growing rapidly and spectrum resources are becoming scarce in wireless
networks. Due to this, the wireless network capacity will not meet the traf ic demand. To address this
problem, using cellular systems in an unlicensed spectrum emerged as an ef ective solution. In this case,
cellular systems need to coexist with Wi-Fi and other systems. For that, we propose an ef icient channel
assignment method for Wi-Fi AP and cellular NB, based on the DRL method. To train the DDQN model,
we implement an emulator as an environment for spectrum sharing in densely deployed NB and APs in
wireless heterogeneous networks. Our proposed DDQN algorithm improves the average throughput from
25.5% to 48.7% in dif erent user arrival rates compared to the conventional method. We evaluated the
generalization performance of the trained agent, to confirm channel allocation ef iciency in terms of
average throughput under the dif erent user arrival rates
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
WiMAX is based on the standard IEEE 802.16e-2009 for wireless access in Metropolitan Area Networks. It
is one of the solutions for 4G IP based wireless technology. WiMAX utilizes Orthogonal Frequency
Division Multiple Access which also supports Multicast and Broadcast Service with appropriate
Modulation and Coding Scheme. Presently, Scheduling and Resource allocation algorithm in Opportunistic
Layered Multicasting provides multicasting of layered video over mobile WiMAX to ensure better QoS.
Initially, the knowledge based allocation of subcarriers is used for scheduling. In addition, to reduce the
burst overhead, delay and jitter, SWIM (Swapping Min-Max) algorithm is utilized. Another promising
technology that can greatly improve the system performance by exploring the broadcasting nature of
wireless channels and the cooperation among multiple users is the Cooperative Multicast Scheduling
(CMS) technique. The simulation results show, Swapping Min-Max performs better with lesser number of
bursts, Zero jitter and with optimal throughput. The results with Cooperative Multicast Scheduling show
the enhanced throughput for each member in the Multicasting Scenario.
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
Talhunt is a leader in assisting and executing IEEE Engineering projects to Engineering students - run by young and dynamic IT entrepreneurs. Our primary motto is to help Engineering graduates in IT and Computer science department to implement their final year project with first-class technical and academic assistance.
Project assistance is provided by 15+ years experienced IT Professionals. Over 100+ IEEE 2015 and 200+ yester year IEEE project titles are available with us. Projects are based on Software Development Life-Cycle (SDLC) model.
Talhunt is a leader in assisting and executing IEEE Engineering projects to Engineering students - run by young and dynamic IT entrepreneurs. Our primary motto is to help Engineering graduates in IT and Computer science department to implement their final year project with first-class technical and academic assistance.
Project assistance is provided by 15+ years experienced IT Professionals. Over 100+ IEEE 2015 and 200+ yester year IEEE project titles are available with us. Projects are based on Software Development Life-Cycle (SDLC) model.
Choosing the best quality of service algorithm using OPNET simulationIJECEIAES
The concept of quality of service (QoS) is a new computer technology. Previously, there was a slow internet connection to access the sites and it was slow to send information. But now, it requires speeding up the traffic and increasing the efficiency for audio and video. In this study, we discuss the concepts of QoS provided over the network to achieve these goals. This study aims to compare six algorithms to control the QoS, then, the best algorithm will be selected to improve the traffic. These algorithms are named first in first out (FIFO), priority queuing (PQ), custom queuing (CQ), CQ with low latency queuing (LLQ), weighted fair queuing (WFQ), WFQ with low latency queuing (LLQ), so the behavior of these algorithms can be measured. The results obtained by comparing between them using OPNET simulation show that the best algorithm is the priority queuing algorithm, followed by CQ, then CQ with LLQ, then WFQ, then WFQ with LLQ and finally FIFO. All these results are plotted in the form of graphs to show the paths of these algorithms for the single state with an operation time of 5 minutes for each algorithm.
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) aims to cover innovative topics to research findings to trends analysis on Mobile Computing and Application related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives
The Use of Java Swing’s Components to Develop a WidgetWaqas Tariq
Widget is a kind of application provides a single service such as a map, news feed, simple clock, battery-life indicators, etc. This kind of interactive software object has been developed to facilitate user interface (UI) design. A user interface (UI) function may be implemented using different widgets with the same function. In this article, we present the widget as a platform that is generally used in various applications, such as in desktop, web browser, and mobile phone. We also describe a visual menu of Java Swing’s components that will be used to establish widget. It will assume that we have successfully compiled and run a program that uses Swing components.
3D Human Hand Posture Reconstruction Using a Single 2D ImageWaqas Tariq
Passive sensing of the 3D geometric posture of the human hand has been studied extensively over the past decade. However, these research efforts have been hampered by the computational complexity caused by inverse kinematics and 3D reconstruction. In this paper, our objective focuses on 3D hand posture estimation based on a single 2D image with aim of robotic applications. We introduce the human hand model with 27 degrees of freedom (DOFs) and analyze some of its constraints to reduce the DOFs without any significant degradation of performance. A novel algorithm to estimate the 3D hand posture from eight 2D projected feature points is proposed. Experimental results using real images confirm that our algorithm gives good estimates of the 3D hand pose. Keywords: 3D hand posture estimation; Model-based approach; Gesture recognition; human- computer interface; machine vision.
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Waqas Tariq
Camera mouse has been widely used for handicap person to interact with computer. The utmost important of the use of camera mouse is must be able to replace all roles of typical mouse and keyboard. It must be able to provide all mouse click events and keyboard functions (include all shortcut keys) when it is used by handicap person. Also, the use of camera mouse must allow users troubleshooting by themselves. Moreover, it must be able to eliminate neck fatigue effect when it is used during long period. In this paper, we propose camera mouse system with timer as left click event and blinking as right click event. Also, we modify original screen keyboard layout by add two additional buttons (button “drag/ drop” is used to do drag and drop of mouse events and another button is used to call task manager (for troubleshooting)) and change behavior of CTRL, ALT, SHIFT, and CAPS LOCK keys in order to provide shortcut keys of keyboard. Also, we develop recovery method which allows users go from camera and then come back again in order to eliminate neck fatigue effect. The experiments which involve several users have been done in our laboratory. The results show that the use of our camera mouse able to allow users do typing, left and right click events, drag and drop events, and troubleshooting without hand. By implement this system, handicap person can use computer more comfortable and reduce the dryness of eyes.
A Proposed Web Accessibility Framework for the Arab DisabledWaqas Tariq
The Web is providing unprecedented access to information and interaction for people with disabilities. This paper presents a Web accessibility framework which offers the ease of the Web accessing for the disabled Arab users and facilitates their lifelong learning as well. The proposed framework system provides the disabled Arab user with an easy means of access using their mother language so they don’t have to overcome the barrier of learning the target-spoken language. This framework is based on analyzing the web page meta-language, extracting its content and reformulating it in a suitable format for the disabled users. The basic objective of this framework is supporting the equal rights of the Arab disabled people for their access to the education and training with non disabled people. Key Words : Arabic Moon code, Arabic Sign Language, Deaf, Deaf-blind, E-learning Interactivity, Moon code, Web accessibility , Web framework , Web System, WWW.
Real Time Blinking Detection Based on Gabor FilterWaqas Tariq
New method of blinking detection is proposed. The utmost important of blinking detections method is robust against different users, noise, and also change of eye shape. In this paper, we propose blinking detections method by measuring of distance between two arcs of eye (upper part and lower part). We detect eye arcs by apply Gabor filter onto eye image. As we know that Gabor filter has advantage on image processing application since it able to extract spatial localized spectral features, such line, arch, and other shape are more easily detected. After two of eye arcs are detected, we measure the distance between both by using connected labeling method. The open eye is marked by the distance between two arcs is more than threshold and otherwise, the closed eye is marked by the distance less than threshold. The experiment result shows that our proposed method robust enough against different users, noise, and eye shape changes with perfectly accuracy.
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...Waqas Tariq
A method for computer input with human eyes-only using two Purkinje images which works in a real time basis without calibration is proposed. Experimental results shows that cornea curvature can be estimated by using two light sources derived Purkinje images so that no calibration for reducing person-to-person difference of cornea curvature. It is found that the proposed system allows usersf movements of 30 degrees in roll direction and 15 degrees in pitch direction utilizing detected face attitude which is derived from the face plane consisting three feature points on the face, two eyes and nose or mouth. Also it is found that the proposed system does work in a real time basis.
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...Waqas Tariq
Mobile multimedia service is relatively new but has quickly dominated people¡¯s lives, especially among young people. To explain this popularity, this study applies and modifies the Technology Acceptance Model (TAM) to propose a research model and conduct an empirical study. The goal of study is to examine the role of Perceived Enjoyment (PE) and what determinants can contribute to PE in the context of using mobile multimedia service. The result indicates that PE is influencing on Perceived Usefulness (PU) and Perceived Ease of Use (PEOU) and directly Behavior Intention (BI). Aesthetics and flow are key determinants to explain Perceived Enjoyment (PE) in mobile multimedia usage.
Collaborative Learning of Organisational KnolwedgeWaqas Tariq
This paper presents recent research into methods used in Australian Indigenous Knowledge sharing and looks at how these can support the creation of suitable collaborative envi- ronments for timely organisational learning. The protocols and practices as used today and in the past by Indigenous communities are presented and discussed in relation to their relevance to a personalised system of knowledge sharing in modern organisational cultures. This research focuses on user models, knowledge acquisition and integration of data for constructivist learning in a networked repository of or- ganisational knowledge. The data collected in the repository is searched to provide collections of up-to-date and relevant material for training in a work environment. The aim is to improve knowledge collection and sharing in a team envi- ronment. This knowledge can then be collated into a story or workflow that represents the present knowledge in the organisation.
Our research aims to propose a global approach for specification, design and verification of context awareness Human Computer Interface (HCI). This is a Model Based Design approach (MBD). This methodology describes the ubiquitous environment by ontologies. OWL is the standard used for this purpose. The specification and modeling of Human-Computer Interaction are based on Petri nets (PN). This raises the question of representation of Petri nets with XML. We use for this purpose, the standard of modeling PNML. In this paper, we propose an extension of this standard for specification, generation and verification of HCI. This extension is a methodological approach for the construction of PNML with Petri nets. The design principle uses the concept of composition of elementary structures of Petri nets as PNML Modular. The objective is to obtain a valid interface through verification of properties of elementary Petri nets represented with PNML.
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardWaqas Tariq
The main aim of this paper is to build a system that is capable of detecting and recognizing the hand gesture in an image captured by using a camera. The system is built based on Altera’s FPGA DE2 board, which contains a Nios II soft core processor. Image processing techniques and a simple but effective algorithm are implemented to achieve this purpose. Image processing techniques are used to smooth the image in order to ease the subsequent processes in translating the hand sign signal. The algorithm is built for translating the numerical hand sign signal and the result are displayed on the seven segment display. Altera’s Quartus II, SOPC Builder and Nios II EDS software are used to construct the system. By using SOPC Builder, the related components on the DE2 board can be interconnected easily and orderly compared to traditional method that requires lengthy source code and time consuming. Quartus II is used to compile and download the design to the DE2 board. Then, under Nios II EDS, C programming language is used to code the hand sign translation algorithm. Being able to recognize the hand sign signal from images can helps human in controlling a robot and other applications which require only a simple set of instructions provided a CMOS sensor is included in the system.
An overview on Advanced Research Works on Brain-Computer InterfaceWaqas Tariq
A brain–computer interface (BCI) is a proficient result in the research field of human- computer synergy, where direct articulation between brain and an external device occurs resulting in augmenting, assisting and repairing human cognitive. Advanced works like generating brain-computer interface switch technologies for intermittent (or asynchronous) control in natural environments or developing brain-computer interface by Fuzzy logic Systems or by implementing wavelet theory to drive its efficacies are still going on and some useful results has also been found out. The requirements to develop this brain machine interface is also growing day by day i.e. like neuropsychological rehabilitation, emotion control, etc. An overview on the control theory and some advanced works on the field of brain machine interface are shown in this paper.
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...Waqas Tariq
There is growing ageing phenomena with the rise of ageing population throughout the world. According to the World Health Organization (2002), the growing ageing population indicates 694 million, or 223% is expected for people aged 60 and over, since 1970 and 2025.The growth is especially significant in some advanced countries such as North America, Japan, Italy, Germany, United Kingdom and so forth. This growing older adult population has significantly impact the social-culture, lifestyle, healthcare system, economy, infrastructure and government policy of a nation. However, there are limited research studies on the perception and usage of a mobile phone and its service for senior citizens in a developing nation like Malaysia. This paper explores the relationship between mobile phones and senior citizens in Malaysia from the perspective of a developing country. We conducted an exploratory study using contextual interviews with 5 senior citizens of how they perceive their mobile phones. This paper reveals 4 interesting themes from this preliminary study, in addition to the findings of the desirable mobile requirements for local senior citizens with respect of health, safety and communication purposes. The findings of this study bring interesting insight to local telecommunication industries as a whole, and will also serve as groundwork for more in-depth study in the future.
Principles of Good Screen Design in WebsitesWaqas Tariq
Visual techniques for proper arrangement of the elements on the user screen have helped the designers to make the screen look good and attractive. Several visual techniques emphasize the arrangement and ordering of the screen elements based on particular criteria for best appearance of the screen. This paper investigates few significant visual techniques in various web user interfaces and showcases the results for better understanding and their presence.
Virtual teams are used more and more by companies and other organizations to receive benefits. They are a great way to enable teamwork in situations where people are not sitting in the same physical place at the same time. As companies seek to increase the use of virtual teams, a need exists to explore the context of these teams, the virtuality of a team and software that may help these teams working virtualy. Virtual teams have the same basic principles as traditional teams, but there is one big difference. This difference is the way the team members communicate. Instead of using the dynamics of in-office face-to-face exchange, they now rely on special communication channels enabled by modern technologies, such as e-mails, faxes, phone calls and teleconferences, virtual meetings etc. This is why this paper is focused on the issues regarding virtual teams, and how these teams are created and progressing in Albania.
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Waqas Tariq
It is a well established fact that the Web-Applications require frequent maintenance because of cutting– edge business competitions. The authors have worked on quality evaluation of web-site of Indian ecommerce domain. As a result of that work they have made a quality-wise ranking of these sites. According to their work and also the survey done by various other groups Futurebazaar web-site is considered to be one of the best Indian e-shopping sites. In this research paper the authors are assessing the maintenance of the same site by incorporating the problems incurred during this evaluation. This exercise gives a real world maintainability problem of web-sites. This work will give a clear picture of all the quality metrics which are directly or indirectly related with the maintainability of the web-site.
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...Waqas Tariq
A paradox has been observed whereby web site usability is proven to be an essential element in a web site, yet at the same time there exist an abundance of web pages with poor usability. This discrepancy is the result of limitations that are currently preventing web developers in the commercial sector from producing usable web sites. In this paper we propose a framework whose objective is to alleviate this problem by automating certain aspects of the usability evaluation process. Mainstreaming comes as a result of automation, therefore enabling a non-expert in the field of usability to conduct the evaluation. This results in reducing the costs associated with such evaluation. Additionally, the framework allows the flexibility of adding, modifying or deleting guidelines without altering the code that references them since the guidelines and the code are two separate components. A comparison of the evaluation results carried out using the framework against published evaluations of web sites carried out by web site usability professionals reveals that the framework is able to automatically identify the majority of usability violations. Due to the consistency with which it evaluates, it identified additional guideline-related violations that were not identified by the human evaluators.
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...Waqas Tariq
A robot arm utilized having meal support system based on computer input by human eyes only is proposed. The proposed system is developed for handicap/disabled persons as well as elderly persons and tested with able persons with several shapes and size of eyes under a variety of illumination conditions. The test results with normal persons show the proposed system does work well for selection of the desired foods and for retrieve the foods as appropriate as usersf requirements. It is found that the proposed system is 21% much faster than the manually controlled robotics.
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text EditorWaqas Tariq
In recent decades speech interactive systems have gained increasing importance. Performance of an ASR system mainly depends on the availability of large corpus of speech. The conventional method of building a large vocabulary speech recognizer for any language uses a top-down approach to speech. This approach requires large speech corpus with sentence or phoneme level transcription of the speech utterances. The transcriptions must also include different speech order so that the recognizer can build models for all the sounds present. But, for Telugu language, because of its complex nature, a very large, well annotated speech database is very difficult to build. It is very difficult, if not impossible, to cover all the words of any Indian language, where each word may have thousands and millions of word forms. A significant part of grammar that is handled by syntax in English (and other similar languages) is handled within morphology in Telugu. Phrases including several words (that is, tokens) in English would be mapped on to a single word in Telugu.Telugu language is phonetic in nature in addition to rich in morphology. That is why the speech technology developed for English cannot be applied to Telugu language. This paper highlights the work carried out in an attempt to build a voice enabled text editor with capability of automatic term suggestion. Main claim of the paper is the recognition enhancement process developed by us for suitability of highly inflecting, rich morphological languages. This method results in increased speech recognition accuracy with very much reduction in corpus size. It also adapts Telugu words to the database dynamically, resulting in growth of the corpus.
An Improved Approach for Word Ambiguity RemovalWaqas Tariq
Word ambiguity removal is a task of removing ambiguity from a word, i.e. correct sense of word is identified from ambiguous sentences. This paper describes a model that uses Part of Speech tagger and three categories for word sense disambiguation (WSD). Human Computer Interaction is very needful to improve interactions between users and computers. For this, the Supervised and Unsupervised methods are combined. The WSD algorithm is used to find the efficient and accurate sense of a word based on domain information. The accuracy of this work is evaluated with the aim of finding best suitable domain of word. Keywords: Human Computer Interaction, Supervised Training, Unsupervised Learning, Word Ambiguity, Word sense disambiguation
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Waqas Tariq
From the existing research it has been observed that many techniques and methodologies are available for performing every step of Automatic Speech Recognition (ASR) system, but the performance (Minimization of Word Error Recognition-WER and Maximization of Word Accuracy Rate- WAR) of the methodology is not dependent on the only technique applied in that method. The research work indicates that, performance mainly depends on the category of the noise, the level of the noise and the variable size of the window, frame, frame overlap etc is considered in the existing methods. The main aim of the work presented in this paper is to use variable size of parameters like window size, frame size and frame overlap percentage to observe the performance of algorithms for various categories of noise with different levels and also train the system for all size of parameters and category of real world noisy environment to improve the performance of the speech recognition system. This paper presents the results of Signal-to-Noise Ratio (SNR) and Accuracy test by applying variable size of parameters. It is observed that, it is really very hard to evaluate test results and decide parameter size for ASR performance improvement for its resultant optimization. Hence, this study further suggests the feasible and optimum parameter size using Fuzzy Inference System (FIS) for enhancing resultant accuracy in adverse real world noisy environmental conditions. This work will be helpful to give discriminative training of ubiquitous ASR system for better Human Computer Interaction (HCI). Keywords: ASR Performance, ASR Parameters Optimization, Multi-Environmental Training, Fuzzy Inference System for ASR, ubiquitous ASR system, Human Computer Interaction (HCI)
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The French Revolution Class 9 Study Material pdf free download
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Networks
1. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 1
Call Admission Control Scheme With Multimedia
Scheduling Service in WiMAX Networks
Zhiwei Yan zhiweiyan@mailst.xjtu.edu.cn
The School of Electronics and Information Engineering
Xi’an Jiaotong University
Xi’an 710049, P. R. China
Guizhong Liu liugz@mail.xjtu.edu.cn
The School of Electronics and Information Engineering
Xi’an Jiaotong University
Xi’an 710049, P. R. China
Rui Su ssurui@gmail.com
Xi’an Satellite Control Center
Xi’an 710049, P. R. China
Abstract
WiMAX network introduces a multimedia data scheduling service to handle the different quality of
service (QoS) requirements. The service schedules the opportunities of data transmission
according to the types of traffic for the connections or users. In this paper, based on the data
types defined in the service, a uniform definition of QoS level is proposed for multimedia
connections. The QoS level of individual connection is only determined by the type of data of the
connection and its allocated resources. By means of allocating the bandwidth resources and
calculating the QoS levels, we can make a decision of call admission control (CAC) for the entry
admission of a new connection, without degrading the network performance and the QoS of
ongoing connections. The contribution of this scheme is to regulate the traffic of ongoing
connections so that the network can work at an optimal point, especially under heavy load traffic.
Simulation experiments confirm that the proposed CAC scheme can achieve better trade-off
between the overall performance of network system and the QoS requirements of individual
connection.
Keywords: Call Admission Control, QoS level, Multimedia, Wireless Network, WiMAX.
1. INTRODUCTION
Call admission control (CAC) is a technology that it manages call entry requests or regulates
traffic volume loaded on a network. The technology is used typically in wireless voice
communications or in VoIP (voice over Internet Protocol, also known as Internet telephony)
networks [1] [2]. It is also used to ensure, or maintain a certain level of quality in video
communications networks [3] [4] [5]. Generally, it is also considered as a methodology or a trade-
off policy between limited resource supply and a larger amount of resource demand. For
example, in a telephone service network, a typical real-time delay-sensitive application, call
admission control will take such strategy that it can deny much more network access, not allowing
traffic onto the network if the network condition is under congestion. If CAC strategy is not taken,
traffic congestion of this network will deteriorate. In addition, call admission control influences the
allocation of network resources: if an influx of data traffic is greedy for oversubscribing link
resources in the network, the excessive network traffic of a connection will impair the quality of
service of other connections. The worse thing is to bring about many connections or users who
are blocked or dropped and to result in the dissatisfaction with the service among users.
In the past decades, most of CAC algorithms fall into three broad categories according to call
entry management disciplines. The first category of algorithms are implemented by regulating the
2. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 2
basic network parameters. These parameters include the total utilized bandwidth, the total
number of calls, or the total number of packets or data bits, which pass a specific point per unit
time. If the values of the parameters are reached or exceeded the pre-defined top or bottom
threshold, new calls are likely to be prohibited from or postponed entering the network until at
least one current call leaves or terminates [6] [7].
The second category of algorithms builds their discipline of service threshold through combining
the utility of lower network layers (MAC and Physical Layers) together. For example, in [8], Song
and Zhuang introduced a service discipline called the shortest remaining processing time. The
size of this time is regulated to an appropriate threshold, which is used to judge which connection
was dropped. Yilmaz and Chen did the roughly similar works [9]. They built the threshold of price
for radio resource. They first made a pricing scheme by means of analyzing the features of CAC
in single and multiple-class traffic, and then developed a CAC algorithm with hybrid partitioning
thresholds by the pricing scheme. The scheme periodically determines an optimum price of
resources in order to maximize the system revenue. Those connections or users who could not
afford their required resource would be denied or dropped. In [10], [11], the problem of whether or
not to accept an incoming user is transformed into a mathematical problem, which achieves the
maximum resource utilization by means of establishing and analyzing a complex model of a semi-
Markov decision process. Zhai and Xiang regulated the arriving traffic of the IEEE802.11 network
such that the network can work at an optimal point through measuring channel busyness ratio as
an indicator of the network status [12].
The third category of algorithms is called resource reservation algorithms. In the algorithms,
researchers made a reservation of radio resources for new incoming connections. This topic has
been extensively examined in the last decade. For example, in [13], [14], preferential admission is
given to high priority calls by preserving an interference guard margin. The guard margin is is
dynamically adjusted by referencing traffic conditions in neighboring cells based upon users’
quality of service. El-Kadi presented such a reservation method by borrowing bandwidth from
other calls in a cell for an incoming call [15]. The amount of bandwidth borrowed from ongoing
calls is proportional to its tolerance to bandwidth loss in the scheme. In [16], Elsayed evaluated
the three resource reservation policies: the uniform reservation policy, the capacity proportional
policy, and the remaining capacity proportional policy. The policies are used to map the end-to-
end delay requirement into a local rate to be reserved at each switch.
However, these CAC algorithms above consider less about the features of connections from the
view of application layer. Few literatures address this feature in CAC schemes. Therefore, we
construct a uniform QoS metric of connection in accordance with the types of multimedia
applications and its allocated resources of connections in the paper. And then using the metric,
we propose a CAC scheme to make the network perform at an optimal point.
The rest of this paper is organized as follows: Section 2 introduces the five types of application
traffic defined in WiMAX scheduling services. Then we develop a uniform metric of QoS level for
the different traffic. Especially, we describe in detail the QoS of video application based on an
idea of rate distortion optimization (RDO) model in Section 3. Next, we prove mathematically that
there is an optimum solution of bandwidth allocation if the bandwidth of connections can be
adjusted dynamically in Section 4. In Section5, CAC algorithm is proposed to determine
according to the optimal solution of bandwidth allocation of connections. We report the results of
simulation experiments in Section 6. Finally, we conclude the paper in Section 7.
2. WIMAX SCHEDULING SERVICES
One of the key functions of the WiMAX (Worldwide Interoperability for Microwave Access) MAC
layer is to ensure that QoS requirements for MAC packet data units are met as reliably as
possible given the loading conditions of the system. These packet data belong to the five different
service flows. This implies that various negotiated performance indicators that are tied to the
overall QoS, such as latency, jitter, data rate, packet error rate, and system availability, must be
met for each connection [17] [18]. The WiMAX MAC layer designs a scheme of scheduling
3. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 3
service to deliver and handle MAC packet data with different QoS requirements. A scheduling
service uniquely determines the mechanism the network uses to allocate upload and download
transmission opportunities for the packet data. WiMAX standard define five scheduling services.
• The unsolicited grant service (UGS) is designed to support real-time service flows. The flow
data include fixed-size data packets with a periodic basis, such as T1/E1 and VoIP. So UGS
offers fixed-size grants on a real-time periodic basis. The features of traffic implies that the
resources the UGS requests are constant during the whole communication.
• The real-time polling services (rtPS) is designed to support real-time services that generate
variable- size data packets on a periodic basis, such as MPEG (Motion Pictures Experts Group)
or H.264 video. In this service class, the base station provides unicast polling opportunities for the
MS (Mobile Station) to request bandwidth. The unicast polling opportunities are frequent enough
to ensure that latency requirements of real-time services are met. This service requires more
request overhead than UGS does but is more efficient for service that generates variable-size
data packets or has a duty cycle less than 100 percent.
• The non-real-time polling services (nrtPS) is very similar to rtPS except that the MS can also
use contention-based polling in the uplink to request bandwidth. In nrtPS, it is allowable to have
unicast polling opportunities, but the average duration between two such opportunities is in the
order of few seconds, which is large compared to rtPS. All the MSs belonging to the group can
also request resources during the contention-based polling opportunity, which can often result in
collisions and additional attempts.
• The best-effort service (BE) provides very little QoS support and is applicable only for services
that do not have strict QoS requirements. Data is sent whenever resources are available and not
required by any other scheduling-service classes. The MS uses only the contention-based polling
opportunity to request bandwidth.
• The extended real-time polling service (ertPS), a new scheduling service introduced with the
IEEE 802.16e standard, builds on the efficiencies of UGS and rtPS. In this case, periodic upload
allocations provided for a particular MS can be used either for data transmission or for requesting
additional bandwidth. This features allow ertPS to accommodate data services whose bandwidth
requirements change with time. Note that in the case of UGS, unlike ertPS, the MS is allowed to
request additional bandwidth during the upload allocation for only non-UGS-related connections.
3. CAC SCHEDULER MODEL, SERVICE FLOW AND QOS OPERATIONS
Since the QoS requirements of different data services can vary greatly, WiMAX needs various
handling and transporting mechanisms to meet that variety. The scheduling mechanisms of the
services, however, are not implemented in WiMAX standards. The WiMAX standard explains the
reason that the scheduling mechanisms or algorithms will be implemented independently by
various vendors. In the paper, our work focuses on the issue. The key idea is that we combine
the data scheduling mechanism with call admission control mechanism to obtain the more
effective results than before.
3.1. CAC Scheduler Model
Just as we said above, CAC methodology is to determine which connection or user ought to be
dropped or blocked, averting network congestion. In the paper, we consider a general CAC model
of WiMAX network, which consists of the KK connections in one base station (BS), illustrated in
Figure 1. These connections include K ¡ 1K ¡ 1 ongoing connections and one new incoming
connection. All of these connections fall into five different application traffic categories, belonging
to the corresponding WiMAX services. Before the KK th connection is admitted into the BS, all
(K ¡ 1K ¡ 1) connections share all available bandwidth by provided the BS, denoted by BtotalBtotal. The
CAC process is triggered by the KK th connection when a mobile station sends its new connection
request and bandwidth allocation request. A vector or scheme of bandwidth allocation bb is
4. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 4
provided by the our proposed QoS level evaluator, where bibi denotes the assigned bandwidth for
the ii th connection, b = [b1; b2; b3; : : : ; bK ]b = [b1; b2; b3; : : : ; bK ] and
P K
i= 1 bi · Btotal
P K
i= 1 bi · Btotal . Based on the allocated
bandwidth bibi of every connection, the CAC scheduler examines the QoS level of each connection
and the whole QoS of the BS. After that, the CAC scheduler makes the decision whether or not
the KK th connection will be blocked.
3.2. QoS Metric And Bandwidth Allocation
The traditional QoS metrics of connections are developed by most of the existed CAC
algorithms. They are directly taken from the measurement of MAC layer or physical layer,
such as bandwidth utilization ratio, drop call rate and so on. Our CAC method emphasizes the
QoS metric from the view of application layer for the connections, which depends on from the
bandwidth allocation scheme b and the characteristic of applications.
FIGURE 1: System model of CAC in WiMAX networks
3.2.1. QoS Metric of UGS Traffic.
TABLE 1: R-Factor vs. Packet Loss
For VoIP application as a typical UGS traffic, the E- Model provides an objective method
of assessing the transmission quality of a telephone connection. The model defines an
analytic model for prediction of voice quality based on network impairment parameters,
such as packet loss and delay [19]. The E-Model results in an R- factor ranging from a
best case of 100 to a worst case of 0. The R- factor uniquely is reduced into another
well-known metric: the Mean Opinion Score (MOS), which provides a numerical indication
of the perceived quality of received media after compression and/or transmission. The
number is in a scale of 1 to 5, where 1 is the lowest perceived quality, and 5 is the
highest perceived quality [20].
The R-factor can be obtained by the following expression:
R = R0 ¡ I s ¡ I d ¡ I e + AR = R0 ¡ I s ¡ I d ¡ I e + A (1)
where R0 represents the basic signal-to-noise ratio. I s represents the combination of all
impairments which occur more or less simultaneously with voice signal; Id stands for the
impairments caused by delay. Ie denotes impairments caused by low bit rate codecs
and A is the advantage factor, that corresponds to the user allowance due to the
convenience in using a given technology. Eqn.(1) can be reduced to:
5. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 5
R = 93:4 ¡ I d(Ta) ¡ I e(codec; loss)R = 93:4 ¡ I d(Ta) ¡ I e(codec; loss) (2)
where Id is a function of the absolute one-way delay and Ie rests on the sound codec
type and the packet loss rate. (Here, we assume the delay is very small and can be
omitted). We can obtain the results of voice QoS level for different packet loss rate by the
E-Model calculator [21]. The results, in Table I, suggest that the voice applications hardly
tolerate packet loss because R-Factor < 50 means poor quality (Nearly all users
dissatisfied). Therefore, we have the QoS metric of UGS(voice) traffic, defined by Eqn.(3)
(3)
where ®UGS®UGS represents the QoS level of UGS traffic. bb is the allocated bandwidth and BB is the
required bandwidth for voice applications. Furthermore, we express the metric by the Dirac
measure , shown in Eqn(4).
®UGS
= ±b(B ) =
(
1 if b = B ,
0 others
®UGS
= ±b(B ) =
(
1 if b = B ,
0 others
(4)
3.2.2. QoS Metric of rtPS Traffic.
Video traffic is a typical rtPS application. In video applications, the most popular objective criterion for
image quality is peak signal-to-noise ratio (PSNR), which measures the difference between the
corrupted video image K and original video one I , illustrated in Eqn.(5).
PSN R = 10 ¢log10
µ
M AX 2
I
M SE
¶
M SE =
1
M N
M ¡ 1X
i= 0
N ¡ 1X
j = 0
[I (i; j ) ¡ K (i; j )]2
PSN R = 10 ¢log10
µ
M AX 2
I
M SE
¶
M SE =
1
M N
M ¡ 1X
i= 0
N ¡ 1X
j = 0
[I (i; j ) ¡ K (i; j )]2
(5)
where M AX IM AX I is the maximum possible pixel value of the image. When the pixels are represented
using 8 bits per sample, this is 255. More generally, when samples are represented using linear PCM
with zz bits per sample, M AX IM AX I is 2z
¡ 12z
¡ 1. The mean squared error (MSE) which for two M £ NM £ N
monochrome images I and K. The image II means the reference image and the image KK is a
corrupted image.
The PSNR, however, is not directly applied in CAC processes for the measurement of QoS level of
connections, because the value of the PSNR of a video image can be calculated correctly only after
the video packets must be decoded into the YUV images in the application layer. Moreover, the
reference video images are hardly obtained by CAC schedulers in BS in advance. What we have in
CAC scheduler is bandwidth requirement BB from the application layer and bandwidth allocation bb
provided by the CAC scheduler. Thus, similar to the ratio of network throughput, the ratio of the
allocated bandwidth bb to the required bandwidth BB sometimes is used to evaluate the quality of
connection. Unfortunately, it is also not suitable for the video traffic, because video quality is not linear
relationship with the ratio [22] . We should seek out another alternative measurement solution, which
is closely akin to the PSNR and particularly suitable for the CAC process.
We find that we can utilize the idea of rate distortion optimization (RDO) in our case. RDO is a method
of improving video quality in image compression and video encoding[23][24][25]. It aims to establish
the relationship between the amount of distortions (loss of video quality) and the amount of data
required to encode the video. The RDO method bridges between the video QoS measurement and
the bandwidth allocation in the CAC problem. In order to find a suitable metric for video traffic, we
investigated some typical fitting models for the relationship between encoding rate and quality of video.
6. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 6
The Table II shows the results of fitting operations as an example, for a video sequence called
"Forman". We choose the last two fitting modes (labeled by 7 and 8) as the candidates of QoS
evaluation. If we had considered only mathematical results not practical conditions, we might have
chosen the model p1x4
+ p2x3
+ p3x2
+ p4x + p5p1x4
+ p2x3
+ p3x2
+ p4x + p5 just according to the goodness of fit (SSE and
Adjusted R‐square). Here, we choose the fitting model (labeled by 7), a(1¡ e
½ x
max(x ) )a(1¡ e
½ x
max(x ) ). There are
three reasons for the choice: First, from the view of complexity, the polynomial model contains five
parameters and is more complex than the exponential one. What we just need is a simple and robust
QoS metric in the CAC process. Second, the exponential model also denotes the relationship better
than other six models and make a good balance between the simplicity and accuracy. Third, the
model also cover the other type of traffic, detail in the later Section 3.3.
We normalized the relationship and proposed a formula shown in Eqn(6), which denotes the
relationship between quality of video or rtPS application ®® and allocated bandwidth bb for the rtPS
connection.
FIGURE2: Comparison of the proposed metric of QoS level (½= 4½= 4) and the normalized PSNR of video
clips, which are Akiyo, Coastguard, Carphone, Foreman, Mobile, and Mother &daughter.
TABLE 2: Fitting Model Types
®r tP S
=
PSN Rb
PSN RB
=
1 ¡ e¡ ½b
B
1 ¡ e¡ ½
; ½> 0®r tP S
=
PSN Rb
PSN RB
=
1 ¡ e¡ ½b
B
1 ¡ e¡ ½
; ½> 0 (6)
where PSN RbPSN Rb and PSN RBPSN RB are the qualities of video with the encoding rate bband BB, respectively.
®r tP S®r tP S indicates the normalized QoS level of a rpPS or video stream. ½½stands for the characteristic of
the rtPS or video connection. Every rtPS connection has its unique value ½½, which can be determined
before data transmission. e¡ ½b
Be¡ ½b
B denotes the distortion, 1¡ e½b
B1¡ e½b
B denotes the QoS level of the rtPS
stream and the denominator 1¡ e¡ ½
1¡ e¡ ½is introduced for normalization. The bb denotes the amount of
allocated bandwidth of the connection, which is larger than the minimum bandwidth BminBmin , and BB
7. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 7
denotes the amount of desired bandwidth of the connection. In order to further validate the formula, we
encode the standard video sequences with the different traffic rate and compare the results with the
proposed metric with ½= 4½= 4. The results are shown in Fig.3. As expected, the proposed metric is a
proper approximation for the QoS of video streams.
3.2.3. QoS Metric of Other Traffic.
For the BE traffic, FTP and HTTP applications are popular examples. File Transfer Protocol (FTP) is a
standard network protocol used to transfer files from one host to another host over a TCP-based
network. FTP is usually built on a client-server architecture and uses separate control and data
connections between the client and the server [25]. For instance, we use it to upload web pages and
other documents from a private development machine to a public web-hosting server. The Hypertext
Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information
systems. HTTP is the foundation of data communication for the World Wide Web [26]. The same point
for the two applications is that their quality just depends on the ratio between the volume of data received
by the receiver end and the volume of data sent by the sender end. Therefore, we can simply define the
QoS metric, shown in Eqn.(7).
®other s
=
b
B
®other s
=
b
B
(7)
where bbis the allocated bandwidth and BB is the required bandwidth for BE applications. We think the
ratio represents the QoS of BE traffic. For the last two type of traffic, nrtPS and ertPS, the relationship
between their data and QoS level are also similar to the BE applications. We use the Eqn.(7) to denote it
too.
3.2.4 Uniform QoS Metric With Allocated Bandwidth Resources
Because the forms of QoS level metric of the five services traffic look like different, we summarize them
into one form. For BE, nrtPS or ertPS, we notice that the limit of Eqn.(6) when ½½approaches 00, illustrated
in Eqn(8).
lim
½! 0
1 ¡ e¡ ½b
B
1 ¡ e¡ ½
=
b
B
lim
½! 0
1 ¡ e¡ ½b
B
1 ¡ e¡ ½
=
b
B
(8)
Therefore, we rewrite the QoS metric of Eqn(9) as
®other s
=
b
B
=
1 ¡ e¡ ½b
B
1 ¡ e¡ ½
if ½! 0®other s
=
b
B
=
1 ¡ e¡ ½b
B
1 ¡ e¡ ½
if ½! 0 (9)
Finally, we sum up the equations of QoS level for all traffic and we have
® =
8
>><
>>:
±b(B ); for UGS tra± c
1¡ e¡ ½ b
B
1¡ e¡ ½ ; ½> 0 for rtPS tra± c
1¡ e¡ ½ b
B
1¡ e¡ ½ ; ½> 0; ½! 0; for BE, nrtPS, ertPS tra± c
® =
8
>><
>>:
±b(B ); for UGS tra± c
1¡ e¡ ½ b
B
1¡ e¡ ½ ; ½> 0 for rtPS tra± c
1¡ e¡ ½ b
B
1¡ e¡ ½ ; ½> 0; ½! 0; for BE, nrtPS, ertPS tra± c
(10)
4. OPTIMUM RESOURCE ALLOCATION SOLUTION
The target of CAC schemes is to maximize the QoS level demand of all connections as it can as
possible. At the same time, bandwidth resource can be utilized efficiently. We formulate the target as an
optimum issue about the sum of QoS level of all connections. We assume that there are MM UGS
connections, NN rtPS connections and QQ other connections in the base station. These connections are
independent with each other. The sum of QoS levels of all the K = M + N + QK = M + N + Q connections in the
BS, is formulated by Eqn.(11).
9. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 9
F (xM + 1; xM + 2; : : : ; xK ; ¸ ) =
M + NX
i = M + 1
µ
1 ¡ e¡ ½i x i
1 ¡ e¡ ½i
¶
+
KX
i = M + N + 1
µ
1 ¡ e¡ ½i x i
1 ¡ e¡ ½i
¶
+ ¸
Ã
Btotal ¡
MX
i = 1
Bi ¡
KX
i = M + 1
xi Bi
!
:
F (xM + 1; xM + 2; : : : ; xK ; ¸ ) =
M + NX
i = M + 1
µ
1 ¡ e¡ ½i x i
1 ¡ e¡ ½i
¶
+
KX
i = M + N + 1
µ
1 ¡ e¡ ½i x i
1 ¡ e¡ ½i
¶
+ ¸
Ã
Btotal ¡
MX
i = 1
Bi ¡
KX
i = M + 1
xi Bi
!
: (14)
Then, we have the @2 F
@xi @xj
@2 F
@xi @xj
Hermitian matrix MM .
M =
2
6
6
6
6
6
4
@2
F
@x 2
M + 1
@2
F
@xM + 1 @x M + 2
¢¢¢ @2
F
@xM + 1 @x K
@2
F
@xM + 2 @x M + 1
@2
F
@x 2
M + 2
¢¢¢ @2
F
@xM + 2 @x K
...
...
...
...
@2
F
@x K @x M + 1
@2
F
@x K @x M + 2
¢¢¢ @2
F
@x 2
K
3
7
7
7
7
7
5
=
2
6
6
6
4
¡ ½2
M + 1 e¡ ½M + 1 x M + 1
(1¡ e¡ ½M + 1 )
0
...
0 ¡ ½2
K e¡ ½K x K
(1¡ e¡ ½K )
3
7
7
7
5
M =
2
6
6
6
6
6
4
@2
F
@x 2
M + 1
@2
F
@xM + 1 @x M + 2
¢¢¢ @2
F
@xM + 1 @x K
@2
F
@xM + 2 @x M + 1
@2
F
@x 2
M + 2
¢¢¢ @2
F
@xM + 2 @x K
...
...
...
...
@2
F
@x K @x M + 1
@2
F
@x K @x M + 2
¢¢¢ @2
F
@x 2
K
3
7
7
7
7
7
5
=
2
6
6
6
4
¡ ½2
M + 1 e¡ ½M + 1 x M + 1
(1¡ e¡ ½M + 1 )
0
...
0 ¡ ½2
K e¡ ½K x K
(1¡ e¡ ½K )
3
7
7
7
5
Obviously, if ½> 0½> 0 ,1 ¡ e¡ ½
> 01 ¡ e¡ ½
> 0. The matrix MM is said to be negative definite. Thus, there exist the
locate largest extreme values for the utility of BS, UB SUB S. In the following, we show how to find the
optimum solution. First, set the derivative dFdF = 0, which yields the system of equations:
@F
@xM + 1
=
½M + 1e¡ ½M + 1 x M + 1
(1 ¡ e¡ ½M + 1 )
¡ ¸ BM + 1 = 0 (15-M+ 1)
@F
@xM + 2
=
½M + 2e¡ ½M + 2 x M + 2
(1 ¡ e¡ ½M + 2 )
¡ ¸ BM + 2 = 0 (15-M+ 2)
...
...
...
@F
@xK
=
½K e¡ ½K x K
(1 ¡ e¡ ½K )
¡ ¸ BK = 0 (15-K)
@F
@¸
= Bt ot al ¡
MX
i = 1
Bi ¡
KX
i = 1
xi Bi = 0 (15-K+ 1)
@F
@xM + 1
=
½M + 1e¡ ½M + 1 x M + 1
(1 ¡ e¡ ½M + 1 )
¡ ¸ BM + 1 = 0 (15-M+ 1)
@F
@xM + 2
=
½M + 2e¡ ½M + 2 x M + 2
(1 ¡ e¡ ½M + 2 )
¡ ¸ BM + 2 = 0 (15-M+ 2)
...
...
...
@F
@xK
=
½K e¡ ½K x K
(1 ¡ e¡ ½K )
¡ ¸ BK = 0 (15-K)
@F
@¸
= Bt ot al ¡
MX
i = 1
Bi ¡
KX
i = 1
xi Bi = 0 (15-K+ 1)
According to Eqn.(15), we have
@F
@xi
=
½i e¡ ½i xi
(1 ¡ e¡ ½i )
¡ ¸ Bi = 0
=) xi =
1
½i
ln
·
½i
¸ Bi (1 ¡ e¡ ½i )
¸
@F
@xi
=
½i e¡ ½i xi
(1 ¡ e¡ ½i )
¡ ¸ Bi = 0
=) xi =
1
½i
ln
·
½i
¸ Bi (1 ¡ e¡ ½i )
¸
We substitute the xixi into Eqn.(15 K+1), and then
Bt ot al ¡
MX
i = 1
Bi =
KX
i = M + 1
xi Bi
=
KX
i = M + 1
Bi
½i
ln
·
½i
¸ Bi (1 ¡ e¡ ½i )
¸
Bt ot al ¡
MX
i = 1
Bi =
KX
i = M + 1
xi Bi
=
KX
i = M + 1
Bi
½i
ln
·
½i
¸ Bi (1 ¡ e¡ ½i )
¸
Based on the equation above , we can find the solution of ¸¸ .
10. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 10
¸ = exp
0
@
P K
i = M + 1
B i
½i
ln
h
½i
B i (1¡ e¡ ½i )
i
P K
i = M + 1
B i
½i
+
P M
i = 1 Bi ¡ Bt ot al
P K
i = M + 1
B i
½i
!
¸ = exp
0
@
P K
i = M + 1
B i
½i
ln
h
½i
B i (1¡ e¡ ½i )
i
P K
i = M + 1
B i
½i
+
P M
i = 1 Bi ¡ Bt ot al
P K
i = M + 1
B i
½i
!
and then we have
xi =
1
½i
ln
½i
Bi (1 ¡ e¡ ½i )
¡
1
½i
0
@
P K
j = M + 1
B j
½j
ln
h
½j
B j (1¡ e¡ ½j )
i
P K
j = M + 1
B j
½j
1
A
¡
1
½i
à P M
j = 1 Bj ¡ Bt ot al
P K
j = M + 1
B j
½i
!
xi =
1
½i
ln
½i
Bi (1 ¡ e¡ ½i )
¡
1
½i
0
@
P K
j = M + 1
B j
½j
ln
h
½j
B j (1¡ e¡ ½j )
i
P K
j = M + 1
B j
½j
1
A
¡
1
½i
à P M
j = 1 Bj ¡ Bt ot al
P K
j = M + 1
B j
½i
!
(15)
Finally, the solution of optimum bandwidth allocation is shown.
b¤
= [b¤
M + 1; ¢¢¢; b¤
K ]
b¤
i = xi Bi =
Bi
½i
ln
½i
Bi (1 ¡ e¡ ½i )
¡
Bi
½i
0
@
P K
j = M + 1
B j
½j
ln
h
½j
B j (1¡ e
¡ ½j )
i
P K
j = M + 1
B j
½j
1
A
¡
Bi
½j
à P M
j = 1 Bj ¡ Btotal
P K
j = M + 1
B j
½i
!
; i 2 [M + 1; ¢¢¢; K ]
b¤
= [b¤
M + 1; ¢¢¢; b¤
K ]
b¤
i = xi Bi =
Bi
½i
ln
½i
Bi (1 ¡ e¡ ½i )
¡
Bi
½i
0
@
P K
j = M + 1
B j
½j
ln
h
½j
B j (1¡ e
¡ ½j )
i
P K
j = M + 1
B j
½j
1
A
¡
Bi
½j
à P M
j = 1 Bj ¡ Btotal
P K
j = M + 1
B j
½i
!
; i 2 [M + 1; ¢¢¢; K ]
(16)
Therefore, we just obtain only one solution of b¤
b¤ to maximize the QoS level of the BS according to the
derivations above.
5. PROPOSED CAC SCHEME
We proposed a simple CAC scheme, which is based on the optimum solution of the bandwidth
allocation in Section 4. In the CAC scheme, we introduce two new features. One is that the allocated
bandwidth of a connection will be larger than its minimum bandwidth limit, b¤
i ¸ Bmin
ib¤
i ¸ Bmin
i . The minimum
limit of the connection depends on its application requirement. if it is a UGS connection such as voice
applications, its minimum bandwidth is set to its required bandwidth. If it is an rtPS connection, its
minimum bandwidth is less than its required bandwidth. If the value b¤
Kb¤
K is less than the minimum
requirement of bandwidthBmin
KBmin
K , we reject the connection. The reason is that the quality of service of the
connection will be poor, even if it is granted to enter the BS. The other is that the priority order is
introduced for ongoing connections and new connections. The ongoing connections have higher priority
to share the resource than new connections. That is, the ongoing connections will be not dropped in our
CAC scheme.
Since the two features, this CAC mechanism causes the process of bandwidth allocation to be iterated.
For example, if the allocated bandwidth amount of an ongoing connection, calculated by Eqn.(17), is
lower than a bottom limit Bmin
iBmin
i , CAC scheme will not drop the connection but continue providing service
for the connection. At that time, what the CAC scheduler does is to cancel the bandwidth allocation,
exclude the ongoing connection from the bandwidth allocation process, and then restart a new
bandwidth allocation procedure. The iterated process does not stop until the allocated bandwidth of the
reminder connections are greater than their minimum bandwidth requirement. If there are nothing in the
set of reminder connections in the end, the new connection will be blocked.
The detail of the scheme is shown in Algorithm I. After a new incoming connection sends its request of
entry to a BS, CAC process starts. If the BS has the available bandwidth enough for the its demand at
11. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 11
that time, the new connection KK will be given the access right and its required resource is allocated to it.
Otherwise, the optimum value of bandwidth b¤
b¤ for the connections. Under a lack of resource, if a
connection is accepted, two conditions should be satisfied. One is that the value b¤
Kb¤
K is greater than the
threshold Bmin
KBmin
K for the new connection. The other is that allocated bandwidth b¤
ib¤
i is greater than Bmin
iBmin
i for
the ongoing connections. After the allocated bandwidth b¤
b¤ is ready, we adjust allocated bandwidth of
other K ¡ 1K ¡ 1ongoing connections using their optimum values. And then we allocate the b¤
Kb¤
K bandwidth
to the new connection to the end. Thus, we can keep the QoS level of the BS as high as possible all the
time. The step 7, 8 ,9 mean that we exclude the specific ongoing connection from the process of
bandwidth allocation, whose optimal value of allocate bandwidth is less than its lowest limit. The iterated
bandwidth allocation will not stop until the reminder connections satisfy the conditions, b¤
i ¸ Bmin
ib¤
i ¸ Bmin
i .
6. SIMULATIONS
We conduct computer simulation to test the performance of the proposed scheme through a simulation
model, shown in Fig.3. To evaluate the overall performance of the CAC scheme, the simulation scripts
are run multiple times to obtain statistically meaningful results.
The simulation model is constructed according to the CAC model in Section 3.1, and includes the
components listed below:
• Pseudo Connection Generators: It creates connections with the inter-arrival times, just like
"customers" in queuing theory. The inter-arrival time T of a Poisson arrival process is an
exponential random variable, The arrive rate of connections is presumed as 30 to 100 per hour
according to different applications and services. Every connection has its minimum bandwidth
requirement and its application characteristic parameters. The bandwidth requests of the
connections are from 64Kbps to 2Mbps. A service time span that a connection stays in the
system is assigned to every connection. The value of the service time is also drawn from
exponential distribution with mean value from 600 to 1 500 seconds.
• Ongoing Connection Management: When a new connection is accepted by CAC, it will be
placed into a dynamic queue of ongoing connections. The ongoing connection is removed by
the Connection Queue Management when its service time is end.
12. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 12
• Call Admission Control Scheduler: It carries out a CAC algorithm including QoS level
calculation, providing the access right to a connection, and allocating the total bandwidth (Bt o t
al = 75M b p s ) to connections.
TABLE 3: Connection Types
FIGURE 3: The Structure of simulation model
Here, we choose two other CAC methods as the simulation benchmarks. The first one is labeled as
’Baseline’. In the method, we do not take any extra CAC strategy. We just accept one new connection
if available bandwidth is enough for it, or block it if not. The other is labeled as ’Elkadi’ algorithm which
is a typical resource reservation method. It makes bandwidth reservation for new connections, whose
resources are taken from the ongoing connections [15].
TABLE 4: Summary of Simulation Results
The simulation scripts are run multiple times to obtain statistically meaningful results to evaluate
the overall performance of the CAC scheme. Table IV summarizes the simulation results for the
three CAC methods. As can be seen, we investigated the performance through not only the
traditional measurement parameters such as block rate, bandwidth utilization, and connection
capacity, but also the proposed metric: average QoS level of connections and the overall QoS
level of BS. For example, the proposed method is the best one in the bandwidth utilization and
13. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 13
QoS level of BS. Compared to the Baseline method, the proposed method decreases the block
rate five times, which varies from 4.15% to 0.82%. The value 0.82% is small, approaching to the
performance of Elkadi method. The Elkadi method does not block any new connections even
under a heavy load traffic condition, because it makes a resource reservation enough for all the
new connections. The average connection capacity of our method increases by about more than
5% connections than the baseline one. In addition, its value 144.01 is close to 145.60, the one of
the Eldadi method. Therefore, we think the proposed method can achieve comprehensive
performance better than others can.
On the other hand, Fig. 4 - 8 shows the measurement curves of the three methods during the
whole simulation time. There are six curves in each figure, where the horizontal lines with dot line
describe the mean value of the corresponding measurement variable. In Fig.4, we can see that
the block rate curve of the proposed method keeps zero during half of simulation time. The curve
of the baseline method always fluctuates because it often blocks the new connections under the
heavy load traffic. Fig.5 illustrates that the number of ongoing connections of the proposed
method and Elkadi method are similar during the simulation, and their performance are better
than the baseline method. The bandwidth utilization curve of the Elkadi method is lower than
other two methods, illustrated in Fig.6. The reason is that the Elkadi method makes a bandwidth
reservation to accommodate new incoming connections by means of cutting down the bandwidth
of ongoing connections. On the other hand, its connection capacity benefits from the reservation
methodology and its curve can be always keeping higher, shown in Fig. 5.
For the view of users, the curves of QoS level are more meaningful for individual connection. Our
target is to satisfy both the ongoing connections and new connections. The curve of average QoS
level of connections for the Elkadi method falls below the others, which suggests the
dissatisfactions of ongoing connections. The baseline method can indeed keep the average QoS
level of ongoing connections as the maximum value. However, it should be noticed that it denies
many requests of new incoming connections frequently, which contributes to the highest block
rate. This is, the satisfaction degree of new connections is low in this case. These two benchmark
methods cannot deal with the tradeoff among the requirements of the new connections and
ongoing connections. On contrast, the proposed method makes the average QoS level of
ongoing connections higher than Elkadi method as well in the simulation. At the same time, the
block rate of new connections is kept close to a tiny value. The result of the proposed method can
satisfy both ongoing connections and new connections.
FIGURE 4: Comparison of block rate of connections
14. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 14
FIGURE 5: Comparison of capacity of connections
FIGURE 6: Comparison of bandwidth utilization
FIGURE 7: Comparison of QoS Level of a BS
15. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 15
FIGURE 8: Comparison of average QoS level of connections
7. CONCLUSION
We introduce a metric of individual QoS level for multimedia data defined in WiMAX standard in
the paper. Using the metric, a CAC scheduler can take account of the QoS level of the new
connections and the ongoing connections, and then obtain the optimum solution of bandwidth
allocation. The solution is provided to the CAC scheduler to determine whether a connection is
accepted or not. The simulation results indicate that our proposed method can achieve better
trade-off among the new connections, the ongoing connections and BS system performance.
REFERENCES
[1] H. G. Perros and K. M. Elsayed, “Call Admission Control Schemes: A Review,” IEEE
Communications Magazine, vol. 34, no. 11, pp. 82–91, 1996.
[2] K. Mase, “Toward scalable admission control for VoIP networks,” IEEE Communications
Magazine, vol. 42, no. 7, pp. 42–47, 2004.
[3] Cisco-System. (2001) Voip call admission control document. [Online]. Available:
http://www.cisco.com/- univercd/~cc/td/doc/cisintwk/intsolns/voipsol/cac.htm
[4] Y. Fang and Y. Zhang, “Call admission control schemes and performance analysis in wireless
mobile networks,” Vehicular Technology, IEEE Transactions on, vol. 51, no. 2, pp. 371 –382, mar
2002.
[5] Y. Xiao, P. Chen, and Y. Wang, “Optimal admission control for multi-class of wireless adaptive
multimedia services,” IEICE Transactions on Communications, vol. E84-B, no. 4, pp. 795–804,
april 2001.
[6] Y. Qian, R.-Y. Hu, and H.-H. Chen, “A call admission control framework for voice over wlans,”
Wireless Communications, IEEE, vol. 13, no. 1, pp. 44 – 50, feb. 2006.
[7] G. Djukanovic, N. Gospic, and M. Sunjevaric, “Cac negotiation algorithm proposal for higher qos
in heterogeneous wireless networks,” in Telecommunications in Modern Satellite, Cable and
Broadcasting Services, 2007. TELSIKS 2007. 8th International Conference on, 26-28 2007, pp.
19 –22.
[8] W. Song and W. H. Zhuang, “Multi-service load sharing for resource management in the
cellular/wlan integrated network,” IEEE Transactions on Wireless Communications, vol. 8, no. 2,
pp. 725–735, 2009.
16. Zhiwei Yan, Guizhong Lui & Rui Su
Advances in Multimedia - An International Journal (AMIJ), Volume (3) : Issue (1) : 2012 16
[9] O. Yilmaz and I. R. Chen, “Utilizing call admission control for pricing optimization of multiple service
classes in wireless cellular networks,” Computer Communications, vol. 32, no. 2, pp. 317–323,
2009.
[10] X. P. Zhai, G. G. Bi, and P. P. Xu, “Call admission control with bandwidth reallocation for adaptive
multimedia in high-rate short-range wireless networks,” Chinese Journal of Electronics, vol. 14,
no. 1, pp. 169–173, 2005.
[11] W. L. Ni, W. Li, and M. Alam, “Determination of optimal call admission control policy in wireless
networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 2, pp. 1038–1044, 2009.
[12] H. Zhai, X. Chen, and Y. Fang, “A call admission and rate control scheme for multimedia support
over ieee 802.11 wireless lans,” Wireless Networks, vol. 12, no. 4, pp. 451–463, 2006.
[13] H. Chen, S. Kumar, and C. J. Kuo, “Dynamic call admission control and resource reservation with
interference guard margin ( igm ) for cdma systems,” in Wireless Communications and
Networking, IEEE, vol. 3, no. C, 2003, pp. 1568–1572.
[14] Sunil and C. J. Kuo, “Qos-aware radio resource management scheme for cdma cellular networks
based on dynamic interference guard margin (igm),” Computer Networks, vol. 46, no. 6, pp. 867–
879, 2004.
[15] M. El-Kadi, S. Olariu, and H. Abdel-Wahab, “A rate-based borrowing scheme for qos provisioning
in multimedia wireless networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 13,
no. 2, pp. 156–166, 2002.
[16] K. Elsayed, A. Saad, and M. El-Hadidi, “Performance evaluation of resource reservation and call
admission policies for deterministic services in pgps-based packet networks,” Elsevier Computer
Communications, vol. 25, pp. 1513–26, 2002.
[17] K. Tsagkaris and P. Demestichas, “Wimax network,” IEEE Vehicular Technology Magazine, vol.
4, no. 2, 2009.
[18] J. G. Andrews, A. Ghosh, and R. Muhamed, Fundamentals of WiMAX. Prentice Hall, 2007.
[19] ITU-T Recommendation G.107. The e-model, a computational model for use in transmission
planning, MC68175/D, ITU, December.
[20] K. N. N. Kitawaki and T. Yamada, “Objective quality assessment of wideband speech coding,”
IEICE Transactions on Communications, vol. E88-B(n3), 2005.
[21] ITU-T. (2008) R value calculator. [Online]. Available: http://www.itu.int/itu-
t/studygroups/com12/emodelv1/calcul. php
[22] Z. He, J. Cai, and C. W. Chen, “Joint source channel rate-distortion analysis for adaptive mode
selection and rate control in wireless video coding,” Circuits and Systems for Video Technology,
IEEE Transactions on, vol. 12, no. 6, pp. 511–523, Jun 2002.
[23] E.-H. Yang and X. Yu, “Rate distortion optimization for h.264 interframe coding: A general
framework and algorithms,” Image Processing, IEEE Transactions on, vol. 16, no. 7, pp. 1774 –
1784, july 2007.
[24] J. Liu, Z. Guo, and Y. Cho, “Bit allocation for joint spatial-quality scalability in h.264/svc,” in Image
Processing(ICIP), 2009 16th IEEE International Conference on, 7-10 2009, pp. 3737 –3740.
[25] J. Postel and J. Reynolds, “Rfc959, file transfer protocol (ftp),” 1985. [Online]. Available:
http://tools.ietf.org/html/rfc959
[26] R. C. W. C. Fielding and Irvine, “Rfc2616 the hipertext transfer protocol,” p. 176, 1999. [Online].
Available:http://www.ietf.org-/rfc/-rfc2616.txt