SlideShare a Scribd company logo
Wireless Embedded & Networking System Laboratory




Low-overhead Uplink Scheduling
Through Load Prediction for
WiMAX real-time services
W. Nie, H. Wang, N. Xiong2
IET Commun., 2011, Vol. 5, Iss. 8, pp. 1060–1067




                                                        Thomhert Suprapto Siadari
                                                              Dept. IT Convergence
                                             Kumoh National Institute of Technology

                                                                  February 3rd., 2012
 Introduction

 Problems & Solutions

 WiMAX Sample Frame

 WiMAX Service Classes

 Low-overhead Scheduling

 Simulation Results

 Conclusion & Future Works




DOC ID
 IEEE802.16

 WiMAX 300 trials worldwide

 Connection oriented

 PHY & MAC Layer

 Suffers problem of huge MAC overhead

 No scheduling Algorithm standard




DOC ID
Problems:

1. Large overhead uplink scheduling

2. Real-time services

3. Scheduling algorithm

Solutions/ Contributions:

1. Low-overhead uplink scheduling

2. Load prediction




DOC ID
 PMP (BS to MSs)

 Transmission: Downlink & Uplink

 TDD




DOC ID
WiMAX service classes:

 Unsolicited Grant Service (UGS)  fixed-size data packets

 Real-time polling service (rtPS)  generate variable-size data
  packets periodically

 Non-real-time polling service (nrtPS)  bandwidth not on the
  basis of fixed packet size

 Best Effort (BE)  efficient service (web surfing)




DOC ID
- Earlier Deadline First (EDF) scheduling

- Adaptive Bandwidth Scheduling




DOC ID
- Information Module

- Scheduling Database Module

- Service Assignment Module


f        : frame size (ms), uplink and downlink subframe contains;

di       : the maximum delay of connection i (ms);

qi(t) : the queue length of connection i at time t(bit);

si [t, t + f ]: the number of bits required to be transmitted for connection i in the time interval [t, t + f ];

ai[t, t + f ]: the number of bits arriving for connection i in the time interval [t, t + f ];

Ndi[t, t + f ]: the number of bits waiting in the queue for connection i, which will expire in the time interval [t, t + f ].




DOC ID
-        Selects SSs based on delay requirement

-        Suitable for real-time services

-        Deadline to each packet

-        Allocate bandwidth to SS based on earliest deadline

Information Module
        Firstly  delay requirement

         rtPS connection input information module:

         Output:

        Secondly  expiration time




DOC ID
Scheduling Database Module  serves as a database of information for all
connections




Service Assignment Module

- Determine uplink subframe allocation in terms of the number of bits per SS




DOC ID
Specific implementation steps:

Check BWrtps & Bufferi_deadline (bandwidth required by the deadline frame in cureent
time



If



Guarantee the bandwidth of deadline packets

Allocate more bandwidth to active SS



If

The bandwidth requirement will be scheduled:




DOC ID
C: the uplink channel capacity;

         F: set of all SSs belonging to the rtPS class;

         Bi: bandwidth allocated to connection i;

         Dequeue i: remove packet P from the queue of
         connection i;

         amount(P,): retrieve the packets P from the
         connection i. Convert the packets to number of
         symbols according to the signal-to-interference
         noise ratio [SINR(ji)] of connection i.

         CreateIE(amount(P, ji)): create an IE for
              connection i with

         amount(P, ji) number of symbols. Then, IE is
             added to the UL-MAP message.

         Drop(rtPS): drop packets from the queues for all
              connections.




DOC ID
- Modeling the Arrival Process




PDF:

CDF of inter-arrival time:

- Estimation of Time: predict the response time when BS
  allocates the bandwidth to SS
                             -   Tr = Reuest time

                             -   Ti = Bandwidth response time




DOC ID
Adaptive time slots calculating:
To calculate expected bandwidth:

To calculate required time slots



Given buffer  calculate required time slot

Si(0,1)  smooth parameter  give ratio of the actual allocation bandwidth to
    previous predictions and requirements

If ε > 1  calculated bandwidth is closer to predicted bandwidth

If ε < 1  calculated bandwidth is closer to requested bandwidth

So, use ω = 0.05 to adjust Si.



DOC ID
DOC ID
- Better performance than WFQ & WRR

- Sharply reduce MAP & MAC SDUs subheader overhead

- Improves system throughput




DOC ID
-        Problem yg ada itu apa?

-        Solusi dan kontribusi yang ditwarkan apa?

-        Metodenya? LOH: EDF & Adaptive sched schem?

-        EDF utk apa sebenarmya? Ad a 3 module disini? Information module? Sched database module? Service assignment module?
         Specific implementation steps?

-        Adaptive sched scheme: modeling Arrival process? estimation time? Adaptive time slots calculating?  apa tujuannya semua
         ini?

-        Simulasi  frame ultilisation, average throughput, average queuing delay, packet loss?  kenapa dalam real-time
         communication harus pake ini? Alasannya?

-        Dia pake perbandingan WFQ dan WRR? kenapa? Dan hasilnya lebih baik? Kenapa? Ada apa dengann WFQ dan WRR?

-        Dia kan pake load prediction? Kalo WFQ dan WRR pake load prediction juga gimana?




DOC ID

More Related Content

What's hot

Ad Hoc Probe
Ad Hoc ProbeAd Hoc Probe
Ad Hoc Probe
nutikumar
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
Yoss Cohen
 
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
IJERA Editor
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
IJECEIAES
 
Wanhive vs Chord Distributed Hash Table
Wanhive vs Chord Distributed Hash TableWanhive vs Chord Distributed Hash Table
Wanhive vs Chord Distributed Hash Table
Amit Kumar
 
Available network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsAvailable network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocols
IJCNCJournal
 
Dual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained NetworksDual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained Networks
ambitlick
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
Debesh Sadhukhan
 
A METHOD FOR ENCRYPTING AND DECRYPTINGWAVE FILES
A METHOD FOR ENCRYPTING AND DECRYPTINGWAVE FILESA METHOD FOR ENCRYPTING AND DECRYPTINGWAVE FILES
A METHOD FOR ENCRYPTING AND DECRYPTINGWAVE FILES
IJNSA Journal
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
Romyull Islam
 
Improving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingImproving QoS of VANET using Network Coding
Improving QoS of VANET using Network Coding
Dr. Amarjeet Singh
 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Editor IJCATR
 
20120140504014 2
20120140504014 220120140504014 2
20120140504014 2
IAEME Publication
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
ijseajournal
 
Chapter 4 pc
Chapter 4 pcChapter 4 pc
Chapter 4 pc
Hanif Durad
 
8The Affects of Different Queuing Algorithms within the Router on QoS VoIP a...
8The Affects of Different Queuing Algorithms  within the Router on QoS VoIP a...8The Affects of Different Queuing Algorithms  within the Router on QoS VoIP a...
8The Affects of Different Queuing Algorithms within the Router on QoS VoIP a...
IJCNC
 
Collective Communications in MPI
 Collective Communications in MPI Collective Communications in MPI
Collective Communications in MPI
Hanif Durad
 
June 28 Presentation
June 28 PresentationJune 28 Presentation
June 28 Presentation
Andrew McGarry
 
550 537-546
550 537-546550 537-546
550 537-546
idescitation
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
IJMER
 

What's hot (20)

Ad Hoc Probe
Ad Hoc ProbeAd Hoc Probe
Ad Hoc Probe
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
 
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
 
Wanhive vs Chord Distributed Hash Table
Wanhive vs Chord Distributed Hash TableWanhive vs Chord Distributed Hash Table
Wanhive vs Chord Distributed Hash Table
 
Available network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsAvailable network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocols
 
Dual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained NetworksDual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained Networks
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
 
A METHOD FOR ENCRYPTING AND DECRYPTINGWAVE FILES
A METHOD FOR ENCRYPTING AND DECRYPTINGWAVE FILESA METHOD FOR ENCRYPTING AND DECRYPTINGWAVE FILES
A METHOD FOR ENCRYPTING AND DECRYPTINGWAVE FILES
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Improving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingImproving QoS of VANET using Network Coding
Improving QoS of VANET using Network Coding
 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
 
20120140504014 2
20120140504014 220120140504014 2
20120140504014 2
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
Chapter 4 pc
Chapter 4 pcChapter 4 pc
Chapter 4 pc
 
8The Affects of Different Queuing Algorithms within the Router on QoS VoIP a...
8The Affects of Different Queuing Algorithms  within the Router on QoS VoIP a...8The Affects of Different Queuing Algorithms  within the Router on QoS VoIP a...
8The Affects of Different Queuing Algorithms within the Router on QoS VoIP a...
 
Collective Communications in MPI
 Collective Communications in MPI Collective Communications in MPI
Collective Communications in MPI
 
June 28 Presentation
June 28 PresentationJune 28 Presentation
June 28 Presentation
 
550 537-546
550 537-546550 537-546
550 537-546
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
 

Similar to Nsl seminar(2)

An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
Priyasloka Arya
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
ijmnct
 
Gurpinder_Resume
Gurpinder_ResumeGurpinder_Resume
Gurpinder_Resume
Gurpinder Ghuman
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
AAKASH S
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
Sri Prasanna
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
cscpconf
 
Tcp ip
Tcp ipTcp ip
Tcp ip
mailalamin
 
Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANET
ijsrd.com
 
UDT
UDTUDT
UDT
lilyco
 
UDT
UDTUDT
UDT
xlight
 
iMinds' course: preceding exercises
iMinds' course: preceding exercisesiMinds' course: preceding exercises
iMinds' course: preceding exercises
FORGE project
 
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
A. Sufian
 
Ccna day1
Ccna day1Ccna day1
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
darulquthni
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
Sanjeev Jain
 
Wan notes
Wan notesWan notes
Wan notes
Saket Pathak
 
nv.ppt
nv.pptnv.ppt
nv.ppt
tahaniali27
 
Clocking and sync
Clocking and syncClocking and sync
Clocking and sync
Oded Rotter
 
Week10 transport
Week10 transportWeek10 transport
Week10 transport
kapilpahwabnb
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
Katie Gulley
 

Similar to Nsl seminar(2) (20)

An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Gurpinder_Resume
Gurpinder_ResumeGurpinder_Resume
Gurpinder_Resume
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANET
 
UDT
UDTUDT
UDT
 
UDT
UDTUDT
UDT
 
iMinds' course: preceding exercises
iMinds' course: preceding exercisesiMinds' course: preceding exercises
iMinds' course: preceding exercises
 
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Wan notes
Wan notesWan notes
Wan notes
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Clocking and sync
Clocking and syncClocking and sync
Clocking and sync
 
Week10 transport
Week10 transportWeek10 transport
Week10 transport
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
 

Recently uploaded

The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 

Recently uploaded (20)

The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 

Nsl seminar(2)

  • 1. Wireless Embedded & Networking System Laboratory Low-overhead Uplink Scheduling Through Load Prediction for WiMAX real-time services W. Nie, H. Wang, N. Xiong2 IET Commun., 2011, Vol. 5, Iss. 8, pp. 1060–1067 Thomhert Suprapto Siadari Dept. IT Convergence Kumoh National Institute of Technology February 3rd., 2012
  • 2.  Introduction  Problems & Solutions  WiMAX Sample Frame  WiMAX Service Classes  Low-overhead Scheduling  Simulation Results  Conclusion & Future Works DOC ID
  • 3.  IEEE802.16  WiMAX 300 trials worldwide  Connection oriented  PHY & MAC Layer  Suffers problem of huge MAC overhead  No scheduling Algorithm standard DOC ID
  • 4. Problems: 1. Large overhead uplink scheduling 2. Real-time services 3. Scheduling algorithm Solutions/ Contributions: 1. Low-overhead uplink scheduling 2. Load prediction DOC ID
  • 5.  PMP (BS to MSs)  Transmission: Downlink & Uplink  TDD DOC ID
  • 6. WiMAX service classes:  Unsolicited Grant Service (UGS)  fixed-size data packets  Real-time polling service (rtPS)  generate variable-size data packets periodically  Non-real-time polling service (nrtPS)  bandwidth not on the basis of fixed packet size  Best Effort (BE)  efficient service (web surfing) DOC ID
  • 7. - Earlier Deadline First (EDF) scheduling - Adaptive Bandwidth Scheduling DOC ID
  • 8. - Information Module - Scheduling Database Module - Service Assignment Module f : frame size (ms), uplink and downlink subframe contains; di : the maximum delay of connection i (ms); qi(t) : the queue length of connection i at time t(bit); si [t, t + f ]: the number of bits required to be transmitted for connection i in the time interval [t, t + f ]; ai[t, t + f ]: the number of bits arriving for connection i in the time interval [t, t + f ]; Ndi[t, t + f ]: the number of bits waiting in the queue for connection i, which will expire in the time interval [t, t + f ]. DOC ID
  • 9. - Selects SSs based on delay requirement - Suitable for real-time services - Deadline to each packet - Allocate bandwidth to SS based on earliest deadline Information Module  Firstly  delay requirement rtPS connection input information module: Output:  Secondly  expiration time DOC ID
  • 10. Scheduling Database Module  serves as a database of information for all connections Service Assignment Module - Determine uplink subframe allocation in terms of the number of bits per SS DOC ID
  • 11. Specific implementation steps: Check BWrtps & Bufferi_deadline (bandwidth required by the deadline frame in cureent time If Guarantee the bandwidth of deadline packets Allocate more bandwidth to active SS If The bandwidth requirement will be scheduled: DOC ID
  • 12. C: the uplink channel capacity; F: set of all SSs belonging to the rtPS class; Bi: bandwidth allocated to connection i; Dequeue i: remove packet P from the queue of connection i; amount(P,): retrieve the packets P from the connection i. Convert the packets to number of symbols according to the signal-to-interference noise ratio [SINR(ji)] of connection i. CreateIE(amount(P, ji)): create an IE for connection i with amount(P, ji) number of symbols. Then, IE is added to the UL-MAP message. Drop(rtPS): drop packets from the queues for all connections. DOC ID
  • 13. - Modeling the Arrival Process PDF: CDF of inter-arrival time: - Estimation of Time: predict the response time when BS allocates the bandwidth to SS - Tr = Reuest time - Ti = Bandwidth response time DOC ID
  • 14. Adaptive time slots calculating: To calculate expected bandwidth: To calculate required time slots Given buffer  calculate required time slot Si(0,1)  smooth parameter  give ratio of the actual allocation bandwidth to previous predictions and requirements If ε > 1  calculated bandwidth is closer to predicted bandwidth If ε < 1  calculated bandwidth is closer to requested bandwidth So, use ω = 0.05 to adjust Si. DOC ID
  • 16. - Better performance than WFQ & WRR - Sharply reduce MAP & MAC SDUs subheader overhead - Improves system throughput DOC ID
  • 17. - Problem yg ada itu apa? - Solusi dan kontribusi yang ditwarkan apa? - Metodenya? LOH: EDF & Adaptive sched schem? - EDF utk apa sebenarmya? Ad a 3 module disini? Information module? Sched database module? Service assignment module? Specific implementation steps? - Adaptive sched scheme: modeling Arrival process? estimation time? Adaptive time slots calculating?  apa tujuannya semua ini? - Simulasi  frame ultilisation, average throughput, average queuing delay, packet loss?  kenapa dalam real-time communication harus pake ini? Alasannya? - Dia pake perbandingan WFQ dan WRR? kenapa? Dan hasilnya lebih baik? Kenapa? Ada apa dengann WFQ dan WRR? - Dia kan pake load prediction? Kalo WFQ dan WRR pake load prediction juga gimana? DOC ID

Editor's Notes

  1. To day, I’d like deliver my presentation about paper titled blaThe authors areIE
  2. My outline today is:
  3. belumm
  4. At the begin
  5. IE: describes resource allocation of data burst
  6. BMAP  untukEstimation of time  lama waktuuntukrespondari BS dalammengalokasikan bandwidth ke SSAdaptive time slots sched  untuk calculated bandwidth, bandwidth allocation solutionWe use a BMAP and Newton’s interpolation polynomial function to predict the bandwidth requirement of rtPSpackets that will be queued between the time the SS makes the request for bandwidth and the time the BS responds. Thisestimate is combined with the number of rtPS packets that are waiting to be transmitted to find a total bandwidthnecessary and estimate time-slot requests for the SS.