PAPER A Preemptive Priority Handoff Scheme in Integrated Voice and Data Cellular Mobile Systems

Size: px
Start display at page:

Download "PAPER A Preemptive Priority Handoff Scheme in Integrated Voice and Data Cellular Mobile Systems"

Transcription

1 IEICE TRANS. COMMUN., VOL.E82 B, NO.10 OCTOBER PAPER A Preemptive Priority Handoff Scheme in Integrated Voice and Data Cellular Mobile Systems Bo LI, Qing-An ZENG, Kaiji MUKUMOTO, and Akira FUKUDA, Members SUMMARY In this paper, we propose a preemptive priority handoff scheme for integrated voice/data cellular mobile systems. In our scheme, calls are divided into three different classes: handoff voice calls, originating voice calls, and data calls. In each cell of the system there is a queue only for data calls. Priority is given to handoff voice calls over the other two kinds of calls. That is, the right to preempt the service of data is given to a handoff voice call if on arrival it finds no idle channels. The interrupted data call returns to the queue. The system is modeled by a two-dimensional Markov chain. We apply the Successive Over-Relaxation (SOR) method to obtain the equilibrium state probabilities. Blocking and forced termination probabilities for voice calls are obtained. Moreover, average queue length and average transmission delay of data calls are evaluated. The results are compared with another handoff scheme for integrated voice/data cellular mobile systems where some numbers of channels are reserved for voice handoff calls. It is shown that, when the data traffic is not very light, the new scheme can provide lower blocking probability for originating voice calls, lower forced termination probability for ongoing voice calls, and shorter average queue length and less average transmission delay for data calls. key words: mobile communication systems, integration of voice and data handoff scheme, preemptive priority 1. Introduction One of the central issues in the performance characterization of cellular mobile and personal communication systems (PCS) is the problem of handoff [1]. Handoff denotes the process of changing the channel (frequency, time slot, spreading code, or combination of them) associated with the current connection to maintain acceptable service quality or to provide better service. It is often initiated either by cell boundary crossing or deteriorated service quality in the current channel. With the penetration of PCS, the microcell and the hybrid cell (macro-, micro-, pico-) structures are exploited to support the drastically increased demand [2]. The smaller cell size and the variable propagation conditions in microcells introduce much more frequent handoffs than ever before [3]. Poorly designed handoff strategy will Manuscript received January 17, Manuscript revised April 30, The author is with Institute of Communication Engineering, Xidian University, Xi an, , China. The author is with 3rd Development Department, Mobile Communication Systems Division, NEC Corporation, Tokyo, Japan. The authors are with the Department of Electrical Engineering, Shizuoka University, Hamamatsu-shi, Japan. generate very heavy signaling traffic and worse service quality. The handoff process usually consists of two phases: the handoff initiation phase and the handoff execution phase. In the handoff initiation phase, the service quality is monitored in order to decide when to trigger the handoff. Various types of handoff initiating criteria have been proposed [4] [6]. In the handoff execution phase, allocation of new resources to the handoff call is performed. It should be noted that the focus of this paper is put on the handoff execution phase, and we assume that the handoff request detection and initiation procedures are perfect (i.e. all valid requests are detected and no invalid requests activate the handoff procedure). A handoff area is defined as the area in which the strength of the radio wave from the current base station received by a mobile is between the handoff threshold and the receiver threshold [1], [7]. When received signal strength falls below the handoff threshold, a handoff procedure is initiated. The handoff process must be completed within the handoff area. However, in our scheme, no queues are provided to handoff voice calls, so handoff area needs not be considered. In our scheme, if on arrival there are no channels available for a voice handoff request, the ongoing conversation is forced to terminate. Forced termination of ongoing voice calls is more undesirable than blocking of originating calls from the user s viewpoint. Therefore, several schemes giving priority to handoff requests have been proposed to reduce the forced termination probability. Traffic models and performance measures of systems adopting some priority schemes are discussed in [8] [19]. The simplest way of giving priority to handoff requests is to reserve a fixed number of channels for them. That is, when the number of free channels in a cell is less than or equal to a predefined value, originating calls will be blocked. The handoff calls can still gain access to the system until there are no available channels. This scheme is called priority reservation scheme or cut-off priority scheme. In [12], systems with queues only for handoff requests are studied. In [18], on the other hand, queues are allowed only for originating calls. Both the originating calls and handoff requests are allowed to be queued in the system studied in [8]. In [9], [13], handoff schemes with two-level priority reservation have been proposed. Cellular communication systems that sup-

2 1634 IEICE TRANS. COMMUN., VOL.E82 B, NO.10 OCTOBER 1999 port a mixture of platform types distinguished by different mobility characteristics are considered in [14] [17]. However, in all of the above studies, only cutoff priority is concerned. Moreover, they do not take multiple types of services into consideration. With the development of cellular mobile systems, data services must also be considered [20]. Thus, a handoff scheme in data mobile systems was studied in [10]. However, future cellular mobile systems will be required to accommodate multiple types of services, such as voice, data, and video. In order to meet the future demands, the handoff strategy needs to take different features of these services into account, i.e., the ideal handoff process is service-dependent. For example, voice transmission is very sensitive to interruption. On the other hand, transmission delay of data has not much impact on the data performance (the data is not delay-sensitive). Therefore, a successful handoff without interruption is very important to voice, but not critical to dada. In [19], a special two-dimensional model for integrated voice/data cellular mobile systems, which gave preemptive priority to voice calls, was proposed. However, in this model, originating voice calls and handoff requests were not distinguished. Since forced termination of ongoing voice calls is more annoying than blocking of originating voice calls from the user s viewpoint, much more priority should be given to handoff voice calls. In [11], a handoff scheme in integrated voice/data cellular systems with priority reservation for voice handoff requests was proposed. In this scheme, some numbers of channels were reserved for voice handoff requests. Queues are allowed for voice handoff requests and data channel requests (originating data calls and handoff data requests). Moreover, a data channel request in the queue can be transferred to another queue in an adjacent cell when it moves out of the cell before getting a channel. In this paper, we propose a preemptive priority handoff scheme for integrated voice/data cellular mobile systems. Calls are divided into three different classes: handoff voice calls, originating voice calls, and data calls (originating data calls, handoff data calls, and data calls transferred from other cells). Data calls are queued in a data queue with finite capacity if no channels are available on their arrival. In the paper, all the calls, no matter which class they belong to, can access to all the channel resources if they are in idle. That is to say, no guard channels are reserved. However, priority is given to handoff voice calls over the other two kinds of calls. Specifically, the right to preempt the service of data is given to handoff voice calls if on arrival they find no idle channels. The interrupted data call returns to the queue and waits for some channel to be available. In the next two sections, we describe the preemp- Fig. 1 System model. tive handoff scheme and the traffic model. Analysis of the scheme is given in Sect. 4. Numerical results are presented in Sect. 5. Finally, Sect. 6 concludes the paper. 2. Preemptive Handoff Scheme For simplicity, fixed channel assignment scheme is assumed in this paper. That is to say, a set of channels is permanently assigned to each cell. We consider a system with many homogeneous cells each having S channels, and focus our attention on a single cell. This cell is called the marked cell. As shown in Fig. 1, in the base station there is a queue Q with capacity M for data channel requests. There are no queues for voice calls (handoff and originating voice calls). For both voice mobile users and data mobile users, there is no handoff area. But there is a cell boundary between the two neighboring cells. The boundary is defined as the locus of points where the average received signal strength of the two neighboring cells is equal. When a mobile user holding a channel approaches from a neighboring cell toward the marked cell and the received signal strength of the current base station goes below that of the base station in the marked cell, a handoff request is generated in the marked cell. Priority is given to voice handoff requests over originating voice calls and data calls. Specifically, the right to preempt the service of data is given to handoff voice calls if on arrival they find no idle channels. The preempted data call returns to the queue, and waits for a channel to be available. A voice handoff request will be rejected by the system under either of the following two circumstances: one is that all the channels are occupied by already arrived voice calls, the other one is that the data queue is full (that is to say, in our scheme, data calls in service can not be preempted by voice handoff calls when the data queue is full). It is possible to consider another scheme, that is whether the queue is full or not, data calls in service can be preempted by handoff voice calls. However, there is almost no difference between these two schemes when the capacity of the queue is very large. As to a newly generated voice

3 LI et al: A PREEMPTIVE PRIORITY HANDOFF SCHEME 1635 call, it will be blocked if there are no available channels on its arrival. A data channel request is queued in Q when on arrival it finds no available channels. It will be blocked if the queue is full. Furthermore, a data channel request in the queue can be transferred to the queue of the target cell when it moves out of the cell before it gets a channel. 3. TrafficModel 3.1 Channel Holding Time Let the random variable T CV be the call holding time of a voice call. That is the time a voice call would continue if the call is not forced into termination. A call is forced into termination if a handoff is required and fails before call completion. The call holding time T CV of a voice call is assumed to have an exponential distribution with mean E[T CV ](= 1/µ CV ). Let the random variable T CD denote the data length (total transmission time needed), which is also assumed to have an exponential distribution with mean E[T CD ](= 1/µ CD ). Let the random variable T dwell be the dwell time of a mobile user (voice mobile user or data mobile user) in a cell. Again we assume that it has an exponential distribution with mean E[T dwell ](= 1/µ dwell ). The channel assigned to a voice call will be held until either the call is completed in the cell or the mobile user moves out of the cell before call completion. Therefore, the channel holding time of a voice call T V is equal to the smaller one between T dwell and T CV. Assuming independence of T dwell and T CV and using the memoryless property of the exponential pdf (probability density function), we see that the channel holding time T V of a voice mobile user is exponentially distributed with mean E[T V ]= 1 = E[min(T dwell,t CV )] µ V 1 = (1) µ CV + µ dwell As to a data call not preempted by a voice handoff request, the channel assigned to it will be held until the call is completed in the cell or the mobile data user moves out of the cell before call completion. Similar to the case of a voice call, its channel holding time T D is equal to the smaller one between T dwell and T CD.Thus T D is exponentially distributed with mean E[T D ]= 1 = E[min(T dwell,t CD )] µ D 1 = (2) µ CD + µ dwell 3.2 Arrival Process of Calls We assume that the arrival processes of originating voice calls and originating data calls in a cell are both Poisson, with rates λ OV and λ OD, respectively (see Fig. 1). If the call holding time of a mobile user is greater than the dwell time in the cell, a handoff request will be initiated in a neighboring cell. Since we assume an equilibrium homogeneous mobility pattern, the mean number of incoming users into a cell is equal to that of outgoing ones from the cell. Therefore, the arrival rate of handoff requests at the marked cell is equal to the departure rate of handoff calls from the cell. Let λ HV denote the arrival rate of handoff voice requests, and λ HD denote the arrival rate of handoff data requests. It is apparent from the above discussions that λ HV = E[C V ]µ dwell (3) where E[C V ] is the average number of voice calls holding channels in a cell. And λ HD = E[C D ]µ dwell (4) where E[C D ] is the average number of data calls holding channels in a cell. We assume that the arrival processes of both kinds of handoff requests are Poisson processes having the above rates. A data channel request in the queue of a cell is transferred to the queue of the target cell when it moves out of the cell before getting a channel. The arrival rate λ TD of transferred requests at the marked cell is given by λ TD = L D µ dwell (5) where L D is the average length of the data queue Q. Again we assume that the arrival process of transferred data requests is Poisson. 4. Performance Analysis 4.1 The System-State Probabilities We define the state of the marked cell by a two-tuple of non-negative integers v =(i, j), where i is the number of channels used by voice calls, j is the sum of the number of data calls holding channels and the number of data calls waiting in the queue. It is apparent from the above assumptions that (i, j) is a two-dimensional Markov chain. The state space V of the cell is given by V = {v 0 i i + j S 0 i S<i+ j S + M} (6) In our scheme, the underlying processes that drive the system are as follows:

4 1636 IEICE TRANS. COMMUN., VOL.E82 B, NO.10 OCTOBER The arrival of data calls at the marked cell. 2. The generation of originating voice calls in the marked cell. 3. The arrival of handoff voice calls at the marked cell. 4. The departure of voice calls from the marked cell. 5. The departure of data calls from the marked cell. In the following, we will describe the state transitions of the system based on the above driving processes. Data Call Arrival Define r 1 (v, w) as the rate of transition from state v = (i, j) to state w =(i, j + 1) caused by the arrival of a data call. If 0 i<sand i + j S 1, the call will be served immediately. If 0 i S and S i + j S+M 1, the data call will be buffered in the queue. In the above two cases, r 1 (v, w) =λ D = λ OD +λ HD +λ TD. Otherwise, the data call will be blocked by the system. Originating Voice Call Arrival Define r 2 (v, w) as the rate of transition from state v = (i, j) to state w =(i +1,j) caused by the arrival of an originating voice call. If 0 i i + j S 1, the originating voice call will be served immediately by the system, and r 2 (v, w) =λ OV. Otherwise, the call will be blocked by the system. Handoff Voice Call Arrival Define r 3 (v, w) as the rate of transition from state v = (i, j) to state w =(i +1,j) caused by the arrival of a handoff voice call. If 0 i i + j S 1, the handoff voice call will get a channel immediately. If 0 i S 1 and S i + j S + M 1, a data call in service will be preempted by the handoff voice request, and the handoff voice call will get the channel. The preempted data call returns to the queue. In the above two cases, r 3 (v, w) = λ HV. Otherwise, the handoff voice call will be blocked by the system. Voice Call Departure Define r 4 (v, w) as the rate of transition from state v = (i, j) to state w =(i 1,j) caused by the departure of a voice call from a channel. In this case, r 4 (v, w) =iµ V. Data Call Departure Define r 5 (v, w) as the rate of transition from state v = (i, j) to state w =(i, j 1) caused by the departure of a data call from the cell. If i + j S, the data call departures only from a channel, and r 5 (v, w) =jµ D.If i+j >S, the data call departures either from a channel or from the data queue, and r 5 (v, w) =(S i)µ D +(i+ j S)µ dwell. To find the statistical equilibrium state probabilities P (i, j) for the marked cell, we write the flow balance equations (7), (8) and (9) for the states. [λ V + λ D + u(i 1)iµ V + u(j 1)jµ D ]P (i, j) =(i +1)µ V P (i +1,j)+(j +1)µ D P (i, j +1) + u(i 1)λ V P (i 1,j)+u(j 1)λ D P (i, j 1) 0 i + j S 1, 0 i S 1 (7) [u(m 1)u(S i 1)λ HV + u(m 1)λ D + u(i 1)iµ V + u(j 1)jµ D ]P (i, j) = u(m 1)u(S i 1)(i +1)µ V P (i +1,j) +[(S i)µ D + µ dwell ]u(m 1)P (i, j +1) + u(i 1)λ V P (i 1,j)+u(j 1)λ D P (i, j 1) i + j = S, 0 i S (8) [u(s i 1)u(S + M i 1 j)λ HV + u(s + M i j 1)λ D + u(i 1)iµ V +(S 1)µ D +(j + i S)µ dwell ]P (i, j) = u(s i 1)u(S+M i 1 j)(i+1)µ V P (i+1,j) +[(S 1)µ D +(i + j +1 S)µ dwell ] u(s + M i j 1)P (i, j +1) + u(i 1)λ HV P (i 1,j)+λ D P (i, j 1) S<i+ j S + M, 0 i S (9) In the above flow balance equations, we assume that P (i, j) = 0 when (i, j) / V. We also define the unit step function as { 1 n 0 u(n) = (10) 0 n<0 and use the notation λ V = λ HV + λ OV (11) Corresponding to N T =(1+S) ( S 2 + M +1) states in the state space V, there are N T flow balance equations. However, note that one of these balance equations can be obtained from other N T 1 equations. Since the sum of all state probabilities must be equal to 1, we have S i=0 S+M i j=0 P (i, j) = 1 (12) as another independent equation. As an example, the state transition diagram, when S = 2 and M = 2, is given in Fig. 2. In order to obtain all the P (i, j)s from Eqs. (3) (5), (7) (9) and (12), we use the iteration method shown in Appendix. 4.2 Performance Measures Based on the P (i, j)s obtained, various performance characteristics can then be readily calculated. The blocking probability of originating voice calls is apparently S 1 B OV =1 i=0 S 1 i j=0 P (i, j) (13) The blocking probability of handoff voice calls is

5 LI et al: A PREEMPTIVE PRIORITY HANDOFF SCHEME 1637 Fig. 2 An example of state transition diagram with S =2,M =2. B HV = M j=0 S 1 P (S, j)+ P (i, S + M i) (14) i=0 When a voice user is assigned to a channel, subsequent cell boundary crossings while the call is in progress will necessitate further handoffs. The handoff requirement probability P H of a voice call is the probability that the call holding time exceeds the dwell time of the voice user in a cell, i.e. P H = Prob{T CV >T dwell } (15) Assuming that T CV and T dwell are independent, we can easily get µ dwell P H = (16) µ CV + µ dwell The forced termination probability P F, that a voice call accepted into the system is forced into termination during its lifetime, is an important measure of the system performance. It is important to distinguish between this probability and the blocking probability B HV of a single voice handoff attempt. The forced termination probability P F of a voice call can be expressed as P F = P H B HV [(1 B HV )P H ] l 1 l=1 B HV P H = 1 P H (1 B HV ) The average length of Q is L D = S S+M i i=0 j=s+1 i (17) (i + j S)P (i, j) (18) The blocking probability of data calls is S B D = P (i, S + M i) (19) i=0 E[C V ] denotes the average number of voice calls holding channels and we have E[C V ]= S i=0 S+M i j=0 ip (i, j) (20) The average number of data calls holding channels in a cell, denoted by E[C D ], is given by S S i S E[C D ]= jp(i, j)+ i=0 j=0 (S i)p (i, j) (21) S+M i i=0j=s+1 i Using Little s formula, average value of waiting time T W (random variable) of data channel requests in the queue is given by E[T W ]= L D λ D (1 B D ) (22) Average value of duration T S (random variable) of a data call in a cell is E[T S ]= E[C D]+L D (23) λ D (1 B D ) Let us define the random variable N h as the number of cells that a data mobile user must cross before the completion of the call. Then, we have E[T CD ] E[N h ]= (24) E[T S ] E[T W ] Therefore, from Eqs. (22), (23) and (24), we can get the average transmission delay E[T D ] of data calls E[T D ]=E[N h ]E[T W ]= L DE[T CD ] (25) E[C D ] 5. Numerical Results and Discussions In this section, some system characteristics are numerically studied. Moreover, the results are compared with those in the handoff scheme for integrated voice and data mobile cellular radio system with priority reservation for voice handoff requests [11]. In the scheme presented in [11], a system with many cells each having S channels is considered. In

6 1638 IEICE TRANS. COMMUN., VOL.E82 B, NO.10 OCTOBER 1999 Fig. 3 Comparison of forced termination probabilities for the three schemes versus γ. each cell, there are two queues Q V and Q D with capacities M V and M D for voice handoff requests and data calls, respectively. S S C channels are reserved for voice handoff requests. A voice handoff request is queued in Q V if on arrival it finds no idle channels. On the other hand, a data channel request is queued in Q D when on arrival it finds less than or equal to S S C available channels. Both channel requests are blocked if their own queues are full on their arrival. An originating voice call is blocked if on arrival it finds less than or equal to S S C available channels. No queue is assumed for originating voice calls. A voice handoff request in the queue is deleted from the queue when it passes through the handoff area before getting a new channel (i.e., forced termination) or its communication is completed before passing through the handoff area. A data channel request in the queue Q D can be transferred to the queue of the target cell when it moves out of the cell before it gets a channel. In our numerical examples, the parameters of the preemptive priority scheme are set as follows: E[T CV ] = 120.0s, E[T CD ]=60.0s, E[T dwell ]=30.0s, S = 10, M = 100. As for the priority reservation scheme, for comparison purposes, the capacity of the queue for handoff voice calls is set to be 0 and the capacity M D of the data queue is set to be 100. Other parameters in the scheme are set to be equal to those in the preemptive priority handoff scheme. Note that in the priority reservation scheme with S S C = 0, there are no guard channels provided to voice handoff requests. This system is nothing but a system without any priority given to voice handoff calls. Thus in the following, this system is called non-priority scheme. We define ρ = λ OD E[T CD ]+λ OV E[T CV ] as the traffic intensity of the originating calls in the marked cell. Moreover, γ is defined as the ratio of the data traffic intensity to the total traffic intensity, that is γ = λ ODE[T CD ] ρ λ OD E[T CD ] = (26) λ OD E[T CD ]+λ OV E[T CV ] Figure 3 shows the forced termination probabilities of voice handoff calls for the three schemes (preemptive priority scheme, priority reservation scheme, and nonpriority scheme) versus γ. Two cases are shown in the figure, one is the case where ρ =7.0, which means that the traffic load of the system is heavy; the other one is the case of moderate traffic load with ρ =3.0. In the preemptive priority scheme, with the increase of γ, the number of data calls holding channels increases, which makes it easier for a handoff voice call getting a channel by preempting a data call in service if on arrival it finds no idle channels. Therefore, with γ increasing, the forced termination probability in the preemptive priority scheme decreases much faster than that in the priority reservation scheme. When γ is greater than a certain value, the preemptive priority scheme can provide an improvement on the forced termination probability relative to the priority reservation scheme, which becomes much larger when γ increases. Since the forced termination of ongoing voice calls is very undesirable from the user s viewpoint, this improvement is of great importance for service quality of the whole cellular mobile system. However, with γ being small, the probability by which a handoff voice call can preempt a data call in service becomes small. Thus, it can be seen from Fig. 3 that the improvement on the forced termination probability of the voice handoff calls in the preemptive priority scheme is not large. Moreover, in the extreme case, where γ = 0, there is no difference between the preemptive priority scheme and the non-priority scheme. Therefore, the forced termination probabilities of the two schemes are the same. To cope with this problem,

7 LI et al: A PREEMPTIVE PRIORITY HANDOFF SCHEME 1639 Fig. 4 Comparison of the forced termination probabilities for the three schemes versus ρ. Fig. 5 Comparison of the blocking probabilities of the originating voice calls for the three schemes versus γ. some other priority schemes need to be adopted as will be mentioned in Sect. 6. Different from the other two schemes, it can be seen from Fig. 3 that the forced termination probability in the non-priority scheme slightly increases with the increase of γ. The reason can be explained as follows: In the non-priority scheme, since handoff voice calls have no priority over originating voice calls, the blocking probability B HV of handoff voice calls and the blocking probability B OV of originating voice calls are the same. From Eq. (17), we see that, the forced termination probability P F is a monotone increasing function of B HV. Since the system provides a queue only for data calls, the increase of γ results in the increase of the effective traffic intensity and thus the increase of B OV (= B HV ) (see Fig. 5). Therefore, with the increase of γ, the forced termination probability P F in non-priority scheme increases. Figure 4 shows the forced termination probabilities of voice calls for the three schemes versus ρ. Two cases are shown, one is for γ =0.5, and the other one is for γ = 0.1. When γ = 0.5, the forced termination probability in the preemptive priority scheme is always much smaller than that in the priority reservation scheme. That is, the effect of the preemption is much greater than that of the channel reservation for this case. However, performance of the preemptive priority scheme depends on γ. For the case of γ =0.1, the improvement on the forced termination probability is not large since the number of data calls in service is small. Figure 5 shows the blocking probabilities of originating voice calls for the three schemes versus γ. It can be seen that with the increase of γ, the blocking probabilities of originating voice calls in all of these three schemes increases. This is because, in these schemes, queues are provided only for data calls, so that the increase of γ causes the increase of effective traffic intensity. From the figure, we see that the blocking proba- bility in the preemptive priority scheme is smaller than that in the priority reservation scheme. This is because no guard channels are used in the preemptive priority scheme. When γ = 0, the blocking probability of originating voice calls in the preemptive priority scheme is the same as that in the non-priority scheme. When γ is between 0 and 1, the blocking probability of originating voice calls in the preemptive priority scheme is larger than that in the non-priority scheme. This is because, in the preemptive priority scheme, with the right to preempt the service of data calls given to handoff voice calls, larger number of channels will be occupied by handoff voice calls, which makes it more difficult for originating voice calls to get idle channels on their arrival. When γ is very close to 1, the blocking probability of originating voice calls is mainly determined by the data traffic intensity. Thus, the difference between the blocking probability of originating voice calls in the preemptive priority scheme and that in the nonpriority scheme becomes very small. Moreover, with the decrease of ρ, the preemption probability of data calls in service becomes smaller, so that the blocking probabilities of the two schemes become closer as we can see in the figure for the case of ρ =3.0. Figure 6 shows the average queue length of data calls for the three schemes versus γ. Comparing the priority reservation schemes, we see that the case of S S C = 0 (non-priority scheme) has the best performance. This is because that there are no guard channels in the non-priority scheme. The preemptive priority scheme has no guard channels as well. However, in the preemptive priority scheme, data calls preempted by voice handoff calls return to the data queue, which brings about the increase in the average queue length. Therefore, we see that the average queue length in the preemptive priority scheme is always larger than that in the non-priority scheme. Moreover, when γ is close to 1, the occurrence of data calls being preempted becomes

8 1640 IEICE TRANS. COMMUN., VOL.E82 B, NO.10 OCTOBER 1999 Fig. 6 Comparison of the average length of the data queue for the three schemes versus γ. is very small, we see that the difference between the average transmission delay of data calls in the preemptive priority scheme and that in the non-priority scheme slightly increases with the increase of γ. In this case, the arrival rate λ HV of the handoff voice calls is very large, but the number of data calls in service is very small. Therefore, in contrast to other cases, the increase of γ results in the increase of the number of data calls preempted and thus the increase in the average transmission delay of data calls. In summary, our scheme can provide great improvement on the forced termination probability of voice calls with only small increase in the blocking probability of originating voice calls and the average transmission delay for data calls relative to those in the non-priority scheme. Since the data is usually not delay-sensitive, we can say that, the preemptive priority scheme has great advantages over the non-priority scheme. When γ is larger than a certain value, all the performance characteristics (forced termination probability for voice calls, blocking probability for originating voice calls, average transmission delay, and average queue length) of the system are better than those in the priority reservation scheme. That is to say, a better quality of service for both voice calls and data calls can be obtained. 6. Conclusions Fig. 7 Comparison of the average transmission delay of data calls for the three schemes versus γ. small since the arrival rate of handoff voice calls is very small. Thus, the difference between the average queue length in the preemptive priority scheme and that in the non-priority scheme becomes very small. Figure 7 shows the average transmission delay of data calls for the three schemes versus γ. We can see that the average transmission delay of data calls in the preemptive priority scheme is larger than that in the non-priority scheme. This is because, in the preemptive priority scheme, data calls in service can be preempted by handoff voice calls and return to the data queue waiting for some channels to be available. Therefore, on the average, in the preemptive priority scheme, a data will spend more time waiting in the data queue. Furthermore, we see that when γ is close to 1, the average transmission delay of data calls in the preemptive priority scheme becomes very close to that in the nonpriority scheme. This is because with γ being close to 1, the preemption probability of a data call in service becomes very small. For the case of ρ =7.0, when γ In this paper, we proposed a preemptive priority handoff scheme for integrated voice/data cellular mobile systems. The calls generated are divided into three different classes: handoff voice calls, originating voice calls and data calls. Priority is given to handoff voice calls over the other two kinds of calls. Specifically, the right to preempt the service of data is given to handoff voice call if on arrival it finds no idle channels. Data calls are queued if no channels are available at the time of arrival. The interrupted data call returns to the data queue. Performance of the system is compared to that of another handoff scheme for integrated voice/data cellular mobile systems where cut-off priority for voice handoffs is considered. Comparison shows that, when the data traffic is not very light, our scheme can provide lower blocking probabilities of originating voice calls, lower forced termination probabilities of ongoing voice calls, shorter average queue length, and less average transmission delay for data calls. On the whole, the preemptive handoff scheme proposed in this paper not only decreases the forced termination probability of voice calls, but also improves the channel utilization. However, when the data traffic is light, the improvement on the forced termination probability is not large. Especially, when γ is very small, the performance of the preemptive priority scheme becomes worse than that of the priority reservation scheme. To cope with this problem, we can conceive to combine the pre-

9 LI et al: A PREEMPTIVE PRIORITY HANDOFF SCHEME 1641 emptive priority scheme with the priority reservation scheme. This combined system will be studied in the future work. As we know, the queuing handoff is another method to decrease the forced termination probability. However, in this paper, we did not consider this method. In the future work, we will add a queue for voice handoff requests. This will further decrease the forced termination probability for ongoing voice calls. Lastly, it should be noted that only fixed channel allocation scheme was considered in this paper. However, dynamic channel allocation scheme is also widely studied for modern mobile cellular systems. It is more suitable than the fixed allocation scheme when the system has non-uniform traffic distribution. To study how to adopt the preemptive priority handoff scheme into the system with dynamic channel allocation is also our future work. For example, it is an interesting problem to decide whether the preemptive priority scheme or the dynamic channel allocation scheme should be invoked first when there is no channel available for a handoff voice call. From the discussions in this paper, we can expect that even under the assumption of dynamic channel allocation scheme the basic idea of the preemptive priority scheme still works and better quality of service would be obtained. References [1] S. Tekinay and B. Jabbbari, Handover and channel assignment in mobile cellular networks, IEEE Commun. Mag., vol.29, no.11, pp.42 46, Nov [2] V.O.K. Li and X.X. Qiu, Personal communication systems (PCS), Proc. IEEE, vol.83, no.9, pp , Sept [3] Q.A. Zeng, K. Mukumoto, and A. Fukuda, Influence of cell radius, moving speed, and duration of calls on handoff rate in cellular mobile radio systems, Proc. Wireless 95, J-2, pp , June [4] A. Murase, I.C. Symington, and E. Green, Handover criterion for macro and microcellular systems, IEEE VTC-91, pp , [5] M.D. Austin and G.L. Stuber, Direction biased handoff algorithms for urban microcells, IEEE VTC-94, pp , [6] K.G. Cornett, Bit error rate estimation techniques for digital land mobile radios, IEEE VTC-91, pp , [7] S. Tekinay and B. Jabbari, A measurement-based prioritization scheme for handovers in mobile cellular networks, IEEE J. Sel. Areas Commun., vol.10, no.8, pp , Oct [8] Q.A. Zeng, K. Mukumoto, and A. Fukuda, Performance analysis of mobile cellular radio system with priority reservation handoff procedures, Proc. IEEE VTC-94, vol.3, pp , June [9] Q.A. Zeng, K. Mukumoto, and A. Fukuda, Performance analysis of mobile cellular radio systems with two-level priority reservation handoff procedure, IEICE Trans. Commun., vol.e80-b, no.4, pp , April [10] Q.A. Zeng, K. Mukumoto, and A. Fukuda, Performance analysis of a handoff scheme in data mobile cellular radio systems, IEICE Conf., B-5-193, March [11] Q.A. Zeng, K. Mukumoto, and A. Fukuda, Performance analysis of a handoff scheme in integrated voice/data mobile cellular radio systems, IEICE Conf., B-5-194, March [12] D. Hong and S.S. Rappaport, Traffic model and performance analysis for cellular mobile radiotelephone systems with prioritized and non-prioritized hand-off procedures, IEEE Trans., vol.vt-35, pp.77 92, [13] D. Hong and S.S. Rappaport, Priority oriented channel access for cellular systems serving vehicular and portable radio telephones, IEE Proc. I, CSV-136, no.5, pp , [14] S.S. Rappaport, The multiple-call hand-off problem in high-capacity communications systems, IEEE Trans. Veh. Technol., vol.40, no.3, pp , [15] S.S. Rappaport, Models for call hand-off schemes in cellular communication networks, in Third generation wireless information networks, eds. S. Nanda and D.J. Goodman, pp , Kluwer Academic Publishers, Boston, [16] S.S. Rappaport, Blocking, hand-off and traffic performance for cellular communication systems with mixed platforms, IEE Proc. I, CSV-140, no.5, pp , [17] C. Purzynski and S.S. Rappaport, Multiple call handoff problem with queued handoffs and mixed platform types, IEE Proc. I, CSV-142, no.1, pp.31 39, [18] R. Guerin, Queueing-blocking systems with two arrival stream and guard channels, IEEE Trans. Commun., vol.36, no.2, pp , Feb [19] F.-N. Parlidon, Two-dimensional traffic models for cellular mobile systems, IEEE Trans. Commun., vol.42, no.2/3/4, pp , Feb./March/April [20] D.J. Goodman, Trends in cellular and cordless communication, IEEE Commun. Mag., vol.29, no.6, pp.31 40, June [21] H. Akimaru and R.B. Cooper, Teletraffic Engineering, Ohm, Appendix In order to obtain all the state probabilities, we must solve the flow balance equations (7), (8), (9) and (12). If we assume that λ HV, λ HD and λ TD are constant, the flow balance equations can be solved as a set of linear simultaneous equations. However, actually λ HV, λ HD and λ TD are not constant, but dependent on the state probabilities P (i, j)s through Eqs. (3) (5). Thus we use the following iteration procedure to obtain all the state probabilities: Step 1. Select arbitrary initial (positive) values for λ HV, λ HD and λ TD. Step 2. Compute all the state probabilities P (i, j)s by using SOR method [21]. Step 3. Compute the average number of voice calls holding channels, the average number of data calls holding channels and the average number of data calls waiting in the queue by using Eqs. (20), (21) and (18). Step 4. Compute new λ HV, λ HD and λ TD using Eqs. (3) (5). If new λ HV oldλ HV <ε, new λ HD oldλ HD <εand new λ TD oldλ TD <ε, then stop the iteration. Otherwise, go to step 2 again. Where ε is a very small positive number to check the convergence.

10 1642 IEICE TRANS. COMMUN., VOL.E82 B, NO.10 OCTOBER 1999 Bo Li was born in Xi an, China, on November 18, He received the B.S. and M.S. degrees from Xidian University, China, in 1994 and 1997, all in communication engineering. From 1997 to 1998, as a research student, he did research work on mobile communication systems in Shizuoka University, Japan. Now he is with the institute of communication engineering of Xidian University. At the same time, he is also working towards Ph.D. degree in Xidian University. His research interests include handoffs, multiple access protocols, and mobile communication systems. He also has some interests in the study of mobile video communication systems. Qing-An Zeng received the B.S. degree from Chengdu Meteorological Institute, China, the M.S. and Ph.D. degrees from Shizuoka University, Japan, all in electrical engineering, in 1984, 1994 and 1997, respectively. From 1984 to 1990, he was with the State Meteorological Administration, China, as a researcher. In 1997, he joined NEC Corporation, Japan, where he has been engaged in the development of mobile radio communication systems. His research interests include mobile radio communication systems, wireless networks, channel allocation algorithms, handoffs, CDMA technology, and queueing theory. Dr. Zeng is a member of the IEEE. Akira Fukuda received the B.S., M.S., and Ph.D. degrees, all in electronic engineering, from the University of Tokyo, Tokyo, Japan, in 1967,1969, and 1972, respectively. In 1972, he joined the Department of Electrical Engineering, Shizuoka University, Hamamatsu, Japan, where he is now a professor. From 1983 to 1984, he was a visiting professor at the Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA. His research interests include coding theory, modulation theory, queueing theory, mobile communication systems, and meteor burst communications. He has published about 100 papers in the above areas. He is the author of the two books Meteor Burst Communications (Corona, Tokyo) and Fundamentals of Communication Engineering (Morikita, Tokyo). He received the Yonezawa Memorial Prize in He was also honored from the Telecommunications Advancement Foundation in 1987 for his invention of EPA (Equilibrium Point Analysis). Dr. Fukuda is a member of the IEEE. Kaiji Mukumoto was born in Shizuoka, Japan, on March 28, He received the Ph.D. degree in electrical engineering from Shizuoka University, Hamamatsu, Japan in In 1974, he joined the Department of Electrical Engineering, Shizuoka University, Hamamatsu, Japan, as a technical official. His research interests include software modems, packet radio networks, queueing theory, and meteor burst communications.

ADAPTIVE SLOT ALLOCATION AND BANDWIDTH SHARING FOR PRIORITIZED HANDOFF CALLS IN MOBILE NETWOKS

ADAPTIVE SLOT ALLOCATION AND BANDWIDTH SHARING FOR PRIORITIZED HANDOFF CALLS IN MOBILE NETWOKS ADAPTIVE SLOT ALLOCATION AND BANDWIDTH SHARING FOR PRIORITIZED HANDOFF CALLS IN MOBILE NETWOKS S.Malathy G.Sudhasadasivam K.Murugan S.Lokesh Research Scholar Professor, CSE Department Lecturer, IT Dept

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

THE future telecommunications networks (such as the

THE future telecommunications networks (such as the IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 51, NO. 2, MARCH 2002 371 Call Admission Control Schemes and Performance Analysis in Wireless Mobile Networks Yuguang Fang, Senior Member, IEEE, and Yi Zhang

More information

Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio

Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Abstract Spectrum scarcity is one of the most critical recent problems in the field of wireless communication One of the promising

More information

Design and Analysis of QoS Supported Frequent Handover Schemes in Microcellular ATM Networks

Design and Analysis of QoS Supported Frequent Handover Schemes in Microcellular ATM Networks 942 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 50, NO. 4, JULY 2001 Design and Analysis of QoS Supported Frequent Handover Schemes in Microcellular ATM Networks Kuochen Wang and Lon-Sheng Lee Abstract

More information

Tunable Preemption Controls for a Cellular Emergency Network

Tunable Preemption Controls for a Cellular Emergency Network Tunable Preemption Controls for a Cellular Emergency Network Jiazhen Zhou and Cory Beard Department of Computer Science Electrical Engineering University of Missouri - Kansas City, Kansas City, MO 64 Abstract

More information

Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions

Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions Eser Gemikonakli University of Kyrenia, Kyrenia, Mersin 10, Turkey Abstract In this study, the aim

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

A New Call Admission Control scheme for Real-time traffic in Wireless Networks

A New Call Admission Control scheme for Real-time traffic in Wireless Networks A New Call Admission Control scheme for Real-time traffic in Wireless Networks Maneesh Tewari and H.S. Jamadagni Center for Electronics Design and Technology, Indian Institute of Science, Bangalore, 5612

More information

ABSTRACT /99/$ IEEE

ABSTRACT /99/$ IEEE Dynamic Reservation Based on Mobility in Wireless ATM Networks Young Chon Kim, Dong Eun Lee, Bong Ju Lee, Chonbuk National University, Korea Young Sun Kim, Electronic Telecommunication Research Institute,

More information

An Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks

An Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks An Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks Hong Bong Kim Telecommunication Networks Group, Technical University of Berlin Sekr FT5 Einsteinufer 25 1587 Berlin Germany

More information

An Adaptive Bandwidth Reservation Scheme in Multimedia Wireless Networks

An Adaptive Bandwidth Reservation Scheme in Multimedia Wireless Networks An Adaptive Bandwidth Reservation Scheme in Multimedia Wireless Networks Xiang Chen and Yuguang Fang Depament of Electrical and Computer Engineering University of Florida, Gainesville, FL 32611 Abstract

More information

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department

More information

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision Huei-Wen Ferng, Jin-Hui Lin, Yuan-Cheng Lai, and Yung-Ching Chen Department of Computer Science and Information

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 26, NO. 21, NOVEMBER 1, /$ IEEE

JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 26, NO. 21, NOVEMBER 1, /$ IEEE JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 26, NO. 21, NOVEMBER 1, 2008 3509 An Optical Hybrid Switch With Circuit Queueing for Burst Clearing Eric W. M. Wong, Senior Member, IEEE, and Moshe Zukerman, Fellow,

More information

Decreasing Call Blocking Rate by Using Optimization Technique

Decreasing Call Blocking Rate by Using Optimization Technique International Journal of Scientific and Research Publications, Volume 4, Issue 6, June 2014 1 Decreasing Call Blocking Rate by Using Optimization Technique Vinay Prakash Sriwastava *, Jalneesh Singh *,

More information

654 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 2, MARCH 2006

654 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 2, MARCH 2006 654 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 2, MARCH 2006 Optimal Resource Allocation and Adaptive Call Admission Control for Voice/Data Integrated Cellular Networks Chi Wa Leong, Weihua

More information

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks *

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks * Dynamic Control and Optimization of for Short Message Transfer in GPRS/UMTS Networks * Michael M. Markou and Christos G. Panayiotou Dept. of Electrical and Computer Engineering, University of Cyprus Email:

More information

SUPPORT OF HANDOVER IN MOBILE ATM NETWORKS

SUPPORT OF HANDOVER IN MOBILE ATM NETWORKS SUPPORT OF HANDOVER IN MOBILE ATM NETWORKS Péter Fazekas fazekasp@hit.hit.bme.hu Tel: (36) 1-463-3256 Fax: (36) 1-463-3263 Department of Telecommunications Pázmány Péter sétany 1/D Polytechnic University

More information

User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey

User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey Hamid Beigy and M. R. Meybodi Computer Engineering Department Amirkabir University of Technology Tehran, Iran {beigy, meybodi}@ce.aut.ac.ir

More information

A Call Admission Protocol for Wireless Cellular Multimedia Networks

A Call Admission Protocol for Wireless Cellular Multimedia Networks A Call Admission Protocol for Wireless Cellular Multimedia Networks Mokhtar A. Aboleaze Dept. of Computer Science and Engineering York University Toronto, ON. Canada aboelaze@cs.yorku.ca Fadi A. Aloul

More information

Keywords Handoff, QoS provisioning, Expected Visitor List, Decomposition of Handoff Messaging, Base Station, Handoff Initiation, Handoff Decision.

Keywords Handoff, QoS provisioning, Expected Visitor List, Decomposition of Handoff Messaging, Base Station, Handoff Initiation, Handoff Decision. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Handoff

More information

Transport Performance Evaluation of an ATM-based UMTS Access Network

Transport Performance Evaluation of an ATM-based UMTS Access Network Transport Performance Evaluation of an -based US Access Network Nikos H. Loukas, Christos K. Xenakis, Lazaros Merakos University of Athens, Department of Informatics, Communication Networks Laboratory

More information

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels

More information

Multimedia Document Communications over Wireless Network

Multimedia Document Communications over Wireless Network Multimedia Document Communications over Wireless Network 1 Convergence of Mobile Services Personal computer Access to any data Internet Telecommunications Mobile Technology Ubiquitous Portable processing

More information

CHANNEL SHARING SCHEME FOR CELLULAR NETWORKS USING MDDCA PROTOCOL IN WLAN

CHANNEL SHARING SCHEME FOR CELLULAR NETWORKS USING MDDCA PROTOCOL IN WLAN International Journal on Information Sciences and Computing, Vol. 5, No.1, January 2011 65 Abstract CHANNEL SHARING SCHEME FOR CELLULAR NETWORKS USING MDDCA PROTOCOL IN WLAN Jesu Jayarin P. 1, Ravi T.

More information

An Efficient Resource Allocation Protocol for Multimedia Wireless Networks

An Efficient Resource Allocation Protocol for Multimedia Wireless Networks International Journal of Advanced Trends in Computer Science and Engineering, Vol.2, No.1, Pages : 178-182 (213) Special Issue of ICACSE 213 - Held on 7-8 January, 213 in Lords Institute of Engineering

More information

Channel Allocation and Performance Study for the Integrated GSM/GPRS System

Channel Allocation and Performance Study for the Integrated GSM/GPRS System Channel Allocation and Performance Study for the Integrated GSM/GPRS System Huei-Wen Ferng and Yi-Chou Tsai Department of Computer Science and Information Engineering, National Taiwan University of Science

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

Performance Evaluation of Handover Channel Exchange Scheme in GSM Network

Performance Evaluation of Handover Channel Exchange Scheme in GSM Network Performance Evaluation of Handover Channel Exchange Scheme in GSM Network Onyishi D.U Department of Electrical & Electronics Engineering, Federal University of Petroleum Resources Effurun Nwalozie G.C

More information

Research Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized Secondary Users

Research Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized Secondary Users Mobile Information Systems Volume 2016, Article ID 3297938, 8 pages http://dx.doi.org/10.1155/2016/3297938 Research Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized

More information

The Analysis of the Loss Rate of Information Packet of Double Queue Single Server in Bi-directional Cable TV Network

The Analysis of the Loss Rate of Information Packet of Double Queue Single Server in Bi-directional Cable TV Network Applied Mechanics and Materials Submitted: 2014-06-18 ISSN: 1662-7482, Vol. 665, pp 674-678 Accepted: 2014-07-31 doi:10.4028/www.scientific.net/amm.665.674 Online: 2014-10-01 2014 Trans Tech Publications,

More information

Performance Study of Routing Algorithms for LEO Satellite Constellations

Performance Study of Routing Algorithms for LEO Satellite Constellations Performance Study of Routing Algorithms for LEO Satellite Constellations Ioannis Gragopoulos, Evangelos Papapetrou, Fotini-Niovi Pavlidou Aristotle University of Thessaloniki, School of Engineering Dept.

More information

Teletraffic theory (for beginners)

Teletraffic theory (for beginners) Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles

More information

Different Resource Sharing Policies under a General Channel Management Strategy for Multi-Class Traffic in LEO-MSS

Different Resource Sharing Policies under a General Channel Management Strategy for Multi-Class Traffic in LEO-MSS www.iji.org 126 Different Resource Sharing Policies under a General Channel Management Strategy for Multi-Class Traffic in LEO-MSS Amr S. Matar, Gamal Abd-Elfadeel, Ibrahim I. Ibrahim and Hesham M. Z.

More information

WIRELESS/MOBILE networking is one of the strongest

WIRELESS/MOBILE networking is one of the strongest IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 53, NO. 3, MAY 2004 835 An Integrated Adaptive Bandwidth-Management Framework for QoS-Sensitive Multimedia Cellular Networks Sungwook Kim and Pramod K. Varshney,

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

Queuing Networks Modeling Virtual Laboratory

Queuing Networks Modeling Virtual Laboratory Queuing Networks Modeling Virtual Laboratory Dr. S. Dharmaraja Department of Mathematics IIT Delhi http://web.iitd.ac.in/~dharmar Queues Notes 1 1 Outline Introduction Simple Queues Performance Measures

More information

Introduction to Queuing Systems

Introduction to Queuing Systems Introduction to Queuing Systems Queuing Theory View network as collections of queues FIFO data-structures Queuing theory provides probabilistic analysis of these queues Examples: Average length Probability

More information

Maximum Number of Users Which Can Be Served by TETRA Systems

Maximum Number of Users Which Can Be Served by TETRA Systems Maximum Number of Users Which Can Be Served by TETRA Systems Martin Steppler Aachen University of Technology Communication Networks Prof. Dr.-Ing. Bernhard Walke Kopernikusstr. 16 D-52074 Aachen Germany

More information

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for

More information

Cover sheet for Assignment 3

Cover sheet for Assignment 3 Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach

More information

Minimize the Cost of Two-Tier Cellular Network Using Genetic Algorithm

Minimize the Cost of Two-Tier Cellular Network Using Genetic Algorithm Minimize the Cost of Two-Tier Cellular Network Using Genetic Algorithm Minimize the Cost of Two-Tier Cellular Network Using Genetic Algorithm Pankaj Goel and D. K. Lobiyal School of Computer and Systems

More information

RESERVATION OF CHANNELS FOR HANDOFF USERS IN VISITOR LOCATION BASED ON PREDICTION

RESERVATION OF CHANNELS FOR HANDOFF USERS IN VISITOR LOCATION BASED ON PREDICTION RESERVATION OF CHANNELS FOR HANDOFF USERS IN VISITOR LOCATION BASED ON PREDICTION 1 M.AMSAVENI 2 S.MALATHY 1 Assistant Professor, Department of ECE, RVS College of Engineering And Technology, Coimbatore,

More information

Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications

Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Lin Dai Department of Electronic Engineering City University of Hong Kong lindai@cityu.edu.hk March, 2018

More information

Model suitable for virtual circuit networks

Model suitable for virtual circuit networks . The leinrock Independence Approximation We now formulate a framework for approximation of average delay per packet in telecommunications networks. Consider a network of communication links as shown in

More information

arxiv: v2 [cs.ni] 23 May 2016

arxiv: v2 [cs.ni] 23 May 2016 Simulation Results of User Behavior-Aware Scheduling Based on Time-Frequency Resource Conversion Hangguan Shan, Yani Zhang, Weihua Zhuang 2, Aiping Huang, and Zhaoyang Zhang College of Information Science

More information

Cross Layer QoS Provisioning in Home Networks

Cross Layer QoS Provisioning in Home Networks Cross Layer QoS Provisioning in Home Networks Jiayuan Wang, Lukasz Brewka, Sarah Ruepp, Lars Dittmann Technical University of Denmark E-mail: jwan@fotonik.dtu.dk Abstract This paper introduces an innovative

More information

Performance Analysis of DS/SSMA Unslotted ALOHA System With Variable Length Data Traffic

Performance Analysis of DS/SSMA Unslotted ALOHA System With Variable Length Data Traffic IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 19, NO. 11, NOVEMBER 2001 2215 Performance Analysis of DS/SSMA Unslotted ALOHA System With Variable Length Data Traffic Jae-Woo So, Student Member,

More information

Delay Analysis of the Selective-Repeat ARQ with the Per Flow Resequencing

Delay Analysis of the Selective-Repeat ARQ with the Per Flow Resequencing Delay Analysis of the Selective-epeat AQ with the Per Flow esequencing Toshihiro Shikama Information Technology & D Center Mitsubishi Electric Corporation 5-1-1 Ofuna, Kamakura-shi, 247-8501 Japan Email:

More information

PAPER Adaptive Thresholds of Buffer to Solve the Beat-Down Problem of Rate Control in ATM Networks

PAPER Adaptive Thresholds of Buffer to Solve the Beat-Down Problem of Rate Control in ATM Networks 362 PAPER Adaptive Thresholds of Buffer to Solve the Beat-Down Problem of Rate Control in ATM Networks Harry PRIHANTO, Student Member and Kenji NAKAGAWA, Member SUMMARY ABR service is currently standardized

More information

Adaptive Dynamic Channel Allocation Scheme for Spotbeam Handover in LEO Satellite Networks*

Adaptive Dynamic Channel Allocation Scheme for Spotbeam Handover in LEO Satellite Networks* Adaptive Dynamic Channel Allocation Scheme for Spotbeam Handover in LEO Satellite Networks* Sungrae Cho Broadband and Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia

More information

A Route Selection Scheme for Multi-Route Coding in Multihop Cellular Networks

A Route Selection Scheme for Multi-Route Coding in Multihop Cellular Networks A Route Selection Scheme for Multi-Route Coding in Multihop Cellular Networks Hiraku Okada,HitoshiImai, Takaya Yamazato, Masaaki Katayama, Kenichi Mase Center for Transdisciplinary Research, Niigata University,

More information

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Leah Rosenbaum Mohit Agrawal Leah Birch Yacoub Kureh Nam Lee UCLA Institute for Pure and Applied

More information

Stochastic Admission Control for Quality of Service in Wireless Packet Networks

Stochastic Admission Control for Quality of Service in Wireless Packet Networks Stochastic Admission Control for Quality of Service in Wireless Packet Networks Majid Ghaderi 1, Raouf Boutaba 1, and Gary W. Kenward 2 1 University of Waterloo, Waterloo, ON N2L 3G1, Canada {mghaderi,rboutaba}@uwaterloo.ca

More information

Adaptive Mechanism for Aggregation with fragments retransmission in high-speed wireless networks

Adaptive Mechanism for Aggregation with fragments retransmission in high-speed wireless networks Int. J. Open Problems Compt. Math., Vol. 4, No. 3, September 2011 ISSN 1998-6262; Copyright ICSRS Publication, 2011 www.i-csrs.org Adaptive Mechanism for Aggregation with fragments retransmission in high-speed

More information

Chapter 3 MEDIA ACCESS CONTROL

Chapter 3 MEDIA ACCESS CONTROL Chapter 3 MEDIA ACCESS CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Motivation SDMA, FDMA, TDMA Aloha Adaptive Aloha Backoff protocols Reservation schemes Polling Distributed

More information

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015)

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Cross Traffic Estimate Model for Optical Burst Switching Networks Yujue WANG 1, Dawei NIU 2, b,

More information

DEVELOPMENT OF CONGESTION CONTROL SCHEME FOR WIRELESS MOBILE NETWORK

DEVELOPMENT OF CONGESTION CONTROL SCHEME FOR WIRELESS MOBILE NETWORK DEVELOPMENT OF CONGESTION CONTROL SCHEME FOR WIRELESS MOBILE NETWORK 1 Oyebisi T.O, 2 Ojesanmi O.A 1 Prof., Technological Planning and Development Unit, Obafemi Awolowo University, Ile-Ife, Osun State,

More information

Quality Control Scheme for ATM Switching Network

Quality Control Scheme for ATM Switching Network UDC 621.395.345: 621.395.74 Quality Control Scheme for ATM Switching Network VMasafumi Katoh VTakeshi Kawasaki VSatoshi Kakuma (Manuscript received June 5,1997) In an ATM network, there are many kinds

More information

Comparison of Combined Preemption and Queuing Schemes for Admission Control in. a Cellular Emergency Network

Comparison of Combined Preemption and Queuing Schemes for Admission Control in. a Cellular Emergency Network Comparison of Combined Preemption and Queuing Schemes for Admission Control in a Cellular Emergency Network Jiazhen Zhou and Cory Beard Department of Computer Science/Electrical Engineering University

More information

Optimal Dynamic Mobility Management for PCS Networks

Optimal Dynamic Mobility Management for PCS Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 3, JUNE 2000 319 Optimal Dynamic Mobility Management for PCS Networks Jie Li, Member, IEEE, Hisao Kameda, and Keqin Li, Senior Member, IEEE Abstract We

More information

Adaptive QoS Platform in Multimedia Networks

Adaptive QoS Platform in Multimedia Networks Adaptive QoS Platform in Multimedia Networks Mahmoud Sherif, Ibrahim Habib, Mahmoud Naghshineh, and Parviz Kermani CUNY Graduate School and Department of Electrical Engineering The City College of New

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing Husnu Saner Narman Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science University of Oklahoma,

More information

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability A Simple Performance Analysis of a Core Node in an Optical Burst Switched Network Mohamed H. S. Morsy, student member, Mohamad Y. S. Sowailem, student member, and Hossam M. H. Shalaby, Senior member, IEEE

More information

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1 IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. IV (May - Jun. 2014), PP 49-53 Analyzing the performance of WiMAX zone

More information

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012 Queuing Systems Queuing theory establishes a powerful tool in modeling and performance analysis of many complex systems, such as computer networks, telecommunication systems, call centers, manufacturing

More information

THE TELEPHONE network of the past is fast evolving

THE TELEPHONE network of the past is fast evolving 848 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 11, NO. 7, JULY 2001 Performance Modeling of Video-on-Demand Systems in Broadband Networks Eric Wing Ming Wong, Senior Member, IEEE,

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

DEFINITION OF SUITABLE SIMULATION SCENARIOS FOR DYNAMIC INVESTIGATIONS IN CELLULAR NETWORKS WITH STEAM

DEFINITION OF SUITABLE SIMULATION SCENARIOS FOR DYNAMIC INVESTIGATIONS IN CELLULAR NETWORKS WITH STEAM DEFINITION OF SUITABLE SIMULATION SCENARIOS FOR DYNAMIC INVESTIGATIONS IN CELLULAR NETWORKS WITH STEAM Holger Pampel Enrico Jugl Lucent Technologies Network Systems GmbH Thurn-und-Taxis Strasse 10 90411

More information

Application of Importance Sampling in Simulation of Buffer Policies in ATM networks

Application of Importance Sampling in Simulation of Buffer Policies in ATM networks Application of Importance Sampling in Simulation of Buffer Policies in ATM networks SAMAD S. KOLAHI School of Computing and Information Systems Unitec New Zealand Carrington Road, Mt Albert, Auckland NEW

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

Extending WLAN Coverage via Utility Pipes

Extending WLAN Coverage via Utility Pipes Extending WLAN Coverage via Utility Pipes A. E. Xhafa and O. K. Tonguz Texas Instruments Inc., Dallas, TX 7543, USA Email: axhafa@ti.com Carnegie Mellon University, Department of Electrical and Computer

More information

Process- Concept &Process Scheduling OPERATING SYSTEMS

Process- Concept &Process Scheduling OPERATING SYSTEMS OPERATING SYSTEMS Prescribed Text Book Operating System Principles, Seventh Edition By Abraham Silberschatz, Peter Baer Galvin and Greg Gagne PROCESS MANAGEMENT Current day computer systems allow multiple

More information

Efficient Dynamic Multilevel Priority Task Scheduling For Wireless Sensor Networks

Efficient Dynamic Multilevel Priority Task Scheduling For Wireless Sensor Networks Efficient Dynamic Multilevel Priority Task Scheduling For Wireless Sensor Networks Mrs.K.Indumathi 1, Mrs. M. Santhi 2 M.E II year, Department of CSE, Sri Subramanya College Of Engineering and Technology,

More information

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Masaru Yoshimachi and Yoshifumi Manabe movement of the devices. Thus the routing protocols for MANET need

More information

Personal Handyphone Systems in Urban Infrastructure

Personal Handyphone Systems in Urban Infrastructure Personal Handyphone Systems in Urban Infrastructure Yukio Iino Mitsunobu Ootsuka Isao Shimbo ABSTRACT: The personal handyphone system (PHS) service began in Japan in 1995. As this new communication service

More information

Performance Analysis of Spillover-Partitioning Call Admission Control in Mobile Wireless Networks

Performance Analysis of Spillover-Partitioning Call Admission Control in Mobile Wireless Networks Wireless Pers Commun (2010) 53:111 131 DOI 10.1007/s11277-009-9673-8 Performance Analysis of Spillover-Partitioning Call Admission Control in Mobile Wireless Networks Okan Yilmaz Ing-Ray Chen Gregory Kulczycki

More information

Information Technology Mobile Computing Module: GSM Handovers

Information Technology Mobile Computing Module: GSM Handovers Information Technology Mobile Computing Module: GSM Handovers Learning Objectives What is handover? Why handover are required? Types of handovers(hard and Soft) Types of Handovers in GSM(Intra cell, Inter

More information

A Handover Optimisation Scheme in Cellular Networks

A Handover Optimisation Scheme in Cellular Networks A Handover Optimisation Scheme in Cellular Networks A.Gueroui and S.Boumerdassi Laboratoire PRiSM, Université de Versailles 45, Avenue des Etats-Unis 78035 Versailles France Laboratoire CEDRIC, CNAM 292,

More information

WiMax-based Handovers in Next Generation Networks

WiMax-based Handovers in Next Generation Networks WiMax-based Handovers in Next Generation Networks Nadine Akkari Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University, Saudi Arabia nakkari@kau.edu.sa

More information

Call Admission Control for Multimedia Cellular Networks Using Neuro-dynamic Programming

Call Admission Control for Multimedia Cellular Networks Using Neuro-dynamic Programming Call Admission Control for Multimedia Cellular Networks Using Neuro-dynamic Programming Sidi-Mohammed Senouci, André-Luc Beylot 2, and Guy Pujolle Laboratoire LIP6 Université de Paris VI 8, rue du Capitaine

More information

Error Control System for Parallel Multichannel Using Selective Repeat ARQ

Error Control System for Parallel Multichannel Using Selective Repeat ARQ Error Control System for Parallel Multichannel Using Selective Repeat ARQ M.Amal Rajan 1, M.Maria Alex 2 1 Assistant Prof in CSE-Dept, Jayamatha Engineering College, Aralvaimozhi, India, 2 Assistant Prof

More information

WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT

WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 014 WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT Y. J. Lee Department of Technology

More information

Deploying Small Cells in Traffic Hot Spots: Always a Good Idea?

Deploying Small Cells in Traffic Hot Spots: Always a Good Idea? Deploying Small Cells in Traffic Hot Spots: Always a Good Idea? Marco Ajmone Marsan Politecnico di Torino, Italy, and IMDEA Networks Institute, Spain marco.ajmone@polito.it Fatemeh Hashemi Politecnico

More information

Call Admission Control based on Adaptive Bandwidth Allocation for Wireless Networks

Call Admission Control based on Adaptive Bandwidth Allocation for Wireless Networks Call Admission Control based on Adaptive Bandwidth Allocation for Wireless Networks Mostafa Zaman Chowdhury a, Yeong Min Jang a, and Zygmunt J. Haas b a Department of Electronics Engineering, Kookmin University,

More information

Proactive Load Control Scheme at Mobility Anchor Point in Hierarchical Mobile IPv6 Networks

Proactive Load Control Scheme at Mobility Anchor Point in Hierarchical Mobile IPv6 Networks 2578 IEICE TRANS. INF. & SYST., VOL.E87 D, NO.12 DECEMBER 2004 PAPER Special Section on New Technologies and their Applications of the Internet Proactive Load Control Scheme at Mobility Anchor Point in

More information

Network Selection Decision Based on Handover History in Heterogeneous Wireless Networks

Network Selection Decision Based on Handover History in Heterogeneous Wireless Networks International Journal of Computer Science and Telecommunications [Volume 3, Issue 2, February 2012] 21 ISSN 2047-3338 Network Selection Decision Based on Handover History in Heterogeneous Wireless Networks

More information

Supporting QoS over Handovers in LEO Satellite Systems

Supporting QoS over Handovers in LEO Satellite Systems Supporting QoS over Handovers in LEO Satellite Systems E. Papapetrou, E. Stathopoulou, F.-N. Pavlidou Aristotle University of Thessaloniki, School of Engineering, Dept. of Electrical & Computer Engineering,

More information

Adaptive Hard Handoff Algorithms

Adaptive Hard Handoff Algorithms 2456 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 11, NOVEMBER 2000 Adaptive Hard Handoff Algorithms Rajat Prakash, Student Member, IEEE, and Venugopal V. Veeravalli, Senior Member, IEEE

More information

Optimal Admission Control in Two-class Preemptive Loss Systems

Optimal Admission Control in Two-class Preemptive Loss Systems *Manuscript Click here to view linked References 1 1 1 1 1 1 0 1 0 1 0 1 0 1 0 1 Abstract Optimal Admission Control in Two-class Preemptive Loss Systems Aylin Turhan a,, Murat Alanyali a, David Starobinski

More information

Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks

Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks Wireless Personal Communications (2006) 38: 357 376 DOI: 10.1007/s11277-006-9037-6 C Springer 2006 Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks

More information

Simulation of Throughput in UMTS Networks with Different Spreading Factors

Simulation of Throughput in UMTS Networks with Different Spreading Factors Simulation of Throughput in UMTS Networks with Different Spreading Factors Robert Akl Department of Computer Science and Engineering University of North Texas Denton, Texas 76207 Email: rakl@cse.unt.edu

More information

Providing QoS to Real and Non-Real Time Traffic in IEEE networks

Providing QoS to Real and Non-Real Time Traffic in IEEE networks Providing QoS to Real and Non-Real Time Traffic in IEEE 802.16 networks Joint work with my student Harish Shetiya Dept. of Electrical Communication Engg., Indian Institute of Science, Bangalore Overview

More information

INTEGRATION of data communications services into wireless

INTEGRATION of data communications services into wireless 208 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 54, NO 2, FEBRUARY 2006 Service Differentiation in Multirate Wireless Networks With Weighted Round-Robin Scheduling and ARQ-Based Error Control Long B Le, Student

More information

OPERATING SYSTEMS. After A.S.Tanenbaum, Modern Operating Systems, 3rd edition. Uses content with permission from Assoc. Prof. Florin Fortis, PhD

OPERATING SYSTEMS. After A.S.Tanenbaum, Modern Operating Systems, 3rd edition. Uses content with permission from Assoc. Prof. Florin Fortis, PhD OPERATING SYSTEMS #5 After A.S.Tanenbaum, Modern Operating Systems, 3rd edition Uses content with permission from Assoc. Prof. Florin Fortis, PhD General information GENERAL INFORMATION Cooperating processes

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information