WiMAX: MAC Layer Performance Assessments

Size: px
Start display at page:

Download "WiMAX: MAC Layer Performance Assessments"

Transcription

1 WiMAX: MAC Layer Performance Assessments A. Bestetti,G.Giambene, S. Hadzic Alcatel-Lucent, Via Trento, 30, I Vimercate, Milano, Italy University of Siena, Via Roma, 56, I Siena, Italy Abstract This paper focuses on WiMAX since this wireless technology allows broadband communications. In particular, we provide here a preliminary study on MAC layer performance as well as a sensitivity study to its parameters. A simulation approach has been adopted, based on the ns-2 environment to investigate the impact that real-time traffic has on non-real-time traffic and vice versa. The study presented in this paper has been carried out in the framework of the EU FP6 WEIRD project. I. INTRODUCTION Broadband wireless access systems are gaining now momentum everywhere for their capabilities to allow users to have a high-speed connection to the Internet. The IEEE d standard allows broadband wireless access for fixed users, while the IEEE e amendment supports fixed and mobile users. IEEE d defines different air interface options; we focus here on the Orthogonal Frequency Division Multiplexing (OFDM) case on the basis of one scenario defined in the WEIRD (WiMAX extension to Isolated Research Data Networks) European FP6 project [1]. OFDM is a digital modulation technique that combats frequency-selective fading by splitting the transmission flow on parallel orthogonal flat narrowband channels, named sub-carriers [2],[3]. IEEE d uses an FFT with 256 orthogonal sub-carriers. Each transmitted OFDM symbol has a Cyclic Prefix (CP) that completely eliminates Inter-Symbol Interference (ISI) as long as the CP duration is longer than the channel delay spread. An OFDM symbol is made up of three different types of sub-carriers: data, pilot and null. OFDM allows sub-carriers to be adaptively modulated depending on distance and noise level. The following modulation and coding combinations are available: BPSK 1/2, QPSK 1/2, QPSK 3/4, 16QAM 1/2, 16QAM 3/4, 64QAM 2/3, and 64QAM 3/4. With Worldwide Interoperability for Wireless Microwave Access (WiMAX) we mean different possible standard versions within the IEEE family. WiMAX defines the Medium Access Control (MAC) framework, traffic classes and signaling, but it does not identify a specific scheduling algorithm to manage the different traffic classes [4] - [6]. This paper deals with an evaluation of the MAC layer performance considering the impact of the access phase and the scheduling for a configuration with non-real-time and real-time traffic flows. Correspondence to: G. Giambene ( giambene@unisi.it). This work has been carried out with the support of Alcatel-Lucent in the framework of the EU FP6 WEIRD project (Integrated Project n ). II. WEIRD PROJECT OVERVIEW WEIRD is an IST FP6 project with the scope to leverage the features offered by broadband wireless connectivity and to test and validate actual wireless state-of-the-art technology, thus interacting in a convergent heterogeneous network architecture in order to prepare for the deployment of next-generation information and communications networks across Europe. The main objective of the WEIRD project is to have a seamless E2E integration of various network technologies, to provide Quality of Service (QoS) over wireless communication channels, and to achieve a wireless connection for the last mile by using the IEEE standard technology (WiMAX), overcoming the cost barriers of wired technologies. One of the main WEIRD tasks relies upon implementing four test beds located in different European countries to test WEIRD solutions over large-scale experimentations in real settings. A scenario envisages the wireless real-time data links between seismological sensors deployed over a volcano and the central site of the Osservatorio Vesuviano in Italy or of the Icelandic Meteorological Office. These real-time data can be used to analyze volcano status and evolution and to share information with the scientist community all over the Europe. WEIRD tasks include deploying a proprietary network architecture supporting different applications (with related QoS levels) to collect information coming from distributed terminals located in critical and isolated zones. These services will be shared with the scientist community across the Europe with connectivity granted by the GEANT pan-european network and relevant national research networks. III. WIMAX MAC LAYER The IEEE standard defines a connection-oriented MAC and the signaling mechanism for information exchange between Base Station (BS) and Subscriber Station (SS). The MAC layer takes packets (called MAC Service Data Units, MSDUs) from the upper layer and organizes them into MAC Protocol Data Units (MPDUs) for transmission. Connection ID (CID) is the identifier of a unidirectional connection between MAC peers over the air interface. A Service Flow (with related Service Flow ID, SFID) is a MAC transport layer channel for unidirectional (uplink or downlink) transport of MPDUs within a QoS class for a connection. WiMAX uses a variable-length MPDU (max length of 2048 bytes) formed by a 6-byte Generic MAC Header (GMH), a payload of variable length and an optional CRC. Multiple

2 MPDUs may be concatenated into a single burst to save physical overhead. Similarly, multiple MSDUs from the same higher-layer service may be packed into a single MPDU to save MAC header overhead. Large MSDUs may be fragmented into smaller MPDUs and sent with multiple bursts. In the case of Time Division Duplexing (TDD) air interface, time is divided into downlink and uplink sub-frames with movable boundaries and a gap interval in-between. Each frame has a fixed duration of a few milliseconds. The downlink subframe comes first and then there is the uplink part. The first part of the downlink phase contains a preamble and a lot of broadcast signaling information to coordinate the usage of resources (e.g., DL-MAP and UL-MAP messages contain the burst allocation decided by the BS, respectively for downlink and uplink). Two initial parts of the uplink sub-frame are used for contention-based transmissions for initial ranging of newly joining SSs and for best effort bandwidth requests of alreadyassociated SSs. Note that 1 symbol is the preamble overhead of each uplink burst (short preamble). IV. WIMAX RESOURCE MANAGEMENT AND QOS SUPPORT Four MAC components are necessary to manage QoS, such as: admission control, scheduling, buffer management, and access scheme. In order to support different applications, WiMAX provides the following QoS traffic classes: UGS (Unsolicited Grant Service), ertps (Extended Real Time Polling Services - from e), rtps (Real Time Polling Service), nrtps (Non Real Time Polling Service), BE (Best Effort). The BS decides about the transmission in uplink and downlink. In downlink, only the BS transmits, but in uplink all SSs can transmit. Uplink resource allocation for packet transmission is performed by the BS through signaling to the SSs. At the SS, the packet scheduler will retrieve the packets from the queues and transmit them to the BS in the appropriate assigned resources, defined by the UL-MAP sent by the BS. The role of the scheduler (both BS side and SS side) is to transfer packets from the queues of the connections to the bursts, to determine the quantity of packets that will be sent in the bursts and also the fragmentation needed. All packets from the application layer are classified on the basis of CID and SIF and are forwarded to the appropriate queue (i.e., UGS, rtps, ertps, nrtps, and BE). The resource allocation to SSs (uplink direction) is based on a request-grant mechanism [7]. Bandwidth requests are always per connection. The standard defines the resource allocation methods (i.e., grant mechanisms) below for SSs transmissions to BS; these mechanisms can be mapped to the different traffic classes. Unsolicited bandwidth grants. The SS sends a request only once, and the BS will start sending grants to allocate resources periodically. This is suitable for UGS class. Unicast polling. This allocation technique is used when bandwidth resource demand is not relevant enough to use unsolicited bandwidth grants for SSs. When an SS is polled, resources (communicated via UL-MAP message) are allocated in uplink to allow the SS to send a bandwidth request message. If the SS does not need to make a request (decision of the SS scheduler), it may use this bandwidth allocation to send data. If SS does not have data to transmit it can use padding CID to indicate that it is not sending the bandwidth request. This access method is suitable for rtps, ertps, and nrtps classes. Contention-based polling. If there is not sufficient bandwidth to poll individually SSs and if some SSs can be inactive, a certain amount of every uplink sub-frame (called contention part) is allocated for sending contention-based requests. This access mechanism is suitable for the BE traffic class. Contention resources can be used by either all SSs (broadcast polling) or a group of SSs (multicast polling). The access protocol used for the contention phase is described below. Bandwidth requests can be standalone request (for unicast or contention-based polling) or use the piggybacking mechanism. In each frame, there is in the uplink part a contention phase that is organized according to transmission opportunities (the transmission of one bandwidth request needs a transmission opportunity). Because the uplink burst profile can change dynamically, all requests for bandwidth shall be made in terms of the number of bytes needed to carry the GMH and payload. As soon as an SS wants to send a bandwidth request through contention (i.e., when this SS has a new packet in its buffer and there is no other pending request), it enters the contention resolution algorithm. The initial backoff and maximum backoff window values are selected by the BS and are specified in the UCD message. They are given as a power of two; for example, the value of 4 indicates a backoff window value At the first attempt, the backoff value is equal to the initial one. The access algorithm operates as follows: the SS will select a random number in the interval (0, backoff window) that will be used to indicate the number of transmission opportunities that will be missed in the contention phase. Then, the SS transmits the bandwidth request on a suitable transmission opportunity and waits for a given number of subsequent UL-MAP messages (timer T16) to receive a data transmission grant from the BS (if the request has been received without collisions and has been satisfied). If timer T16 expires without an allocation, the SS doubles the backoff window (as long as it is less than the maximum value) and repeats the contention procedure. This retry process continues until the maximum number of retries (Request Retries limit = 16) has been reached. If this happens, the SS discards the bandwidth request. The contention phase depends on the following parameters: the contention size c in transmission opportunities, that is the number of transmission opportunities per frame; the minimum and the maximum value of the backoff window, W min and W max ; timer T16; the Request Retries limit; the frame duration, T frame. The bigger the c value, the lower the risk of collisions, but the lower the resources for data traffic, thus increasing the transmission delay. Note that the

3 optimal number of c maximizing the throughput of successful access attempts per transmission opportunity should be equal to the number of contending requests in each frame. A too high T16 value could cause too delay to react to collisions. On the other hand, if T16 is too small (the minimum T16 value is 10 ms), unuseful reattempts could be triggered for requests successfully received at the BS, but not yet served due to the service delay (congestion of resources). With the following condition, we have that T16 expires after the first attempt has been accomplished (. is the ceiling function): ( 1+ Wmin ) T frame. (1) T 16 c V. SIMULATOR CHARACTERISTICS In this study, we have considered the WiMAX model (TDD version) for the ns-2 environment developed by NIST (National Institute of Standards and Technology, US) [8]. A. PHY Layer The NIST model physical layer is based on OFDM (FFT with 256 values). There are 192 data sub-carriers (an SS in uplink can use all of them), and the symbol duration and the slot duration can be determined as [3]: OFDM symbol duration = T g + T u = N FFT s f BW (1 + G), (2) 4 physical slot duration = s f BW, (3) where T u denotes the useful symbol duration (the reciprocal of the sub-carrier bandwidth), T g is the CP duration (typically, the CP phase is expressed in terms of the ratio G = T g /T u ), and s f is the sampling factor. Moreover, we consider the parameter values in Table I that refer to the 3.5T1 WiMAX profile. Hence, on the basis of (2) with N FFT = 256 (the number of sub-carriers), we obtain OFDM symbol duration = [s] and physical slot duration = [s]. From (2) and (3), one symbol requires N FFT (1 + G)/4 slots. We can derive the number of slots and hence the number of symbols available in a frame for data transmissions considering the presence of RTG and TTG gaps for switching between uplink and downlink parts and vice versa (each of 20 slots); we have: Number of data symbols/frame = = 4 N FFT(1+G) [ ] T frame physical slot duration RT G TTG. (4) On the basis of (4), we have 124 OFDMA symbols per frame, being the symbol the minimum granularity in the resource allocation process. These 124 symbols are used for all the types of downlink and uplink traffic flows (i.e., broadcast downlink management messages, unicast management messages, data messages). In our study, we have considered a configuration with downlink/uplink resource ratio as 0.3/0.7 in order to allow a higher uplink capacity for the transmission of uplink time-critical data. Hence, there are 37 symbols for downlink and 87 symbols for uplink. The uplink and the downlink resources for data traffic are further reduced due to the resources needed for management messages. Hence, for downlink we have to consider DL PREAMBLE, DL MAP and UL MAP and gaps between the different parts, totally needing 10 symbols in the simulator. Moreover, for uplink, 19 symbols are used for initial ranging procedures of SSs and a variable number of symbols are used to accommodate the variable number of c transmission opportunities per frame (the BPSK 1/2 mode is used); we are referring here to the region request full contention method and sub-channelization is not used. At the beginning of the ranging phase and the contention one there is one gap symbol. According to NIST simulator settings [8], we have that the number of OFDM symbols used for the contention phase is S c = S c = c + x, where x is the smallest integer number so that x 96 t 48 c and t = 8 bits denotes a trailer byte. Hence, c = 2 requires S c =4 OFDM symbols and c = 5 needs S c = 8 OFDM symbols 1. With our settings, practically, we have N data sym, downlink = 27 symbols that can be used for downlink data traffic and N data sym, uplink = S c 2 = 66 S c symbols that can be used for uplink data traffic. Note that these resources for data traffic are also used for management connections (basic, primary and secondary connections corresponding to each active SS) that constitute a negligible traffic load. The uplink Cap up and the downlink Cap down capacities in bit/s for information traffic can be evaluated (upper bound) as follows: Cap = N data sym 192 log 2 (M) r, (5) T frame where M is the number of data sub-carriers and r denotes the RS-CC code rate. Moreover, in the uplink case we consider Cap = Cap up and N data sym = N data sym, uplink and for the downlink we use Cap = Cap down and N data sym = N data sym, downlink. Correspondingly, for instance for BPSK 1/2, we have kbit/s in downlink and 1113 kbit/s in uplink with c =5.Note that these capacities are further reduced due to the presence of preamble bursts. Finally, it is important to note that modulation and coding adaptation is not supported in the simulator; a threshold mechanism is used to determine the cell size. B. MAC Layer Outgoing packets are categorized by the classifier object only on the basis of their destination and are then sent to the connection object. When two MAC nodes (SS and BS) establish a new connection, the simulator creates two objects of type Connection, one outgoing (at SS side) and one incoming (at BS side), or vice versa. The simulator defines GMH with all the fields as specified in the standard. The NIST simulator currently supports only contention-based polling (broadcast, not multicast) for sending bandwidth requests. Note that 1 In the simulator, a transmission opportunity is the resource needed to send a bandwidth request burst formed by a short preamble (1 OFDM symbol) plus a GMH plus a trailer. This is slightly different with respect to the standard, where a bandwidth request is totally formed by 2 OFDM symbols.

4 piggybacking, ARQ and packing are not implemented. The BS scheduler determines the composition of sub-frames that are practically organized as in the standard. Several parameters can be set from Tcl scripts, such as frame length, the ratio between downlink and uplink sub-frame durations and the contention size. Contention zones are always at the beginning of uplink sub-frame; each request is preceded by the preamble (1 OFDM symbol for bandwidth requests, and 2 OFDM symbols for ranging) [2]. The contention resolution algorithm is implemented as specified in the standard. The NIST module implements both BS and SS schedulers; however, there is no traffic differentiation: only BE traffic class is supported and the scheduling of the different connections is based on a round robin approach, as described below. In downlink, the BS scheduler looks into each peer node and tries to schedule data from its connections to the downlink sub-frame. Connections in one peer node are checked in the following order: i) Basic connection; ii) Primary connection; iii) Secondary connection; iv) Data connection. The service of connections is performed in a round robin way. As long as there is free space in the downlink sub-frame, the scheduler will assign a data burst to the connection. Once the free space in the downlink sub-frame is over, the scheduler will remember where it has stopped, and in the next frame it will continue to assign bursts from there. In uplink, the BS scheduler will first reserve space for contention slots. As said before, information about the bandwidth needs is stored in the peer node objects in the MAC layer. When scheduling uplink transmissions, the scheduler will look at this information from connections, and will use a round robin procedure as for the downlink part. During this process, it will also add 1 OFDM symbol (= short preamble) between bursts. The SS scheduler is responsible for taking the data transmission opportunities allocated by the BS and for assigning them to the appropriate incoming connections. If bandwidth is assigned to a given connection, the SS scheduler will also fill the bursts with the data from its outgoing connections. If the SS has not an outstanding request, the SS scheduler looks at all outgoing connections and generates bandwidth requests, sent in the contention phase. Each request is of the aggregated type. VI. PERFORMANCE EVALUATION In this study, we consider a scenario with inelastic and elastic traffic flows respectively for video and data transfer applications. We refer to the configuration in Fig. 1 with a variable number N of SSs receiving FTP downlink flows and N SSs transmitting video-cbr uplink flows to the BS. Thus, we have three traffic flow types: FTP downlink data packets, uplink video-cbr packets and uplink TCP ACKs. The video stream is with Standard Interchange Format (SIF, pixels) resolution: one IP packet of 470 bytes is generated every 13 ms (corresponding to about 282 kbit/s). The N video-cbr flows and the N FTP flows are started at Fig. 1. WiMAX network scenario considered. TABLE I SIMULATION PARAMETER VALUES (3.5T1 WIMAX PROFILE). Parameter value BS DL/UL ratio of the TDD frame 0.3/0.7 Frame duration, T frame 5ms Channel bandwidth, BW 7MHz Receive/Transmit gap 20 physical slots Cyclic prefix, G = T g/t u 0.25 Queue length of each data connection 100 packets DCD/UCD interval 5s Channel number n. 1 at GHz Modulation and coding BPSK 1/2 or 16QAM 1/2 Sampling factor for 7 MHz BW, s f 8/7 Transmission power (both BS and SS) 27 dbm Maximum backoff window, W max 63 trans. opport. randomized instants (uniformly distributed in the interval 0-30 ms) to avoid phase effects with the WiMAX frame. For the FTP traffic, we use an ACK-cloked TCP traffic model based on TCP NewReno with packets of 1500 bytes generated at the IP level. Simulator settings are shown Table I and refer to the 3.5T1 WiMAX profile [9]; in addition to this, all wired links in Fig. 1 are at 100 Mbit/s with 1 ms of propagation delay and droptail buffer policy. In this preliminary study, all the traffic flows belong to the BE class. We are interested to evaluate the WiMAX performance expressed in terms of mean delay and mean goodput for video CBR flows and mean TCP goodput for FTP flows. We aim to show the impact on performance due to the different settings of the MAC layer parameters that regulate the access phase. We have performed different simulations, varying the N parameter and considering different possible values for the access phase parameters, such as c, T 16, and W min. The results are shown in Figs. 2 and 3 respectively for what concerns the mean packet delay and the mean goodput for a CBR flow. 10 repeated simulations of 400 s have been performed for each point to have reliable results. These different simulations are aimed to determine the best access parameter values for scenarios with different N values; the adopted criterion is to maximize the CBR goodput 2 provided that the mean CBR packet delay is lower than 80 ms. As for the mean CBR packet delay, we can note that it increases with N and T16. Moreover, 2 The mean CBR goodput may be lower than the source bit-rate value due to packet losses caused by buffer overflow.

5 TABLE II SELECTION OF ACCESS PARAMETERS FOR OUR WIMAX SCENARIO. BPSK 1/2 16QAM 1/2 N c T16 W min 1, ms ms (or 10 ms) 7 (or 3) ms ms 7 the mean CBR goodput reduces with lower c values (the contention phase is more congested and more time is needed for the access with the risk of packet losses due to buffer overflow) and with N due to the congestion of resources. Note that in all the cases in Figs. 2 and 3 the aggregated FTP downlink goodput remains practically constant with an evident reduction only in the case of N = 4 due to the congestion of uplink resources and the consequent delay in sending ACK uplink packets. As a conclusion, we can consider Table II where the best settings of the access parameters are proposed (for BPSK 172 and N = 4 we do not achieve the delay requirement for CBR). Finally, we focus on a configuration with N FTP and N CBR flows as before, but where FTP downlink flows are divided into two groups: one group formed by an SS, experiencing bad channel conditions with a given Packet Error Rate (PER) at the IP level, PER = 3 %; the other group is formed by N 1 FTP flows with excellent channel conditions (no errors). This situation is to account for two different channel conditions. The interest is here to investigate the impact that an increase in the number of FTP flows experiencing good channel conditions has on the FTP flow with PER =3% in the presence of a round robin scheduler. The performance results are shown in Fig. 4. We can note that the FTP flow with PER = 3 % is penalized in goodput by the increase in the number of the other FTP flows since these flows are able to exploit the injection rate reduction due to the frequent losses of the FTP flow with PER = 3 %. This behavior is present with both BPSK 1/2 and 16QAM 1/2, even if with 16QAM 1/2 performance is much better for both FTP downlink flows and CBR uplink ones. VII. CONCLUSIONS AND FUTURE WORK This paper provides a preliminary MAC study for a WiMAX scenario suitable for the WEIRD project. In the current NIST simulator, only the BE traffic class is implemented with round robin scheduler (the WiMAX Forum is working to improve the NIST simulator). Then, we have considered a scenario with FTP downlink and video-cbr uplink traffic flows with the aim to select appropriate settings for the access parameters. A further refinement of this work is needed to implement a scheduler that accounts for traffic differentiation and the priority of CBR traffic (UGS class) with respect to other traffic classes (e.g., BE class); moreover, the scheduler should account for fairness issues to compensate for the resource unbalance due to SSs experiencing different channel conditions. Fig. 2. Mean CBR packet delay as a function of N, the number of CBR and the number of FTP flows. Fig. 3. Mean CBR goodput as a function of N, the number of CBR and the number of FTP flows. Fig. 4. N FTP users experiencing different downlink channel conditions. REFERENCES [1] Web site of the WEIRD Project with URL: [2] IEEE , IEEE Standard for Local and Metropolitan Area Networks, Air Interface forfixed Broadband Wireless Access Systems, October [3] Loutfi Nuaymi, WiMAX: Technology for Broadband Wireless Access. John Wiley and Sons, Chichester, England, [4] J. Chen, W. Jiao, H. Wang, A Service Flow Management Strategy for IEEE Broadband Wireless Access Systems in TDD Mode, ICC 2005, pp , May [5] H. Lee, T. Kwon, D.-H. Cho, An Efficient Uplink Scheduling Algorithm for VoIP Services in IEEE BWA Systems, VTC 04, pp , Sept [6] L. Lin, W. Jia, W. Lu, Performanc Analysis of IEEE Multicast and Broadcast Polling based Bandwidth Request, WCNC 2007, pp , [7] Web site with URL: jain/cse574-06/ftp/wimax qos/index.html [8] Web site with URL: [9] WiMAX Forum Web site with URL:

MAC layer: structure and QoS support. PhD student: Le Minh Duong

MAC layer: structure and QoS support. PhD student: Le Minh Duong 802.16 MAC layer: structure and QoS support PhD student: Le Minh Duong Content 1. Introduction 2. 802.16 MAC layer 2.1. MAC Service-Specific Convergence Sublayer 2.2. Common Part Sublayer 3. QoS support

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

A Deficit Round Robin with Fragmentation Scheduler for IEEE e Mobile WiMAX 1,2

A Deficit Round Robin with Fragmentation Scheduler for IEEE e Mobile WiMAX 1,2 1 A Deficit Round Robin with Fragmentation Scheduler for IEEE 802.16e Mobile WiMAX 1,2 Chakchai So-In, Student Member, IEEE, Raj Jain, Fellow, IEEE, Abdel-Karim Tamimi, Member, IEEE Deficit Round Robin

More information

* Author to whom correspondence should be addressed; Tel.: ; Fax:

* Author to whom correspondence should be addressed;   Tel.: ; Fax: Future Internet 2010, 2, 446-468; doi:10.3390/fi2040446 Article OPEN ACCESS future internet ISSN 1999-5903 www.mdpi.com/journal/futureinternet Deficit Round Robin with Fragmentation Scheduling to Achieve

More information

Evaluating VoIP using Network Simulator-2

Evaluating VoIP using Network Simulator-2 Athens University of Economic and Business Evaluating VoIP using Network Simulator-2 June 2007 Author: Papantonakos Manos Supervisor Prof.: George Xylomenos Co-Supervisor Prof: George Polyzos About WiMax

More information

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes Syed R. Zaidi, Shahab Hussain, M. A. Ali Department of Electrical Engineering The City College of The

More information

Qos Analysis Of Wimax Network

Qos Analysis Of Wimax Network Qos Analysis Of Wimax Network 802.16 Gurpal Singh Sidhu 1, Sandeep Kaushal 2, Dr. Vijay Kumar Banga 3 1 M-Tech scholar, Department of Electronics and Communication Engineering, Amritsar College of Engineering

More information

On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network

On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE 802.16 based WiMAX Network Vinit Grewal Department of Electronics and Communication Engineering National Institute of Technology

More information

A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks

A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks Han-Sheng Chuang 1, Liang-Teh Lee 1 and Chen-Feng Wu 2 1 Department of Computer Science and Engineering, Tatung

More information

Comparative Assessments for Different WiMAX Scheduling Algorithms

Comparative Assessments for Different WiMAX Scheduling Algorithms Proceedings of the World Congress on Engineering and Computer Science 9 Vol I WCECS 9, October -, 9, San Francisco, USA Comparative Assessments for Different WiMAX Scheduling Algorithms Ahmed H. Rashwan,

More information

TWO-STEP SCHEDULING ALGORITHM FOR IEEE WIRELESS NETWORKS

TWO-STEP SCHEDULING ALGORITHM FOR IEEE WIRELESS NETWORKS TWO-STEP SCHEDULING ALGORITHM FOR IEEE802.16 WIRELESS NETWORKS Mohamed. M. Elgazzar R&D Department, Cairo, Egypt, m_elgazzar1961@yahoo.com ABSTRACT This paper proposes a new scheduling algorithm for IEEE

More information

Delay Analysis of IEEE Wireless Metropolitan Area Network

Delay Analysis of IEEE Wireless Metropolitan Area Network Delay Analysis of IEEE 802.16 Wireless Metropolitan Area Network Zsolt Saffer Technical University of Budapest 1521 Budapest Hungary safferzs@hit.bme.hu Sergey Andreev State University of Aerospace Instrumentation

More information

RECENTLY, the information exchange using wired and

RECENTLY, the information exchange using wired and Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

SS Initialization Overview

SS Initialization Overview SS Initialization Overview Downlink Sync Auth. Key Xchange Get Uplink Parameters Setup Time Ranging Register Download Configuration File Capability Negotiation DHCP Setup connection and service flow (provisioned

More information

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 82.16 System Woo-Jae Kim 1, Joo-Young Baek 1, Sun-Don Lee 1, Young-Joo Suh 1, Yun-Sung Kim 2, and Jin-A Kim 2 1 Department of Computer

More information

Optimizing WiMAX: A Dynamic Strategy for Reallocation of Underutilized Downlink Sub-Frame to Uplink in TDD Mode

Optimizing WiMAX: A Dynamic Strategy for Reallocation of Underutilized Downlink Sub-Frame to Uplink in TDD Mode Int. J. Communications, Network and System Sciences, 2009, 2, 888-894 doi:10.4236/ijcns.2009.29103 Published Online December 2009 (http://www.scirp.org/journal/ijcns/). Optimizing WiMAX: A Dynamic Strategy

More information

A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX

A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX Abdalla A\ Alrahman Mohamed Abdalla 1, Dr. Amin Babiker A\ Nabi 2, Dr. Ashraf A. Osman 3 1,2,3 Department of communication,

More information

Mesh Networks

Mesh Networks Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE

More information

Publication P IEEE. Reprinted with permission.

Publication P IEEE. Reprinted with permission. Publication P5 Jani Lakkakorpi, Alexander Sayenko, and Jani Moilanen. 8. Comparison of different scheduling algorithms for WiMAX base station: Deficit Round Robin vs. Proportional Fair vs. Weighted Deficit

More information

Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes

Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes Syed R. Zaidi a, Shahab Hussain a, Ajaz Sana a,aparicio Carranza b, Farrukh Zia b a The City College of The City University of

More information

NCTUns Simulation Tool for WiMAX Modeling

NCTUns Simulation Tool for WiMAX Modeling NCTUns Simulation Tool for WiMAX Modeling (Invited Paper) Shiang-Ming Huang smhuang@csnctuedutw Ya-Chin Sung ycsung@csienctuedutw Yi-Bing Lin liny@linycsienctuedutw Shie-Yuan Wang shieyuan@csienctuedutw

More information

MAC Overview NCHU CSE WMAN - 1

MAC Overview NCHU CSE WMAN - 1 MAC Overview NCHU CSE WMAN - 1 MAC Overview Connection-oriented Supports difficult user environments High bandwidth, hundreds of users per channel For variable Continuous and Burst traffic Very efficient

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Institute of Electrical and Electronics Engineers (IEEE)

Institute of Electrical and Electronics Engineers (IEEE) 2006-03-08 IEEE L802.16-06/004 INTERNATIONAL TELECOMMUNICATION UNION RADIOCOMMUNICATION STUDY GROUPS Document 8A/IEEE-2-E Document 8F/IEEE-1-E 8 March 2006 English only Received: TECHNOLOGY Subject: Question

More information

A Multi-Factor Scheduling Algorithm for WIMAX Systems

A Multi-Factor Scheduling Algorithm for WIMAX Systems A Multi-Factor Scheduling Algorithm for WIMAX Systems Ahmed H. El-Shinnawy, Mohamed M. Elgazzar, and Amin M.Nassar Abstract This paper proposes a new scheduling algorithm for IEEE 802.16-2005 Broadband

More information

Internet Traffic Performance in IEEE Networks

Internet Traffic Performance in IEEE Networks Internet Traffic Performance in IEEE 802.16 Networks Dmitry Sivchenko 1,2,3, Nico Bayer 1,2,3, Bangnan Xu 1, Veselin Rakocevic 2, Joachim Habermann 3 1 T-Systems, SSC ENPS, Deutsche-Telekom-Allee 7, 64295

More information

The Impact of Channel Bandwidth with Network Asymmetry in WiMAX Network Using TCP New Reno

The Impact of Channel Bandwidth with Network Asymmetry in WiMAX Network Using TCP New Reno International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 1 The Impact of Channel Bandwidth with Network Asymmetry in WiMAX Network Using TCP New Reno Kailash Chandra

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Sujesh P. Lal VIT University, TN, INDIA

Sujesh P. Lal VIT University, TN, INDIA VoIP TRAFFIC SCHEDULING IN Sujesh P. Lal VIT University, TN, INDIA Introduction Popularity of Voice over IP (VoIP) applications such as Skype, Google Talk, and MSN Messenger along with emerging deployment

More information

Preliminary Performance Evaluation of QoS in DOCSIS 1.1

Preliminary Performance Evaluation of QoS in DOCSIS 1.1 The University of Kansas Technical Report Preliminary Performance Evaluation of QoS in DOCSIS 1.1 Gayathri Chandrasekaran, Mohammed Hawa and David W. Petr ITTC-FY2003-TR-22736-01 January 2003 Sponsor:

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

Flexible Resource Allocation in IEEE Wireless Metropolitan Area Networks

Flexible Resource Allocation in IEEE Wireless Metropolitan Area Networks Flexible Resource Allocation in IEEE 802.16 Wireless Metropolitan Area Networks Spyros A. Xergias, Nikos Passas and Lazaros Merakos Communication Networks Laboratory Department of Informatics & Telecommunications

More information

Overview of WiMAX (Chapter 2) ENE 490 MON 13:30-16:30 Asst. Prof. Suwat Pattaramalai

Overview of WiMAX (Chapter 2) ENE 490 MON 13:30-16:30 Asst. Prof. Suwat Pattaramalai (Chapter 2) ENE 490 MON 13:30-16:30 Asst. Prof. Suwat Pattaramalai Background on IEEE 802.16 and WiMAX (Table 2.1 and Table 2.2) Salient Features of WiMAX OFDM-based physical layer: good resistance to

More information

Bandwidth Allocation for Video Streaming in WiMax Networks

Bandwidth Allocation for Video Streaming in WiMax Networks Bandwidth Allocation for Video Streaming in WiMax Networks Alessandra Scicchitano DEIS, Università della Calabria Andrea Bianco, Carla-Fabiana Chiasserini, Emilio Leonardi Dipartimento di Elettronica,

More information

Design and Implementation of IEEE MAC Layer Simulator

Design and Implementation of IEEE MAC Layer Simulator IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.8, August 2009 53 Design and Implementation of IEEE 802.16 MAC Layer Simulator Malik Muhammad Asim, Muid Mufti Computer Engineering

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Institute of Electrical and Electronics Engineers (IEEE) PROPOSED AMENDMENTS TO [IMT.EVAL]

Institute of Electrical and Electronics Engineers (IEEE) PROPOSED AMENDMENTS TO [IMT.EVAL] IEEE L802.16-08/032 Source: Doc. 5D/5, 5D/97 and 5D/EVAL-CG TECHNOLOGY Subject: Question ITU-R 229-1/8 Institute of Electrical and Electronics Engineers (IEEE) PROPOSED AMENDMENTS TO [IMT.EVAL] This contribution

More information

Performance Evaluation of WiFiRe using OPNET

Performance Evaluation of WiFiRe using OPNET Performance Evaluation of WiFiRe using OPNET Under the guidance of: Prof. Sridhar Iyer and Prof. Varsha Apte Dept. of CSE (KReSIT) July 16, 2007 Goal Goal Building. Finding minimum slot length to support

More information

Solutions to Performance Problems in VoIP Over a Wireless LAN

Solutions to Performance Problems in VoIP Over a Wireless LAN Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular

More information

A Deficit Round Robin with Fragmentation Scheduler for Mobile WiMAX

A Deficit Round Robin with Fragmentation Scheduler for Mobile WiMAX A Deficit Round Robin with Fragmentation Scheduler for Mobile WiMAX Chakchai So-In, Raj Jain and Abdel-Karim Al Tammi Washington University in Saint Louis Saint Louis, MO 63130 jain@cse.wustl.edu Presentation

More information

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Network Simulation Model Jim Martin Department of Computer Science Clemson University jim.martin@cs.clemson.edu Phone: 864 656 4529 Fax: 864 656

More information

Performance Analysis of TCP and UDP-based Applications in a IEEE deployed Network

Performance Analysis of TCP and UDP-based Applications in a IEEE deployed Network Performance Analysis of TCP and UDP-based Applications in a IEEE 82.16 deployed Network Hemant Kumar Rath 1 and Abhay Karandikar 2 1 TCS Networks Lab, Bangalore 56 66, India, Email:hemant.rath@tcs.com

More information

7/27/2010 LTE-WIMAX BLOG HARISHVADADA.WORDPRESS.COM. QOS over 4G networks Harish Vadada

7/27/2010 LTE-WIMAX BLOG HARISHVADADA.WORDPRESS.COM. QOS over 4G networks Harish Vadada 7/27/2010 HARISHVADADA.WORDPRESS.COM LTE-WIMAX BLOG QOS over 4G networks Harish Vadada Cellular network operators across the world have seen an explosive growth of mobile broadband usage. Traffic volume

More information

Optimizing TCP Goodput and Delay in Next Generation IEEE (ax) Devices

Optimizing TCP Goodput and Delay in Next Generation IEEE (ax) Devices T RANSACTIONS ON TNC N ETWORKS AND C OMMUNICATIONS SOCIETY FOR SCIENCE AND EDUCATION UNITED KINGDOM VOLUME 6, NO. 2 ISSN: 2054-7420 Optimizing TCP Goodput and Delay in Next Generation IEEE 802.11 (ax)

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Investigation of Efficient Resource Allocation Schemes for WiMAX Networks

Investigation of Efficient Resource Allocation Schemes for WiMAX Networks School of Engineering and Design Electronic & Computer Engineering Investigation of Efficient Resource Allocation Schemes for WiMAX Networks A thesis submitted for the degree of Master of Philosophy Usman

More information

Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX

Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX Siddu P. Algur Departmentof Computer Science Rani Chennamma University Belgaum, India Niharika Kumar Department of Information

More information

A Scheduler for Unsolicited Grant Service (UGS) in IEEE e Mobile WiMAX Networks*

A Scheduler for Unsolicited Grant Service (UGS) in IEEE e Mobile WiMAX Networks* 1 A Scheduler for Unsolicited Grant Service (UGS) in IEEE 802.16e Mobile WiMAX Networks* Chakchai So-In, Member, IEEE, Raj Jain, Fellow, IEEE, Abdel-Karim Al Tamimi, Member, IEEE Abstract Most of the IEEE

More information

Wireless Communication. IEEE Wireless Metropolitan Area Network (wman)

Wireless Communication. IEEE Wireless Metropolitan Area Network (wman) 1 IEEE 802.16 Wireless Metropolitan Area Network (wman) 2 Existing Data Network Hierarchy Level Typical Connections Wired Technologies Wireless Technologies Personal Area (PAN) Peripherals and personal

More information

Implementation of WiFiRe PHY Sectorization in OPNET

Implementation of WiFiRe PHY Sectorization in OPNET P Sreedhar Reddy Roll No. 06305024 24th July, 2007 Under the Guidance Of Prof. Sridhar Iyer Department Of Computer Science and Engineering Indian Institute Of Technology, Bombay Outline WiFiRe overview.

More information

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview Source : Jamshid Khun Jush (Ericsson) (THOMSON multimedia) 1 HIPERLAN/2 Standard A new standard developed by the ETSI Project

More information

Evaluation and Comparaison of Scheduling Algorithms in Wimax Networks

Evaluation and Comparaison of Scheduling Algorithms in Wimax Networks Evaluation and Comparaison of Scheduling Algorithms in Wimax Networks Abstract Kais Mnif * LETI laboratory, University of Sfax, Tunisia Ecole Nationale d Electronique et de Télécommunications (ENET COM)

More information

Cross-Layer QoS Support in the IEEE Mesh Network

Cross-Layer QoS Support in the IEEE Mesh Network Cross-Layer QoS Support in the IEEE 802.16 Mesh Network Chun-Chuan Yang, Yi-Ting Mai and Liang-Chi Tsai Multimedia and Communications Laboratory Department of Computer Science and Information Engineering

More information

Cover Page. Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message

Cover Page. Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message Cover Page 1. Title of Paper Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message 2. Name of the authors, Sung-Han Park, and Jae-Hyun Kim 3. About authors Affiliation

More information

Performance Evaluation of Scheduling Algorithm for Wimax Networks

Performance Evaluation of Scheduling Algorithm for Wimax Networks Performance Evaluation of Scheduling Algorithm for Wimax Networks Radhia Khdhir, Kais Mnif, and Lotfi Kamoun Wimax retains only OFDM and OFDMA. For topologies, mesh and Point-to-Multipoint (PMP) modes

More information

Priority Based Uplink Scheduling Scheme for WiMAX Service Classes

Priority Based Uplink Scheduling Scheme for WiMAX Service Classes I.J. Information Technology and Computer Science, 213, 8, 66-74 Published Online July 213 in MECS (http://www.mecs-press.org/) DOI: 1.5815/ijitcs.213.8.7 Priority Based Uplink Scheduling Scheme for WiMAX

More information

WiMAX Vs Wi-Fi. 3G Evolution (source: Nokia) Wireless Systems. WiMAX

WiMAX Vs Wi-Fi. 3G Evolution (source: Nokia) Wireless Systems. WiMAX 3G Evolution (source: Nokia) WiMAX Vs Wi-Fi ผศ.ดร.ส ร นทร ก ตต ธรก ล ภาคว ชาว ศวกรรมคอมพ วเตอร คณะว ศวกรรมศาสตร สถาบ นเทคโนโลย พระจอมเกล าเจ าค ณทหารลาดกระบ ง 2 Wireless Systems WiMAX Worldwide Interoperability

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Measurement and Analysis of One-Way Delays over IEEE e/WiBro Network

Measurement and Analysis of One-Way Delays over IEEE e/WiBro Network Measurement and Analysis of One-Way Delays over IEEE 82.16e/WiBro Network Dongmyoung Kim, Hua Cai, and Sunghyun Choi School of Electrical Engineering and INMC, Seoul National University, Seoul, Korea Samsung

More information

Wireless LAN A competing method to wired LAN. Course: Wireline Communication Instructor: Prof. Werner Henkel Student: Chin Yung Lu

Wireless LAN A competing method to wired LAN. Course: Wireline Communication Instructor: Prof. Werner Henkel Student: Chin Yung Lu Wireless LAN A competing method to wired LAN Course: Wireline Communication Instructor: Prof. Werner Henkel Student: Chin Yung Lu Outline of the presentation Introduction Background Problem Environment

More information

The Forward Link Performance Study of the WiMAX System Under Different Schedulers

The Forward Link Performance Study of the WiMAX System Under Different Schedulers REVISTA CIENTÍFICA PERIÓDICA - TELECOMUNICAÇÕES, VOL 12, NO. 2, DEZEMBRO DE 29 61 The Forward Link Performance Study of the WiMAX System Under Different Schedulers Leandro Bento Sena Marques & Shusaburo

More information

Request Mechanisms to Reduce the Contention Period in : A Comparison

Request Mechanisms to Reduce the Contention Period in : A Comparison Request Mechanisms to Reduce the Contention Period in 82.6: A Comparison Jesús Delicado, Francisco M. Delicado and Luis Orozco Barbosa Instituto de Investigación en Informática de Albacete (I 3 A) Universidad

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

A Frame Aggregation Scheduler for IEEE n

A Frame Aggregation Scheduler for IEEE n A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University

More information

Performance Comparison of d OFDMA, TD-CDMA, cdma2000 1xEV-DO and a WLAN on Voice over IP Service

Performance Comparison of d OFDMA, TD-CDMA, cdma2000 1xEV-DO and a WLAN on Voice over IP Service Performance Comparison of 82.16d OFDMA, TD-CDMA, cdma2 1xEV-DO and 82.11a WLAN on Voice over IP Service Jee-young Song, Hyun-ho Choi, Hyu-dae Kim, Sang-wook Kwon and Dong-ho Cho* Hong-sung Chang, Geunwhi

More information

Advanced Computer Networks. WLAN, Cellular Networks

Advanced Computer Networks. WLAN, Cellular Networks Advanced Computer Networks 263 3501 00 WLAN, Cellular Networks Patrick Stuedi Spring Semester 2013 Oriana Riva, Department of Computer Science ETH Zürich Last week Medium Access COPE Today Last week Short

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY OF MOBILE WIMAX STANDARD KOMAL L. LAKHANI, PROF. MAYUR TIWARI Department

More information

Keywords- IEEE , WiMAX, QoS, CBR, Mobility.

Keywords- IEEE , WiMAX, QoS, CBR, Mobility. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A QoS Oriented

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Scheduling and CAC in IEEE Fixed BWNs: A Comprehensive Survey and Taxonomy

Scheduling and CAC in IEEE Fixed BWNs: A Comprehensive Survey and Taxonomy Scheduling and CAC in IEEE 802.16 Fixed BWNs: A Comprehensive Survey and Taxonomy Ikbal Chammakhi Msadaa, Daniel Câmara, and Fethi Filali EURECOM Mobile Communications Department 2229 route des crêtes,

More information

Implementation and Evaluation of a MAC Scheduling Architecture for IEEE WirelessMANs

Implementation and Evaluation of a MAC Scheduling Architecture for IEEE WirelessMANs Implementation and Evaluation of a MAC Scheduling Architecture for IEEE 802.16 WirelessMANs by Abhishek Maheshwari Department of Computer Science and Engineering Indian Institute of Technology Kanpur May

More information

PREFACE. The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie ( )

PREFACE. The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie ( ) PREFACE The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie (1888-1964) The recent standard IEEE 802.16 for fixed Broadband Wireless Access (BWA)

More information

MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4

MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS 1999-10-29 Source Phil Guillemette SpaceBridge Networks Corporation

More information

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,

More information

A Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX Base Stations

A Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX Base Stations A Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX Base Stations Yi-Neng Lin, Che-Wen Wu, Ying-Dar Lin National Chiao-Tung University Hsinchu, Taiwan Yuan-Cheng Lai National Taiwan

More information

Optimization of Frame Structure for WiMAX Multihop

Optimization of Frame Structure for WiMAX Multihop Optimization of Frame Structure for WiMAX Multihop Networks Pavel Mach 1, Robert Bestak 1, 1 Czech Technical University in Prague, Faculty of Electrical Engineering Technicka 2, Prague, 16627, Czech Republic

More information

The Integration of Heterogeneous Wireless Networks (IEEE /IEEE ) and its QoS Analysis

The Integration of Heterogeneous Wireless Networks (IEEE /IEEE ) and its QoS Analysis 141 The Integration of Heterogeneous Wireless Networks (IEEE 802.11/IEEE 802.16) and its QoS Analysis Wernhuar Tarng 1, Nai-Wei Chen 1, Li-Zhong Deng 1, Kuo-Liang Ou 1, Kun-Rong Hsie 2 and Mingteh Chen

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

HIPERLAN/2 and a: A Comparative Study

HIPERLAN/2 and a: A Comparative Study HIPERLAN/2 and 802.11a: A Comparative Study PADMA BONDE Reader, Department of Computer Science Shri Vaishnav Institute of Technology and Science Indore, INDIA JAYESH BONDE Executive Engineer, Department

More information

Comparison between LTE and Rival Wireless Technologies (using Opnet 16)

Comparison between LTE and Rival Wireless Technologies (using Opnet 16) ENSC 427: COMMUNICATION NETWORKS SPRING 2013 Comparison between LTE and Rival Wireless Technologies (using Opnet 16) Team 10: Josh Ancill Kim Izmaylov Anton Khomutskiy jja48@sfu.ca kvi@sfu.ca aka78@sfu.ca

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

Scheduling in WiMAX based wireless networks. Srivathsan Soundararajan

Scheduling in WiMAX based wireless networks. Srivathsan Soundararajan Scheduling in WiMAX based wireless networks Except where reference is made to the work of others, the work described in this thesis is my own or was done in collaboration with my advisory committee. This

More information

Cross-Layer Networking Protocol Design for Ubiquitous Home Service -- Hierarchical Cross-Layer Fuzzy Control

Cross-Layer Networking Protocol Design for Ubiquitous Home Service -- Hierarchical Cross-Layer Fuzzy Control Cross-Layer Networking Protocol Design for Ubiquitous Home Service -- Hierarchical Cross-Layer Fuzzy Control Chao-Lieh Chen ( 陳朝烈 ) 1 Yau-Hwang Kuo ( 郭耀煌 ) 1 Dept. Electronics Eng. Kun-Shan University

More information

Bandwidth Allocation for Quality of Service Provision in IEEE Systems

Bandwidth Allocation for Quality of Service Provision in IEEE Systems Bandwidth Allocation for Quality of Service Provision in IEEE 802.16 Systems Tze Wei Tang Thesis submitted for the degree of Doctor of Philosophy in Electrical and Electronic Engineering at The University

More information

MODULATION AWARE CONNECTION ADMISSION CONTROL AND UPLINK SCHEDULING ALGORITHM FOR WIMAX NETWORKS

MODULATION AWARE CONNECTION ADMISSION CONTROL AND UPLINK SCHEDULING ALGORITHM FOR WIMAX NETWORKS International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 215 MODULATION AWARE CONNECTION ADMISSION CONTROL AND UPLINK SCHEDULING ALGORITHM FOR WIMAX NETWORKS Shwetha D 1, Mohan

More information

IEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract

IEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract IEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract The growing penetration of the internet throughout the society has also brought advantages to SOHOs and home networks. As networks develop,

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Upstream Scheduler Mode Configuration for the Cisco ubr CMTS

Upstream Scheduler Mode Configuration for the Cisco ubr CMTS Upstream Scheduler Mode Configuration for the Cisco ubr CMTS Document ID: 69704 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Upstream Scheduling in

More information

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents

More information

Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack

Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack Int. J. Communications, Network and System Sciences, 2012, 5, 353-367 http://dx.doi.org/10.4236/ijcns.2012.56046 Published Online June 2012 (http://www.scirp.org/journal/ijcns) Detection and Fortification

More information

Multiple TFRC Streaming in a WiMAX Environment

Multiple TFRC Streaming in a WiMAX Environment Multiple TFRC Streaming in a WiMAX Environment S. Saleh and M. Fleury University of Essex, School of Computer Science and Electronic Engineering Colchester, Essex CO4 3SQ UK Abstract-Employing multiple

More information

A Cross Layer Frame Work for Enhanced Quality of Service Provisioning in Worldwide Interoperability for Microwave Access Networks

A Cross Layer Frame Work for Enhanced Quality of Service Provisioning in Worldwide Interoperability for Microwave Access Networks Journal of Computer Science 8 (3): 420-424, 2012 ISSN 1549-3636 2012 Science Publications A Cross Layer Frame Work for Enhanced Quality of Service Provisioning in Worldwide Interoperability for Microwave

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

BW-REQ channel design recommendations for IEEE m

BW-REQ channel design recommendations for IEEE m BW-REQ channel design recommendations for IEEE 802.16m Document Number: IEEE C802.16m-08/635 Date Submitted: 2008-07-13 Source: Qinghua Li (qinghua.li@intel.com) Yuan Zhu (yuan.zhu@intel.com) Xiangying

More information

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers

More information