WiMAX: MAC Layer Performance Assessments
|
|
- Wendy Sparks
- 6 years ago
- Views:
Transcription
1 WiMAX: MAC Layer Performance Assessments A. Bestetti,G.Giambene, S. Hadzic Alcatel-Lucent, Via Trento, 30, I Vimercate, Milano, Italy University of Siena, Via Roma, 56, I Siena, Italy Abstract This paper focuses on WiMAX since this wireless technology allows broadband communications. In particular, we provide here a preliminary study on MAC layer performance as well as a sensitivity study to its parameters. A simulation approach has been adopted, based on the ns-2 environment to investigate the impact that real-time traffic has on non-real-time traffic and vice versa. The study presented in this paper has been carried out in the framework of the EU FP6 WEIRD project. I. INTRODUCTION Broadband wireless access systems are gaining now momentum everywhere for their capabilities to allow users to have a high-speed connection to the Internet. The IEEE d standard allows broadband wireless access for fixed users, while the IEEE e amendment supports fixed and mobile users. IEEE d defines different air interface options; we focus here on the Orthogonal Frequency Division Multiplexing (OFDM) case on the basis of one scenario defined in the WEIRD (WiMAX extension to Isolated Research Data Networks) European FP6 project [1]. OFDM is a digital modulation technique that combats frequency-selective fading by splitting the transmission flow on parallel orthogonal flat narrowband channels, named sub-carriers [2],[3]. IEEE d uses an FFT with 256 orthogonal sub-carriers. Each transmitted OFDM symbol has a Cyclic Prefix (CP) that completely eliminates Inter-Symbol Interference (ISI) as long as the CP duration is longer than the channel delay spread. An OFDM symbol is made up of three different types of sub-carriers: data, pilot and null. OFDM allows sub-carriers to be adaptively modulated depending on distance and noise level. The following modulation and coding combinations are available: BPSK 1/2, QPSK 1/2, QPSK 3/4, 16QAM 1/2, 16QAM 3/4, 64QAM 2/3, and 64QAM 3/4. With Worldwide Interoperability for Wireless Microwave Access (WiMAX) we mean different possible standard versions within the IEEE family. WiMAX defines the Medium Access Control (MAC) framework, traffic classes and signaling, but it does not identify a specific scheduling algorithm to manage the different traffic classes [4] - [6]. This paper deals with an evaluation of the MAC layer performance considering the impact of the access phase and the scheduling for a configuration with non-real-time and real-time traffic flows. Correspondence to: G. Giambene ( giambene@unisi.it). This work has been carried out with the support of Alcatel-Lucent in the framework of the EU FP6 WEIRD project (Integrated Project n ). II. WEIRD PROJECT OVERVIEW WEIRD is an IST FP6 project with the scope to leverage the features offered by broadband wireless connectivity and to test and validate actual wireless state-of-the-art technology, thus interacting in a convergent heterogeneous network architecture in order to prepare for the deployment of next-generation information and communications networks across Europe. The main objective of the WEIRD project is to have a seamless E2E integration of various network technologies, to provide Quality of Service (QoS) over wireless communication channels, and to achieve a wireless connection for the last mile by using the IEEE standard technology (WiMAX), overcoming the cost barriers of wired technologies. One of the main WEIRD tasks relies upon implementing four test beds located in different European countries to test WEIRD solutions over large-scale experimentations in real settings. A scenario envisages the wireless real-time data links between seismological sensors deployed over a volcano and the central site of the Osservatorio Vesuviano in Italy or of the Icelandic Meteorological Office. These real-time data can be used to analyze volcano status and evolution and to share information with the scientist community all over the Europe. WEIRD tasks include deploying a proprietary network architecture supporting different applications (with related QoS levels) to collect information coming from distributed terminals located in critical and isolated zones. These services will be shared with the scientist community across the Europe with connectivity granted by the GEANT pan-european network and relevant national research networks. III. WIMAX MAC LAYER The IEEE standard defines a connection-oriented MAC and the signaling mechanism for information exchange between Base Station (BS) and Subscriber Station (SS). The MAC layer takes packets (called MAC Service Data Units, MSDUs) from the upper layer and organizes them into MAC Protocol Data Units (MPDUs) for transmission. Connection ID (CID) is the identifier of a unidirectional connection between MAC peers over the air interface. A Service Flow (with related Service Flow ID, SFID) is a MAC transport layer channel for unidirectional (uplink or downlink) transport of MPDUs within a QoS class for a connection. WiMAX uses a variable-length MPDU (max length of 2048 bytes) formed by a 6-byte Generic MAC Header (GMH), a payload of variable length and an optional CRC. Multiple
2 MPDUs may be concatenated into a single burst to save physical overhead. Similarly, multiple MSDUs from the same higher-layer service may be packed into a single MPDU to save MAC header overhead. Large MSDUs may be fragmented into smaller MPDUs and sent with multiple bursts. In the case of Time Division Duplexing (TDD) air interface, time is divided into downlink and uplink sub-frames with movable boundaries and a gap interval in-between. Each frame has a fixed duration of a few milliseconds. The downlink subframe comes first and then there is the uplink part. The first part of the downlink phase contains a preamble and a lot of broadcast signaling information to coordinate the usage of resources (e.g., DL-MAP and UL-MAP messages contain the burst allocation decided by the BS, respectively for downlink and uplink). Two initial parts of the uplink sub-frame are used for contention-based transmissions for initial ranging of newly joining SSs and for best effort bandwidth requests of alreadyassociated SSs. Note that 1 symbol is the preamble overhead of each uplink burst (short preamble). IV. WIMAX RESOURCE MANAGEMENT AND QOS SUPPORT Four MAC components are necessary to manage QoS, such as: admission control, scheduling, buffer management, and access scheme. In order to support different applications, WiMAX provides the following QoS traffic classes: UGS (Unsolicited Grant Service), ertps (Extended Real Time Polling Services - from e), rtps (Real Time Polling Service), nrtps (Non Real Time Polling Service), BE (Best Effort). The BS decides about the transmission in uplink and downlink. In downlink, only the BS transmits, but in uplink all SSs can transmit. Uplink resource allocation for packet transmission is performed by the BS through signaling to the SSs. At the SS, the packet scheduler will retrieve the packets from the queues and transmit them to the BS in the appropriate assigned resources, defined by the UL-MAP sent by the BS. The role of the scheduler (both BS side and SS side) is to transfer packets from the queues of the connections to the bursts, to determine the quantity of packets that will be sent in the bursts and also the fragmentation needed. All packets from the application layer are classified on the basis of CID and SIF and are forwarded to the appropriate queue (i.e., UGS, rtps, ertps, nrtps, and BE). The resource allocation to SSs (uplink direction) is based on a request-grant mechanism [7]. Bandwidth requests are always per connection. The standard defines the resource allocation methods (i.e., grant mechanisms) below for SSs transmissions to BS; these mechanisms can be mapped to the different traffic classes. Unsolicited bandwidth grants. The SS sends a request only once, and the BS will start sending grants to allocate resources periodically. This is suitable for UGS class. Unicast polling. This allocation technique is used when bandwidth resource demand is not relevant enough to use unsolicited bandwidth grants for SSs. When an SS is polled, resources (communicated via UL-MAP message) are allocated in uplink to allow the SS to send a bandwidth request message. If the SS does not need to make a request (decision of the SS scheduler), it may use this bandwidth allocation to send data. If SS does not have data to transmit it can use padding CID to indicate that it is not sending the bandwidth request. This access method is suitable for rtps, ertps, and nrtps classes. Contention-based polling. If there is not sufficient bandwidth to poll individually SSs and if some SSs can be inactive, a certain amount of every uplink sub-frame (called contention part) is allocated for sending contention-based requests. This access mechanism is suitable for the BE traffic class. Contention resources can be used by either all SSs (broadcast polling) or a group of SSs (multicast polling). The access protocol used for the contention phase is described below. Bandwidth requests can be standalone request (for unicast or contention-based polling) or use the piggybacking mechanism. In each frame, there is in the uplink part a contention phase that is organized according to transmission opportunities (the transmission of one bandwidth request needs a transmission opportunity). Because the uplink burst profile can change dynamically, all requests for bandwidth shall be made in terms of the number of bytes needed to carry the GMH and payload. As soon as an SS wants to send a bandwidth request through contention (i.e., when this SS has a new packet in its buffer and there is no other pending request), it enters the contention resolution algorithm. The initial backoff and maximum backoff window values are selected by the BS and are specified in the UCD message. They are given as a power of two; for example, the value of 4 indicates a backoff window value At the first attempt, the backoff value is equal to the initial one. The access algorithm operates as follows: the SS will select a random number in the interval (0, backoff window) that will be used to indicate the number of transmission opportunities that will be missed in the contention phase. Then, the SS transmits the bandwidth request on a suitable transmission opportunity and waits for a given number of subsequent UL-MAP messages (timer T16) to receive a data transmission grant from the BS (if the request has been received without collisions and has been satisfied). If timer T16 expires without an allocation, the SS doubles the backoff window (as long as it is less than the maximum value) and repeats the contention procedure. This retry process continues until the maximum number of retries (Request Retries limit = 16) has been reached. If this happens, the SS discards the bandwidth request. The contention phase depends on the following parameters: the contention size c in transmission opportunities, that is the number of transmission opportunities per frame; the minimum and the maximum value of the backoff window, W min and W max ; timer T16; the Request Retries limit; the frame duration, T frame. The bigger the c value, the lower the risk of collisions, but the lower the resources for data traffic, thus increasing the transmission delay. Note that the
3 optimal number of c maximizing the throughput of successful access attempts per transmission opportunity should be equal to the number of contending requests in each frame. A too high T16 value could cause too delay to react to collisions. On the other hand, if T16 is too small (the minimum T16 value is 10 ms), unuseful reattempts could be triggered for requests successfully received at the BS, but not yet served due to the service delay (congestion of resources). With the following condition, we have that T16 expires after the first attempt has been accomplished (. is the ceiling function): ( 1+ Wmin ) T frame. (1) T 16 c V. SIMULATOR CHARACTERISTICS In this study, we have considered the WiMAX model (TDD version) for the ns-2 environment developed by NIST (National Institute of Standards and Technology, US) [8]. A. PHY Layer The NIST model physical layer is based on OFDM (FFT with 256 values). There are 192 data sub-carriers (an SS in uplink can use all of them), and the symbol duration and the slot duration can be determined as [3]: OFDM symbol duration = T g + T u = N FFT s f BW (1 + G), (2) 4 physical slot duration = s f BW, (3) where T u denotes the useful symbol duration (the reciprocal of the sub-carrier bandwidth), T g is the CP duration (typically, the CP phase is expressed in terms of the ratio G = T g /T u ), and s f is the sampling factor. Moreover, we consider the parameter values in Table I that refer to the 3.5T1 WiMAX profile. Hence, on the basis of (2) with N FFT = 256 (the number of sub-carriers), we obtain OFDM symbol duration = [s] and physical slot duration = [s]. From (2) and (3), one symbol requires N FFT (1 + G)/4 slots. We can derive the number of slots and hence the number of symbols available in a frame for data transmissions considering the presence of RTG and TTG gaps for switching between uplink and downlink parts and vice versa (each of 20 slots); we have: Number of data symbols/frame = = 4 N FFT(1+G) [ ] T frame physical slot duration RT G TTG. (4) On the basis of (4), we have 124 OFDMA symbols per frame, being the symbol the minimum granularity in the resource allocation process. These 124 symbols are used for all the types of downlink and uplink traffic flows (i.e., broadcast downlink management messages, unicast management messages, data messages). In our study, we have considered a configuration with downlink/uplink resource ratio as 0.3/0.7 in order to allow a higher uplink capacity for the transmission of uplink time-critical data. Hence, there are 37 symbols for downlink and 87 symbols for uplink. The uplink and the downlink resources for data traffic are further reduced due to the resources needed for management messages. Hence, for downlink we have to consider DL PREAMBLE, DL MAP and UL MAP and gaps between the different parts, totally needing 10 symbols in the simulator. Moreover, for uplink, 19 symbols are used for initial ranging procedures of SSs and a variable number of symbols are used to accommodate the variable number of c transmission opportunities per frame (the BPSK 1/2 mode is used); we are referring here to the region request full contention method and sub-channelization is not used. At the beginning of the ranging phase and the contention one there is one gap symbol. According to NIST simulator settings [8], we have that the number of OFDM symbols used for the contention phase is S c = S c = c + x, where x is the smallest integer number so that x 96 t 48 c and t = 8 bits denotes a trailer byte. Hence, c = 2 requires S c =4 OFDM symbols and c = 5 needs S c = 8 OFDM symbols 1. With our settings, practically, we have N data sym, downlink = 27 symbols that can be used for downlink data traffic and N data sym, uplink = S c 2 = 66 S c symbols that can be used for uplink data traffic. Note that these resources for data traffic are also used for management connections (basic, primary and secondary connections corresponding to each active SS) that constitute a negligible traffic load. The uplink Cap up and the downlink Cap down capacities in bit/s for information traffic can be evaluated (upper bound) as follows: Cap = N data sym 192 log 2 (M) r, (5) T frame where M is the number of data sub-carriers and r denotes the RS-CC code rate. Moreover, in the uplink case we consider Cap = Cap up and N data sym = N data sym, uplink and for the downlink we use Cap = Cap down and N data sym = N data sym, downlink. Correspondingly, for instance for BPSK 1/2, we have kbit/s in downlink and 1113 kbit/s in uplink with c =5.Note that these capacities are further reduced due to the presence of preamble bursts. Finally, it is important to note that modulation and coding adaptation is not supported in the simulator; a threshold mechanism is used to determine the cell size. B. MAC Layer Outgoing packets are categorized by the classifier object only on the basis of their destination and are then sent to the connection object. When two MAC nodes (SS and BS) establish a new connection, the simulator creates two objects of type Connection, one outgoing (at SS side) and one incoming (at BS side), or vice versa. The simulator defines GMH with all the fields as specified in the standard. The NIST simulator currently supports only contention-based polling (broadcast, not multicast) for sending bandwidth requests. Note that 1 In the simulator, a transmission opportunity is the resource needed to send a bandwidth request burst formed by a short preamble (1 OFDM symbol) plus a GMH plus a trailer. This is slightly different with respect to the standard, where a bandwidth request is totally formed by 2 OFDM symbols.
4 piggybacking, ARQ and packing are not implemented. The BS scheduler determines the composition of sub-frames that are practically organized as in the standard. Several parameters can be set from Tcl scripts, such as frame length, the ratio between downlink and uplink sub-frame durations and the contention size. Contention zones are always at the beginning of uplink sub-frame; each request is preceded by the preamble (1 OFDM symbol for bandwidth requests, and 2 OFDM symbols for ranging) [2]. The contention resolution algorithm is implemented as specified in the standard. The NIST module implements both BS and SS schedulers; however, there is no traffic differentiation: only BE traffic class is supported and the scheduling of the different connections is based on a round robin approach, as described below. In downlink, the BS scheduler looks into each peer node and tries to schedule data from its connections to the downlink sub-frame. Connections in one peer node are checked in the following order: i) Basic connection; ii) Primary connection; iii) Secondary connection; iv) Data connection. The service of connections is performed in a round robin way. As long as there is free space in the downlink sub-frame, the scheduler will assign a data burst to the connection. Once the free space in the downlink sub-frame is over, the scheduler will remember where it has stopped, and in the next frame it will continue to assign bursts from there. In uplink, the BS scheduler will first reserve space for contention slots. As said before, information about the bandwidth needs is stored in the peer node objects in the MAC layer. When scheduling uplink transmissions, the scheduler will look at this information from connections, and will use a round robin procedure as for the downlink part. During this process, it will also add 1 OFDM symbol (= short preamble) between bursts. The SS scheduler is responsible for taking the data transmission opportunities allocated by the BS and for assigning them to the appropriate incoming connections. If bandwidth is assigned to a given connection, the SS scheduler will also fill the bursts with the data from its outgoing connections. If the SS has not an outstanding request, the SS scheduler looks at all outgoing connections and generates bandwidth requests, sent in the contention phase. Each request is of the aggregated type. VI. PERFORMANCE EVALUATION In this study, we consider a scenario with inelastic and elastic traffic flows respectively for video and data transfer applications. We refer to the configuration in Fig. 1 with a variable number N of SSs receiving FTP downlink flows and N SSs transmitting video-cbr uplink flows to the BS. Thus, we have three traffic flow types: FTP downlink data packets, uplink video-cbr packets and uplink TCP ACKs. The video stream is with Standard Interchange Format (SIF, pixels) resolution: one IP packet of 470 bytes is generated every 13 ms (corresponding to about 282 kbit/s). The N video-cbr flows and the N FTP flows are started at Fig. 1. WiMAX network scenario considered. TABLE I SIMULATION PARAMETER VALUES (3.5T1 WIMAX PROFILE). Parameter value BS DL/UL ratio of the TDD frame 0.3/0.7 Frame duration, T frame 5ms Channel bandwidth, BW 7MHz Receive/Transmit gap 20 physical slots Cyclic prefix, G = T g/t u 0.25 Queue length of each data connection 100 packets DCD/UCD interval 5s Channel number n. 1 at GHz Modulation and coding BPSK 1/2 or 16QAM 1/2 Sampling factor for 7 MHz BW, s f 8/7 Transmission power (both BS and SS) 27 dbm Maximum backoff window, W max 63 trans. opport. randomized instants (uniformly distributed in the interval 0-30 ms) to avoid phase effects with the WiMAX frame. For the FTP traffic, we use an ACK-cloked TCP traffic model based on TCP NewReno with packets of 1500 bytes generated at the IP level. Simulator settings are shown Table I and refer to the 3.5T1 WiMAX profile [9]; in addition to this, all wired links in Fig. 1 are at 100 Mbit/s with 1 ms of propagation delay and droptail buffer policy. In this preliminary study, all the traffic flows belong to the BE class. We are interested to evaluate the WiMAX performance expressed in terms of mean delay and mean goodput for video CBR flows and mean TCP goodput for FTP flows. We aim to show the impact on performance due to the different settings of the MAC layer parameters that regulate the access phase. We have performed different simulations, varying the N parameter and considering different possible values for the access phase parameters, such as c, T 16, and W min. The results are shown in Figs. 2 and 3 respectively for what concerns the mean packet delay and the mean goodput for a CBR flow. 10 repeated simulations of 400 s have been performed for each point to have reliable results. These different simulations are aimed to determine the best access parameter values for scenarios with different N values; the adopted criterion is to maximize the CBR goodput 2 provided that the mean CBR packet delay is lower than 80 ms. As for the mean CBR packet delay, we can note that it increases with N and T16. Moreover, 2 The mean CBR goodput may be lower than the source bit-rate value due to packet losses caused by buffer overflow.
5 TABLE II SELECTION OF ACCESS PARAMETERS FOR OUR WIMAX SCENARIO. BPSK 1/2 16QAM 1/2 N c T16 W min 1, ms ms (or 10 ms) 7 (or 3) ms ms 7 the mean CBR goodput reduces with lower c values (the contention phase is more congested and more time is needed for the access with the risk of packet losses due to buffer overflow) and with N due to the congestion of resources. Note that in all the cases in Figs. 2 and 3 the aggregated FTP downlink goodput remains practically constant with an evident reduction only in the case of N = 4 due to the congestion of uplink resources and the consequent delay in sending ACK uplink packets. As a conclusion, we can consider Table II where the best settings of the access parameters are proposed (for BPSK 172 and N = 4 we do not achieve the delay requirement for CBR). Finally, we focus on a configuration with N FTP and N CBR flows as before, but where FTP downlink flows are divided into two groups: one group formed by an SS, experiencing bad channel conditions with a given Packet Error Rate (PER) at the IP level, PER = 3 %; the other group is formed by N 1 FTP flows with excellent channel conditions (no errors). This situation is to account for two different channel conditions. The interest is here to investigate the impact that an increase in the number of FTP flows experiencing good channel conditions has on the FTP flow with PER =3% in the presence of a round robin scheduler. The performance results are shown in Fig. 4. We can note that the FTP flow with PER = 3 % is penalized in goodput by the increase in the number of the other FTP flows since these flows are able to exploit the injection rate reduction due to the frequent losses of the FTP flow with PER = 3 %. This behavior is present with both BPSK 1/2 and 16QAM 1/2, even if with 16QAM 1/2 performance is much better for both FTP downlink flows and CBR uplink ones. VII. CONCLUSIONS AND FUTURE WORK This paper provides a preliminary MAC study for a WiMAX scenario suitable for the WEIRD project. In the current NIST simulator, only the BE traffic class is implemented with round robin scheduler (the WiMAX Forum is working to improve the NIST simulator). Then, we have considered a scenario with FTP downlink and video-cbr uplink traffic flows with the aim to select appropriate settings for the access parameters. A further refinement of this work is needed to implement a scheduler that accounts for traffic differentiation and the priority of CBR traffic (UGS class) with respect to other traffic classes (e.g., BE class); moreover, the scheduler should account for fairness issues to compensate for the resource unbalance due to SSs experiencing different channel conditions. Fig. 2. Mean CBR packet delay as a function of N, the number of CBR and the number of FTP flows. Fig. 3. Mean CBR goodput as a function of N, the number of CBR and the number of FTP flows. Fig. 4. N FTP users experiencing different downlink channel conditions. REFERENCES [1] Web site of the WEIRD Project with URL: [2] IEEE , IEEE Standard for Local and Metropolitan Area Networks, Air Interface forfixed Broadband Wireless Access Systems, October [3] Loutfi Nuaymi, WiMAX: Technology for Broadband Wireless Access. John Wiley and Sons, Chichester, England, [4] J. Chen, W. Jiao, H. Wang, A Service Flow Management Strategy for IEEE Broadband Wireless Access Systems in TDD Mode, ICC 2005, pp , May [5] H. Lee, T. Kwon, D.-H. Cho, An Efficient Uplink Scheduling Algorithm for VoIP Services in IEEE BWA Systems, VTC 04, pp , Sept [6] L. Lin, W. Jia, W. Lu, Performanc Analysis of IEEE Multicast and Broadcast Polling based Bandwidth Request, WCNC 2007, pp , [7] Web site with URL: jain/cse574-06/ftp/wimax qos/index.html [8] Web site with URL: [9] WiMAX Forum Web site with URL:
MAC layer: structure and QoS support. PhD student: Le Minh Duong
802.16 MAC layer: structure and QoS support PhD student: Le Minh Duong Content 1. Introduction 2. 802.16 MAC layer 2.1. MAC Service-Specific Convergence Sublayer 2.2. Common Part Sublayer 3. QoS support
More informationChapter - 1 INTRODUCTION
Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system
More informationA Deficit Round Robin with Fragmentation Scheduler for IEEE e Mobile WiMAX 1,2
1 A Deficit Round Robin with Fragmentation Scheduler for IEEE 802.16e Mobile WiMAX 1,2 Chakchai So-In, Student Member, IEEE, Raj Jain, Fellow, IEEE, Abdel-Karim Tamimi, Member, IEEE Deficit Round Robin
More information* Author to whom correspondence should be addressed; Tel.: ; Fax:
Future Internet 2010, 2, 446-468; doi:10.3390/fi2040446 Article OPEN ACCESS future internet ISSN 1999-5903 www.mdpi.com/journal/futureinternet Deficit Round Robin with Fragmentation Scheduling to Achieve
More informationEvaluating VoIP using Network Simulator-2
Athens University of Economic and Business Evaluating VoIP using Network Simulator-2 June 2007 Author: Papantonakos Manos Supervisor Prof.: George Xylomenos Co-Supervisor Prof: George Polyzos About WiMax
More informationWiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes
WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes Syed R. Zaidi, Shahab Hussain, M. A. Ali Department of Electrical Engineering The City College of The
More informationQos Analysis Of Wimax Network
Qos Analysis Of Wimax Network 802.16 Gurpal Singh Sidhu 1, Sandeep Kaushal 2, Dr. Vijay Kumar Banga 3 1 M-Tech scholar, Department of Electronics and Communication Engineering, Amritsar College of Engineering
More informationOn Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network
On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE 802.16 based WiMAX Network Vinit Grewal Department of Electronics and Communication Engineering National Institute of Technology
More informationA Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks
A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks Han-Sheng Chuang 1, Liang-Teh Lee 1 and Chen-Feng Wu 2 1 Department of Computer Science and Engineering, Tatung
More informationComparative Assessments for Different WiMAX Scheduling Algorithms
Proceedings of the World Congress on Engineering and Computer Science 9 Vol I WCECS 9, October -, 9, San Francisco, USA Comparative Assessments for Different WiMAX Scheduling Algorithms Ahmed H. Rashwan,
More informationTWO-STEP SCHEDULING ALGORITHM FOR IEEE WIRELESS NETWORKS
TWO-STEP SCHEDULING ALGORITHM FOR IEEE802.16 WIRELESS NETWORKS Mohamed. M. Elgazzar R&D Department, Cairo, Egypt, m_elgazzar1961@yahoo.com ABSTRACT This paper proposes a new scheduling algorithm for IEEE
More informationDelay Analysis of IEEE Wireless Metropolitan Area Network
Delay Analysis of IEEE 802.16 Wireless Metropolitan Area Network Zsolt Saffer Technical University of Budapest 1521 Budapest Hungary safferzs@hit.bme.hu Sergey Andreev State University of Aerospace Instrumentation
More informationRECENTLY, the information exchange using wired and
Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology
More informationIEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <
Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir
More informationSS Initialization Overview
SS Initialization Overview Downlink Sync Auth. Key Xchange Get Uplink Parameters Setup Time Ranging Register Download Configuration File Capability Negotiation DHCP Setup connection and service flow (provisioned
More informationEfficient Uplink Scheduler Architecture of Subscriber Station in IEEE System
Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 82.16 System Woo-Jae Kim 1, Joo-Young Baek 1, Sun-Don Lee 1, Young-Joo Suh 1, Yun-Sung Kim 2, and Jin-A Kim 2 1 Department of Computer
More informationOptimizing WiMAX: A Dynamic Strategy for Reallocation of Underutilized Downlink Sub-Frame to Uplink in TDD Mode
Int. J. Communications, Network and System Sciences, 2009, 2, 888-894 doi:10.4236/ijcns.2009.29103 Published Online December 2009 (http://www.scirp.org/journal/ijcns/). Optimizing WiMAX: A Dynamic Strategy
More informationA QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX
A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX Abdalla A\ Alrahman Mohamed Abdalla 1, Dr. Amin Babiker A\ Nabi 2, Dr. Ashraf A. Osman 3 1,2,3 Department of communication,
More informationMesh Networks
Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE
More informationPublication P IEEE. Reprinted with permission.
Publication P5 Jani Lakkakorpi, Alexander Sayenko, and Jani Moilanen. 8. Comparison of different scheduling algorithms for WiMAX base station: Deficit Round Robin vs. Proportional Fair vs. Weighted Deficit
More informationCapacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes
Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes Syed R. Zaidi a, Shahab Hussain a, Ajaz Sana a,aparicio Carranza b, Farrukh Zia b a The City College of The City University of
More informationNCTUns Simulation Tool for WiMAX Modeling
NCTUns Simulation Tool for WiMAX Modeling (Invited Paper) Shiang-Ming Huang smhuang@csnctuedutw Ya-Chin Sung ycsung@csienctuedutw Yi-Bing Lin liny@linycsienctuedutw Shie-Yuan Wang shieyuan@csienctuedutw
More informationMAC Overview NCHU CSE WMAN - 1
MAC Overview NCHU CSE WMAN - 1 MAC Overview Connection-oriented Supports difficult user environments High bandwidth, hundreds of users per channel For variable Continuous and Burst traffic Very efficient
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More informationInstitute of Electrical and Electronics Engineers (IEEE)
2006-03-08 IEEE L802.16-06/004 INTERNATIONAL TELECOMMUNICATION UNION RADIOCOMMUNICATION STUDY GROUPS Document 8A/IEEE-2-E Document 8F/IEEE-1-E 8 March 2006 English only Received: TECHNOLOGY Subject: Question
More informationA Multi-Factor Scheduling Algorithm for WIMAX Systems
A Multi-Factor Scheduling Algorithm for WIMAX Systems Ahmed H. El-Shinnawy, Mohamed M. Elgazzar, and Amin M.Nassar Abstract This paper proposes a new scheduling algorithm for IEEE 802.16-2005 Broadband
More informationInternet Traffic Performance in IEEE Networks
Internet Traffic Performance in IEEE 802.16 Networks Dmitry Sivchenko 1,2,3, Nico Bayer 1,2,3, Bangnan Xu 1, Veselin Rakocevic 2, Joachim Habermann 3 1 T-Systems, SSC ENPS, Deutsche-Telekom-Allee 7, 64295
More informationThe Impact of Channel Bandwidth with Network Asymmetry in WiMAX Network Using TCP New Reno
International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 1 The Impact of Channel Bandwidth with Network Asymmetry in WiMAX Network Using TCP New Reno Kailash Chandra
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationSujesh P. Lal VIT University, TN, INDIA
VoIP TRAFFIC SCHEDULING IN Sujesh P. Lal VIT University, TN, INDIA Introduction Popularity of Voice over IP (VoIP) applications such as Skype, Google Talk, and MSN Messenger along with emerging deployment
More informationPreliminary Performance Evaluation of QoS in DOCSIS 1.1
The University of Kansas Technical Report Preliminary Performance Evaluation of QoS in DOCSIS 1.1 Gayathri Chandrasekaran, Mohammed Hawa and David W. Petr ITTC-FY2003-TR-22736-01 January 2003 Sponsor:
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationQoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered
More informationPerformance Evaluation of Scheduling Mechanisms for Broadband Networks
Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph
More informationFlexible Resource Allocation in IEEE Wireless Metropolitan Area Networks
Flexible Resource Allocation in IEEE 802.16 Wireless Metropolitan Area Networks Spyros A. Xergias, Nikos Passas and Lazaros Merakos Communication Networks Laboratory Department of Informatics & Telecommunications
More informationOverview of WiMAX (Chapter 2) ENE 490 MON 13:30-16:30 Asst. Prof. Suwat Pattaramalai
(Chapter 2) ENE 490 MON 13:30-16:30 Asst. Prof. Suwat Pattaramalai Background on IEEE 802.16 and WiMAX (Table 2.1 and Table 2.2) Salient Features of WiMAX OFDM-based physical layer: good resistance to
More informationBandwidth Allocation for Video Streaming in WiMax Networks
Bandwidth Allocation for Video Streaming in WiMax Networks Alessandra Scicchitano DEIS, Università della Calabria Andrea Bianco, Carla-Fabiana Chiasserini, Emilio Leonardi Dipartimento di Elettronica,
More informationDesign and Implementation of IEEE MAC Layer Simulator
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.8, August 2009 53 Design and Implementation of IEEE 802.16 MAC Layer Simulator Malik Muhammad Asim, Muid Mufti Computer Engineering
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationInstitute of Electrical and Electronics Engineers (IEEE) PROPOSED AMENDMENTS TO [IMT.EVAL]
IEEE L802.16-08/032 Source: Doc. 5D/5, 5D/97 and 5D/EVAL-CG TECHNOLOGY Subject: Question ITU-R 229-1/8 Institute of Electrical and Electronics Engineers (IEEE) PROPOSED AMENDMENTS TO [IMT.EVAL] This contribution
More informationPerformance Evaluation of WiFiRe using OPNET
Performance Evaluation of WiFiRe using OPNET Under the guidance of: Prof. Sridhar Iyer and Prof. Varsha Apte Dept. of CSE (KReSIT) July 16, 2007 Goal Goal Building. Finding minimum slot length to support
More informationSolutions to Performance Problems in VoIP Over a Wireless LAN
Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular
More informationA Deficit Round Robin with Fragmentation Scheduler for Mobile WiMAX
A Deficit Round Robin with Fragmentation Scheduler for Mobile WiMAX Chakchai So-In, Raj Jain and Abdel-Karim Al Tammi Washington University in Saint Louis Saint Louis, MO 63130 jain@cse.wustl.edu Presentation
More informationModeling a MAC Scheduler: Experiences with a DOCSIS Cable
Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Network Simulation Model Jim Martin Department of Computer Science Clemson University jim.martin@cs.clemson.edu Phone: 864 656 4529 Fax: 864 656
More informationPerformance Analysis of TCP and UDP-based Applications in a IEEE deployed Network
Performance Analysis of TCP and UDP-based Applications in a IEEE 82.16 deployed Network Hemant Kumar Rath 1 and Abhay Karandikar 2 1 TCS Networks Lab, Bangalore 56 66, India, Email:hemant.rath@tcs.com
More information7/27/2010 LTE-WIMAX BLOG HARISHVADADA.WORDPRESS.COM. QOS over 4G networks Harish Vadada
7/27/2010 HARISHVADADA.WORDPRESS.COM LTE-WIMAX BLOG QOS over 4G networks Harish Vadada Cellular network operators across the world have seen an explosive growth of mobile broadband usage. Traffic volume
More informationOptimizing TCP Goodput and Delay in Next Generation IEEE (ax) Devices
T RANSACTIONS ON TNC N ETWORKS AND C OMMUNICATIONS SOCIETY FOR SCIENCE AND EDUCATION UNITED KINGDOM VOLUME 6, NO. 2 ISSN: 2054-7420 Optimizing TCP Goodput and Delay in Next Generation IEEE 802.11 (ax)
More informationAbstract of the Book
Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the
More informationInvestigation of Efficient Resource Allocation Schemes for WiMAX Networks
School of Engineering and Design Electronic & Computer Engineering Investigation of Efficient Resource Allocation Schemes for WiMAX Networks A thesis submitted for the degree of Master of Philosophy Usman
More informationNovel MIME Type and Extension Based Packet Classification Algorithm in WiMAX
Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX Siddu P. Algur Departmentof Computer Science Rani Chennamma University Belgaum, India Niharika Kumar Department of Information
More informationA Scheduler for Unsolicited Grant Service (UGS) in IEEE e Mobile WiMAX Networks*
1 A Scheduler for Unsolicited Grant Service (UGS) in IEEE 802.16e Mobile WiMAX Networks* Chakchai So-In, Member, IEEE, Raj Jain, Fellow, IEEE, Abdel-Karim Al Tamimi, Member, IEEE Abstract Most of the IEEE
More informationWireless Communication. IEEE Wireless Metropolitan Area Network (wman)
1 IEEE 802.16 Wireless Metropolitan Area Network (wman) 2 Existing Data Network Hierarchy Level Typical Connections Wired Technologies Wireless Technologies Personal Area (PAN) Peripherals and personal
More informationImplementation of WiFiRe PHY Sectorization in OPNET
P Sreedhar Reddy Roll No. 06305024 24th July, 2007 Under the Guidance Of Prof. Sridhar Iyer Department Of Computer Science and Engineering Indian Institute Of Technology, Bombay Outline WiFiRe overview.
More informationETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview
ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview Source : Jamshid Khun Jush (Ericsson) (THOMSON multimedia) 1 HIPERLAN/2 Standard A new standard developed by the ETSI Project
More informationEvaluation and Comparaison of Scheduling Algorithms in Wimax Networks
Evaluation and Comparaison of Scheduling Algorithms in Wimax Networks Abstract Kais Mnif * LETI laboratory, University of Sfax, Tunisia Ecole Nationale d Electronique et de Télécommunications (ENET COM)
More informationCross-Layer QoS Support in the IEEE Mesh Network
Cross-Layer QoS Support in the IEEE 802.16 Mesh Network Chun-Chuan Yang, Yi-Ting Mai and Liang-Chi Tsai Multimedia and Communications Laboratory Department of Computer Science and Information Engineering
More informationCover Page. Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message
Cover Page 1. Title of Paper Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message 2. Name of the authors, Sung-Han Park, and Jae-Hyun Kim 3. About authors Affiliation
More informationPerformance Evaluation of Scheduling Algorithm for Wimax Networks
Performance Evaluation of Scheduling Algorithm for Wimax Networks Radhia Khdhir, Kais Mnif, and Lotfi Kamoun Wimax retains only OFDM and OFDMA. For topologies, mesh and Point-to-Multipoint (PMP) modes
More informationPriority Based Uplink Scheduling Scheme for WiMAX Service Classes
I.J. Information Technology and Computer Science, 213, 8, 66-74 Published Online July 213 in MECS (http://www.mecs-press.org/) DOI: 1.5815/ijitcs.213.8.7 Priority Based Uplink Scheduling Scheme for WiMAX
More informationWiMAX Vs Wi-Fi. 3G Evolution (source: Nokia) Wireless Systems. WiMAX
3G Evolution (source: Nokia) WiMAX Vs Wi-Fi ผศ.ดร.ส ร นทร ก ตต ธรก ล ภาคว ชาว ศวกรรมคอมพ วเตอร คณะว ศวกรรมศาสตร สถาบ นเทคโนโลย พระจอมเกล าเจ าค ณทหารลาดกระบ ง 2 Wireless Systems WiMAX Worldwide Interoperability
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationMeasurement and Analysis of One-Way Delays over IEEE e/WiBro Network
Measurement and Analysis of One-Way Delays over IEEE 82.16e/WiBro Network Dongmyoung Kim, Hua Cai, and Sunghyun Choi School of Electrical Engineering and INMC, Seoul National University, Seoul, Korea Samsung
More informationWireless LAN A competing method to wired LAN. Course: Wireline Communication Instructor: Prof. Werner Henkel Student: Chin Yung Lu
Wireless LAN A competing method to wired LAN Course: Wireline Communication Instructor: Prof. Werner Henkel Student: Chin Yung Lu Outline of the presentation Introduction Background Problem Environment
More informationThe Forward Link Performance Study of the WiMAX System Under Different Schedulers
REVISTA CIENTÍFICA PERIÓDICA - TELECOMUNICAÇÕES, VOL 12, NO. 2, DEZEMBRO DE 29 61 The Forward Link Performance Study of the WiMAX System Under Different Schedulers Leandro Bento Sena Marques & Shusaburo
More informationRequest Mechanisms to Reduce the Contention Period in : A Comparison
Request Mechanisms to Reduce the Contention Period in 82.6: A Comparison Jesús Delicado, Francisco M. Delicado and Luis Orozco Barbosa Instituto de Investigación en Informática de Albacete (I 3 A) Universidad
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationA Frame Aggregation Scheduler for IEEE n
A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University
More informationPerformance Comparison of d OFDMA, TD-CDMA, cdma2000 1xEV-DO and a WLAN on Voice over IP Service
Performance Comparison of 82.16d OFDMA, TD-CDMA, cdma2 1xEV-DO and 82.11a WLAN on Voice over IP Service Jee-young Song, Hyun-ho Choi, Hyu-dae Kim, Sang-wook Kwon and Dong-ho Cho* Hong-sung Chang, Geunwhi
More informationAdvanced Computer Networks. WLAN, Cellular Networks
Advanced Computer Networks 263 3501 00 WLAN, Cellular Networks Patrick Stuedi Spring Semester 2013 Oriana Riva, Department of Computer Science ETH Zürich Last week Medium Access COPE Today Last week Short
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY OF MOBILE WIMAX STANDARD KOMAL L. LAKHANI, PROF. MAYUR TIWARI Department
More informationKeywords- IEEE , WiMAX, QoS, CBR, Mobility.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A QoS Oriented
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationScheduling and CAC in IEEE Fixed BWNs: A Comprehensive Survey and Taxonomy
Scheduling and CAC in IEEE 802.16 Fixed BWNs: A Comprehensive Survey and Taxonomy Ikbal Chammakhi Msadaa, Daniel Câmara, and Fethi Filali EURECOM Mobile Communications Department 2229 route des crêtes,
More informationImplementation and Evaluation of a MAC Scheduling Architecture for IEEE WirelessMANs
Implementation and Evaluation of a MAC Scheduling Architecture for IEEE 802.16 WirelessMANs by Abhishek Maheshwari Department of Computer Science and Engineering Indian Institute of Technology Kanpur May
More informationPREFACE. The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie ( )
PREFACE The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie (1888-1964) The recent standard IEEE 802.16 for fixed Broadband Wireless Access (BWA)
More informationMAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS 1999-10-29 Source Phil Guillemette SpaceBridge Networks Corporation
More informationMPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE
MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,
More informationA Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX Base Stations
A Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX Base Stations Yi-Neng Lin, Che-Wen Wu, Ying-Dar Lin National Chiao-Tung University Hsinchu, Taiwan Yuan-Cheng Lai National Taiwan
More informationOptimization of Frame Structure for WiMAX Multihop
Optimization of Frame Structure for WiMAX Multihop Networks Pavel Mach 1, Robert Bestak 1, 1 Czech Technical University in Prague, Faculty of Electrical Engineering Technicka 2, Prague, 16627, Czech Republic
More informationThe Integration of Heterogeneous Wireless Networks (IEEE /IEEE ) and its QoS Analysis
141 The Integration of Heterogeneous Wireless Networks (IEEE 802.11/IEEE 802.16) and its QoS Analysis Wernhuar Tarng 1, Nai-Wei Chen 1, Li-Zhong Deng 1, Kuo-Liang Ou 1, Kun-Rong Hsie 2 and Mingteh Chen
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationHIPERLAN/2 and a: A Comparative Study
HIPERLAN/2 and 802.11a: A Comparative Study PADMA BONDE Reader, Department of Computer Science Shri Vaishnav Institute of Technology and Science Indore, INDIA JAYESH BONDE Executive Engineer, Department
More informationComparison between LTE and Rival Wireless Technologies (using Opnet 16)
ENSC 427: COMMUNICATION NETWORKS SPRING 2013 Comparison between LTE and Rival Wireless Technologies (using Opnet 16) Team 10: Josh Ancill Kim Izmaylov Anton Khomutskiy jja48@sfu.ca kvi@sfu.ca aka78@sfu.ca
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling
More informationScheduling in WiMAX based wireless networks. Srivathsan Soundararajan
Scheduling in WiMAX based wireless networks Except where reference is made to the work of others, the work described in this thesis is my own or was done in collaboration with my advisory committee. This
More informationCross-Layer Networking Protocol Design for Ubiquitous Home Service -- Hierarchical Cross-Layer Fuzzy Control
Cross-Layer Networking Protocol Design for Ubiquitous Home Service -- Hierarchical Cross-Layer Fuzzy Control Chao-Lieh Chen ( 陳朝烈 ) 1 Yau-Hwang Kuo ( 郭耀煌 ) 1 Dept. Electronics Eng. Kun-Shan University
More informationBandwidth Allocation for Quality of Service Provision in IEEE Systems
Bandwidth Allocation for Quality of Service Provision in IEEE 802.16 Systems Tze Wei Tang Thesis submitted for the degree of Doctor of Philosophy in Electrical and Electronic Engineering at The University
More informationMODULATION AWARE CONNECTION ADMISSION CONTROL AND UPLINK SCHEDULING ALGORITHM FOR WIMAX NETWORKS
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 215 MODULATION AWARE CONNECTION ADMISSION CONTROL AND UPLINK SCHEDULING ALGORITHM FOR WIMAX NETWORKS Shwetha D 1, Mohan
More informationIEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract
IEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract The growing penetration of the internet throughout the society has also brought advantages to SOHOs and home networks. As networks develop,
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationUpstream Scheduler Mode Configuration for the Cisco ubr CMTS
Upstream Scheduler Mode Configuration for the Cisco ubr CMTS Document ID: 69704 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Upstream Scheduling in
More informationIEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering
by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents
More informationDetection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack
Int. J. Communications, Network and System Sciences, 2012, 5, 353-367 http://dx.doi.org/10.4236/ijcns.2012.56046 Published Online June 2012 (http://www.scirp.org/journal/ijcns) Detection and Fortification
More informationMultiple TFRC Streaming in a WiMAX Environment
Multiple TFRC Streaming in a WiMAX Environment S. Saleh and M. Fleury University of Essex, School of Computer Science and Electronic Engineering Colchester, Essex CO4 3SQ UK Abstract-Employing multiple
More informationA Cross Layer Frame Work for Enhanced Quality of Service Provisioning in Worldwide Interoperability for Microwave Access Networks
Journal of Computer Science 8 (3): 420-424, 2012 ISSN 1549-3636 2012 Science Publications A Cross Layer Frame Work for Enhanced Quality of Service Provisioning in Worldwide Interoperability for Microwave
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationBW-REQ channel design recommendations for IEEE m
BW-REQ channel design recommendations for IEEE 802.16m Document Number: IEEE C802.16m-08/635 Date Submitted: 2008-07-13 Source: Qinghua Li (qinghua.li@intel.com) Yuan Zhu (yuan.zhu@intel.com) Xiangying
More informationPerformance analysis of aodv, dsdv and aomdv using wimax in NS-2
Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers
More information