1 S-72.333 Post-graduate course in Radio Communications 2003-2004 Analysis Methods for Combined Voice and Data Huibin Lin

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

Chapter 5 Voice Communication Concepts and Technology.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access Techniques for Wireless Communications
Multiple access What if multiple machines are sharing the same link?
DPRMA (Distributed Packet Reservation Multiple Access)
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 “Multiplexing Live Video Streams & Voice with Data over a High Capacity Packet Switched Wireless Network” Spyros Psychis, Polychronis Koutsakis and Michael.
Analyzing Multi-channel MAC Protocols for Underwater Sensor Networks Presenter: Zhong Zhou.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
End-to-End TCP-Friendly Streaming Protocol and Bit Allocation for Scalable Video Over Wireless Internet Fan Yang, Qian Zhang, Wenwu Zhu, and Ya-Qin Zhang.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
WiFi Models EE 228A Lecture 5 Teresa Tung and Jean Walrand
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
7C Cimini-9/97 ALOHA Carrier-Sense Techniques Reservation Protocols Voice and Data Techniques - PRMA - Adaptive CDMA Power Control “Channel access.
7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Efficiency Reservation Protocols Voice and Data Techniques - PRMA - Variable rate CDMA.
Two Media Access Control Protocols (MAC) for Wireless Networks.
7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Carrier-Sense Techniques Reservation Protocols PRMA.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Prof.R.K.NADESH;SITE;VIT MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals:
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Medium Access Control Sublayer
Chap 4 Multiaccess Communication (Part 1)
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
: Data Communication and Computer Networks
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Orthogonal Frequency Division Multiple Access (OFDMA)
Autumn2004 © University of Surrey SatComms A - part 4 - B G Evans 4.1 Satellite Communications A Part 4 Access Schemes in Satellite Networks -Professor.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Voice-Data Channel Access Integration in Third Generation Microcellular Wireless Network : Design and Performance Evaluation Allan C. Cleary Chapter 2.
Data and Computer Communications Chapter 11 – Asynchronous Transfer Mode.
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
An optimal power-saving class II for VoIP traffic and its performance evaluations in IEEE e JungRyun Lee School of Electrical and Electronics Eng,Chung-Ang.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
Wireless communications and mobile computing conference, p.p , July 2011.
A Medium Access Protocol for Interconnecting ATM and Wireless Networks Time division multiple access/frequency division duplex. Voice mobiles require real-time.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
1 Merges of Wireless Communications and Computer Networks George Lee.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Computer Networking Queueing (A Summary from Appendix A) Dr Sandra I. Woolley.
實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Review of Useful Definitions Statistical multiplexing is a method of sharing a link among transmissions. When computers use store-and-forward packet switching,
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
MAC Protocols for Sensor Networks
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
Network Processing Systems Design
2. Data Link Layer: Medium Access Control. Scheduling.
5G MOBILE TECHNOLOGY By J.YOGESH 08M31A0425.
Chapter 12 Multiple Access
Channel Allocation (MAC)
Make Random Access Contentions Transparent by Orthogonal Complementary Codes in Wireless Communications Xiaohua (Edward) Li Department of Electrical and.
Communication Networks NETW 501
Qingwen Liu, Student Member, IEEE Xin Wang, Member, IEEE,
Chapter 12 Media Access Control (MAC)
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

1 S Post-graduate course in Radio Communications Analysis Methods for Combined Voice and Data Huibin Lin

2 Contents  Why to integrate voice and data?  Multiuser access –Contention-based packet communications protocols (ALOHA, CSMA) –Fixed access methods (FDMA, TDMA) –CDMA –Example of integration of voice and data  Movable boundary TDMA with silence detection  Packet reservation multiple access  Analysis methods  Comparison of Analysis methods  Voice/Data integration technologies

3 Why to integrate voice and data  Save money –the cost of packet voice is currently estimated to be only 20 to 50 percent of the cost of a traditional circuit-based voice network.  More efficiently used band  gain increased user productivity –integrate computers with PBXs to provide applications such as advanced call center features

4 Difficulties in combining voice and data  Voice is sensitive to delay, but can tolerate errors and even packet loss, a loss of 1-2% of voice packets has insignificant effect on the perceived quality of reconstructed voice.  Whereas, data packets are sensitive to loss and errors but can generally tolerate delays.

5 Multiuser access  A key technical problem to be dealt with in integration of voice and data. –Contention-based packet communications protocols (ALOHA, CSMA) –Fixed access methods (FDMA, TDMA) –CDMA

6 Movable boundary TDMA with silence detection Time frame voice slots Data slots Movable Boundary Frame structure in a movable-boundary frame-polling system.

7 Packet reservation multiple access  Variable mixture of voice packets and data packets  PRMA system is closely related to reservation- ALOHA, merges characteristics of slotted ALOHA and TDMA protocols.  Terminals can send two types of information, referred to as periodic and random.

8 Analysis methods 1 (M/D/1)  Approximate the system by a fixed-foundary TDMA system (Voice packets always occupy the N1 available slots)  One-dimensional M/D/1 (Markov arrival, definite service time and single server) queuing model.  The queuing delay: Where N is the number of slots in a frame λ d is the arrival rate of the data packets

9 Analysis method 2 (M/G/1)  This method assumes a variable service rate and depends upon the probability of voice occupancy of the slot.  The queuing delay: Where Here xi=1/(µd(N-i)) is the service time for N-I slots of data, and P(I) is the probability that the voice traffic would require I slots for transmission.  One dimensional M/G/1 (Markov arrival, general service time, and single server) queuing model.

10 Analysis Method 3 (recursive method analyzed)  Two-dimensional Markov chain to model the voice and data traffic  Recursive method analyzed  Results obtained by this analytical method lie closest to the results of simulations.  The queuing delay is: Where Tr[ ] is thr trace operator, which sums all elements of a vector, R is an (N1+1)X(N1+1)matrix, I is the identity matrix, and  is a vector of length N+1.

11 Analysis method 4  An approximate analysis of the underload region in which the data throughput is smaller than the number of slots left in the frame after voice transmission.  The average delay is:

12 Comparison of performance assessment methods (1) Data throughput (Erlangs) Data delay (No. of packets) Method II Method III Method I Method IV Delay versus throughput for a dual-rate syestem with dual diversity. Diversity (M)=2, voice users=59.

13 Comparison of performance assessment methods (2) Data throughput (Erlangs) Data delay (No. of packets) M=2 Voice users=20 M=4 Voice users=59 M=8 Voice users=59 Delay versus throughput for a single-rate movable-boundary TDMA system with M=2,4,and 8 orders of diversity, determined using analysis method III.

14 Comparison of performance assessment methods 3 No. of voice users Data throughput (Mbits/sec) M = 8 M = 4 M = 2 Throughput for a single-rate system versus number of voice users for data delay less than 10 msec with diversity M=2,4 and 8.

15 Voice/Data integration technologies  Voice over ATM  Voice over frame relay  Voice over IP

16 Summary  Integrate voice and data can save money and make efficient use of bandwidth  4 different methods could be used to analyze the combination of voice and data

17 Reference  Book 3: Wireless Informations Networks, Chapter 11, Kaveh Pahlavan & Allen H. Levesque, John Wiley & Sons, inc   k/ito_doc/voicdata.htm k/ito_doc/voicdata.htm  mvd/fitce1998.pdf mvd/fitce1998.pdf

18 Homework  Give a general description of the different analyze methods of combining voice and data.