throbber
1111
`
`■
`
`■
`
`Editor-in-Chief:
`lmrich Chlamtac
`
`i
`
`Volume 1 (1996) No. 3
`ISSN 1383 469X
`Published December 1996
`
`

`

`Mobile Networks and Applications
`The journal of special issues on mobility of systems, users, data and computing
`
`Mobile Networks and Applications (MONET) is a joint publication of the ACM and Baltzer Science Publishers
`
`Editor-in-Chief: Imrich Chiamtac, ECS Department, Boston University, 44 Cummington Street, Boston, MA 02215, USA
`E-mail: chlamtacOacm.org
`
`Advisory Board:
`Anthony Acampora, Professor, UC San Diego
`Toby Berger, Professor, Cornell University
`Vinton Cerf. Vice President, MCI
`Domenico Ferrari, Professor, UC Berkeley
`Robert Gallager, Professor, MIT
`Richard Gitlin, Vice President, Lucent Technologies
`David Goodman, Professor, Rutgers University
`
`Area Editors:
`Design and analysis of algorithms, Baruch Awerbuch,
`Johns Hopkins University
`Algorithms for online and mobile environments,
`Maurizio Bonuccelli, University of Pisa, Italy
`Advanced services, multimedia, Jon Crowcroft,
`Univ. College, England
`Systems and technologies, Rene Cruz, UC San Diego
`Wireless, mobile network planning, Beza/el Gavish,
`Vanderbilt University
`Data management and databases, Tomasz Imielinski,
`Rutgers University
`Network/node/host architectures, Raj Jain,
`Ohio State University
`Mobility algorithms, broadband wireless, Ravi Jain, Bellcore
`Mobility and applications, David Johnson, Carnegie Mellon University
`Aims and Scope:
`
`Leonard Kleinrock, Professor, UCLA
`Tom Leighton, Professor, MIT
`Barry M. Leiner, Vice President, MCC
`Ray Miller, Professor, University of Maryland
`Dave Morgan, Vice President, Motorola
`Christos Papadimitriou, Professor, UC Berkeley
`Mischa Schwartz, Professor, Columbia University
`
`Service algorithms and ATM, Mark Karol, Lucent Technologies
`Mobile, roaming services, Randy Katz, UC Berkeley
`Nomadic computing, Arv ind Krishna, IBM
`Security, reliability, availability, Shay Kutten, Technion, Israel
`Standards, Tom La Porta, AT&T
`Network management, Aurel Lazar, Columbia University
`Wireless-wireline systems integration, Lauis Lame, BMDO
`Design of mobile networks, Debasis Mitra, AT&T
`Protocols for mobility, Charlie Perkins, IBM
`Multihop networks, sattelite, PCS, Ambatipudi Sastry, SRI
`Routing and multicasting, Martha Steenstrup, BBN
`Performance characterization, Yutaka Takahasi,
`Nara Institute of Science & Technology, Japan
`Systems for wireless and mobile environments,
`David Tennenhouse, MIT
`
`MO~_ET's technical scope reflects the emerging symbiosis of portable computers and wireless networks, addressing the convergence of
`mob1hty, computing and information organization, its access and management. In approving Special Issues, the journal places an equal emphasis
`on the various areas of nomadic computing, data management, related software and hardware technologies, and mobile user services, alongside
`more "classical" topics in wireless and mobile networking. The journal documents practical and theoretical results which make a fundamental
`contribution, in the following, representative, areas:
`• Nomadic computing, applications and services supporting the mobile user
`• Design and analysis of algorithms for online and mobile environments
`• Protocols to cope with mobility, limited bandwidth, intermittent connectivity
`• Data management issues in mobile environments
`• Mobile and wireless networks and their architectures
`• Mobile node/ host architectures
`• Mobility management, mobile agent and proxy architectures
`• Solutions for portable, mobile and roaming services
`• Mobile applications, location-dependent and sensitive applications
`• Systems and technologies for wireless and mobile environments, wearable computers and body area networks
`• Performance characterization of mobile/ wireless and nomadic systems
`• Design, management and operation of emerging wireless environments
`• Mobile network planning and standardization
`• Integration ofwireline and wireless systems
`• Security, scalability and reliability in wireless communication and computations environments
`• Service algorithms, emerging topics, multimedia, ATM, etc.
`
`Sublcrlption Information
`Subscription Volume 1, 1996: Institutional price: Swiss Francs 354.00 I USS 290.00 including postage.
`Subscription Volume 2. 1997 ( 4 issues): Institutional price: Swiss Francs 365.00 I USS 299.00 including postage.
`Personal pricing on request. In case of exchange rate fluctuations the Swiss Francs Price is definitive.
`Subscriptions should be sent to your usual supplier or to Baltzer Science Publishers, P.O. Box 37208, 1030 AE Amsterdam, The Netherlands
`(aubacribetna.bal tzer.nl). Second class postage paid at Rahway, NJ. Postmaster: please send address corrections to Baltzer Science Publishers, C/O
`Mercury Airfreight International Ltd., 2323 Randolph Avenue, Avenel, NJ 07001, USA. A CM members: MONET is available for its members at the rate of
`USS 47.00; student members: USS 42.00. In the USA please contact: ACM Member Services Department, Church Street Station, P.O. Box 12114, New
`York, NY 10257, USA (aCllbelpeaca.org); members in Europe: ACM European Services Centre, 108 Cowley Road, Oxford OX4 IJF, UK. Phone:
`+44 1865 382338. E-mail: aca-europetaca.org. WWW: http : / /wv.aca.org, http : //wv.acm.org/ j ournals/130.html.
`0 Baltzer Science Publishen (1996): All righta rctCrved. No part of tbil publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic,
`
`mechanical, pbotocopyin1, recording or otherwise, without the prior permission of the publisher. No responsibility ii ass'.""ed by the pu~lilhcr for any injury and/ o~ dama~ to penon.1 :i
`
`property as I matter of producu liability, nesJiacn<e or otherwile, or from any use or operation of any methods, products, tnstructioru or ideas contained 1~ the matenal herein. Although
`advertisins material ii cxpocted to conform to ethical 1tandards, ind111ion in this publication doa 1101 constitute a guarantee or endonement of the quahty or value of such product or of
`the claima made by ill manufacturer. Claims for illuca not received 1bould be made within 3 montba of publication. If not, they cannot be honoured free of charge. Claims, requesta for
`complimentary iuues and req-ts for back iuueaand/orvolll.lllCI 1bould be aent directly to the publisher or to your 111ual supplier.
`ii
`
`

`

`Mobile Networks and Applications
`
`iii
`
`

`

`Mobile Networks and Applications
`The journal of special issues on mobility of systems, users, data and computing
`
`Volume 1 (1996) No. 3
`
`Published December 1996
`
`Contents
`
`Editorial
`
`Wireless A TM - an overview
`G.A. Awater and J. Kruys
`
`Forward error control for MPEG-2 video transport in a wireless A TM LAN
`E. Ayanog/u, P. Pancha, A.R. Reibman and S. Ta/war
`
`A multiple access scheme for multimedia traffic in wireless A TM
`X. Qiu, V. O.K. Li and J.-H. Ju
`
`Mobility management in integrated wireless-A TM networks
`B. Rajagopalan
`
`A signaling and control architecture for mobility support in wireless A TM networks
`R. Yuan, S.K. Biswas, L.J. French, J. Li and D. Raychaudhuri
`Lossless handover for wireless A TM
`H. Mitts, H. Hansen, J. Immonen and S. Veikkolainen
`
`A hybrid handover protocol for local area wireless A TM networks
`C-K Toh
`A proposal of an ATM wireless access system for tetherless multimedia services
`M. Umehira, A. Hashimoto, H. Matsue and M. Nakura
`
`233
`
`235
`
`245
`
`259
`
`273
`
`287
`
`299
`
`313
`
`335
`
`iv
`
`

`

`Mobile Networks and Applications 1 (1996) 259^272
`
`259
`
`A multiple access scheme for multimedia traffic in wireless ATM
`
`Xiaoxin Qiu, Victor O.K. Li and Ji-Her Ju
`
`Communication Sciences Institute, Department of Electrical Engineering, University of Southern California,
`
`Los Angeles, CA 90089-2565, USA
`
`Abstract. This paper proposes a multiple access scheme for the forthcoming wireless ATM (Asynchronous Transfer Mode) sys-
`
`tem. Such ATM compatible wireless systems are motivated by the rapidly increasing demand for wireless extensions to broadband
`
`networks, which are expected to support mixed broadband services including Constant Bit Rate (CBR), Variable Bit Rate (VBR),
`
`and Available Bit Rate (ABR) traffic. Since these different traffics have very different performance requirements, the multiple
`
`access scheme design is very challenging. In this paper, we propose a multiple access scheme called Dynamic Time Division Multiple
`
`Access with Piggybacked Reservation (DTDMA/PR), attempting to achieve higher statistical multiplexing efficiency in the mixed
`
`VBR/CBR/ABR traffic scenario. The basic idea is to exploit two levels of reservation. The first level deals with the isochronous nat-
`
`ure of CBR and VBR traffic and the bursty nature of ABR traffic by using the ALOHA reservation procedure. The second level
`
`exploits the piggybacked reservation approach to cope with the dynamic feature of VBR traffic in order to increase the multiplexing
`
`efficiency. An analytical model is also developed in this paper and verified by simulation. Numerical examples are given to gain
`
`some insight into the protocol itself.
`
`1. Introduction
`
`When the source is active, the CBR packet is generated
`
`periodically. It can tolerate low to medium packet loss
`
`It is generally believed that the wireless system is evol-
`
`but is not very tolerable to delay and delay jitter. On the
`
`ving towards supporting a wide range of telecommunica-
`
`other hand, teleconferencing is a VBR type of service
`
`tion services, including data, voice, video, and images.
`
`with bit rates ranging from 64 Kbps to 384 Kbps. It can
`
`Such ``multimedia capable'' wireless system is motivated
`
`also tolerate packet loss but not delay and delay jitter.
`
`by the rapidly increasing demand for wireless extensions
`
`VBR traffic is also generated periodically but with cer-
`
`to future broadband networks. It is obvious that this
`
`tain dynamic characteristics. The number of packets
`
`extension will be very challenging because the band-
`
`generated in a period is a random variable instead of a
`
`width of the wireless system is much more limited than
`
`fixed number as in CBR. Finally, high-speed data with
`
`that of its wireline counterpart. But it is very important
`
`bit rates from 1 Mbps to 10 Mbps requires high transfer
`
`in the system design to provide at least qualitatively simi-
`
`rate and very low or no packet loss. But it can tolerate
`
`lar attributes even though quantitative equivalence is
`
`some delay and delay jitter [13]. The desired multiple
`
`not feasible. To be compatible with the developing ATM
`
`access scheme must provide mechanisms to deal with
`
`network, the wireless ATM concept is proposed in [13].
`
`each of these service types at reasonable QOS levels.
`
`In that paper, the possibility of supporting broadband
`
`Several multiple access schemes which attempt to
`
`services in the wireless environment is explored from the
`
`cope with the different features of ATM traffic can be
`
`architecture point of view. The same issues are also dis-
`
`found in the literature. Dynamic Time Division Multiple
`
`cussed in [3] from the system viewpoint. Wireless ATM
`
`Access (DTDMA) is discussed in [13] under the inte-
`
`is a very popular topic nowadays, stimulating much
`
`grated voice and data scenario. The frame structure is
`
`research and commercial interests.
`
`shown in Fig. 1(a). Each frame is divided into three peri-
`
`A major technical issue related to the wireless ATM
`
`ods, namely, the reservation subframe, the fixed alloca-
`
`system design which has a significant impact on the user
`
`tion subframe, and the dynamic allocation subframe. In
`
`performance, system capacity and complexity is the
`
`DTDMA, the voice user can make a reservation for a
`
`selection of the appropriate multiple access control
`
`traffic slot in the fixed allocation subframe by using the
`
`scheme. Wireless ATM is expected to support Constant
`
`ALOHA protocol at the beginning of each active period
`
`Bit Rate (CBR) traffic such as voice and CBR video,
`
`(or talkspurt) and can keep the slot until the end of its
`
`Variable Bit Rate (VBR) traffic such as teleconferencing
`
`active period. However, the data user has to make reser-
`
`and dial-up videophone, and Available Bit Rate (ABR)
`
`vations each time he has something to transmit. This
`
`traffic such as packet data, which have very different
`
`protocol is designed to provide the flexibility to accom-
`
`characteristics
`
`(bit-rate
`
`range, Quality-of-Service
`
`modate CBR and ABR traffic. VBR is not considered. A
`
`(QOS) requirement, etc.). For example, voice telephone
`
`similar protocol called TDD ALOHA-Reservation is
`
`traffic is CBR with bit rates ranging from 2.4 Kbps to 32
`
`proposed in [15] for the integration of video (VBR) and
`
`Kbps, depending on the vocoder. It is either active
`
`data (ABR) in wireless LAN. Its frame structure is
`
`(during voice talkspurt) or inactive (between talkspurts).
`
`shown in Fig. 1(b). Each frame is divided into uplink and
`
`Ä J.C. Baltzer AG, Science Publishers
`
`

`

`260
`
`X. Qiu et al. / A multiple access scheme for wireless ATM
`
`I J 111111111 ~ I_
`I
`I Reservation
`
`Minislots
`
`I I
`
`I I
`
`Fixed Allocatioo Subframe
`
`I ~~---J
`
`Subframe
`
`Movable Boundary
`
`(a) DTDMA Protocol Frame Structure
`
`Minislots Minislots
`
`Message Subframe
`
`Message Subframe
`
`Control
`Subframe
`
`Uplink
`
`Downlink
`
`(b) TDD ALOHA-Reservation Protocol Frame Structure
`
`Fig. 1. Frame structures of DTDMA and TDD ALOHA-Reservation protocols.
`
`downlink slots. At the beginning of the uplink slots,
`
`The basic reservation approach designed with CBR
`
`there are several reservation minislots and acknowledg-
`
`(e.g., voice) traffic in mind is not very suitable for VBR
`
`ment minislots for the downlink. A data user with pack-
`
`traffic. For example, how many slots should a VBR user
`
`ets to transmit has to contend for the traffic slots on a
`
`reserve in a frame? Following the same approach as for
`
`frame-by-frame basis by randomly choosing one avail-
`
`the CBR traffic, we can assign slots to the VBR user
`
`able reservation minislot to transmit its reservation
`
`according to either its peak packet arrival rate or its
`
`packet. The video user, on the other hand, will be
`
`mean packet arrival rate or some value between its peak
`
`assigned one of the reservation minislots by the base sta-
`
`and mean rates. The peak-rate assignment guarantees
`
`tion at the connection setup phase and can keep it for its
`
`the user performance but reduces the multiplexing effi-
`
`exclusive use during the lifetime of the connection to
`
`ciency, especially when the ratio of its peak rate to mean
`
`avoid collision and to cope with the dynamic nature of
`
`rate is high. On the other hand, the mean-rate assign-
`
`VBR traffic. In each frame, the video user will tell the
`
`ment increases the system capacity at the expense of per
`
`base station through the dedicated minislot how many
`
`user performance in the form of excessive packet loss if
`
`packets need to be transmitted. The traffic slots will be
`
`no other control mechanisms are applied. The problem
`
`assigned to this user on a frame-by-frame basis accord-
`
`associated with an in-between assignment is that it is
`
`ing to his requirement and the availability of resource.
`
`difficult to determine the optimal number of slots
`
`However, the authors did not discuss how to make the
`
`assigned to the user considering the dynamic nature of
`
`minislot reservations in the first place, although we can
`
`the traffic.
`
`probably assume that it is also through contention with
`
`In this paper, we propose a new multiple access
`
`other users. Of course, using dedicated minislots will
`
`scheme, called Dynamic Time Division Multiple Access
`
`cause more reservation failures for both data users and
`
`with Piggybacked Reservation (DTDMA/PR), bearing
`
`newly arriving VBR users, and therefore degrade the
`
`the above considerations in mind. We exploit the same
`
`system performance. CBR traffic is not considered in
`
`frame structure as that of DTDMA but modify the
`
`that paper. We will extend this protocol to include CBR
`
`reservation procedure in order to deal with the different
`
`traffic and compare it with our new protocol. Besides
`
`characteristics of CBR, VBR, and ABR traffic. Two
`
`these two protocols, several other protocols such as
`
`level reservations are used. In the first level, all the CBR
`
`Dynamic Reservation Multiple Access
`
`[12] and
`
`and VBR users who have just become active and ABR
`
`Distributed-Queueing Request Update Multiple Access
`
`users with packets to transmit have to contend for the
`
`(DQRUMA) [5] have also been proposed to improve the
`
`traffic slots using the ALOHA protocol in the reserva-
`
`multiplexing efficiency under the integrated traffic sce-
`
`tion subframe. At the end of this reservation period, the
`
`nario. However, they focus on integrating voice and
`
`base station will announce the assignment to winners.
`
`data. VBR traffic is not considered. To accommodate
`
`The CBR user will be assigned traffic slots according to
`
`VBR traffic, new mechanisms need to be developed.
`
`its packet arrival rate and will keep using these slots in
`
`

`

`X. Qiu et al. / A multiple access scheme for wireless ATM
`
`261
`
`each subsequent frame as long as it remains active.
`
`2. Dynamic TDMA with Piggybacked Reservation
`
`The VBR user will be assigned a certain number of traf-
`
`(DTDMA/PR) protocol
`
`fic slots (for example, equivalent to its minimum or to
`
`its mean rate) and can also keep the slots until the end
`
`In this section, we describe the DTDMA/PR proto-
`
`of
`
`its current active period. With this reservation
`
`col in detail. For simplicity, a single-cell system is consid-
`
`mechanism, the circuit switched transmission mode is
`
`ered, where the base station and the dispersed users
`
`achieved for CBR and VBR users. On the other hand,
`
`communicate through the uplink (users to base station)
`
`the ABR user will be assigned a number of slots accord-
`
`and the downlink (base station to users) channels. Time
`
`ing to his requirement and the availability of resources
`
`is divided into slots which are grouped into frames. The
`
`and he has to release them at the end of this frame. The
`
`duration of each slot is equivalent to one packet trans-
`
`second level reservation is designed to cope with the
`
`mission time. We assume that all packets have the same
`
`dynamic feature of VBR traffic. Each VBR data packet
`
`packet length. The ABR traffic is bursty. The CBR pack-
`
`has a ``piggyback field'' which can be used to make the
`
`ets are generated periodically during the active period
`
`second level reservation. If the VBR user has more
`
`according to the codec rate. We design the frame length
`
`packets to transmit
`
`in the current frame than its
`
`to coincide with this period. Groups of VBR packets are
`
`assigned slots, it will inform the base station of the
`
`also generated periodically during the active period,
`
`number of additional slots he requires in the piggyback
`
`although the number in each group is a random variable
`
`field. Upon receiving this data packet, extra slots will
`
`following a certain distribution. For the sake of simpli-
`
`be assigned to him if there are still some available after
`
`city, we assume here the periods of VBR and CBR
`
`the requirements of the newly arriving VBR, CBR and
`
`sources are the same. Using layered MPEG coder
`
`ABR traffic have been satisfied. There is no collision in
`
`instead of the standard MPEG coder, different priorities
`
`the second level reservation.
`
`can be assigned to VBR packets [11,14]. The packets
`
`The rest of this paper is organized as follows. In sec-
`
`with higher priority will always be transmitted first to
`
`tion 2, the DTDMA/PR protocol is described in detail.
`
`improve the performance.
`
`Traffic models for CBR/VBR/ABR sources are given in
`
`The uplink frame structure of DTDMA/PR is shown
`
`section 3. The analytical model for the DTDMA/PR
`
`in Fig. 2. Each frame is divided into three parts: the reser-
`
`protocol is developed under the integrated VBR/CBR
`
`vation subframe, the long-term reservable subframe,
`
`traffic scenario in section 4. Several performance meas-
`
`and the short-term reservable subframe. The reservation
`
`ures are defined in the same section. In section 5, we first
`
`subframe consists of a number of reservation minislots.
`
`study the performance of the integrated VBR/CBR sys-
`
`Slots in the long-term reservable subframe can be
`
`tem. The analytical model is verified by simulation.
`
`reserved by CBR or VBR users according to their
`
`Some numerical examples are given in order to gain
`
`requirements. Slots in the short-term reservable sub-
`
`some insight into the protocol itself. The impact of sys-
`
`frame can only be used on a frame-by-frame basis. The
`
`tem and traffic parameters on the system performance is
`
`boundary between these two subframes are movable.
`
`also investigated. Then, the performance of the inte-
`
`The unused long-term reservable slots in the current
`
`grated CBR/VBR/ABR system is simulated and com-
`
`frame can also be used for the short-term reservations.
`
`pared to the existing protocol. Finally, we conclude in
`
`We assume that the base station is powerful enough to
`
`section 6.
`
`handle the downlink traffic.
`
`Resecvation
`Minislots
`
`Long-Term Reservable Subframe
`
`Movable
`Boundary
`
`~ Short-Term
`
`Reservable
`Subframe
`
`ID
`
`No. of Slots
`Required
`
`(CBR or VBR or ABR)
`
`Fig. 2. Frame structures of DTDMA/PR protocol.
`
`No. of Extra Slots
`
`

`

`262
`
`X. Qiu et al. / A multiple access scheme for wireless ATM
`
`When a CBR (VBR) source generates a new active
`
`slots it has already been assigned, there is no packet loss.
`
`period (e.g., a new talkspurt for the voice user), it will
`
`But if it is not so, packet loss may occur. We call those
`
`randomly choose one minislot at the beginning of next
`
`packets the extra packets. Some mechanism has to be
`
`frame and transmit a reservation packet, informing the
`
`designed to handle this situation. We propose the second
`
`base station its traffic type, its Identification Number
`
`level reservation, called ``piggybacked'' reservation. We
`
`(ID), the number of slots required, etc. The active
`
`append a piggyback field to the end of each packet.
`
`ABR user will also transmit the reservation packet in a
`
`Through this field, the base station will be informed of
`
`randomly chosen minislot. At the end of the reserva-
`
`the number of additional slots a VBR user requires in the
`
`tion period, the base station will broadcast the IDs of
`
`current frame. Since only several bits are needed to carry
`
`those users who have made successful reservations, the
`
`this information, the piggyback field has negligible
`
`number of slots assigned to each of them, and the cor-
`
`impact on the packet length. According to the current
`
`responding slot positions. The reservations of VBR
`
`traffic situation, the base station will decide the number
`
`and CBR users can only be made in the long-term
`
`of extra slots assigned to the VBR user in the current
`
`reservable subframe. The ABR sources can take the
`
`frame. Those slots assigned in the piggybacked reserva-
`
`remaining slots which are not reserved by VBR and
`
`tion mode have to be released at the end of the current
`
`CBR users in the current frame. A reservation failure
`
`frame. Note that we assume here the propagation delay
`
`may be caused by either packet collisions in the reser-
`
`and the processing delay at the base station are negligi-
`
`vation period or a shortage of traffic slots. These failed
`
`ble. The VBR user finds its additional assignment imme-
`
`reservations may retry in the next frame. The CBR or
`
`diately through monitoring the downlink channel. This
`
`VBR user who makes the reservation successfully may
`
`assumption makes sense in the micro- or pico-cellular
`
`keep using the assigned slots until the end of its current
`
`environment where the distance between the base station
`
`active period. Afterwards, the slots will be released to
`
`and the user is relatively small. Our performance model
`
`the base station. The ABR user has to release the slots
`
`can be generalized to take the impact of those delays into
`
`after its current transmission. We assume that both the
`
`account.
`
`VBR and the CBR traffic are delay-sensitive and need
`
`It should be noted that to make DTDMA/PR work,
`
`immediate delivery. The packet has to be discarded if
`
`slot reordering and reassignment needs to be implemen-
`
`its delay exceeds a certain limit. Because this packet
`
`ted in order to keep all the unused slots at the end of each
`
`dropping causes performance degradation, it should be
`
`frame. For example, as illustrated in Fig. 3, as CBR user
`
`limited. On the other hand, the ABR traffic is delay-
`
`3 (occupying slot 3 in this example) leaves the system in
`
`insensitive. The ABR packet can be stored in the buffer
`
`frame i at the end of his current ON period, the base sta-
`
`until being successfully transmitted. Note that we
`
`tion will be informed through a special bit pattern in the
`
`assume here all the reservation failures are caused by
`
`last packet of user 3. After the reservation period of
`
`reservation packet collisions or the shortage of traffic
`
`frame i
`
`1, the base station will assign a new user to that
`

`
`slots. No channel errors are considered. A suitable
`
`newly available slot, or if there is no new users, move the
`
`extension can be made to take the channel
`
`impair-
`
`user currently occupying slot 4 to slot 3. This reordering
`
`ments into account.
`
`and reassignment technique has also been used in
`
`The reservation through the minislot is the first level
`
`Dynamic Channel Assignment (DCA) in TDMA cellu-
`
`reservation which deals with the isochronous nature of
`
`lar systems. See [1,6,16].
`
`CBR and VBR sources and the bursty nature of ABR
`
`sources. It is sufficient for the CBR user since the number
`
`of packets generated in each frame is fixed. However, the
`
`3. Traffic models of CBR/VBR/ABR sources
`
`number of packets generated in each frame by a VBR
`
`source is a random variable. If the number of packets
`
`As the first step towards developing the analytical
`
`generated in the current frame is within the number of
`
`model for DTDMA/PR, we establish the models for
`
`- - occupied - -
`
`, ,
`
`I
`
`11111111 . . . T'i
`
`frame i
`
`I I
`
`I frame i+l
`
`Fig. 3. Illustration of slot recordering and reassignment.
`
`

`

`X. Qiu et al. / A multiple access scheme for wireless ATM
`
`263
`
`traffic sources first. We assume that CBR or VBR traffic
`
`3.2. Traffic model of VBR source
`
`consists of alternating ON (or ACTIVE) and OFF (or
`
`SILENCE) periods. The lengths of ON and OFF periods
`
`ON-OFF sources have been successfully used to
`
`are assumed to be exponentially distributed with average
`
`characterize VBR traffic [4,7]. Taking the teleconferen-
`
`c
`durations t
`
`and t
`
`o
`
`c
`
`s
`
`for CBR sources and tv
`
`and tv
`
`for
`
`cing-type of traffic as an example, there are two typical
`
`o
`
`s
`
`VBR sources. Denote the frame duration as T .
`
`kinds of scenes, the active one and the inactive one [10].
`
`The system can be designed so that when it is inactive, no
`
`3.1. Traffic model of CBR source
`
`packet is generated, which corresponds to the OFF per-
`
`iod. When the user is active, the number of packets gen-
`
`We follow the traffic model developed in [9]. In
`
`erated in each frame is a variable, which distinguishes it
`
`DTDMA/PR protocol, an active CBR user may be in
`
`from the CBR source. This variable can be described by
`
`one of three states, namely, the Silence State (SS), the
`
`its probability distribution function, denoted as
`
`Reservation State (RS), and the Contention State (CS).
`
`Qv
`
`ˆ f
`
`qv
`1 ;
`
`qv
`2; ;
`
`qv
`pv
`
`g
`
`, where qv
`
`i
`
`is the probability of gen-
`
`The RS and CS states belong to the ON period. When
`
`erating i packets in a frame. The maximum number of
`
`the user has nothing to transmit, it is in the silence state.
`
`packets generated by a VBR source in each frame is
`
`When the user generates a new ON period and has not
`
`denoted as pv . It is assumed that there is at least one
`
`made a reservation yet, it leaves the silence state and
`
`packet generated in each frame when the user is active.
`
`enters the contention state. When it contends success-
`
`The VBR user can be in the silence state, the reservation
`
`fully and obtains a reservation, this user will enter the
`
`state, or the contention state. Fig. 4(b) illustrates the
`
`reservation state. Fig. 4(a) illustrates the transitions
`
`transitions among SS, RS, CS states. In this figure, qv
`
`is
`
`s
`
`among these three states. In this figure, q
`
`c
`
`s
`
`is the prob-
`
`the probability that an ON period of VBR source ends in
`
`ability that an ON period of CBR source ends in a frame;
`
`a frame; qv
`
`a
`
`is the probability that an ON period of VBR
`
`c
`
`q
`
`a
`
`is the probability that an ON period of CBR source is
`
`source is generated in a frame; and Pv
`
`is the probability
`
`CR
`
`generated in a frame; and P
`
`c
`
`CR
`
`is the probability that a
`
`that a VBR source obtains a reservation in the current
`
`CBR source obtains a reservation in the current frame.
`
`frame. We assume here the probability that a VBR user
`
`We assume here the probability that a CBR user returns
`
`returns to the silence state before it obtains a reservation
`
`to the silence state before it obtains a reservation is zero.
`
`is zero. Then,
`
`Then,
`
`c
`
`q
`
`a
`
`1
`
`exp
`
`T
`

`
`ÿ
`
`…ÿ
`
`c
`t
`

`
`s
`
`=
`
`and q
`
`c
`
`s
`
`1
`

`
`ÿ
`
`exp
`T
`…ÿ
`
`c
`
`t
`

`
`o
`
`=
`
`1
`

`

`
`qv
`
`a
`
`1
`

`
`ÿ
`
`exp
`…ÿ
`
`T
`
`tv
`
`s
`
`=
`

`
`and qv
`
`s
`
`1
`
`exp
`
`T
`

`
`ÿ
`
`…ÿ
`
`tv
`
`o
`
`=
`

`
`2
`

`

`
`and Pv
`
`CR
`
`also depends on the system parameters. Note
`
`and P
`
`c
`
`CR
`
`depends on the system parameters.
`
`that more sophisticated source model can be used to
`
`·· ...
`
`·••·· .. ~ /\·--... ....
`
`p~
`
`ss
`
`qc
`a
`
`'•·· ...
`
`ON
`
`p•
`CR
`
`•,
`
`··• ...
`
`...
`
`(a) Traffic Model for CBR Source
`
`(b) Traffic Model for VBR Source
`
`Po
`
`Psucc
`
`(c) Traffic Model for ABR Source
`
`Fig. 4. CBR, VBR, and ABR traffic models.
`
`

`

`264
`
`X. Qiu et al. / A multiple access scheme for wireless ATM
`
`describe the VBR traffic. However, no matter what
`
`Simplification. We observe that the CBR (or VBR) user
`
`source model is exploited, the mechanism of DTDMA/
`
`leaving or entering the silence state only depends on
`
`PR remains unchanged.
`
`whether a new ON period is generated or the current one
`
`3.3. Traffic model of ABR source
`
`CBR and VBR) are contending or how many other users
`
`is ended. It does not depend on how many users (both
`
`are in the silence state [8]. Therefore, we can split the
`
`Each ABR user is either in the thinking state (TH) or
`
`four-dimensional Markov chain into three sub-pro-
`
`the backlogged state (BK). When there is no packet gen-
`
`cesses: the active-silence process of CBR, the active-
`
`erated, the user is in the TH state. With a packet gener-
`
`silence process of VBR, and the reservation process
`
`ated, the user enters the BK state immediately and no
`
`which depends on the status of both VBR and CBR
`
`new packet can be generated until the current one has
`
`sources.
`
`been successfully transmitted. The state transitions of
`
`The active-silence process of CBR sources, whose
`
`ABR sources are illustrated in Fig. 4(c), where p
`0
`
`is
`
`state variable is N
`
`c
`
`s
`
`, describes the above transition of
`
`defined as the packet generation rate of ABR users in
`
`CBR users' entering and leaving the silence state. It
`
`terms of packets/frame/ABR user and p
`
`is the trans-
`
`evolves independently of the individual values of N
`
`c
`
`, N
`
`c
`
`,
`
`succ
`
`r
`
`c
`
`mission success probability.
`
`N v
`
`, N v
`
`, and also of N v
`
`r
`
`c
`
`s
`
`. We denote its stationary distribu-
`
`tion as …
`
`c
`
`s
`
`;
`
`† :
`
`c
`
`c
`
`c
`
`c
`
`4. Analytical model for DTDMA/PR
`
`s
`
`…
`
`;
`

`
`
`ˆ …
`
`n
`
`s
`
`
`
`
`
`P
`
`N
`
`†g
`

`

`

`
`s
`
`
`
`n
`

`
`s
`
`:
`
`Similarly, the active-silence process of VBR sources with
`
`For the sake of simplicity, we will concentrate on the
`
`state variable N v
`
`s
`
`can be modeled in the same way. Its sta-
`
`integrated CBR and VBR traffic scenario when we
`
`tionary distribution can be denoted as …
`
`s
`
`;v† :
`
`develop the analytical model in this paper. It is straight-
`
`forward to extend it to the integrated CBR, VBR and
`
`s
`
`;v†
`
`…
`
`
`ˆ …
`
`nv
`
`s
`
`
`
`
`
`P
`
`†g
`

`

`
`N v
`
`s
`

`
`
`
`nv
`
`s
`

`
`:
`
`ABR traffic case but with higher computational com-
`
`On the other hand, the reservation process models
`
`plexity. Therefore, a simulation model will be used to
`
`the reservation or transmission status of the system. It is
`
`obtain the numerical results when we investigate the per-
`
`formance of the integrated VBR/CBR/ABR system.
`
`Denote the total number of traffic slots per frame as
`
`N , the number of long-term reservable slots as N
`
`, the
`
`l
`
`a two-dimensional process whose state variables are
`
`c
`
`N
`
`, N v
`
`f
`
`g
`
`r
`
`r
`
`. Its evolvement depends on the values of both
`
`N
`
`N
`
`c
`
`s
`
`c
`
`s
`
`and N v
`
`s
`
`. Although not completely true with varying
`
`and N v
`
`s
`
`, the stationary distribution of this process is
`
`number of short-term reservab

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket