Vous êtes sur la page 1sur 12

See

discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/280940271

Performance evaluation of voice-data integrated


traffic in IEEE 802.11 and IEEE 802.16e WLAN

Article in WSEAS Transactions on Communications · July 2013

CITATIONS READS

4 48

3 authors, including:

Anupam Roy Md. Ruhul Amin


University of New Brunswick East West University (Bangladesh)
4 PUBLICATIONS 18 CITATIONS 140 PUBLICATIONS 578 CITATIONS

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Optimum DRX Mechanism of LTE View project

Cognitive Radio View project

All content following this page was uploaded by Md. Ruhul Amin on 18 September 2015.

The user has requested enhancement of the downloaded file.


International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012

Performance Evaluation of Voice-Data Integrated


Traffic in IEEE 802.11 and IEEE 802.16e WLAN

Anupam Roy, Md. Imdadul Islam M. R. Amin, Member, IEEE


Department of Computer Science and Engineering Department of Electronics and Communications
Jahangirnagar University Engineering, East West University, Mohakhali,
Savar, Dhaka 1342, Bangladesh Dhaka 1212, Bangladesh
anupamroy132@gmail.com, imdad@juniv.edy ramin@ewubd.edu

Abstract—With the advent of 4G mobile communication system these are [1-3]: PH Markov renewal process (PH-MRP),
the traffic of wired and wireless network becomes voice/video- Markov Modulated Poisson Process (MMPP) and Batch
data integrated service. In this paper traffic model of Markov Markovian Arrival Process (BMAP). In this paper we adopt
Modulated Poisson Process (MMPP) is applied for bursty traffic
of Wireless LAN (WLAN), especially in IEEE 802.11 WLAN,
MMPP model in the analysis of bursty traffic of voice.
known as WiFi, and IEEE 802.16e WLAN is known as WiMAX. Voice-data integrated traffic is widely used in both wired
Traffic of both networks is heavily affected by the fading of and wireless networks. The traffic of packet switching
wireless channel. The traffic parameters of IEEE 802.11 WLAN network is bursty in nature. Hence they are analyzed based on
are evaluated using Giuseppe Bianchi state transition chain. The MMPP. Again in M/D/1/K model (suitable for ATM traffic),
profile of probability of idle condition, the probability of one the probability density function (pdf) of arrival of packet is
successful transmission and the probability of collision is shown
against the number of users. The packet blocking probability and
exponential but that of service time is deterministic, where K
throughput of WLAN are observed varying packet arrival rate. is the length of queue. Therefore, the combination of MMPP
In this paper, a mathematical model of VoIP traffic over wireless and traffic of deterministic service time can be used to support
channel under IEEE 802.16e WLAN is also analyzed under voice/video- data integrated traffic. In wired communication,
Rayleigh and Nakagami-m fading cases with the help of MMPP simple ON-OFF traffic model of [4] can be used quite
and discrete time Markov chain (DTMC) model. Finally, mean comfortably to evaluate performance of such networks since
delay of both wired and wireless LAN are compared.
wired network is not affected by any type of fading [5-6] like
Keywords—Voice-data integrated service, MMPP, DTMC, wireless network.
Rayleighfading, Nakagami-m fading, VoIP . In case of wireless networks, the traffic performance is
evaluated incorporating small scale fading of wireless channel.
I. INTRODUCTION Small scale fading or simply fading takes place in wireless
To cope with the constant growth of user demand, service of a environment where multi-path propagation occurs due to
unguided nature of the channel. Fading is the rapid
voice-data network is growing rapidly. To combat network
fluctuations of the amplitudes, phases or multi-path delays of a
congestion, limited number of available resource must be
allocated among users in an optimum way. Traffic is the flow radio signal over a short period of time or travel distance. In
this paper we consider Rayleigh and Nakagami-m fading [7-8]
of information/messages through a communication system.
in both IEEE 802.11 and IEEE 802.16 standard networks.
The simplest way of evaluating the performance of a network
IEEE 802.11 standard (known as WiFi) is widely used as
is the use of state transition chain of birth-death process called
wireless local area network. Recent literatures find the
Markov chain. One of the major drawbacks of Markov chain
lies in the incorporation of large number of probability states performance of such networks using state transition diagram
of Back off window. Such an analysis is found in [9-11]. In all
which complicates the analysis of the traffic parameters of a
of the papers, the state transition chain is solved to determine
network. Markov arrival process (MAP) provides equivalent
state transition chain of few probability states with some the probability of one successful transmission, probability of
collision and packet transmission probability. The papers show
assumption. MAP can be defined as a process ( N (t ), J (t ) ) for
the profile of packet delay and throughput against utilization
t ≥ 0 on the state space { (i, j ); i ≥ 0, 1 ≤ j ≤ m }, where N (t ) is factor of a channel.
a counting process of “arrivals”, indicates the number of With the development of 3G mobile communication system
arrival in (0, t ] and J (t ) is a Markov process with a finite state and beyond, Voice over Internet Protocol (VoIP) gets
space, 1 ≤ j (t ) ≤ n of the underlying Markov Chain. Teletraffic importance over wireless channel. The different protocols are
found for VoIP services over fading channels. In [11], the
engineering adopts three most widely used cases of MAP and
authors proposed the session initiated protocol (SIP); where
International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012
seven sessions were included to set up a transmission control
protocol (TCP) connection. The condition of the channel is Two-Dimensional Markov Chain of Giuseppe Bianchi
modeled using 2-state Markov Chain. Finally, the authors
For simplicity of analysis, let us consider the two-dimensional
show the profile of session set up delay against frame error Markov chain of Giuseppe Bianchi, where any state
rate.
{ x(t ), y (t ) } is defined as: y (t ) be the size of the Backoff
Initially IEEE 802.16 standard was developed to support
high speed data communication over wireless channel based window and x(t ) be the backoff stage of the station at time t.
on MAC protocol. The standard is now upgraded to IEEE Figure 1 shows the state transition chain of the Backoff
802.16e to support mobile wireless service. The performance algorithm.
of an uplink VoIP system is proposed in [12] using two-
dimensional Discrete Time Markov Chain (DTMC). In that
paper the authors derived a steady state transition matrix from
the two-dimensional DTMC. Finally, packet dropping
probability is evaluated against the number of users. Similar
analysis is also found in [13]. In [14] and [15], performance of
both uplink and downlink of IEEE 802.16e are analyzed using
different MCS (Modulation and Coding Schemes) levels.
The paper is organized as follows: Sec. II provides the
complete analysis of IEEE 802.11 traffic under Binary Backoff
algorithm, Sec. III derives the VoIP traffic parameters using
IEEE 802.16e mode under wireless fading condition, while
Sec. IV provides the results pertinent to Sec. II and Sec. III.
Finally, Sec. V concludes the entire analysis.

II. IEEE 802.11 TRAFFIC


The traffic parameters of IEEE 802.11 WLAN are evaluated
using Giuseppe Bianchi state transition chain under Binary
Backoff algorithm [16]. In this section the Binary Backoff
algorithm and the corresponding traffic parameters are derived
based on the two-dimensional Markov chain of Giuseppe Fig. 1 Two dimensional Markov chain of backoff algorithm.
Bianchi’s model shown in [16] and [17].
Solving the linear equations from nodes and application of
Binary Backoff algorithm
normalization technique we get [9]:
To reduce the packet dropping probability or to enhance
throughput of wireless LAN, exponential binary backoff 2(1 − 2 p )(1 − p )
algorithm is widely used. The access method of MAC protocol P00 = , (1)
(1 − 2 p )(W + 1) + pW (1 − (2 p ) m )
of IEEE 802.11 based on exponential binary backoff algorithm
can be explained with the following steps. where p is the probability that, in a time slot at least one of the
Step 1: The transmitting node first senses the status of the N-1 remaining stations transmits, the Backoff stage of the
channel. If the channel is found busy then the Tx node station at time t may be (0, 1, 2, …m) and W is the minimum
continues to monitor the channel. size of Backoff window. The probability that a transmission
Step 2: If the channel is found idle for a fixed duration known occurs when the Backoff window is equal to zero, regardless
as DIFS (Distributed Inter-frame Space), the Tx chooses a of the Backoff stage, is found as
random number according to the binary exponential back off m P 2(1 − 2 p)
algorithm. The random number is used as a back off timer.
τ= ∑ P j,0 = 1 −00p = , (2)
j =0 (1 − 2 p)(W + 1) + pW (1 − (2 p) m )
Step 3: Time immediately after the DIFS is slotted known as
idle slots, where the duration of a slot is considered as the sum where
of the time required to sense a station and to switch the Tx p = 1 − (1 − τ ) N −1 . (3)
from sensing / listening mode to transmitting mode. For traffic analysis of IEEE 802.11 we need three important
Step 4: Elapsing of each idle slot the back off timer is parameters: Pi, the probability that a channel found idle, Ps,
decreased by one. If the channel is found busy before the back the probability of successful transmission and Pc, the
off timer reaches to zero then repeat the steps 1 to 3. The probability of collision, i.e., when two more users transmit
transmission of data begins only if the back off timer reaches messages simultaneously.
to zero.
International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012
Now, the probability of idle condition, one successful of successful transmission and Pc (the probability of collision).
transmission and probability of collision are given respectively In [10], authors determined throughput of IEEE 802.11 MAC,
by Pi = (1 − τ ) N , Ps = Nτ (1 − τ ) N −1 and Pc = 1 − Ps − Pi . To based on a MMPP/G/1/m queuing model. A DTMC is also
proposed to determine the probability states. The probability
solve the probability τ let us define a function
states are evaluated like [28] as follows:
2(1 − 2 p )
f (τ ) = −τ ,
(1 − 2 p )(W + 1) + pW (1 − (2 p ) m )
(4)
{ }
x 0 = γ T π 0 (Λ − Q )−1 E [T B ] −1 , (8)
where the zero crossing point of above function gives the  n −1 
value of τ . xn = γ T π n + ∑ π k U n −1− k (U − I )(Λ − Q )−1 E[TB ]−1; (9)
 k =0 
Six functions are plotted in Fig. 2 taking M = 5, W = 32, N
= 20, 25, 30, 35, 40 and 45. The zero crossing points are where n = 1, 2, … … …, m-1, and
m −1
0.0265, 0.0235, 0.0205, 0.0195, 0.0175, 0.0165 found from
Fig. 2.
xm = θ − ∑ xn . (10)
n=0
0.08
The matrices Λ and Q are given in [2] and the parameter γ is
0.06 given by
E[T B ]
0.04
γ = ,
E[T B ] + θ 0 (Λ − Q )−1 e
0.02 where E[TB] is the mean values of size of packets and θ is the
f(Tau)

steady-state probability vector. All the above parameters along


0
with the packet waiting time W and throughput S are found in
0.02
[10, 15, 19]. In particular, W and S are given respectively by
K
0.04
( )
λ (1 − PB )W = ∑ kX k e and S = λ (1 − PB ) 1 − Pcm +1 . (11)
k =0
0.06
0 0.01 0.02 0.03 0.04 0.05 0.06
Tau
N=20 III. VOIP AND TRAFFIC USING IEEE 802.16E MODEL
N=25
N=30 The main objective of wireless communication is to provide
N=35
N=40 high data rate with guaranteed quality of service (QoS). The
N=45 throughput prediction for Mobile WiMAX is done based on
Fig. 2 Profile of function f (τ ) . IEEE Std 802.16-2009. With the advent of OFDMA based
IEEE 802.16e, research is now going on to implement VoIP
Throughput and Delay of Packet Traffic service with adaptive modulation and channel coding scheme.
To enhance the throughput of the wireless system the
To evaluate the mean delay of packet and throughput, let us modulation and coding scheme of the transmitter is changed
consider a 2-state MMPP mode as [18]: according to the fading condition of the channel. Such
− r r1  λ1 0  r2λ1 + r1λ2 dynamic modulation and coding scheme is called MCS
Q= 1 , Λ= , λ =
r − r 0 λ r1 + r2 (Modulation Coding Scheme). Therefore, the service becomes
 2 2  2
a variable bit rate service where the bit rate depends on the
and
fading of the wireless channel. VoIP traffic over wireless
U = (Λ − Q )−1 Λ . (5) channel requires the same QoS as the constant bit rate service
The steady probability state is given by of wired network.
1 dj To resolve the situation mentioned above, many packet
π j = Lt z → 0 j b*[λ (1 − z )] , (6) scheduling algorithms are proposed [20, 21]. Recent literature
j! dz
shows the VoIP traffic model based on the combination of
where b*(x) is the pdf of service time.
two-dimensional DTMC and MMPP. Such model is applicable
The steady state probability vector is then by using Eq. (6):
for wireless VoIP services, cognitive radio system and IEEE
θ = [π 0 π1 π 2 ... π k −1] . (7)
802.16 OFDMA/WiMax traffic. The traffic models of above
Let E[TB] = 0.2 ms, which is the mean service time at the services are depicted in [22, 23]. The on-off traffic model of
MAC layer. VoIP considering exponential distribution of mean value of on
In [11], authors deal with IEEE 802.11 MAC protocol of and off periods are summarized in [19, 22]. The voice traffic
WLAN to estimate the traffic parameters using three of exponentially distributed on-off system is also analyzed
probability states: Pi (probability of idle state) Ps (probability using one-dimensional Markov chain of limited user traffic
International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012
model in [20] the chain is extended with incorporation of 1, if ( X b + ∆) ∈ψ b + 1
queue in [21]. The four transition rates and formation of Im (X b ) = 
transition rate matrix and arrival rate matrix of MMPP are 0, otherwise .
explained in [2]. The down link packet scheduling technique The complete explanation of the above parameters is available
of VoIP (using MMPP and probability of using MCSs levels) in [15, 24].
is analyzed in [24], the similar job is enhanced for both up and
down link in [15]. The MCSs levels are shown in tabular form 0.1

in [25, 26] with derivation of probability of choosing a


particular MCS level.
0.01

Symbol error probability (Ps)


A. IEEE 802.16e Based on MCS Level
The probability of a VoIP packet being modulated with mth 1 .10
3

MCS level in the uplink is expressed as


γ m +1
Pm = ∫ Pγ (γ ) dγ , (12) 1 .10
4

γm
where Pγ (γ ) is the pdf of fading. For Nakamagi-m fading,
5
1 .10
m f −1 −m f γ 0 2 4 6 8 10
mf
1 mf γ Average SNR (dB)

Pγ (γ ) = e γ av . (13) QPSK Rayleigh Fading


( )
Γ mf m
γ avf
8-PSK Nakagami-m fading
16-QAM Rayleigh fading

where m f is the Nakagami fading parameter, γ av is the


Fig. 3 SER under fading condition.
average SNR and γ m is the minimum SNR that can support
MCS level m. Let us now consider an Algorithm for determination of
In this paper we consider a different approach. Let us the index probability I m ( X b ) :
calculate the symbol error rate Ps using the relation 1. Select M, a positive integers (positive no of MCS
γ m +1
level) and b = 1 as the minimum value.
Ps (γ m ) = ∫ Pγ (γ ) Q(a, b) dγ , (14) 2. Select the vector,
γm
X b = ( x1 , x 2 , x 3 , L , x M ) ;
where Q(a, b) is Gaussian Q-function and the parameters a
X b ∈ {positive integer} such that
and b are selected according to the particular modulation
M
scheme. Considering Rayleigh fading and γ av =12dB, the
probability of symbol error rate of QPSK, 16-QAM and 64-
X b ∈ {positive integer} such that ∑ xi = b.
i =1
QAM are found as in Fig. 3. If the threshold symbol error rate M M
(SER) is 0.01, then the minimum SNR ( γ m ) that can be 3. If ∑ xi l i ≤ N slot ,u and ∑ xi li + l j ≤ N slot ,u ,
supported by QPSK, 16-QAM and 64-QAM are 3, 8 and 11dB i =1 i =1

respectively. If γ m falls 2dB below the threshold value of a then I j ( X b ) = 0 else I j ( X b ) = 1 .


particular modulation scheme, then coding rate will be 4. Repeat steps 1 and 2 for j = 1, 2… M.
increased by 2 times. 5. Set b = b+1 and repeat steps 2 to 4 to evaluate all
If a base station (BS) is scheduling b VoIP packets from possible I j ( X b +1 ) .
uplink queue then its probability is expressed as Now the transition matrix of the uplink queue is
Psu (b) = Pr{X b ∈ψ b and X b +1 ∉ψ b +1 }  p 0, 0 p 0,1 L p 0, K u 
 M p xm    p p1,1 L p1, K u 
M 
P=
1,0
= ∑  b ! ∏ m  1 − ∑ p m I m ( X b )  ,  L
. (16)
   L L L 
∀ X b ∈ ψ b  m =1 x m !   m =1   
(15)  p K u ,0 p K u ,1 L p K u , K u 
where b is the maximum number of packets in the uplink Elements of the matrix P is expressed as
schedule within the range of the bandwidth, ψ b is the possible b2

set of scheduling for successful transmission, X b is a member


p i, j = ∑ UD( j − max(i − b, 0)PSu (b) , (17)
b =b1
of ψ b and the index probability I m ( X b ) is given by
International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012
where U = (Λ − R )−1 Λ, and D is the diagonal probability Here we consider the voice traffic is exponentially
distributed with mean On time of 1 / λ and mean Off time of
matrix and is given by
1 / µ . Let the capacity of the link is m and the number of user
 λ T e −λ1T f / k!
( ) 0 
D(k ) =  ,
1 f is N. The capacity of the link is expressed as [21]:

 0 λ (T
2 f e )
− λ2T f / k! 

T
m = GI
S TOT
, (19)
Tf is the duration of a frame, R and Λ are the transition rate TMF S scheduler
matrix and arrival rate matrix of MMPP respectively. where, TGI is the time separation between two frames during
The steady probability vector π can be found from, talk-spurt, TMF is the duration of the frame, S TOT is the total
π.P = π and π.1 = 1 . (18)
number of time slots in the frame and S scheduler is the average
Two numerical examples of this section are given in Sec. IV.
number of time slots required during grand interval.
Taking the length of queue k, we derive the initial state P0 ,
B. IEEE 802.16 e/m using AMR Speech Coding
probability of entering queue Q(a, N , m, k ), blocking
In VoIP traffic, there is always a tradeoff between efficient
probability B(a, N , m, k ), and the steady probability states.
utilization of radio resources and QoS. In IEEE 802.16e
model, different algorithms are prevalent for scheduling of The initial state probability is
resources to support in talk–spurt and silence period of a user, 1
P0 = . (20)
as summarized in [20]. In [21], a VoIP scheduling algorithm is y
a
proposed to enhance the performance of a WLAN. According m N  
N m N m
to the algorithm, the BS allocates small bandwidth as a grand ∑ x 
 a x
+ ( N − m)! m  ∑ ( N − m − y + 2)!
  a
in a random access manner instead of periodically allocated x =0    y =1
grand. The random access scheme continued till the instant of
change of silent to talk-spurt state. Once the state of the user is
talk-spurt, the BS grants wide band in periodic manner as
shown in Fig. 4 and the corresponding scheduling can be
modeled by a one-dimensional Markov chain of Fig. 5.

Silent Period (off) Talk spurt (on) Silent Period

Polling
Grant Random access
Size Random access

Time
160 msec 20 msec

BRUSC header Grant Size Wasted Resource

Fig. 4 VoIP scheduling algorithm of [25].

Nλ (N-1)λ (N-m+1)λ (N-m)λ

... ...
1 2 m-1 m m+1 k
0 ...
...
... ...
µ 2µ mµ mµ

Fig. 5 Markov chain of VoIP users for on-off system


International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012
The probability of entering queue and the blocking probability
are given respectively by 0.6
The probability of idle condition Pi
y
k( N − m) !  N   a  0.55 The probability of one /successful transmission Ps
Q(a, N , m, k ) = ∑     P0 a m , (21) The probability of collision Pc
y =1 ( N − m − k ) !  m  m 0.5

and 0.45
y
( N − m) !  N   a 
B(a, N , m, k ) =     P0 a m . (22) 0.4
( N − m − k ) !  m   m 

P i, P c, P s
0.35
Steady probability states are given by the following formula,
 m N 0.3
 P0 ∑   a x , 0 ≤ x ≤ m;
 x = 0  x 0.25
Px = 
P  N  ( N − m) ! a m
N (a / m) x

 m
0  ∑ , m < x ≤ N. 0.2

 x =1 ( N − m − x + 2) ! 0.15
(23)
0.1
The average access delay is expressed as 20 30 40 50 60 70 80 90 100
∞ Number of users N
D = TMF × ∑ k × p N [k ≤ m] × p N [k > m]k −1 . (24)
k =1
Fig. 7 Variation of Pi, Pc and Ps against the number of users.

0
10
0.7
The probability of idle condition Pi
The probability of one /successful transmission Ps
0.6 The probability of collision Pc
-1
10
0.5

-2
0.4 10
Pi, Pc, Ps

PB, S

0.3
-3
10
0.2

0.1 -4
10

0 Blocking Probability
20 25 30 35 40 45
Number of users N Throughput
-5
10
0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
Fig. 6 Variation of Pi, Pc and Ps against the number of users.
Lambda(Packets/ms)

Fig. 8 variation of PB and S against packet arrival rate IEEE


802.11.
IV. RESULTS AND DISCUSSIONS
First of all let us concentrate on Backoff algorithm of
IEEE 802.11. Taking the number of users, N = 20, 25, 30, 35, Figure 7 reveals that the probability of collision Pc and the
40 and 45 and we get τ = 0.0265 0.0235 0.0205 0.0195 probability of successful transmission Ps increase with the
0.0175 and 0.0165. The probability of idle condition Pi, the number of users but the probability of idle condition Pi
probability of one successful transmission Ps, and the decreases with the number of users. For N ≥ 80 both Pi and Ps
probability of collision Pc are plotted against the number of are almost constant but Pc is still in rising condition.
users N in Fig. 6. The number of collisions increases with the number of users
The variation of the parameters are not so rapid hence to which combat any increment of throughput of the network.
observe the distinct variations we vary the number of users Similar explanation will also be found from Fig. 8.
widely and these curves are again plotted in Fig. 7. For both Taking the maximum Backoff stage m = 5, the minimum
Fig. 6 and Fig. 7, we take the maximum Backoff stage m = 5, contention window W = 32, number of users N = 40 and using
the minimum contention window W = 32. the expression of packet blocking probability PB and
throughput S of Eq. (11), we get the graph of Fig. 8. Both
International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012
parameters are plotted against arrival rate of packet. Both the M
blocking probability and the throughput increase with the ∑ x m l m = (0 × 36) + (0 × 24) + (3 ×12) + (1× 6) + (1× 4)
arrival rate of the packets. Initially, the rate of increment of m =1
throughput is rapid but the rate decreases for larger packet + (2 × 3) + (3 × 2) = 58 ≤ N slot ,u .
arrival rate, and finally the throughput becomes constant. The
above observation can be explained with the phenomenon of Table I: Evaluation of function I j ( X b )
collisions of packets at higher arrival rate.
b Xb I j ≡ I j (X b )
10
X 1 = (1,0,0,0) I1 = I 2 = 0, I 3 = I 4 = 1
X 1 = (0,1,0,0) I1 = 0, I 2 = I 3 = I 4 = 0
Blocking Probability/Throughput

1 b =1
X 1 = (0,0,1,0) I1 = I 2 = I 3 = I 4 = 1
X 1 = (0,0,0,1) I1 = I 2 = I 3 = I 4 = 1
0.1
X 2 = (1,0,1,0) I1 = I 2 = I 3 = I 4 = 0
b=2 X 2 = (1,0,0,1) I1 = I 2 = I 3 = 0, I 4 = 1
0.01
X 2 = (0,1,1,0) I1 = I 2 = 0, I 3 = I 4 = 1
3
1 .10 X 2 = (0,1,0,1) I1 = I 2 = 0, I 3 = I 4 = 1
X 2 = (0,0,1,1) I1 = 0, I 2 = I 3 = I 4 = 1
4
1 .10 X 2 = (0,0,0,2) I1 = I 2 = I 3 = I 4 = 1
0.2 0.4 0.6 0.8
Utilization factor a (erls) X 3 = (1,0,0,2) I1 = I 2 = I 3 = I 4 = 0
Blocking Pr X 3 = (0,1,1,1) I1 = I 2 = I 3 = 0, I 4 = 1
Throughput X 3 = (0,1,0,2) I1 = I 2 = 0, I 3 = I 4 = 1
b=3
Fig. 9 variation of PB and S against packet arrival rate of IEEE
X 3 = (0,0,1,2) I1 = 0, I 2 = I 3 = I 4 = 1
802.16e/m.
X 3 = (0,0,0,3) I1 = 0, I 2 = I 3 = I 4 = 1
Similar profile is also found for IEEE 802.16 e/m using X 4 = (0,1,0,3) I1 = I 2 = I 3 = 0, I 4 = 1
AMR Speech Coding case as shown in Fig. 9, where we have X 4 = (0,1,1,2) I1 = I 2 = I 3 = I 4 = 0
taken N = 20, K = 12 and m = 6.
For the case of IEEE 802.16e, let us consider an example, X 4 = (0,0,1,3) I1 = I 2 = 0, I 3 = I 4 = 1
where the types of MCS level, M = 7, and the number of X 4 = (0,0,2,2) I1 = I 2 = 0, I 3 = I 4 = 1
available slots, Nslot, u = 60. Therefore, X 4 = (0,0,3,1) I1 = I 2 = I 3 = 0, I 4 = 1
X b = ( x1 , x 2 , x 3 , x 4 , x5 , x 6 , x 7 ) , b=4
X 4 = (0,0,4,0) I1 = I 2 = I 3 = I 4 = 0
where
X 4 = (0,0,0,4) I1 = 0, I 2 = I 3 = I 4 = 1
M =7
b= ∑ xi = 10 X 4 = (0,1,0,3) I1 = I 2 = I 3 = 0, I 4 = 1
i =1 X 5 = (0,1,0,4) I1 = I 2 = I 3 = I 4 = 0
and xi is the number of packets of ith MCS level. X 5 = (0,0,1,4) I1 = I 2 = 0, I 3 = I 4 = 1
b=5 X 5 = (0,0,2,3) I1 = I 2 = I 3 = 0, I 4 = 1
Now, let us consider b = 10 packets with MCS distribution
of X 5 = (0,0,3,2) I1 = I 2 = I 3 = I 4 = 0
X b = (0, 0, 3, 1, 1, 2, 3) . X 5 = (0,0,0,5) I1 = I 2 = 0, I 3 = I 4 = 1
Therefore, X 6 = (0,0,1,5) I1 = I 2 = I 3 = I 4 = 0
M =7 X 6 = (0,0,2,4) I1 = I 2 = I 3 = I 4 = 0
b= ∑ xi = 0 + 0 + 3 + 1 + 1 + 2 + 3 = 10 . b=6
X 6 = (0,0,0,6) I1 = I 2 = 0, I 3 = I 4 = 1
i =1
We know, l1 = 36, l2 = 24, l3 = 12, l4 = 6, l5 = 4, l6 = 3, l7 = 2; b=7 X 7 = (0,0,0,7) I1 = I 2 = I 3 = 0, I 4 = 1
where the unit of li is time slots. The number of slots requires b=8 X 8 = (0,0,0,8) I1 = I 2 = I 3 = I 4 = 0
transmitting the frame X10:

If the packets of 7th MCS level increased by 1 then we have


X b +1 = (0, 0, 3, 1, 1, 2, 4) .
International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012
Now the required slots: fading), (b) IEEE 802.11 traffic of Sec. II, (c) VoIP Traffic
M Using IEEE 802.16e Model of Sec. III. The mean delay vs.
∑ x m l m = (0 × 36) + (0 × 24) + (3 ×12) + (1× 6) + (1× 4) utilization factor of all cases is depicted in Fig. 11.
m =1
+ (2 × 3) + (4 × 2) = 60 ≤ N slot ,u . For the cases (b) and (c), the traffic parameters are: number of
Therefore, users N = 50, Tf = 5ms, E[TB] = 10ms, λ=0.02 Erls/user, VoIP
I 7 ( X b ) = I 7 ( X 10 ) = 1. capacity, m = 20, λ1 = 0.58, λ2 = 0.04, r1 = 0.1, r2 = 0.2, pdf of
service time of MMPP/E2/1 case is
If the packet of 6th MCS level increased by 1, then k
M  kµ 
b(θ ) =   , k = 2.
∑ x m l m = 61 > N slot ,u .  θ + kµ 
m =1
Let us now go for the combining scheme of M/D/1 and
Therefore, we have
MMPP/D/1 of (a) known as MMPP+M/D/1 applicable to
I 6 ( X b ) = I 6 ( X 10 ) = 0.
voice data integrated service through ATM network. The
If all the packets are 1st MCS level then b1 = 1, which is the detailed theoretical analysis of the model is given in [18, 27].
minimum number of packets can be sent. If all the packets are For convenience of the readers the analysis is included in the
7th MCS level, then b2 = 30, i.e. the maximum 30 packets can Appendix A. Let, h = 2.718×10-6s, T = 3.397×10-6 s, and n = 3,
be sent. we get the MMPP traffic parameters in per ms as, r1 = 0.414,
Let us now consider another example of finding the value r2 = 0.071, λb1 = 3.657×102 cells/ms and λb2 = 6.239cells/ms.
of function Ij(Xb) considering, M = 4, Nslot, u = 50. The analysis Therefore, we get λb = (λb1r2+λb2r1)/(r1+r2) = 58.499cells/ms.
is shown in tabular form in Table I. Taking λp = 100 cells/ms we can evaluate: λ1 = λb1 + λp =
Taking Number of users N = 50, Tf = 1ms, m = 4, λ1=0.566, 465.652 cells/ms, λ2 = λb2 + λp = 106.239 cells/ms, λt = ( λ1r2 +
λ2=0.842, r1=0.21, r2=0.12, the transition matrix of VoIP
λ2r1)/(r1 + r2) =158.499 cells/ms and ρ = λt h = 0.431Erls.
traffic under Rayleigh fading case is found like given in Table
II.
1.8
0
IEEE 802.11
10 IEEE 802.16e/m AMR
1.6
IEEE 802.16e MCS
Data MMPP+M/D/1 wired LAN
1.4
-1 Video MMPP+M/D/1 wired LAN
10
M ean pack et Delay S ec

1.2

1
P robability of states

-2
10
0.8

0.6
-3
10
0.4

-4 0.2
10
Nakagami m=2
Nakagami m=4 0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
Rayleigh traffic intensity Rho Erls
-5
10
0 5 10 15 Fig. 11 Comparison of mean delay of different LAN.
States

Fig.10 The steady probability vector under Rayleigh and From the graphical solution of f ( z ) = z − e− hW (z ); z =
Nakagami-m fading. 0.62. The transition probabilities are ((A.13) and (A.14)):
W (z ) − R1 ( z ) − r2
Similar transition matrices are also derived for Nakagami-2 P01 = (1 − ρ ) = 2.93×10-4,
and Nakagami-4 fading cases. The steady state vector derived (λ2 − λ1 )(1 − z )
from transition matrix P, is plotted for two fading cases as P02 = 1 − ρ − P01 = 0.569;
shown in Fig. 10. The impact of fading on the probability sate where
is found very small but the impact will be high on blocking λ1 − λ2
probability, probability of delay and throughput. u= [r P (1 − λ2 h ) − r2 P02 (1 − λ1h )] = 28.842
In this paper we consider the delay experience by the traffic (1 − ρ )(r1 + r2 )2 1 01
of (a) MMPP+M/D/1 Traffic Model in video-data integrated from (A.15).
service under ATM system of wired network (immune of
International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012
Table II: The 16 × 16 matrix P

P = [0.084 0.019 0.055 0.016 0.018 6.887E-3 3.929E-3 1.933E-3 6.444E-4 4.069E-4 8.455E-5 6.852E-5 9.244E-6 9.616E-6 8.663E-7 1.157E-6
0.010 0.080 6.834E-3 0.067 2.242E-3 0.028 4.902E-4 7.971E-3 8.039E-5 1.678E-3 1.055E-5 2.826E-4 1.153E-6 3.965E-5 1.081E-7 4.770E-6
0.084 0.019 6.834E-3 0.067 2.242E-3 0.028 4.902E-4 7.971E-3 8.039E-5 1.678E-3 1.055E-5 2.826E-4 1.153E-6 3.965E-5 8.663E-7 1.157E-6
0.010 0.080 6.834E-3 0.067 2.242E-3 0.028 4.902E-4 7.971E-3 8.039E-5 1.678E-3 1.055E-5 2.826E-4 1.153E-6 3.965E-5 1.081E-7 4.770E-6
0.000 0.000 0.078 0.019 0.047 0.014 0.015 5.858E-3 3.247E-3 1.616E-3 5.281E-4 3.366E-4 6.891E-5 5.628E-5 7.504E-6 7.858E-6
0.000 0.000 9.673E-3 0.077 5.88E-3 0.059 1.878E-3 0.024 4.05E-4 6.664E-3 6.588E-5 1.388E-3 8.595E-6 2.321E-4 9.36E-7 3.241E-5
0.000 0.000 0.000 0.000 0.077 0.019 0.047 0.014 0.015 5.826E-3 3.235E-3 1.609E-3 5.265E-4 3.353E-4 6.873E-5 5.610E-5
0.000 0.000 0.000 0.000 9.576E-3 0.077 5.843E-3 0.059 1.869E-3 0.024 4.035E-4 6.634E-3 6.568E-5 1.383E-3 8.573E-6 2.314E-4
0.000 0.000 0.000 0.000 0.000 0.000 0.077 0.019 0.047 0.014 0.015 5.824E-3 3.235E-3 1.609E-3 5.265E-4 3.353E-4
0.000 0.000 0.000 0.000 0.000 0.000 9.57E-3 0.077 5.841E-3 0.059 1.869E-3 0.024 4.035E-4 6.633E-3 6.567E-5 1.383E-3
0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.077 0.019 0.047 0.014 0.015 5.824E-3 3.235E-3 1.609E-3
0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 9.57E-3 0.077 5.841E-3 0.059 1.869E-3 0.024 4.035E-4 6.633E-3
0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.077 0.019 0.047 0.014 0.015 5.824E-3
0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 9.57E-3 0.077 5.841E-3 0.059 1.869E-3 0.024
0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.077 0.019 0.047 0.014
1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 ];

Now the mean, virtual and actual waiting time ((A.6) to (A.8)) network but work can be extended for downlink case as well.
are WM=λth2/2(1-ρ) = 1.029E-3 ms, Wa= WM + uh/ρ(1-ρ) = Instead of binary Backoff algorithm of IEEE 802.11 the MCS
0.321ms and Wv = WM + uh/(1-ρ) = 0.139ms. The Wj ((A.15)) level can also be applied for it to observe its level of
are W1 = P1{ Wv + u(λ1-λt)/G } = 0.1ms and W2 = P2{ Wv + improvement. We have applied MMPP model for bursty
u(λ2-λt)/G } = 0.038ms. The individual waiting time are: for traffic of voice but still we have the scope to observe the
video, Wb = (W1 λb1+W2 λb2)/ λb = 0.632ms for data Wp = situation using other MAPs, like batch arrival process or phase
W1+W2 = 0.139ms. We are able to plot the delay of type renewal process to support traffic of variable packet
MMPP+M/D/1 traffic against utilization factor. length.
The profile of delay of data and video traffic of wired LAN
of MMPP+M/D/1 case are almost parallel but the delay of
APPENDIX A
video traffic shows longer delay compared to that of data
traffic because of bursty nature of arrival and variable length When voice or video signals are sent in packetized form, it
of packets of the video traffic. is modeled as ON-OFF pattern. In case of a single source, the
The profile of IEEE 802.11 shows maximum delay spurt and silence period are assumed exponentially distributed
compared to wired LAN case because of huge collision
experienced by Backoff algorithm but the rate of increment of with mean of α −1 and β −1 respectively. If the sampling
delay with utilization factor is found very slow since users are period of voice/video is T (cells / packets are formed for a
stationary and less affected by fading under heavy traffic fixed duration T of the analog signal) then three statistical
condition. In case of IEEE 802.16e, delay is not so large like parameters of the traffic are:
IEEE 802.11 case, because of selection of proper modulation The packet arrival rate,
technique of MCS levels. The rate of increment of delay of β
both the IEEE 802.16e cases is very rapid because users are λ= ,
T (α + β )
mobile and heavily affected by fading under heavy traffic
condition. (A.1)
the SCV of inter arrival time,
1 − (1 − αT )2
V. CONCLUSION Ca 2 = , (A.2)
T 2 (α + β )2
The paper compares QoS, throughput and mean waiting
skewness of service time,
time of traffic of IEEE 802.11 and IEEE 802.16e WLAN to
observe the impact of fading on the networks. The expected Sk =
(
2αT α 2T 2 − 3αT + 3 ). (A.3)
result should be like that: IEEE 802.16e network is more [αT (2 − αT )] 3/ 2
affected under small scale fading condition since it supports The 2-phase MMPP parameters are determined as:
mobility of users. The result section, Sec. IV, reveals a
  1 
complete different scenario because of the use of proper MCS  D1 +  , i = 1;

level in IEEE 802.16e network, hence throughput is increased   1 + nλE 
because of small BER. In case of IEEE 802.11 traffic, ri =  (A.4)
  1 
 , i = 2.
probability of collision deteriorates the performance as  D 1 − 
explained in Sec. IV. The performance of video and data   1 + nλE 
integrated traffic of wired LAN is better than both of IEEE nλ + F + F 1 + nλE , i = 1;
802.11 and IEEE 802.16e because of immunity of fading. In λi′ =  (A.5)
this paper, we have considered only uplink traffic of wireless nλ + F − F 1 + nλE , i = 2;
International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012
where The mean waiting time is given by the following expression
K H λ H1 + (1 − K H )λ H 2 − λ  λ j − λt 
D= , W j ( z ) = π j Wv + u ⋅  , j =1, 2; (14)
Ca 2 − 1  G 

3C a 4 − S k C a 3 − 3C a 2 + 2 where
F = D. , 2
(
3 Ca 2 − 1 ) G= ∑ π j (λ j − λt )2
j =1
and
K H λ H1 + (1 − K H )λ H 2 − λ and
E= . λ1 − λ2
F2 u= [r1P01(1 − λ2h ) − r2 P02 (1 − λ1h)] .
Equations (A.1) - (A.5) provide parameters of MMPP traffic. (1 − ρ )(r1 + r2 )2
Again the virtual and actual waiting time of MMPP/G/1 model The mean waiting time of individual traffic is
are respectively as λ ′ W + λ ′W
uh WMMPP / D / 1 = 1 1 2 2 , (A.15)
Wv = WM + , (A.6) λt′
1− ρ where
and λ1′r2 + λ 2′ r1
uh λt′ = ,
Wa = W M + , (A.7) r1 + r2
ρ (1 − ρ )
and
where WM is the mean waiting time of M/G/1 traffic
Wvoice = W1 + W2 . (A.16)
expressed as
λt h
WM = . (A.8)
ρ (1 − ρ ) REFERENCES
The parameters u and λt are given in (A.15) and (A.9). [1] Thomas L. Saaty, ‘Elements of Queuing Theory with Application’
Now for voice data integrated traffic of MMPP + M/D/1 McGRAW-HILL Book Company, New York, Toronto, London,
Chapter-5, 1981.
case, let λ p be the Poisson’s arrival rate of voice traffic. We
[2] Sang H. Kang, Yong Han Kim, Dan K. Sung and Bong D. Choi, ‘An
application of Markovian Arrival Process (MAP) to modeling
have λ1 = λ1′ + λ p and λ 2 = λ 2 ′ + λ p . superposed ATM cell stream,’ IEEE Transaction on Communications,
vol.50, no.4, pp.633-642, April 2002.
To determine mean waiting time, let us determine,
[3] Paul G. Hoest, Sidney C. Port, Charles I. Stone, ‘Introduction to
r r λ r +λ r Stochastic Processes,’ chapter-3, Universal Book Stall New Delhi, 2002.
π 1 = 2 , π 2 = 1 and λt = 1 2 2 1 . (A.9) [4] K.Yamori, H.Akimaru, and M.R.Finely, " Optimum Design of
r1 + r2 r1 + r2 r1 + r2
Videoconferencing Systems over ATM Networks", 16th IFIP World
Let us define a function, Computer Congress 2000, International Conference on Communication
1 Technology 2000 (ICCT 2000), Beijing, China, No.S05.2, pp.1213-
W ( z ) = {λ1 (1 − z ) + r1 + λ 2 (1 − z ) + r2 } 1219, August 2000.
2 [5] Throdore S. Rapaport, “Wireless communications principles and
1 practice”, Eastern Economy Edition, New Delhi, 2008.
+ (λ1 (1 − z ) + r1 − λ 2 (1 − z ) − r2 )2 − 4r1r2 [6] Simon Haykin, Michael_Moher, “Modern Wireless Communications”,
2
(A.10) Pearson Education, New Delhi, 2005.
1
= {(1 − z )(λ1 + λ 2 ) + (r1 + r2 )} [7] H. A. Suraweera, R. H.Y. Louie, Y. Li, G. K. Karagiannidis and B.
2 Vucetic, “ Two Hop Amplify-and-Forword Transmission in mixed
Rayleigh and Ricean Channels”, IEEE Comm. Letters, Vol. 13, No. 4,
1
+ {(1 − z )(λ1 − λ 2 ) + (r1 − r2 )}2 − 4r1r2 . pp. 227-229, April 2009.
2 [8] S. Nath Datta, S. Chakrabarti, “Unified Error Analysis of Dual-Hop
For MMPP/ D/1 model, Relay Link in Nakagami-m Fading Channel”, IEEE Comm. Letters, Vol.
14, No. 10, pp. 897-899, October 2010.
z = b * (W ( z )) = exp(− hW ( z ) ), (A.11) [9] Sung Won Kim, Byung-Seo Kim and Yuguang Fang, ‘Downlink and
where h is the duration of a cell or packet, and W(z) is given Uplink Resource Allocation in IEEE 802.11 Wireless LANs,’ IEEE
Transactions on Vehicular Technology, pp. 320-327, vol. 54, no. 1,
by Eq. (A.10). By solving the above equation graphically, we January 2005.
can get the value of z. Let us evaluate the two probability of [10] C. Geun Park, D. Hwan Han, S. Joon Ahn, ‘Performance Analysis of
transitions P01 and P02 : MAC Layer Protocols in the IEEE 802.11 Wireless LAN,’ Telecommun
Systems, pp. 233-253, vol. 33, no. 1-3, DOI: 10.1007/s11235-006-9013-
W (z ) − R1(z ) − γ 2 1, 2006.
P01 = (1 − ρ ) , ρ = λt h ; (A.12)
(λ2 − λ1 )(1 − z ) [11] Chan Heng Foh, Moshe Zukerman and Juki Wirawan Tantra, ‘A
Markovian Framework for Performance Evaluation of IEEE 802.11,’
and IEEE Transactions on Wireless Communications, pp.1275-1285, vol. 6,
P02 = 1 − ρ − P01 , R j ( z ) = λ j (1 − z ) + r j ; j =1, 2. (A.13) no. 4, April 2007.
International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012
[12] Hanane Fathi , Shyam S. Chakraborty, and Ramjee Prasad, ‘On SIP
Session Setup Delay for VoIP Services Over Correlated Fading
Channels,’ IEEE Transactions on Vehicular Technology, Vol. 55, No. 1, AUTHORS PROFILE
pp. 286-295, January’ 2006.
[13] Howon Lee and Dong-Ho Cho, ‘Multi-User Queuing Analysis
Considering AMC for Wireless VoIP Services,’ IEEE International Anupam Roy has completed B.Sc Engineering in
Conference on Communications Workshops (ICC), 2009 pp.1-5, 14-18 Computer Science and Engineering from
June 2009. Jahangirnagar University, Savar, Dhaka, Bangladesh
[14] Dusit Niyato and Ekram Hossain, ‘Queue-Aware Uplink Bandwidth in 2007. He is now pursuing M.Sc Engineering at the
Allocation and Rate Control for Polling Service in IEEE 802.16 same department. He worked few months as a
Broadband Wireless Networks,’ IEEE Transactions on Mobile General Software Developer in MFASIA LTD (A
Computing, Vol. 5, No. 6, pp. 668-679, June 2006. joint venture company between Bangladesh and
[15] Jae-Woo So, ‘Performance Analysis of VoIP Services in the IEEE England) and Java Programmer in ATI LTD, Dhaka,
802.16e OFDMA System With Inband Signaling,’ IEEE Transactions on Bangladesh. He is now working as a Programmer in
Mobile Computing, Vol. 57, No. 3, pp. 1876-1886, May 2008. BJIT LTD (A joint venture company between Bangladesh and Japan), Dhaka,
[16] Giuseppe Bianchi, ‘IEEE 802.11- Saturation Throughput Analysis,’ Bangladesh.
IEEE Communications Letters, pp. 318-320, vol. 2, no. 12, December
1998.
[17] Giuseppe Bianchi and Ilenia Tinnirello, ‘Remarks on IEEE 802.11 DCF Md. Imdadul Islam has completed his B.Sc. and
Performance Analysis,’ IEEE Communications Letters, pp. 765-767, M.Sc Engineering in Electrical and Electronic
vol. 9, no. 8, August 2005. Engineering from Bangladesh University of
[18] Haruo Akimaru and Konosuke Kawashima, ‘Teletraffic Theory and Engineering and Technology, Dhaka, Bangladesh in
Applications,’ Springer-Verlag, Berlin, 1993. 1993 and 1998 respectively and has completed his
[19] Yang Xia and Jon Rosdahl, ‘Throughput and Delay Limits of IEEE Ph.D degree in 2010 from the Department of
802.11,’ IEEE Communications Letters, pp. 355-357, vol. 6, no. 8, Computer Science and Engineering, Jahangirnagar
August 2002. University, Dhaka, Bangladesh in the field of
[20] Howon Lee, T. Kwon and D. H. Cho, ‘An enhanced uplink scheduling network traffic engineering. He is now working as a
algorithm based on voice activity for VoIP services in IEEE 802.16d/e Professor at the Department of Computer Science and Engineering,
system,’ IEEE Communications Letters, Vol. 9, no.8, pp. 691-693, Jahangirnagar University, Savar, Dhaka, Bangladesh. Previously, he worked
August 2005. as an Assistant Engineer in Sheba Telecom (Pvt.) LTD (A joint venture
[21] Sung-Min Oh, Sunghyun Cho, Jae-Hyun and Jonghyung Kwun, ‘VoIP company between Bangladesh and Malaysia, for Mobile cellular and WLL),
Scheduling algorithm for AMR speech codec in IEEE 802.16e/m from Sept'94 to July'96. He has a very good field experience in installation of
system,’ IEEE Communications Letters, Vol. 12, No. 5, pp. 374-376, Radio Base Stations and Switching Centers for WLL. His research field is
May 2008. network traffic, wireless communications, wavelet transform, OFDMA,
[22] Howon Lee and Dong-Ho Cho, ‘VoIP Capacity Analysis in Congnitive WCDMA, adaptive filter theory, ANFIS and array antenna systems. He has
Radio System’, IEEE Communications Letters, Vol. 13, No. 6, pp. 393- more than hundred research papers in national and international journals and
395, June 2009. conference proceedings.
[23] Howon Lee and Dong-Ho Cho, ‘Capacity Improvement and Analysis of
VoIP Service in a Cognitive Radio System’, IEEE Transactions on
Vehicular Technology, Vol. 59, No. 4, pp. 1646-1651, May 2010. M. R. Amin received his B.S. and M.S. degrees in
[24] Jae-Woo So, ‘A down link Performance Analysis of VoIP Services over Physics from Jahangirnagar University, Dhaka,
an IEEE 802.16e OFDMA System,’ IEEE Communications Letters, Vol. Bangladesh in 1984 and 1986 respectively and his
11, no.2, pp. 155-157, Feb’ 2007. Ph.D. degree in Plasma Physics from the University
[25] Qingwen Liu, Shengli Zhou and Georgios B. Giannakis, ‘Cross-Layer of St. Andrews, U. K. in 1990. He is a Professor of
Combining of Adaptive Modulation and Coding With Truncated ARQ Electronics and Communications Engineering at East
Over Wireless Links’, IEEE Transactions on Wireless Communications, West University, Dhaka, Bangladesh. He served as a
Vol. 3, No. 5, pp. 1746-1755, September 2004. Post-Doctoral Research Associate in Electrical
[26] D. Pareit, Margot Deruyck, Emmeric Tanghe, Wout Joseph, Ingrid Engineering at the University of Alberta, Canada,
Moerman, Luc Martens and Piet Demeester, ‘Detailed Modeling of during 1991-1993. He was an Alexander von Humboldt Research Fellow at
MAC Throughput and Ranges for Mobile WiMAX,’ IEEE the Max-Planck Institute for Extraterrestrial Physics at Garching/Munich,
COMMUNICATIONS LETTERS, VOL. 15, NO. 8, pp.839-841, Germany during 1997-1999.
AUGUST 2011. Dr. Amin was awarded the Commonwealth Postdoctoral Fellowship in
[27] Anupam Roy, Md. Imdadul Islam, and M. R. Amin,’MMPP+M/D/1 1997. Besides these, he has also received several awards for his research,
Traffic Model in Video-Data Integrated Service under ATM System,’ including the Bangladesh Academy of Science Young Scientist Award for the
IACSIT International Journal of Engineering and Technology, Vol. 3, year 1996 and the University Grants Commission Young Scientist Award for
No. 6, pp.615-620, December 2011. 1996. He is a member of the IEEE. His current fields of research are wireless
[28] Tonmoy Saha, Md. Abu Shufean, Mahbubul Alam and Md. Imdadul communications and networks in general and nonlinear plasma dynamics.
Islam, ‘Performance Evaluation of the WiMAX Network Based on
Combining the 2D Markov Chain and MMPP Traffic Model,’ Journal of
Information Processing Systems, Vol.7, No.4, pp.653-678, December
2011.

View publication stats

Vous aimerez peut-être aussi