Académique Documents
Professionnel Documents
Culture Documents
discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/280940271
CITATIONS READS
4 48
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Md. Ruhul Amin on 18 September 2015.
Abstract—With the advent of 4G mobile communication system these are [1-3]: PH Markov renewal process (PH-MRP),
the traffic of wired and wireless network becomes voice/video- Markov Modulated Poisson Process (MMPP) and Batch
data integrated service. In this paper traffic model of Markov Markovian Arrival Process (BMAP). In this paper we adopt
Modulated Poisson Process (MMPP) is applied for bursty traffic
of Wireless LAN (WLAN), especially in IEEE 802.11 WLAN,
MMPP model in the analysis of bursty traffic of voice.
known as WiFi, and IEEE 802.16e WLAN is known as WiMAX. Voice-data integrated traffic is widely used in both wired
Traffic of both networks is heavily affected by the fading of and wireless networks. The traffic of packet switching
wireless channel. The traffic parameters of IEEE 802.11 WLAN network is bursty in nature. Hence they are analyzed based on
are evaluated using Giuseppe Bianchi state transition chain. The MMPP. Again in M/D/1/K model (suitable for ATM traffic),
profile of probability of idle condition, the probability of one the probability density function (pdf) of arrival of packet is
successful transmission and the probability of collision is shown
against the number of users. The packet blocking probability and
exponential but that of service time is deterministic, where K
throughput of WLAN are observed varying packet arrival rate. is the length of queue. Therefore, the combination of MMPP
In this paper, a mathematical model of VoIP traffic over wireless and traffic of deterministic service time can be used to support
channel under IEEE 802.16e WLAN is also analyzed under voice/video- data integrated traffic. In wired communication,
Rayleigh and Nakagami-m fading cases with the help of MMPP simple ON-OFF traffic model of [4] can be used quite
and discrete time Markov chain (DTMC) model. Finally, mean comfortably to evaluate performance of such networks since
delay of both wired and wireless LAN are compared.
wired network is not affected by any type of fading [5-6] like
Keywords—Voice-data integrated service, MMPP, DTMC, wireless network.
Rayleighfading, Nakagami-m fading, VoIP . In case of wireless networks, the traffic performance is
evaluated incorporating small scale fading of wireless channel.
I. INTRODUCTION Small scale fading or simply fading takes place in wireless
To cope with the constant growth of user demand, service of a environment where multi-path propagation occurs due to
unguided nature of the channel. Fading is the rapid
voice-data network is growing rapidly. To combat network
fluctuations of the amplitudes, phases or multi-path delays of a
congestion, limited number of available resource must be
allocated among users in an optimum way. Traffic is the flow radio signal over a short period of time or travel distance. In
this paper we consider Rayleigh and Nakagami-m fading [7-8]
of information/messages through a communication system.
in both IEEE 802.11 and IEEE 802.16 standard networks.
The simplest way of evaluating the performance of a network
IEEE 802.11 standard (known as WiFi) is widely used as
is the use of state transition chain of birth-death process called
wireless local area network. Recent literatures find the
Markov chain. One of the major drawbacks of Markov chain
lies in the incorporation of large number of probability states performance of such networks using state transition diagram
of Back off window. Such an analysis is found in [9-11]. In all
which complicates the analysis of the traffic parameters of a
of the papers, the state transition chain is solved to determine
network. Markov arrival process (MAP) provides equivalent
state transition chain of few probability states with some the probability of one successful transmission, probability of
collision and packet transmission probability. The papers show
assumption. MAP can be defined as a process ( N (t ), J (t ) ) for
the profile of packet delay and throughput against utilization
t ≥ 0 on the state space { (i, j ); i ≥ 0, 1 ≤ j ≤ m }, where N (t ) is factor of a channel.
a counting process of “arrivals”, indicates the number of With the development of 3G mobile communication system
arrival in (0, t ] and J (t ) is a Markov process with a finite state and beyond, Voice over Internet Protocol (VoIP) gets
space, 1 ≤ j (t ) ≤ n of the underlying Markov Chain. Teletraffic importance over wireless channel. The different protocols are
found for VoIP services over fading channels. In [11], the
engineering adopts three most widely used cases of MAP and
authors proposed the session initiated protocol (SIP); where
International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012
seven sessions were included to set up a transmission control
protocol (TCP) connection. The condition of the channel is Two-Dimensional Markov Chain of Giuseppe Bianchi
modeled using 2-state Markov Chain. Finally, the authors
For simplicity of analysis, let us consider the two-dimensional
show the profile of session set up delay against frame error Markov chain of Giuseppe Bianchi, where any state
rate.
{ x(t ), y (t ) } is defined as: y (t ) be the size of the Backoff
Initially IEEE 802.16 standard was developed to support
high speed data communication over wireless channel based window and x(t ) be the backoff stage of the station at time t.
on MAC protocol. The standard is now upgraded to IEEE Figure 1 shows the state transition chain of the Backoff
802.16e to support mobile wireless service. The performance algorithm.
of an uplink VoIP system is proposed in [12] using two-
dimensional Discrete Time Markov Chain (DTMC). In that
paper the authors derived a steady state transition matrix from
the two-dimensional DTMC. Finally, packet dropping
probability is evaluated against the number of users. Similar
analysis is also found in [13]. In [14] and [15], performance of
both uplink and downlink of IEEE 802.16e are analyzed using
different MCS (Modulation and Coding Schemes) levels.
The paper is organized as follows: Sec. II provides the
complete analysis of IEEE 802.11 traffic under Binary Backoff
algorithm, Sec. III derives the VoIP traffic parameters using
IEEE 802.16e mode under wireless fading condition, while
Sec. IV provides the results pertinent to Sec. II and Sec. III.
Finally, Sec. V concludes the entire analysis.
γm
where Pγ (γ ) is the pdf of fading. For Nakamagi-m fading,
5
1 .10
m f −1 −m f γ 0 2 4 6 8 10
mf
1 mf γ Average SNR (dB)
Polling
Grant Random access
Size Random access
Time
160 msec 20 msec
... ...
1 2 m-1 m m+1 k
0 ...
...
... ...
µ 2µ mµ mµ
mµ
and 0.45
y
( N − m) ! N a
B(a, N , m, k ) = P0 a m . (22) 0.4
( N − m − k ) ! m m
P i, P c, P s
0.35
Steady probability states are given by the following formula,
m N 0.3
P0 ∑ a x , 0 ≤ x ≤ m;
x = 0 x 0.25
Px =
P N ( N − m) ! a m
N (a / m) x
m
0 ∑ , m < x ≤ N. 0.2
x =1 ( N − m − x + 2) ! 0.15
(23)
0.1
The average access delay is expressed as 20 30 40 50 60 70 80 90 100
∞ Number of users N
D = TMF × ∑ k × p N [k ≤ m] × p N [k > m]k −1 . (24)
k =1
Fig. 7 Variation of Pi, Pc and Ps against the number of users.
0
10
0.7
The probability of idle condition Pi
The probability of one /successful transmission Ps
0.6 The probability of collision Pc
-1
10
0.5
-2
0.4 10
Pi, Pc, Ps
PB, S
0.3
-3
10
0.2
0.1 -4
10
0 Blocking Probability
20 25 30 35 40 45
Number of users N Throughput
-5
10
0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
Fig. 6 Variation of Pi, Pc and Ps against the number of users.
Lambda(Packets/ms)
1 b =1
X 1 = (0,0,1,0) I1 = I 2 = I 3 = I 4 = 1
X 1 = (0,0,0,1) I1 = I 2 = I 3 = I 4 = 1
0.1
X 2 = (1,0,1,0) I1 = I 2 = I 3 = I 4 = 0
b=2 X 2 = (1,0,0,1) I1 = I 2 = I 3 = 0, I 4 = 1
0.01
X 2 = (0,1,1,0) I1 = I 2 = 0, I 3 = I 4 = 1
3
1 .10 X 2 = (0,1,0,1) I1 = I 2 = 0, I 3 = I 4 = 1
X 2 = (0,0,1,1) I1 = 0, I 2 = I 3 = I 4 = 1
4
1 .10 X 2 = (0,0,0,2) I1 = I 2 = I 3 = I 4 = 1
0.2 0.4 0.6 0.8
Utilization factor a (erls) X 3 = (1,0,0,2) I1 = I 2 = I 3 = I 4 = 0
Blocking Pr X 3 = (0,1,1,1) I1 = I 2 = I 3 = 0, I 4 = 1
Throughput X 3 = (0,1,0,2) I1 = I 2 = 0, I 3 = I 4 = 1
b=3
Fig. 9 variation of PB and S against packet arrival rate of IEEE
X 3 = (0,0,1,2) I1 = 0, I 2 = I 3 = I 4 = 1
802.16e/m.
X 3 = (0,0,0,3) I1 = 0, I 2 = I 3 = I 4 = 1
Similar profile is also found for IEEE 802.16 e/m using X 4 = (0,1,0,3) I1 = I 2 = I 3 = 0, I 4 = 1
AMR Speech Coding case as shown in Fig. 9, where we have X 4 = (0,1,1,2) I1 = I 2 = I 3 = I 4 = 0
taken N = 20, K = 12 and m = 6.
For the case of IEEE 802.16e, let us consider an example, X 4 = (0,0,1,3) I1 = I 2 = 0, I 3 = I 4 = 1
where the types of MCS level, M = 7, and the number of X 4 = (0,0,2,2) I1 = I 2 = 0, I 3 = I 4 = 1
available slots, Nslot, u = 60. Therefore, X 4 = (0,0,3,1) I1 = I 2 = I 3 = 0, I 4 = 1
X b = ( x1 , x 2 , x 3 , x 4 , x5 , x 6 , x 7 ) , b=4
X 4 = (0,0,4,0) I1 = I 2 = I 3 = I 4 = 0
where
X 4 = (0,0,0,4) I1 = 0, I 2 = I 3 = I 4 = 1
M =7
b= ∑ xi = 10 X 4 = (0,1,0,3) I1 = I 2 = I 3 = 0, I 4 = 1
i =1 X 5 = (0,1,0,4) I1 = I 2 = I 3 = I 4 = 0
and xi is the number of packets of ith MCS level. X 5 = (0,0,1,4) I1 = I 2 = 0, I 3 = I 4 = 1
b=5 X 5 = (0,0,2,3) I1 = I 2 = I 3 = 0, I 4 = 1
Now, let us consider b = 10 packets with MCS distribution
of X 5 = (0,0,3,2) I1 = I 2 = I 3 = I 4 = 0
X b = (0, 0, 3, 1, 1, 2, 3) . X 5 = (0,0,0,5) I1 = I 2 = 0, I 3 = I 4 = 1
Therefore, X 6 = (0,0,1,5) I1 = I 2 = I 3 = I 4 = 0
M =7 X 6 = (0,0,2,4) I1 = I 2 = I 3 = I 4 = 0
b= ∑ xi = 0 + 0 + 3 + 1 + 1 + 2 + 3 = 10 . b=6
X 6 = (0,0,0,6) I1 = I 2 = 0, I 3 = I 4 = 1
i =1
We know, l1 = 36, l2 = 24, l3 = 12, l4 = 6, l5 = 4, l6 = 3, l7 = 2; b=7 X 7 = (0,0,0,7) I1 = I 2 = I 3 = 0, I 4 = 1
where the unit of li is time slots. The number of slots requires b=8 X 8 = (0,0,0,8) I1 = I 2 = I 3 = I 4 = 0
transmitting the frame X10:
1.2
1
P robability of states
-2
10
0.8
0.6
-3
10
0.4
-4 0.2
10
Nakagami m=2
Nakagami m=4 0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
Rayleigh traffic intensity Rho Erls
-5
10
0 5 10 15 Fig. 11 Comparison of mean delay of different LAN.
States
Fig.10 The steady probability vector under Rayleigh and From the graphical solution of f ( z ) = z − e− hW (z ); z =
Nakagami-m fading. 0.62. The transition probabilities are ((A.13) and (A.14)):
W (z ) − R1 ( z ) − r2
Similar transition matrices are also derived for Nakagami-2 P01 = (1 − ρ ) = 2.93×10-4,
and Nakagami-4 fading cases. The steady state vector derived (λ2 − λ1 )(1 − z )
from transition matrix P, is plotted for two fading cases as P02 = 1 − ρ − P01 = 0.569;
shown in Fig. 10. The impact of fading on the probability sate where
is found very small but the impact will be high on blocking λ1 − λ2
probability, probability of delay and throughput. u= [r P (1 − λ2 h ) − r2 P02 (1 − λ1h )] = 28.842
In this paper we consider the delay experience by the traffic (1 − ρ )(r1 + r2 )2 1 01
of (a) MMPP+M/D/1 Traffic Model in video-data integrated from (A.15).
service under ATM system of wired network (immune of
International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012
Table II: The 16 × 16 matrix P
P = [0.084 0.019 0.055 0.016 0.018 6.887E-3 3.929E-3 1.933E-3 6.444E-4 4.069E-4 8.455E-5 6.852E-5 9.244E-6 9.616E-6 8.663E-7 1.157E-6
0.010 0.080 6.834E-3 0.067 2.242E-3 0.028 4.902E-4 7.971E-3 8.039E-5 1.678E-3 1.055E-5 2.826E-4 1.153E-6 3.965E-5 1.081E-7 4.770E-6
0.084 0.019 6.834E-3 0.067 2.242E-3 0.028 4.902E-4 7.971E-3 8.039E-5 1.678E-3 1.055E-5 2.826E-4 1.153E-6 3.965E-5 8.663E-7 1.157E-6
0.010 0.080 6.834E-3 0.067 2.242E-3 0.028 4.902E-4 7.971E-3 8.039E-5 1.678E-3 1.055E-5 2.826E-4 1.153E-6 3.965E-5 1.081E-7 4.770E-6
0.000 0.000 0.078 0.019 0.047 0.014 0.015 5.858E-3 3.247E-3 1.616E-3 5.281E-4 3.366E-4 6.891E-5 5.628E-5 7.504E-6 7.858E-6
0.000 0.000 9.673E-3 0.077 5.88E-3 0.059 1.878E-3 0.024 4.05E-4 6.664E-3 6.588E-5 1.388E-3 8.595E-6 2.321E-4 9.36E-7 3.241E-5
0.000 0.000 0.000 0.000 0.077 0.019 0.047 0.014 0.015 5.826E-3 3.235E-3 1.609E-3 5.265E-4 3.353E-4 6.873E-5 5.610E-5
0.000 0.000 0.000 0.000 9.576E-3 0.077 5.843E-3 0.059 1.869E-3 0.024 4.035E-4 6.634E-3 6.568E-5 1.383E-3 8.573E-6 2.314E-4
0.000 0.000 0.000 0.000 0.000 0.000 0.077 0.019 0.047 0.014 0.015 5.824E-3 3.235E-3 1.609E-3 5.265E-4 3.353E-4
0.000 0.000 0.000 0.000 0.000 0.000 9.57E-3 0.077 5.841E-3 0.059 1.869E-3 0.024 4.035E-4 6.633E-3 6.567E-5 1.383E-3
0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.077 0.019 0.047 0.014 0.015 5.824E-3 3.235E-3 1.609E-3
0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 9.57E-3 0.077 5.841E-3 0.059 1.869E-3 0.024 4.035E-4 6.633E-3
0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.077 0.019 0.047 0.014 0.015 5.824E-3
0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 9.57E-3 0.077 5.841E-3 0.059 1.869E-3 0.024
0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.077 0.019 0.047 0.014
1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 ];
Now the mean, virtual and actual waiting time ((A.6) to (A.8)) network but work can be extended for downlink case as well.
are WM=λth2/2(1-ρ) = 1.029E-3 ms, Wa= WM + uh/ρ(1-ρ) = Instead of binary Backoff algorithm of IEEE 802.11 the MCS
0.321ms and Wv = WM + uh/(1-ρ) = 0.139ms. The Wj ((A.15)) level can also be applied for it to observe its level of
are W1 = P1{ Wv + u(λ1-λt)/G } = 0.1ms and W2 = P2{ Wv + improvement. We have applied MMPP model for bursty
u(λ2-λt)/G } = 0.038ms. The individual waiting time are: for traffic of voice but still we have the scope to observe the
video, Wb = (W1 λb1+W2 λb2)/ λb = 0.632ms for data Wp = situation using other MAPs, like batch arrival process or phase
W1+W2 = 0.139ms. We are able to plot the delay of type renewal process to support traffic of variable packet
MMPP+M/D/1 traffic against utilization factor. length.
The profile of delay of data and video traffic of wired LAN
of MMPP+M/D/1 case are almost parallel but the delay of
APPENDIX A
video traffic shows longer delay compared to that of data
traffic because of bursty nature of arrival and variable length When voice or video signals are sent in packetized form, it
of packets of the video traffic. is modeled as ON-OFF pattern. In case of a single source, the
The profile of IEEE 802.11 shows maximum delay spurt and silence period are assumed exponentially distributed
compared to wired LAN case because of huge collision
experienced by Backoff algorithm but the rate of increment of with mean of α −1 and β −1 respectively. If the sampling
delay with utilization factor is found very slow since users are period of voice/video is T (cells / packets are formed for a
stationary and less affected by fading under heavy traffic fixed duration T of the analog signal) then three statistical
condition. In case of IEEE 802.16e, delay is not so large like parameters of the traffic are:
IEEE 802.11 case, because of selection of proper modulation The packet arrival rate,
technique of MCS levels. The rate of increment of delay of β
both the IEEE 802.16e cases is very rapid because users are λ= ,
T (α + β )
mobile and heavily affected by fading under heavy traffic
condition. (A.1)
the SCV of inter arrival time,
1 − (1 − αT )2
V. CONCLUSION Ca 2 = , (A.2)
T 2 (α + β )2
The paper compares QoS, throughput and mean waiting
skewness of service time,
time of traffic of IEEE 802.11 and IEEE 802.16e WLAN to
observe the impact of fading on the networks. The expected Sk =
(
2αT α 2T 2 − 3αT + 3 ). (A.3)
result should be like that: IEEE 802.16e network is more [αT (2 − αT )] 3/ 2
affected under small scale fading condition since it supports The 2-phase MMPP parameters are determined as:
mobility of users. The result section, Sec. IV, reveals a
1
complete different scenario because of the use of proper MCS D1 + , i = 1;
level in IEEE 802.16e network, hence throughput is increased 1 + nλE
because of small BER. In case of IEEE 802.11 traffic, ri = (A.4)
1
, i = 2.
probability of collision deteriorates the performance as D 1 −
explained in Sec. IV. The performance of video and data 1 + nλE
integrated traffic of wired LAN is better than both of IEEE nλ + F + F 1 + nλE , i = 1;
802.11 and IEEE 802.16e because of immunity of fading. In λi′ = (A.5)
this paper, we have considered only uplink traffic of wireless nλ + F − F 1 + nλE , i = 2;
International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012
where The mean waiting time is given by the following expression
K H λ H1 + (1 − K H )λ H 2 − λ λ j − λt
D= , W j ( z ) = π j Wv + u ⋅ , j =1, 2; (14)
Ca 2 − 1 G
3C a 4 − S k C a 3 − 3C a 2 + 2 where
F = D. , 2
(
3 Ca 2 − 1 ) G= ∑ π j (λ j − λt )2
j =1
and
K H λ H1 + (1 − K H )λ H 2 − λ and
E= . λ1 − λ2
F2 u= [r1P01(1 − λ2h ) − r2 P02 (1 − λ1h)] .
Equations (A.1) - (A.5) provide parameters of MMPP traffic. (1 − ρ )(r1 + r2 )2
Again the virtual and actual waiting time of MMPP/G/1 model The mean waiting time of individual traffic is
are respectively as λ ′ W + λ ′W
uh WMMPP / D / 1 = 1 1 2 2 , (A.15)
Wv = WM + , (A.6) λt′
1− ρ where
and λ1′r2 + λ 2′ r1
uh λt′ = ,
Wa = W M + , (A.7) r1 + r2
ρ (1 − ρ )
and
where WM is the mean waiting time of M/G/1 traffic
Wvoice = W1 + W2 . (A.16)
expressed as
λt h
WM = . (A.8)
ρ (1 − ρ ) REFERENCES
The parameters u and λt are given in (A.15) and (A.9). [1] Thomas L. Saaty, ‘Elements of Queuing Theory with Application’
Now for voice data integrated traffic of MMPP + M/D/1 McGRAW-HILL Book Company, New York, Toronto, London,
Chapter-5, 1981.
case, let λ p be the Poisson’s arrival rate of voice traffic. We
[2] Sang H. Kang, Yong Han Kim, Dan K. Sung and Bong D. Choi, ‘An
application of Markovian Arrival Process (MAP) to modeling
have λ1 = λ1′ + λ p and λ 2 = λ 2 ′ + λ p . superposed ATM cell stream,’ IEEE Transaction on Communications,
vol.50, no.4, pp.633-642, April 2002.
To determine mean waiting time, let us determine,
[3] Paul G. Hoest, Sidney C. Port, Charles I. Stone, ‘Introduction to
r r λ r +λ r Stochastic Processes,’ chapter-3, Universal Book Stall New Delhi, 2002.
π 1 = 2 , π 2 = 1 and λt = 1 2 2 1 . (A.9) [4] K.Yamori, H.Akimaru, and M.R.Finely, " Optimum Design of
r1 + r2 r1 + r2 r1 + r2
Videoconferencing Systems over ATM Networks", 16th IFIP World
Let us define a function, Computer Congress 2000, International Conference on Communication
1 Technology 2000 (ICCT 2000), Beijing, China, No.S05.2, pp.1213-
W ( z ) = {λ1 (1 − z ) + r1 + λ 2 (1 − z ) + r2 } 1219, August 2000.
2 [5] Throdore S. Rapaport, “Wireless communications principles and
1 practice”, Eastern Economy Edition, New Delhi, 2008.
+ (λ1 (1 − z ) + r1 − λ 2 (1 − z ) − r2 )2 − 4r1r2 [6] Simon Haykin, Michael_Moher, “Modern Wireless Communications”,
2
(A.10) Pearson Education, New Delhi, 2005.
1
= {(1 − z )(λ1 + λ 2 ) + (r1 + r2 )} [7] H. A. Suraweera, R. H.Y. Louie, Y. Li, G. K. Karagiannidis and B.
2 Vucetic, “ Two Hop Amplify-and-Forword Transmission in mixed
Rayleigh and Ricean Channels”, IEEE Comm. Letters, Vol. 13, No. 4,
1
+ {(1 − z )(λ1 − λ 2 ) + (r1 − r2 )}2 − 4r1r2 . pp. 227-229, April 2009.
2 [8] S. Nath Datta, S. Chakrabarti, “Unified Error Analysis of Dual-Hop
For MMPP/ D/1 model, Relay Link in Nakagami-m Fading Channel”, IEEE Comm. Letters, Vol.
14, No. 10, pp. 897-899, October 2010.
z = b * (W ( z )) = exp(− hW ( z ) ), (A.11) [9] Sung Won Kim, Byung-Seo Kim and Yuguang Fang, ‘Downlink and
where h is the duration of a cell or packet, and W(z) is given Uplink Resource Allocation in IEEE 802.11 Wireless LANs,’ IEEE
Transactions on Vehicular Technology, pp. 320-327, vol. 54, no. 1,
by Eq. (A.10). By solving the above equation graphically, we January 2005.
can get the value of z. Let us evaluate the two probability of [10] C. Geun Park, D. Hwan Han, S. Joon Ahn, ‘Performance Analysis of
transitions P01 and P02 : MAC Layer Protocols in the IEEE 802.11 Wireless LAN,’ Telecommun
Systems, pp. 233-253, vol. 33, no. 1-3, DOI: 10.1007/s11235-006-9013-
W (z ) − R1(z ) − γ 2 1, 2006.
P01 = (1 − ρ ) , ρ = λt h ; (A.12)
(λ2 − λ1 )(1 − z ) [11] Chan Heng Foh, Moshe Zukerman and Juki Wirawan Tantra, ‘A
Markovian Framework for Performance Evaluation of IEEE 802.11,’
and IEEE Transactions on Wireless Communications, pp.1275-1285, vol. 6,
P02 = 1 − ρ − P01 , R j ( z ) = λ j (1 − z ) + r j ; j =1, 2. (A.13) no. 4, April 2007.
International Journal of Computer Information Systems,
Vol. 4, No. 1, 2012
[12] Hanane Fathi , Shyam S. Chakraborty, and Ramjee Prasad, ‘On SIP
Session Setup Delay for VoIP Services Over Correlated Fading
Channels,’ IEEE Transactions on Vehicular Technology, Vol. 55, No. 1, AUTHORS PROFILE
pp. 286-295, January’ 2006.
[13] Howon Lee and Dong-Ho Cho, ‘Multi-User Queuing Analysis
Considering AMC for Wireless VoIP Services,’ IEEE International Anupam Roy has completed B.Sc Engineering in
Conference on Communications Workshops (ICC), 2009 pp.1-5, 14-18 Computer Science and Engineering from
June 2009. Jahangirnagar University, Savar, Dhaka, Bangladesh
[14] Dusit Niyato and Ekram Hossain, ‘Queue-Aware Uplink Bandwidth in 2007. He is now pursuing M.Sc Engineering at the
Allocation and Rate Control for Polling Service in IEEE 802.16 same department. He worked few months as a
Broadband Wireless Networks,’ IEEE Transactions on Mobile General Software Developer in MFASIA LTD (A
Computing, Vol. 5, No. 6, pp. 668-679, June 2006. joint venture company between Bangladesh and
[15] Jae-Woo So, ‘Performance Analysis of VoIP Services in the IEEE England) and Java Programmer in ATI LTD, Dhaka,
802.16e OFDMA System With Inband Signaling,’ IEEE Transactions on Bangladesh. He is now working as a Programmer in
Mobile Computing, Vol. 57, No. 3, pp. 1876-1886, May 2008. BJIT LTD (A joint venture company between Bangladesh and Japan), Dhaka,
[16] Giuseppe Bianchi, ‘IEEE 802.11- Saturation Throughput Analysis,’ Bangladesh.
IEEE Communications Letters, pp. 318-320, vol. 2, no. 12, December
1998.
[17] Giuseppe Bianchi and Ilenia Tinnirello, ‘Remarks on IEEE 802.11 DCF Md. Imdadul Islam has completed his B.Sc. and
Performance Analysis,’ IEEE Communications Letters, pp. 765-767, M.Sc Engineering in Electrical and Electronic
vol. 9, no. 8, August 2005. Engineering from Bangladesh University of
[18] Haruo Akimaru and Konosuke Kawashima, ‘Teletraffic Theory and Engineering and Technology, Dhaka, Bangladesh in
Applications,’ Springer-Verlag, Berlin, 1993. 1993 and 1998 respectively and has completed his
[19] Yang Xia and Jon Rosdahl, ‘Throughput and Delay Limits of IEEE Ph.D degree in 2010 from the Department of
802.11,’ IEEE Communications Letters, pp. 355-357, vol. 6, no. 8, Computer Science and Engineering, Jahangirnagar
August 2002. University, Dhaka, Bangladesh in the field of
[20] Howon Lee, T. Kwon and D. H. Cho, ‘An enhanced uplink scheduling network traffic engineering. He is now working as a
algorithm based on voice activity for VoIP services in IEEE 802.16d/e Professor at the Department of Computer Science and Engineering,
system,’ IEEE Communications Letters, Vol. 9, no.8, pp. 691-693, Jahangirnagar University, Savar, Dhaka, Bangladesh. Previously, he worked
August 2005. as an Assistant Engineer in Sheba Telecom (Pvt.) LTD (A joint venture
[21] Sung-Min Oh, Sunghyun Cho, Jae-Hyun and Jonghyung Kwun, ‘VoIP company between Bangladesh and Malaysia, for Mobile cellular and WLL),
Scheduling algorithm for AMR speech codec in IEEE 802.16e/m from Sept'94 to July'96. He has a very good field experience in installation of
system,’ IEEE Communications Letters, Vol. 12, No. 5, pp. 374-376, Radio Base Stations and Switching Centers for WLL. His research field is
May 2008. network traffic, wireless communications, wavelet transform, OFDMA,
[22] Howon Lee and Dong-Ho Cho, ‘VoIP Capacity Analysis in Congnitive WCDMA, adaptive filter theory, ANFIS and array antenna systems. He has
Radio System’, IEEE Communications Letters, Vol. 13, No. 6, pp. 393- more than hundred research papers in national and international journals and
395, June 2009. conference proceedings.
[23] Howon Lee and Dong-Ho Cho, ‘Capacity Improvement and Analysis of
VoIP Service in a Cognitive Radio System’, IEEE Transactions on
Vehicular Technology, Vol. 59, No. 4, pp. 1646-1651, May 2010. M. R. Amin received his B.S. and M.S. degrees in
[24] Jae-Woo So, ‘A down link Performance Analysis of VoIP Services over Physics from Jahangirnagar University, Dhaka,
an IEEE 802.16e OFDMA System,’ IEEE Communications Letters, Vol. Bangladesh in 1984 and 1986 respectively and his
11, no.2, pp. 155-157, Feb’ 2007. Ph.D. degree in Plasma Physics from the University
[25] Qingwen Liu, Shengli Zhou and Georgios B. Giannakis, ‘Cross-Layer of St. Andrews, U. K. in 1990. He is a Professor of
Combining of Adaptive Modulation and Coding With Truncated ARQ Electronics and Communications Engineering at East
Over Wireless Links’, IEEE Transactions on Wireless Communications, West University, Dhaka, Bangladesh. He served as a
Vol. 3, No. 5, pp. 1746-1755, September 2004. Post-Doctoral Research Associate in Electrical
[26] D. Pareit, Margot Deruyck, Emmeric Tanghe, Wout Joseph, Ingrid Engineering at the University of Alberta, Canada,
Moerman, Luc Martens and Piet Demeester, ‘Detailed Modeling of during 1991-1993. He was an Alexander von Humboldt Research Fellow at
MAC Throughput and Ranges for Mobile WiMAX,’ IEEE the Max-Planck Institute for Extraterrestrial Physics at Garching/Munich,
COMMUNICATIONS LETTERS, VOL. 15, NO. 8, pp.839-841, Germany during 1997-1999.
AUGUST 2011. Dr. Amin was awarded the Commonwealth Postdoctoral Fellowship in
[27] Anupam Roy, Md. Imdadul Islam, and M. R. Amin,’MMPP+M/D/1 1997. Besides these, he has also received several awards for his research,
Traffic Model in Video-Data Integrated Service under ATM System,’ including the Bangladesh Academy of Science Young Scientist Award for the
IACSIT International Journal of Engineering and Technology, Vol. 3, year 1996 and the University Grants Commission Young Scientist Award for
No. 6, pp.615-620, December 2011. 1996. He is a member of the IEEE. His current fields of research are wireless
[28] Tonmoy Saha, Md. Abu Shufean, Mahbubul Alam and Md. Imdadul communications and networks in general and nonlinear plasma dynamics.
Islam, ‘Performance Evaluation of the WiMAX Network Based on
Combining the 2D Markov Chain and MMPP Traffic Model,’ Journal of
Information Processing Systems, Vol.7, No.4, pp.653-678, December
2011.