Ashraf Ali Thesis Report(1)

50
7/28/2019 Ashraf Ali Thesis Report(1) http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 1/50  Funded and Supervised by:  Intracom Telecom, Hellas. Prepared By: Ashraf A. Ali [email protected] Supervised By: Prof. Spyros Vassilaras. (AIT)  Dr. Konstantinos Ntagkounakis (Intracom Telecom)  Submitted on: April 2 nd , 2009 "Broadband Services Modeling Over WiMAX Access Networks" Graduation Project Report 

Transcript of Ashraf Ali Thesis Report(1)

Page 1: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 1/50

 

Funded and Supervised by:

 Intracom Telecom, Hellas.

Prepared By:

Ashraf A. Ali

[email protected] 

Supervised By:

Prof. Spyros Vassilaras. (AIT)

 Dr. Konstantinos Ntagkounakis (Intracom Telecom) 

Submitted on: April 2nd

, 2009

"Broadband Services Modeling Over 

WiMAX Access Networks" 

Graduation Project Report 

Page 2: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 2/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

2

 

Graduate Project

Submitted in partial fulfillment of the graduate requirements for the degree of 

 Master of Science in Information and Telecommunication Technologies

(MSITT) at the Athens Information Technology Center of Excellence for 

 Research and Graduate Education.

Page 3: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 3/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

3

 

Table of Contents

ACKNOWLEDGMENTS ..............................................................................................................4 

ABSTRACT .................................................................................................................................5 

LIST OF FIGURES AND TABLES.................................................................................................6 

1. REAL-TIME SCHEDULING ALGORITHMS .............................................................................7 

1.1 INTRODUCTION.......................................................................................................................7 1.2 UNSOLICITED GRANT SERVICE ..................................................................................................8 

1.3 REAL TIME POLLING SERVICE .................................................................................................. 8 

1.4 ENHANCED REAL-TIME POLLING SERVICE .................................................................................. 9 

2. VOIP CODECS .......................................................................................................................12 

2.1 G.711 CODEC.....................................................................................................................122 

2.2 G.729 CODEC.......................................................................................................................13 2.3 EVRC AND AMR CODECS......................................................................................................13 

2.4 G.723.1 CODEC ..................................................................................................................133 

2.5 G.722.1 WIDEBAND CODEC ....................................................................................................14 2.6 ILBC (INTERNET LOW BITRATE CODEC) ……………………………………………………...…………14

3. VIDEO STREAMING OVER DATA RATE……………………………………………………...……….14 

4. BASIC ETHERNET RATE.....................................................................................................145 

4.1 VIRTUAL BRIDGED LOCAL AREA NETWORKS HEADER EFFECT ON BANDWIDTH ................................167 

5. PAYLOAD HEADER SUPRESSION ....................................................................................... 188 

6. PAYLOAD HEADER COMPRESSION .....................................................................................21 

7. VOICE ACTIVITY DETECTION ........................................................................................... 233 

8. ETHERNET SERVICES OVER WIMAX ................................................................................256

 9. PACKET ENCAPSULATION (TOP-DOWN ANALYSIS) .........................................................277 

10. DELAY ANALYSIS .............................................................................................................. 31 

10.1 CODEC AND PACKETIZATION DELAY ......................................................................................31 

10.2 SCHEDULING ALGORITHM ACCESS DELAY .............................................................................333 

UGS access delay................................................................................................................344  

 rtPS access delay ................................................................................................................36 6   

ertPS access delay ...............................................................................................................36 6   

11. BANDWIDTH AND DELAY CALCULATOR ……………………………………………………...…..37

12. SIMULATION …………………………………………………………………………………………..…39

12.2 SIMULATION PARAMETERS AND TOPOLOGY……………………………………………….….40

12.3 SIMULATION RESULTS …………………………………………………………………….…………42

13. FUTURE WORK………………………………………………………………………………….………..47 

REFERENCES ……………………………………………………………………………...………………….48

Page 4: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 4/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

4

ACKNOWLEDGMENTS

First of all, I would like to thank my supervisors; Prof. Spyros Vassilaras and Dr.

Konstantinos Ntagkounakis for their continuous support and feedback during the project

period; they never hesitated to help me. The thanks goes also to Intracom Telecom (R&D

department) for funding the project and to Broadband Wireless and Sensors Networks

(BWiSE) Research group at AIT for supporting me and treating me as a member of BWiSE

family where I have learned a lot from the supervisors and researchers.

Page 5: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 5/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

5

 

ABSTRACT

WiMAX, as a wireless broadband access technology, provides the end users with broadband

services similar to that provided by DSL in the traditional wired access networks. Mobile

WiMAX (802.16e) networks are expected to offer voice services to their users, if they want

to successfully compete against cellular networks. However, as WiMAX networks are all-IP

networks, Voice over IP (VoIP) is the means of offering voice services in this environment.

Moreover, the wireless access introduces additional challenges and constraints on the data

rate requirements for higher layers. This created a need for a bandwidth requirements study

for VoIP services over WiMAX which is addressed in this Thesis. To this end, a very useful

tool has been developed for calculating the Ethernet Bandwidth generated by all common

codec types to be injected in the WiMAX link. The user can select the values of several

parameters that affect the generated traffic (type of codec, headers and headers size, etc.).

The effects of Robust Header Compression, Payload Header Suppression, Voice Activity

Detection with Discontinuous Transmission and other bandwidth affecting factors can also

be studied using this tool. In addition, performance analysis of the real time services has been

performed using the ns-2 simulator for the sake of calculating the bandwidth and overhead

introduced by the WiMAX protocols. Finally, the overhead and added delay of using

different uplink scheduling algorithms was analyzed in this Thesis.

Page 6: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 6/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

6

 

List of Figures and Tables

Figure 1: Grant size based on voice activity ……………………………………………… (8)

Figure 2: UGS Scheduling Algorithm. …………………………………………..………… (8)

Figure 3: rtPS Scheduling Algorithm ……………………………………………………… (9)

Figure 4: ertPS Scheduling Algorithm………………………………..………………….… (10)Figure 5: Packet Transmission Delay…………………………………………………….… (10)

Figure 6: Number of saved uplink and downlink Resources……………………….……. (11)

Figure 7: Scheduling Algorithm for AMR codec…….……………………………………. (11)

Figure 8: 802.1Q header format……………………………………………………………. (17)

Figure 9: DL frame header format…………………………………………………………. (18)

Figure 10: Uplink frame Format………………………………………….………………….. (18) 

Figure 11: Suppressed fields in IP, UDP and RTP………..………………………………. (19)

Figure 12: Packet Headers suppressing Algorithm. ………………….…………………… (20)

Figure 13: Ethernet Frame Format………………………………………………..………… (21)

Figure 14: PHS VS. ROHC……………………………………………………………….…… (23)

Figure 15: Voice Sample ……………………………………………………………………… (23)

Figure 16: Voice Activity Model……………………………………………………………… (24)

Figure 17: SID/Voice frames. ………………………………………………………………… (25)Figure 18: VAD effect on the overall average data rate. .………………………………… (26)

Figure 19: 802.1ad packet format……………………………………….…………………… (26)

Figure 20: Mobile WiMAX Network as DSL access Network…………………..………… (27)

Figure 21: PDU formation. …………………………………………………………………… (29)

Figure 22: WiMAX Frame Structure. ………………………………………………..……… (30)

Figure 23: Ethernet over WiMAX infrastructure. ………………………………….……… (30) 

Figure 24: Top down Encapsulation………………………………………………………… (31)

Figure 25: codec delay with packing example. …………………………………………..… (33)

Figure 26: the access delay of UGS……………………………………………………..…… (35)

Figure 27: Probability distribution function of x1…………………………………….…… (35)

Figure 28: BW and Delay calculator………………………………………………………… (38)

Figure 29: WiMAX network in PMP mode………………………………………………….. (41)

Figure 30: UGS throughput…………………………………………………………………… (43)Figure 31: nrtPS scheduling throughput…………………………………………………..... (43)

Figure 32: nrtPS BW request polling. ………………………………………………………. (44)

Figure 33: rtPS scheduling throughput……………………………………………………… (44)

Figure 34: rtPS BW polling intervals………………………………………………………… (45)

Figure 35: ertPS scheduling throughput…………………………………………..………… (45)

Figure 36: ertPS and BWREQ throughput……………………………………………..…… (46)

Figure 37: Overrall System throughput………………………………….………….…….… (46)

Table 1: G.722.1 codec types ………………………………………….…….…………….…. (14)

Table 2: Bit rate for different video scales. …………………………….….……………….. (15)

Table 3: Pure Ethernet Data Rate. ………………………………………..……………...…. (16)

Table 4: Required bandwidth for 802.1Q frames. …………………….….…………….…. (17)

Table 5: ROHC compression…………………………………………….….………………... (22)

Table 6: Exponential Voice Activity model…………………………….…………………… (24)

Table 7: SID/CN Payload size………………………………………………..………………. (24)

Table 8: Convergence Sublayer type………………………………………..……………….. (28)

Table 9: Codec Delay…………………………………………………………….……………. (32)

Table 10: Simulation Configuration parameters…………………………………….……. (40)

Table 11: Uplink and Downlink Scheduling………………………………….…………….. (41)

Page 7: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 7/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

7

 

1. REAL-TIME SCHEDULING ALGORITHMS

In this section an overview of uplink scheduling algorithms will be introduced, where we

will see the overhead introduced by each scheduling type and the tradeoffs among them. We

start with the scheduling algorithms since both in Fixed WiMAX standard (802.16-2004) and

Mobile extension (802.16-2005) the implementation of the uplink scheduling algorithms is

outside the scope of the standard and left for the vendor to implement it based on his needs.

So, we will introduce the scheduling types that we will use in the remaining part of our study.

1.1 Introduction 

First of all we will briefly introduce the main scheduling algorithms defined in 802.16

standards. The main objective of the scheduling services is to provide minimum QoS level by

anticipating the throughput and latency needs of the uplink traffic and providing grants at the

appropriate times. UGS, rtPS, and ertPS are the real time scheduling algorithms. There are

also other non-real time scheduling services such as nrtPS, and Best effort BE services.

Those services are clearly not suitable for VoIP and other real time services. However, we

mention here the services for completeness.

In 802.16 there are many scheduling algorithms such as UGS, UGS-AD, rtPS, nrtPS, Lee's

Algorithm, and BE scheduling services. However, these algorithms have some problemssuch as waste of uplink resources, additional access delay, and MAC overhead for supporting

VoIP services with variable data rate and silence suppression. Lee's algorithm for example

does not support the variable data rate codecs such as the Enhanced Variable data Rate

Codec (EVRC) since it has only two states (on - off) where the BS assigns uplink resources

based on the SS voice state transitions. So, when certain codec uses Voice Activity Detection

(VAD) or Silence suppression (SS) the on-off state of the voice can be sent to the MAC layer

using primitives of convergence sublayer in the 802.16 systems. Thus the SS can inform the

BS to grant a bandwidth or not based on the value of certain bit in the MAC header [1].

Figure 1 shows the operation of the Base Station according to the state of the user's voice in

the SS.

Page 8: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 8/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

8

 

Figure 1: Grant size based on voice activity

1.2 Unsolicited Grant Service

In the Unsolicited Grant Service (UGS) the scheduler provides to the subscriber station

periodic real time fixed grants, so there is no delay at the subscriber side since it has the

needed resources all the time. The size of each grant should be enough to fit the size of the

data for the associated service with all other headers (such as the generic MAC header and

Grant management sub header). Figure 2 shows the operation of UGS for variable rate

codec.

Figure 2. UGS Scheduling Algorithm.

1.3 Real Time Polling Service (rtPS)

Another scheduling service is the real time Polling Service (rtPS). In this scheduling service

the BS assigns periodic variable size data packets at real time. So, this service requires more

overhead but considered more efficient in using the available bandwidth than UGS since it

allows the subscriber station to determine the exact needed bandwidth at every poll. The rtPS

algorithm supports variable data rates; the base station assigns resources that are sufficient

for the requesting mobile station as shown in figure 3. This approach has many advantages;

the base station only assigns the required bandwidth without wasting resources, so it transfer

Page 9: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 9/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

9

the data more efficiently than other fixed bandwidth allocation algorithms such as UGS.

Moreover, there is no need for polling in the silence period since it operates over 1/8th of the

maximum data rate. However, rtPS needs continuous polling each time the mobile station

wants to send data, this introduce MAC overhead and additional access delay. So actually the

rtPS although it supports variable data rate applications, it is considered not the best choice

for real time services such as VoIP.

Figure 3: rtPS Scheduling Algorithm

1.4 Extended Real-Time Polling Service (ertPS)

The extended real time Polling Service (ertPS) is designed as a compromise between

previous two services. So, it provides unicast grants in unsolicited manner like UGS to save

the latency of the bandwidth request. However, it all the allocations are made dynamically

similarly to rtPS service. ertPS tries to overcome all the problems in other scheduling

algorithms, such as the waste of uplink resources, the additional MAC overhead, and the

additional access delay. So it was developed especially for variable data rate with silence

suppression VoIP services. In this algorithm when the size of voice data packet decreases, the

voice user informs the BS of his voice status using grant management sub header, and the

user request the needed bandwidth using extended piggyback request (PBR) bits of the grant

management sub header. So, as a result of this process there is no waste of uplink resources

as the case in the previous algorithms. In case that the size of the voice data packet increased

the user informs the BS of his status voice information using bandwidth (BR) bits in the

bandwidth request header. So, as shown in figure 4, we only need the bandwidth request

Page 10: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 10/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

10

header only when the size of voice data increase which save the polling overhead of rtPS

algorithm. Moreover we get use of piggybacked information to ask for reducing the allocated

bandwidth from the BS.

Figure 4: ertPS Scheduling Algorithm

Figure 5: Packet Transmission Delay

The enhancement in VoIP capacity and saving the uplink resources using ertPS is

investigated in [4] which shows that ertPS can support more VoIP users within certain upper

bound access delay (which is assumed 60 ms) as shown in figure 5. The access delay is the

time needed for the packet to wait in the queue before being scheduled in the frame to be

sent, we will explain it in detail later in delay analysis section. It is clear from figure 5 that

increasing the number of VoIP users will increase the needed access delay which should not

exceed certain limit in order to guarantee certain value for real time services.

Page 11: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 11/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

11

 Figure 6: Number of saved uplink and downlink Resources

Moreover, ertPS saves more uplink and downlink resources than the UGS and rtPS since

each resource, which is the needed bits per frame per user, using the same codec type is less

than the other algorithms. Moreover, the saving in the uplink and downlink resourcesincreases as the number of VoIP user increase. Figure 6 shows the saved resources saved in

ertPS compared to UGS and rtPS over different number of users.

Figure 7: Scheduling Algorithm for AMR codec

One of the promising VoIP codecs that was considered by IEEE 802.16 task group m as a

strong candidate for the 802.16 m systems is the Adaptive Multi-rate codec (AMR) [3]. This

codec generate 95-477 bits speech frames every 20 ms, and generate Silence Insertion

Descriptor (SID) frame every 160 ms of the silent period. It is obvious that this type of 

codecs can not work with the Lee's algorithm since it causes a waste of uplink resources.

Moreover, since the allocated BW in the silent period of Lee's algorithm is too small, it will

not be able to send the SID frame during the silent period. On the other hand there is no

problem in the rtPS algorithm since the SID frame can request the needed bandwidth from

the BS by explicit request. So, a new algorithm was proposed in [3] that is designed for AMR

Page 12: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 12/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

12

codec. The operation of the algorithm is described in figure 7. in silent period the base

station stops the allocation of periodic grant period, then in case of a talk activity the SS

informs the BS about the voice activity and the needed grant size using Bandwidth-Request-

and-Uplink-Sleep-Control (BRUSC) header, then the BS allocates the grant periodically

every 20 ms and in case of data rate change it can adapt easily to the new rate by sending a

new bandwidth request. On the other hand, in case of a silent period the SS send a request to

the BS using the BR field in order to get a grant to send the SID during the silent period

whenever it is received. As shown in figure 7 the wasted resources are minimized.

2. VoIP CODECS 

In order to determine precisely the bandwidth requirements of the VoIP services, we need to

investigate the different Codec types that are being used in nowadays networks, and based on

the studied specification we will be able to exploit the differences and trade ofs among

different codecs; such as needed bandwidth, Codec delay, Quality of voice, and the added

overhead. First of all we will start with brief discussions of most used VoIP codecs and

analyze them then we will make a comparative study among them.

It is important to note that since VoIP is expected to be the killer application of Broadband

access networks, knowing the bandwidth to support the largest number of user within

acceptable QoS guarantees is of a great importance. Hence, we investigated the bandwidth

requirements of different VoIP codecs.

2.1 G.711 Codec

The G.711 is a voice codec that is widely used in different applications [7]. The sampling

rate is 8 KHz and the samples are partitioned into 10 ms frames with bit rate of 64 Kbps

which present a very good voice quality, however in large scale usage may cause a

bottleneck in the network parts that cannot adapt to the large bandwidth requirements. So, in

order to enhance the performance of this algorithm in packet based multimedia applications

such as VoIP, a modified version of the base algorithm was proposed in G.711 Appendix II

[8]. The algorithm use Discontinuous Transmission (DTX), Voice activity Detection (VAD),

and Comfort Noise Generation (CNG) Algorithms in order to reduce the bit rate in a packet

based applications and hence increase the bandwidth efficiency. Table II.1/G.711 in [8]

Page 13: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 13/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

13

shows the bandwidth saving can reach to 39% reduced bandwidth compared to the basic

G.711 Algorithm.

2.2 G.729 Codec

G.729 operates on speech frames of 10 ms corresponding to 80 samples at a sampling rate of 

8000 samples per second with 8 KHz sample rate, but it needs 5 ms look ahead delay which

makes the total algorithmic delay 15 ms [5]. Annex A of the standard (G.729 a) has the same

main features of G.729 but considered as a reduced complexity version. It has been

developed for multimedia simultaneous voice and data applications. However a silence

suppression scheme is developed as Annex b of the standard (G.729 b), it defines a voice

activity detector (VAD) and comfort noise generator (CNG) for G.729 in order to reduce the

transmission rate during the silence period. So, G.729b has been heavily used in VoIP

applications for a long time.

2.3 EVRC and AMR Codecs

There is also other type of codecs that has different bit rates. EVRC and AMR are examples

of such codec types. As described in the previous section the Adaptive Multi-rate (AMR)

speech coded is one of the strong candidates for 802.16 m [3]. The AMR codec consists of 

eight source codecs with bit-rates of 12.2, 10.2, 7.95, 7.40, 6.70, 5.90, 5.15 and 4.75 kbps.

the coder operates over 20 ms frames where in each frame, 95, 103, 118, 134, 148, 159, 204

or 244 bits are produced, corresponding to a bit-rate of 4.75, 5.15, 5.90, 6.70, 7.40, 7.95, 10.2

or 12.2 kbit/s. On the other hand, EVRC changes the data rate from the full rate to 1/8th of 

the full rate based on the voice activity. EVRC compresses each 20 milliseconds of 8000 Hz,

16-bit sampled speech input into output frames in one of the three different sizes: Rate 1 (171

bits), Rate 1/2 (80 bits), or Rate 1/8 (16 bits).

2.4 G.723.1 Codec

G.723.1 is an example of low rate coders; this coder has two bit rates associated with it 5.3

and 6.3 kbps it can switch between the two rates at the frames boundary The frame size is 30

ms with look ahead of 7.5 ms, resulting in a total algorithmic delay of 37.5 ms. The encoder

operates on blocks (frames) of 240 samples each. That is equal to 30 ms at an 8-kHz

Page 14: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 14/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

14

sampling rate. Each frame holds 189 bits in case of 6.3 Kbps and 158 bits in case of 5.3 Kbps

[18].

2.5 G.722.1 Wideband Codec

G.722.1 digital wideband coder algorithm provides an audio bandwidth of 50 Hz to 7 kHz,

operating at a bit rate of 24 kbps or 32 kbps. It operates on 20-ms frames (320 samples) of 

audio with look-ahead buffer size of 20 ms. The frame size is 480 bits for 24 Kbps and 640

bits for 32 Kbps. G.722.1 Annex C [19] the sampling rate doubles from 16 to 32 kHz, and it

supports three data rates as shown in table 1.

Table 1: G.722.1 codec types.

2.6 iLBC (internet Low Bitrate Codec)

iLBC is suitable for robust voice communication over IP. The codec is designed for narrow

band speech and results in a payload bit rate of 13.33 kbps with an encoding frame length of 

30 ms and 15.20 kbps with an encoding length of 20 ms. iLBC codec enables graceful speech

quality degradation in the case of lost frames, which occurs in connection with lost or

delayed IP packets.

3. VIDEO STREAMING OVER DATA RATE 

In this section we will show the bandwidth need of video streaming applications. However,

in the following sections we will focus on only VoIP as example of real time service. In

video streaming services, we need to provide a flexible bitstream adaptation for multimedia

services. Hence, a new category of video coding called Scalable Video Coding (SVC) is used

Page 15: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 15/50

Page 16: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 16/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

16

Where TS is the Total Frame Size, RTP is RTP header, IP is IP header, UDP is UDP header,

Eth. is Ethernet Header, CRC is CRC header, SS is Voice Sample Size, NoS is Number of 

Samples per Frame, DR is Data Rate, and PPS is Packets Per Second.

Table 3: Pure Ethernet Data Rate. 

Codec  Sample

Time

(ms) 

Frame

Size

(bits) 

PPS  IP

Header

(bits) 

RTP

Header

(bits)

UDP

Header

(bits)

Ethernet

Header+ CRC

(bits)

Total

FrameSize

(bits)

Total

RateKbps

G.711  10  640 100  160  96  64 144 1104 110.40

G.729  10  80 100  160  96  64 144 544 54.40

G.723.1

5.3 Kbps 30  158 33  160  96  64 144 622 20.52

G.723.1

6.3 Kbps

 

30  189 33  160  96  64 144 653 21.54

G.722.1

24 Kbps 20  480 50  160  96  64 144 944 47.20

G.722.1

32 Kbps 20  640 50  160  96  64 144 1104 55.20

G.722.1C

48

Kbps* 

20  960 50  160  96  64 144 1424 71.20

EVRC

Rate1 20  172 50  160  96  64 144 636 31.80

EVRC

Rate1/2 20  80 50  160  96  64 144 544 27.20

EVRC

Rate1/8 20  16 50  160  96  64 144 480 24

AMR

4.75

Kbps 

20  95 50  160  96  64 144 559 27.95

AMR

12.2

Kbps 

20  244 50  160  96  64 144 708 35.40

Page 17: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 17/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

17

4.1 Virtual Bridged Local Area Networks header effect on Bandwidth

With 802.1Q standard the formation of virtual LANs inside the network is allowed and thus

the inter-communication between different VLANs is also possible using three layer switches

or routers. However, this implies that we need extra headers to be added to the Ethernet

headers in order to support VLAN tagging process. Figure 8 shows the frame format of the

802.1Q standard where it shows that 32 bit extra header is added. (TPID, PCP, CFI, VID).

[23]

Figure 8: 802.1Q header format 

The Tag Protocol Identifier (TPID) is a 16 bit field that is always set to 0x8100 in order to

identify the 802.1Q frame. The Priority Code Point (PCP) is a three bit field that is used to

priorities the real time traffic. The Canonical Format Indicator (CFI) is one bit field that

indicate whether the MAC address format is canonical or not. And finally, the Virtual LAN

Identifier (VID) is a twelve bit field that indicates the Virtual LAN number the packet

belongs to.

Table 4 shows the new bandwidth requirements after counting the additional 802.1Q header.

The increase in the bandwidth required ranges from 2.2% to 6.6% based on the codec used.

Table 4: Required bandwidth for 802.1Q frames.

Codec G.711 G.729

G.723.1

5.3

G.723.1

6.3

G.722.1

24

G.722.1

32

G.722.1

C

48

EVRC

Rate1

EVRC

Rate1/2

EVRC

Rate1/8

AMR

4.75

AMR

12.2

Total

Size

1136 576 654 685 976 1136 1456 668 576 512 591 740

Total

Rate

113.6 57.6 21.5 22.6 48.8 56.8 72.8 33.4 28.8 25.6 29.55 37

Percent

change

2.8% 5.8% 5.1% 4.9% 3.3% 2.8% 2.2% 5.0% 5.8% 6.6% 5.7% 4.5%

Page 18: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 18/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

18

5. PAYLOAD HEADER SUPPRESSION

Wireless resources are considered scarce. Hence, we need to save the resources using header

compression and suppression since there is redundancy in information and we need to save

the bandwidth to increase the capacity of the system. But, before discussing the suppression

and compression, we will first study the overhead at the MAC and Physical layer in order to

have idea about the wasted bandwidth due to the added overhead.

Figure 9: DL frame header format 

The overheads in the downlink and uplink frames are shown in figure 9 and figure 10. As

shown in figure 9, there are many overheads. In the physical layer there are Preamble, FCH,

Broadcast Messages, and Padding. And in the MAC layer there are MAC header, MAC

subheaders (optional), and CRC. On the other hand figure 10 shows the overheads such as

the contention slots, and MAC headers at the UL physical PDU.

Figure 10: Uplink frame Format  

As discussed previously, the need for saving the bandwidth and reducing the overhead

becomes very important. So, next we will investigate the methods proposed for this purpose

in VoIP. In Payload Header Suppression (PHS) the redundant parts due to the higher layers

in the payload header of MAC SDU are suppressed and then returned at the receiver side.

Those headers are RTP, UDP, and IPv6 headers. Which adds 60 -120 bytes of overhead. It is

important to note that only the constant parts of the headers within the same flow are

Page 19: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 19/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

19

suppressed, the suppressed fields in RTP, UDP, and IPv6 are shown in figure 11. The entire

shaded field can be suppressed, so as shown in [13] we can reduce the 60 byte headers to 15

bytes using PHS in the maximum case and in average to 30 bytes.

Figure 11: Suppressed fields in IP, UDP and RTP

When the PHS is enabled, each MAC SDU is prefixed with Payload Header Suppression

Index (PHSI) which references the Payload Header Suppression Field (PHSF) [11]. The

process of suppressing the PDU header is shown in figure 12.

Page 20: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 20/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

20

 

Figure 12: Packet Headers suppressing Algorithm.

Since the PHS rule determine the fields that have to be suppressed and this rule differs from

one packet to another; hence the suppression and thus the affect on the total packet size will

differ from one packet to another, Figure 13 shows the all the headers in the Ethernet PDU.

We assume that Ethernet Header (14 bytes) is suppressed; 37 bytes are suppressed from IP

Page 21: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 21/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

21

field in case that IPv6 is used as indicated by figure 11. And 8 bytes are suppressed in case

IPv4 is used which represent the source and destination addresses. Moreover, in the UDP

header 4 bytes are suppressed as indicated in figure 11 that represent the source and

destination port addresses. And from the RTP header we can suppress the SSRC identifier (4

bytes) as shown in figure 11.

Based on the above assumptions we can reduce the total header (Ethernet, IP, UDP, RTP,

CRC) from 58 bytes to 30 bytes in case we use IPv4. On the other hand, we reduce the total

header from 78 to 59 in case of IPv6. However, we add only one byte as a Payload Header

Suppression Index (PHSI).

Figure 13: Ethernet Frame Format 

So the Total Size of the Ethernet Frame is given as follows:

( ). * SB+PHSIPHS 

TS RTP IP UDP Eth CRC SS NoS  = + + + + + − ………….. (3)

6. PAYLOAD HEADER COMPRESSION

Another way to save bandwidth and reduce the overhead is using header compression. The

CS may use one of compression algorithms to compress the header and decompress again at

the receiver side. There are many header compression protocols, Robust Header

Compression (ROHC) protocol is one of the best algorithms that outperform other protocols

since it has the ability to tolerate high loss rate in wireless connections [14]. The protocol has

different values of compression efficiency based on the operation mode. There are three

modes of operation; the Unidirectional, the Bidirectional Optimistic, and the Bidirectional

Reliable mode.

The basic concept of ROHC is to find the redundancies in packet headers. IP, UDP, and RTP

headers all have many redundancies within the same packet (intra-redundancy) and between

different packets within the same service flow (inter-redundancy). Moreover, the changes in

many fields are incremental between consecutive packets. So we can efficiently suppress and

Page 22: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 22/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

22

compress many fields in the headers [24]. The compression algorithm of ROHC is very

complicated and as mentioned previously the compression ratio and efficiency depends on

redundancy among packets. However in [24] it was found that compression ratio for

IPv4/UDP/RTP headers is 2.5% to 5% which means that the 40 bytes header is compressed

to 1~2 bytes. For simplicity we will assume that the size of the header after compression is 2

bytes [25]. On the other hand Table 5 shows that using the high efficiency compression

RTP/UDP/IPv6 headers were reduced from 60 bytes to 4 bytes. So, generally specking

ROHC compresses the header to less than 10% of the original size.

Table 5. ROHC compression

The Saved Bytes using ROHC is:

( )  ROHC SB IP UDP RTP H  = + + − ………………………………………………… (4)

Where SB is the saved bytes after using ROHC and  ROHC  H 

is the new header size in bytes,

which depends on the version of IP used.

And the Total size of the Ethernet frame is given as follows:

( ). * SB ROHC 

TS RTP IP UDP Eth CRC SS NoS  = + + + + + − ……………………… (5)

Based on the previous discussion, we compared between ROHC, PHS, and the basic Ethernet

Bitrate. As shown in figure 14 there is a considerable saving in bandwidth in PHS. But the

improvement added by ROHC is small. Hence, we prefer using PHS due to its computational

simplicity.

Page 23: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 23/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

23

 

Figure 14. PHS VS. ROHC 

7. VOICE ACTIVITY DETECTION

The Voice Activity Detection (VAD) or Silence Suppression (SS) is a technique used in

many codecs in order to save the VoIP bandwidth. So, VoIP frames will not be generated

continuously for each user, since there are silent periods and talk periods as shown in the

voice sample in figure 15.

Figure 15. Voice Sample

It was found statistically the mean duration of both ON period and OFF periods follow the

exponential distribution parameters given in table 6.

0

20

40

60

80

100

120

   G .   7

   1   1

   G .   7

   2   9

   G .   7

   2   3 .   1

   5 .   3

   K   b  p  s

   G .   7

   2   3 .   1

   6 .   3

   K   b  p  s

   G .   7

   2   2 .   1

   2   4   K   b  p  s

   G .   7

   2   2 .   1

   3   2   K   b  p  s

   G .   7

   2   2 .   1

   C

   4   8   K   b  p  s

   E   V   R   C

   R  a   t  e   1

   E   V   R   C

   R  a   t  e   1   /   2

   E   V   R   C

   R  a   t  e   1   /   8

   A   M   R   4 .   7

   5

   K   b  p  s

   A   M   R   1   2 .   2

   K   b  p  s

   B   i   t   R  a   t  e   (   K

   b  p  s   )

Default Ethernet Bit Rate PHS Bit Rate ROHC Bit Rate

Page 24: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 24/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

24

Table 6: Exponential Voice Activity model

Each source will alternate between OFF-state and ON-state for certain period as shown in

figure 16.

Figure 16: Voice Activity Model

It is important to note that during silence periods, the Codec send Silence Insertion

Descriptor (SID) in order to send the information of the background noise to the codec at the

receiver side. The SID frame compresses information for sounds that are audible for the

human ear perception. The payload size for different types of codecs is shown in table 7. It is

important to note that this is only the Payload size without packing. So we have to consider

also IP/UDP/RTP headers and the link layer added header for the final packet size.

Moreover, the SID frames are not sent successively back to back. It is usually sent either

based on considerable change in the background noise or uniformly.

Table 7: SID/CN Payload size

CodecG.71

1

G.72

9

G.723.1

5.3

G.723.1

6.3

EVRC

Rate1

EVRC

Rate1/2

EVRC

Rate1/8

AMR

4.75

AMR

12.2

SID/CN

Payload 8* 16 32 32 16 16 16 40 40

Page 25: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 25/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

25

 

Actually, the size of SID payload is very small. However after adding the headers of 

Ethernet/IP/UDP/RTP the size will be considerable and must be included in the calculations

of average bit rate over both the ON and OFF periods as shown in figure 17.

Figure 17. SID/Voice frames.

The voice rate , SID rate, and average total rate is given as follows:

……………………….. (6)

……………..………… (7)

……………...………… (8)

WhereV 

 R ,v

 L ,SID

 R ,SID

 L , Avg

 R ,η , and DTX 

F  are the Voice rate, length of the voice sample,

SID rate, length of SID frame, average total rate, voice activity factor, and discontinuous

transmission ratio.

We calculated the average data rate of several Codecs assuming the voice activity follows

exponential distribution and the SID frames are sent uniformly (  DTX F  =50%). The result is

shown in figure 18.

. . .(1 )

vV 

SID

SID

 Avg V SID DTX 

 L R

 L R

 R R R F η η 

=

=

= + −

Page 26: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 26/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

26

 

Figure 18. VAD effect on the overall average data rate.

8. ETHERNET SERVICES OVER WiMAX

WiMAX networks need to support transparent Ethernet, so we need to add extensions to

support the interfacing between the wired Ethernet-based DSL and the WiMAX. IEEE

802.1ad-2005 is one of the standards that offer the capabilities of IEEE 802.1Q virtual

bridged LANs to a number of customers with no need for alignment across the customers.

The format of the standard is shown in figure 19.

Figure 19: 802.1ad packet format 

As shown in figure 19, the standard adds another layer of addressing to 802.1Q. The

Customer VID (C-VID) and the Service Provider VID (S-VID) both are used to address

traffic between the end customer and service providers. This is called VLAN stacking or Q-

in-Q which is the most widely used in Ethernet Carriers in service provider networks

especially in DSL networks. The different modes of Q-in-Q networks are mentioned in [26].

It is important to know that the Mobile WiMAX Networks can support the Ethernet services

and/or the IP services together as we will see in the following sections. WiMAX network can

emulate the behavior of DSL networks in terms of connectivity between customer interface

(T interface) and the service Provider Interface (V interface). The idea is shown in figure 20.

Page 27: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 27/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

27

 

Figure 20: Mobile WiMAX Network as DSL access Network 

9. PACKET ENCAPSULATION (TOP-DOWN ANALYSIS)

The VoIP frames generated by the codec are encapsulated at the MAC layer. There are two

layers in the MAC layer; the Convergence Sublayer (CS), the MAC Common Part Sublayer,

and the MAC Security Sublayer. The CS receives data packets named Service Data Units

(SDU) from the higher layer. This layer acts as an adaptation layer that performs certain

operations, such as header compression, on SDUs based on the operating protocol in the

higher layer. Table 8 shows the different higher layer protocol convergence sublayers that are

supported in WiMAX. However, only the IP and Ethernet (802.3) CS are implemented in

WiMAX Forum.

Page 28: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 28/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

28

Table 8: Convergence Sublayer types

One of the optional implementations of the CS is to perform Payload Header Suppression

(PHS) on SDUs; this will save the bandwidth by removing redundant data after merging

several SDUs together. So, this operation is used in bandwidth sensitive services such as

VoIP. The suppressed part of the header depends on the associated service. For example, in

VoIP applications the repetitive part of the header includes source IP, destination IP, and the

length indicator.

On the other hand, the Common Part Sublayer works independently from the higher layers. It

receives the SDUs from the higher layers and assembles or fragments the SDUs depending

on their size to make MAC Payload Data Units (PDU) after adding the MAC header. The

PDUs are scheduled in the frame as a Downlink or Uplink Burst which shares a common

quality of service among different PDUs and considered the basic payload field in the

WiMAX frame. Figure 21 clarifies the idea.

Page 29: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 29/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

29

 Figure 21: PDU formation.

As shown in figure 21 the MAC header is added to every PDU. There are two types of 

headers; the generic WiMAX header, and the bandwidth request header. The generic PDU is

used to carry data, such as VoIP frames, and the MAC layer signaling messages. The size of 

the generic MAC header is 6 bytes. On the other hand the bandwidth request PDU is used by

the subscriber to request certain amount of bandwidth from the base station, but the

bandwidth request PDU does not carry CRC or payload. It is important to note that there are

also other sub headers that follow the generic MAC header and used for specific purposes.

After adding the MAC header, the PDUs are passed to the scheduler which uses a scheduling

algorithms to allocate the needed bandwidth over the physical resources based on the quality

of service requirements, channel state and fairness. The scheduler determines the optimum

usage of the physical resources on frame by frame bases in order to meet the channel

coherence time. VoIP PDUs for example need minimum amount of bandwidth based on the

voice encoding standard being used. Hence the scheduler must ensure that this minimum BW

is satisfied for all allocated VoIP users within the WiMAX frame. The frame structure is

shown in figure 22. Moreover, the scheduler must be able to select the sub carriers for each

user to satisfy the highest throughput over good channel conditions. However, it is important

to note that there is no specific scheduling procedure to be used, and it was left for the

manufacturer to implement the scheduling approach. But we can say that there are two broad

scheduling categories in WiMAX; (1) Algorithms that minimize the total transmission power

with a constraint on user data rate, and (2) Algorithms that maximize the total data rate with a

constraint on the total transmit power. So there is trade off between the maximum total data

Page 30: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 30/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

30

rate and the total transmitted power. However, most WiMAX algorithms fall in the second

category such as: Maximum Sum Rate Algorithm, Maximum Fairness Algorithm,

Proportional Rate Constraints Algorithm, and Proportional Fairness Scheduling.

Figure 22: WiMAX Frame Structure.

As mentioned previously, WiMAX forum also supports Ethernet frame Convergence

Sublayer. We need Ethernet over WiMAX in order to offer Ethernet transparent connectivity

over wireless access network, for example in areas where there is no wired infrastructure as

shown in figure 23. Where the service provider operates over Ethernet network and the

Ethernet packets are encapsulated over WiMAX network.

Figure 23: Ethernet over WiMAX infrastructure. 

It is important to note that the support of Ethernet does not require a new network 

architecture since it is smoothly supported into the Mobile WiMAX network architecture and

can operate in parallel with IP services in the same network.

Figure 24 shows the general layered hierarchy starting from the voice encoding until the

802.16 frame formation process [20].

Page 31: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 31/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

31

 

Figure 24: Top Down Encapsulation

10. DELAY ANALYSIS

In this section we will analyze the delay of VoIP from the subscriber station to the core

network. It is described in ITU-T G.114 [15] that the mouth to ear delay for real time

services such as VoIP should not exceed 150 ms in order not to be significantly affected.

However, delays that exceed 400 ms are not acceptable for real time services. Next in this

section we will describe all delay components that contribute to the total mouth to ear delay,

starting from the codec and packetization delay, scheduling delay, access and transmitting

delay, network delay, and receiver side delay

10.1 Codec and Packetization Delay 

The ITU-T G.114 standard describes the codec delay. The codec wait for certain speech

sample time before processing and compressing in a frame, the frame will not be generated

until all the voice samples are collected by the encoder. This time differs from one codec to

another. Moreover, some codecs, as described in previous sections, has a look a head time to

improve the compression efficiency. So, the codec delay is equal to the frame size plus the

Page 32: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 32/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

32

look ahead delay (if exist). We ignore the delays due to encapsulation and adding headers to

pass the frame to the MAC layer since it is very small and negligible. Table 9 shows the

sample and look ahead delay for each codec.

Table 9: Codec Delay.

Codec Type Sample Time Look ahead time

G.711 10 0

G.729 10 5

G.723.1 5.3 Kbps 30 7.5

G.723.1 6.3 Kbps 30 7.5

G.722.1 24 Kbps 20 20

G.722.1 32 Kbps 20 20

G.722.1C 48 Kbps 20 20

EVRC Rate1 20 10

EVRC Rate1/2 20 10

EVRC Rate1/8 20 10

AMR 4.75 Kbps 20 5

AMR 12.2 Kbps 20 5

It is important to know in 802.16 the convergence sublayer (CS) may pack multiple frames

from the higher layers (i.e. VoIP SDUs) in one PDU. If this is the case, then we have to wait

an additional frame time before generating the PDU to the physical layer. The idea is

explained in [15] but for IP networks, I use the same figure 25 in the reference to clarify the

idea.

Page 33: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 33/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

33

 

Figure 25: codec delay with packing example.

In figure 25 the CS pack two frames in each PDU. In this case the delay increase by one

frame time compared to the normal case where one frame is packed in every PDU.

10.2 Scheduling Algorithm Access Delay

After studying the codec and packetization delay, we are now ready to analyze the

scheduling algorithm delay. We will analyze the downlink scheduling and uplink scheduling

delay.

In downlink, the BS scheduler looks into each peer node and tries to schedule data from its

connections to the downlink sub-frame. The service of connections is performed in a round

robin way. As long as there is free space in the downlink sub-frame, the scheduler will assign

a data burst to the connection. Once the free space in the downlink sub-frame is over, the

scheduler will remember where it has stopped, and in the next frame it will continue to assign

bursts from there. So, as long as there is enough space for the data in the downlink sub frame,

the scheduler will send it immediately [20].

In uplink, the BS scheduler will first reserve space for contention slots. The information

about the bandwidth needs is stored in the peer node objects in the MAC layer. When

scheduling uplink transmissions, the scheduler will look at this information from

connections, and will use a round robin procedure as for the downlink part. During this

process, it will also add 1 OFDM symbol (= short preamble) between bursts. The SS 

scheduler  is responsible for taking the data transmission opportunities allocated by the BS

and for assigning them to the appropriate incoming connections. If bandwidth is assigned to a

given connection, the SS scheduler will also fill the bursts with the data from its outgoing

connections. If the SS has not an outstanding request, the SS scheduler looks at all outgoing

Page 34: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 34/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

34

connections and generates bandwidth requests, sent in the contention phase. Each request is

of the aggregated type [20].

The access delay depends on the scheduling service. We will analyze mainly three real time

scheduling services; UGS, rtPS, and ertPS.

UGS access delay

In UGS Algorithm, the base station will provide the subscriber station with fixed sized grants

that are negotiated during connection establishment phase. So, the subscriber station can

always send the data to the base station. Hence, the access delay for this scheduler is the

same as the MAC frame duration. However, it is important to note that this applies as long as

the number of subscriber station is within the maximum number of stations the UGS can

support. Otherwise, an additional queuing delay will be added.

The access delay is given by the equation 9; where the average time is calculated rather than

the max time in the worst case.

………………………..(9)

Wheretx_ugsT  , DLT  ,

ttgT ,

ULT , 1 x , and  2 x , are the UGS transmission delay, Downlink sub frame

duration, Transmission transition gap, Uplink sub frame duration, random variable that 

represent the arrival of voice frames from higher layer as multiple of slot duration, random

variable represent multiples of slot duration in the uplink interval.

From the above equation we note that x1 ranges from 0 slots until the integer value of 

maximum number of slots in the downlink sub frame. Assuming using Partial Usage Sub

Carrier (PUSC) in both the uplink and downlink intervals, the slot duration in the downlink 

sub frame equals three symbols and two symbols in the uplink interval. Figure 26 shows an

example of WiMAX super frame with total period of 5 ms. So, in this example the duration

of downlink sub frame equivalent to 8 slots and 10 slots in the uplink sub frame.

tx_ugs DL 1 2

ULDL1 2

T = [T .2 ] [ .3 ]

TTwhere x {0, }, and x {0, }

2. 3.

sym ttg sym

sym sym

 x T T x T 

T T 

− + +

∈ ∈

Page 35: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 35/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

35

 

Figure 26: The access delay of UGS 

Where 1( ) f x and similarly 2( ) f x is represented as shown in figure 27 as a uniform

distribution function. Hence, the probability of frame arrival is uniform over the downlink 

and uplink periods.

Figure 27 Probability distribution function of x1

Finally, we calculate the Average transmission duration by taking the expectation of equation

9 as follows:

( ) ( )tx_ugs tx_ugs DL 1 2

tx_ugs DL 1 2

T ( .) T [T .2 ] [ .3 ]

T ( .) [T .2 ] [ .3 ]

sym ttg sym

sym sym ttg

 Avg E E x T T x T 

 Avg E x T x T T 

= = − + +

= − + +

………….…. (9)

Assuming uniform probability distribution function, we get the following:

DLtx_ugs

TT ( .)

2 2

ULttg

T  Avg T = + + ………………………………………….….. (10)

Page 36: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 36/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

36

rtPS access delay

This algorithm, as mentioned previously, is used to support real-time service flows that

generate variable size data packets periodically. Hence, the BS assigns uplink resources that

are sufficient for unicast bandwidth requests to the voice user. This period is negotiated in theinitialization process of the voice sessions. Generally, this process is called a bandwidth

request process, or polling process. This bandwidth request process always causes MAC

overhead and additional access delay. Hence, the rtPS algorithm has larger MAC overhead

and access delay than the UGS and ertPS algorithms.

The transmission delay over rtPS scheduling is given in the following equation:

……………………………………(11)T tx_rtPS = T mf + T tx_ugs

Which means that the transmitter has to wait one MAC frame time for polling BS and then

he transmit his data in the uplink field similar to the UGS case. Thus the difference between

the UGS and the rtPS delays is the MAC frame time (Tmf ).

ertPS access delay

This algorithm is designed to support real-time service flows that generate variable size data

packets on a periodic basis, such as VoIP services with silence suppression. This algorithm is

recently proposed and accepted in IEEE 802.16e standard. In order not only to reduce MAC

overhead and access delay of the rtPS algorithm, but also to prevent the waste of uplink 

resources of the UGS algorithm, the ertPS algorithm assigns uplink resources according to

the status of the voice users without MAC overhead. The user requests the bandwidth for

sending the voice packets using extended PBR (Piggyback Request) bits of Grant

Management sub header. In the ertPS algorithm, to distinguish these extended PBR bits with

general PBR bits, the user sets the MSB of PBR bits to 1. In this case, the BS assigns uplink 

resources according to the requested size periodically, until the voice user requests another

size of the bandwidth.

Page 37: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 37/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

37

So, [22] shows that the access delay for this algorithm follows the same equation for that of 

UGS since it uses piggybacking algorithm that affect the overhead not the access time. So

ertPS access time is given be the following equation:

……………………………(12)T 

tx_ertPS 

= T 

tx_ugs

 

11. BANDWIDTH AND DELAY CALCULATOR

Based on all the previous bandwidth and delay analysis, we developed a flexible bandwidth

and subscriber to core network delay calculator. Using this tool, which is shown in figure 28,

the user can do the following:

1)  Set the header values (such as selecting between IPv4 and IPv6) adding the 802.1Q

header.

2)  Select one of the fourteen supported Codecs and select the number of samples per

frame (which affect the total delay and data rate). 

3)  Moreover, the user can see the parameters associated with selected codec type such as

number of packets per second, the frame duration and size. 

4)  Select the operating Convergence Sublayer service (either Ethernet over WiMAX or

IP over WiMAX) 

5)  Select one of the compression and suppression techniques (PHS, ROHC, or none) and

based on the selected value display the saved bytes after using suppression or

compression.

6)  Select whether Voice Activity detection is used or not, and set all the associated

parameters with it such as: Voice Activity factor, and discontinuous transmission

ratio. And based on that display the SID frame size and the average number of saved

bits using VAD. 

7)  Select whether the headers needed to provide DSL like services over WiMAX are

included or not. 

8)  Display the MAX and Average final required data rate based on the selected values

described above. 

Page 38: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 38/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

38

9)  Set the WiMAX super frame duration and set the percent of the Downlink interval to

the total frame duration. 

10) Display the look a head delay, Sample time, Processing delay and total Codec delay

based on the selected codec type.

11) Display the scheduling delay for all real time scheduling types as discussed before. 

12) Finally, Display the total subscriber to core network delay. 

Figure 28 BW and Delay calculator 

Page 39: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 39/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

39

12. SIMULATION

We used the network simulator ( NS2) in order to study the uplink scheduling algorithms and

its performance. Section 11.1 will present a brief overview of NS2, Section 11.2 will present

the simulation environment and topology, and finally some results of the scheduling

algorithms overhead will be presented in section 11.3.

12.1 Network Simulator ( NS2)

NS (version 2) is an object-oriented, discrete event driven network simulator developed at

UC Berkely and written in C++ and OTcl (Tcl script language with Object-oriented

extensions). NS2 implements network protocols such as TCP and UDP, traffic source

behaviour such as FTP, Telnet, Web, CBR and VBR, router queue management mechanism

such as Drop Tail, RED and CBQ, routing algorithms such as Dijkstra, and more. NS also

implements multicasting and some of the MAC layer protocols for LAN simulations.

NS-2 includes a tool for viewing the simulation results, called NAM. NAM is a Tcl/TK

based animation tool for viewing network simulation traces and real world packet trace data.

The first step to use NAM is to produce the trace file. The trace file should contain topology

information, e.g., nodes, links, as well as packet traces. Usually, the trace file is generated by

NS. During an ns simulation, user can produce topology configurations, layout information,

and packet traces using tracing events in ns. When the trace file is generated, it is ready to be

animated by NAM. Upon start-up, NAM will read the trace file, create topology, pop up a

window, do layout if necessary, and then pause at the time of the first packet in the trace file.

Through its user interface, NAM provides control over many aspects of animation 

The official NS2 module does not support WiMAX MAC. In order to support WiMAX over

NS2 we used the module developed by Networks & Distributed Systems Laboratory (NDSL)

centre, which is part of the Chang Gung University in Taiwan. The module supports Point to

Multipoint MAC mode (PMP) which is needed in our case for the connectivity between the

base station and surrounding subscriber stations. The module does not support mobility,

hence the modulation and coding schemes does not change based on the distance changing

between the subscriber and base station.

Page 40: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 40/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

40

12.2 Simulation Parameters and Topology

Using the NDSL module described before, we have simulated a small network of one base

station surrounded by several subscriber stations. The parameters of the simulation are shown

in Table 10. We used 5 ms WiMAX frames with 3:1 downlink to uplink duration. It is

important to note that since the NDSL module used does not support mobility, the

modulation schemes are not adaptive and fixed over the simulation time. In other words, the

modulation and coding does not change when the distance between the subscriber and base

station changes. Moreover the nodes are fixed in positions and hence the transmission power

is fixed regardless of the position from the base station.

Table 10: Simulation Configuration parameters.

Total number of subcarriers 2048

Frame duration 5 ms

 RTG duration 0.02941 ms

TTG duration 0.02941 ms

OFDMA symbol duration 0.10084 ms

 DL subframe 37 OFDMA symbols and 60 subchannels

UL subframe 12 OFDMA symbols and 96 subchannels

Utilized DL/UL modulation types {QPSK ½, QPSK ¾, 16-QAM ½, 16-

QAM ¾, 64-QAM 2/3, 64-QAM ¾

 Number of base stations 1

 Number of subscriber stations 5

Simulations Area 500 m * 500 m

Simulation time 10 s

 

Page 41: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 41/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

41

The Topology of the network is shown in figure 29.

Figure 29. WiMAX network in PMP mode

The uplink and downlink traffic fro each node is described in Table 11. We used the uplink 

scheduling algorithms described before for both the uplink and downlink directions.

Table 11: Uplink and Downlink Scheduling

Node Downlink Uplink

Subscriber Station 1 rtPS UGS

Subscriber Station 2 UGS ertPS(1)

 

Subscriber Station 3 ertPS rtPS

Subscriber Station 4 nrtPS nrtPS

Subscriber Station 5 UGS ertPS(2)

 

(1) 

Simulate G.711 VoIP traffic with exponential ON and OFF periods with VAD

(2) 

Simulate G.729 VoIP traffic with exponential ON and OFF periods with VAD

Page 42: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 42/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

42

There are applications running over the scheduling algorithms described in the table above.

For example we modified the code of the exponential traffic model in NS2 to simulate a

VoIP application with exponential ON and OFF periods as discussed before. Moreover we

set the type of the packets to ertPS in order to be scheduled over the predefined ertPS

scheduler class in the NDSL module. Based on the packet size, rate, the silence interval and

talk interval, which are the parameters that characterize the exponential traffic in NS2, we

can simulate any VoIP codec that implement VAD with any silence and activity periods

distribution. We named the newly defined traffic model as “VoIP_traffic” and can be used

inside the TCL script by referring to the TCL class “Application/traffic/VoIP_traffic”

For the UGS scheduler we run Constant Bit Rate traffic (CBR) over it which is

characterized in NS2 by the rate and packet size. For the rtPS we used a variable bit rate

traffic that changes the size of the sent packet from 200 bytes till 1000 bytes with constant

generation or inter-arrival time. And finally, for the nrtPS scheduler, we used a traffic model

that generates large epochs of data over regular time interval. All the traffic models will be

shown in the next subsection.

12.3 Simulation results

Based on the previously defined and used traffic models and schedulers we have simulated

the network for 10 seconds and based on the generated trace files with the help of analyzing

tool called Trace Graph v 2.02 [28] we got some performance metrics; such as the throughput

of the scheduling service and the overhead of the bandwidth request headers introduced by

each scheduling type.

For example the throughput of the UGS scheduling service is shown in figure 30. As

expected, it is constant and we did not find any polling overhead represented by bandwidth

request messages. Similarly, the throughput of nrtPS scheduling as described before and the

bandwidth request polling intervals are shown in figures 31 and 32 respectively. It is clear

that the BW polling occurs whenever there is nrtPS data to be sent by the subscriber station

(the overhead is represented as number of sent BW request messages over time).

Page 43: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 43/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

43

 

Figure 30. UGS throughput 

Figure 31. nrtPS scheduling throughput 

Page 44: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 44/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

44

 

Figure 32. nrtPS BW request polling.

Figures 33 and 34 show the throughput and BW request overhead for the rtPS scheduling

service. The ertPS throughput in figure 33 is averaged over 0.1 s and we note that due to the

continuous change in the generated rate from the subscriber station, the polling of bandwidth

request messages is continuous as described in the rtPS scheduling services section.

Figure 33. rtPS scheduling throughput 

Page 45: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 45/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

45

 

Figure 34. rtPS BW polling intervals

The throughput of the ertPS scheduling service and the Bandwidth request headers are shown

in figures 35. Both values are averaged over 1 second in order to show increase in BW

requirements over considerable amount of time instead of showing the fast changes. The

ertPS traffic simulates a VoIP application with exponential ON and OFF time periods as

shown in figure 36. Here we assume that there is no traffic during the silence period for

simplicity. As noticed in the figure 36 there are six periods of BW request overhead increase.

This increase corresponds to the data rate increase of the VoIP traffic since we mentioned in

the ertPS scheduling section that we only send BW request header whenever the rate of the

service increases.

Figure 35. ertPS scheduling throughput 

Page 46: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 46/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

46

 

Figure 36. ertPS and BWREQ throughput 

Finally, Figure 37 shows the total and uplink and downlink throughput of the system for all

the scheduling services used during the simulation time. We notice that although we used the

same scheduling services in both the uplink and downlink directions, the downlink traffic is

more stable and offer service to the subscribers in steady behavior. On the other hand the

uplink traffic throughput based on the changes of the traffic needs (depends on the service

behavior) and the allocated bandwidth (depends on the scheduling service and BS). 

Figure 37. Over all System throughput 

Page 47: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 47/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

47

13. FUTURE WORK

Based on the results presented in the previous section, we find a gap between the throughput

of the sent data by the subscriber station and that received from the base station. So, we need

to mind the gap as much as we can. This means that a need for a new uplink scheduling

algorithm which maximize the throughput and minimize the polling overhead with minimum

access delay is needed. However, developing such algorithm is not an easy task especially

that it tries to overcome all the shortcoming of already exist uplink scheduling algorithms.

Moreover, so far we have used a module that supports only fixed WiMAX topology where

the positions of the nodes are fixed and hence the modulation and coding schemes are

predefined regardless the change in the node positions or channel response. This is not the

ideal case where the main target of the 802.16e standard is to support mobility for end users.

And by mobility we don’t only mean moving nodes but also a dynamic topology that

supports handoff mechanisms between the subscriber stations and different base stations.

Hence, we are looking for testing different communication scenarios for end to end

connectivity over dynamic WiMAX communication system. For such dynamic topology, we

intend to calculate the overall system capacity in terms of number of users per cell.

Page 48: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 48/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

48

REFERENCES

 

[1] "An Enhanced Uplink Scheduling Algorithm Based on Voice Activity for VoIP Services

in IEEE 802.16d/e System" Howon Lee, Taesoo Kwon, and Dong-Ho Cho. Communication

Letters, IEEE, Volume 9, Issue 8 Aug 2005.

 

[2] Howon Lee, Taesoo Kwon and Dong-Ho Cho "Extended-rtPS Algorithm for VoIP

Services in IEEE 802.16 Systems". IEEE Communications Conference. Volume 5. 2006

 

[3] Sung-Min Oh, Sunghyun Cho, Jae-Hyun Kim, and Jonghyung Kwun, “VoIP Scheduling

Algorithm for AMR Speech Codec in IEEE 802.16e/m System”. IEEE Communications

letters, Volume 12 May 2008.

[4] Howon Lee, Taesoo Kwon, Dong-Ho Cho, Geunhwi Limt and Yong Chang

"Performance Analysis of Scheduling Algorithms for VoIP Services in IEEE 802.16e

Systems". Vehicular Technology Conference, Volume 3, May 2006.

 

[5] ITU-T standard "G.729 coding of speech at 8 kbps using conjugate-structure algebraic-

code-excited linear prediction (CS-ACELP)" 01/2007.

 

[6] Mo, J. H. "VoIP call capacity for WiMAX". WiMAX Forum. (2006).

 

[7] ITU-T standard "G.711/Appendix I: A high quality low-complexity algorithm for packet

loss concealment with G.711". 9/1999

 

[8] ITU-T standard "G.711/Appendix II : A comfort noise payload definition for ITU-T

G.711 use in packet-based multimedia communication systems" 2/2000

 

[9] 3GPP TS 26.090 V5.0.0, “AMR Speech Codec; Transcoding functions,” Jun. 2002.

 

Page 49: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 49/50

 Ashraf Ali, "Broadband Services Modeling Over WiMAX Access Networks", MSITT, Athens Greece.

49

[10] Jeffery G. Andrews, Arunabha Ghosh, and Rias Muhamed, “Fundamentals of 

WiMAX”, Prentic Hall, Feb 2007

 

[11] IEEE. Standard “802.16-2005. Part 16: Air interface for fixed and mobile broadband

wireless access systems”, December 2005.

 

[12] IEEE. Standard “802.16-2004. Part 16: Air interface for fixed broadband wireless access

systems”, June 2004.

 

[13] Loutfi Nuaymi, Nabil Bouida, Nabil Lahbil, Philippe Godlewski "Headers Overhead

Estimation, Header Suppression and Header Compression in WiMAX".Wireless and Mobile

Computing, Networking and Communications, 2007.

 

[14] IETF RFC 3095, "Robust Header Compression (ROHC): Framework and four profiles:

RTP, UDP, ESP, and uncompressed, " C. Bormann et al, Jul 2001.

 

[15] ITU-T Recommendation G.114, “One-way Transmission Time,” May 2003.

 

[16] Kyung Jae Kim · Bara Kim · Ji Won Um · Jung Je Son · Bong Dae Choi, "Delay analysis

of extended rtPS for VoIP service in IEEE 802.16e by matrix analytic method". Springer

2008.

 

[17] Max Riegel “WIMAX: A TECHNOLOGY UPDATE: Ethernet Services over Mobile

WiMAX”, Nokia Siemens Networks, IEEE Communications Magazine • October 2008

 

[18] ITU-T Recommendation “G.723.1 -Annex A, General Aspects of Digital Transmission

Systems: Dual Rate Speech Coder For Multimedia Communications Transmission at 5.3 and

6.3 kbit/s Annex A: Silence Compression Scheme”, 1996

 

[19] ITU-T Recommendation “G.722.1 Annex C: The First ITU-T Superwideband Audio

Coder". Claude Lamblin and Catherine Quinquis. IEEE Communications Magazine Oct

2008.

Page 50: Ashraf Ali Thesis Report(1)

7/28/2019 Ashraf Ali Thesis Report(1)

http://slidepdf.com/reader/full/ashraf-ali-thesis-report1 50/50

 

[20] Taesoo Kwon, Howon Lee, Sik Choi, Juyeop Kim, and Dong-Ho Cho, "Design and

Implementation of a Simulator Based on a Cross-Layer Protocol between MAC and PHY

Layers in a WiBro Compatible IEEE 802.16e OFDMA System",Communications Magazine,

IEEEVolume 43,Issue 12, Dec. 2005

[21] A. Bestetti, G. Giambene, S. Hadzic, “WiMAX: MAC Layer Performance

Assessments”,Wireless Pervasive Computing, 2008. ISWPC 2008. 3rd International

Symposium on7-9 May 2008.

[22] Howon Lee, Taesoo Kwon and Dong-Ho Cho “Extended-rtPS Algorithm for VoIP

Services in IEEE 802.16 systems”Communications, 2006 IEEE International Conference on

Volume 5, June 2006.

[23] IEEE Standard “802.1Q IEEE Standard for Local and metropolitan area networks

Virtual Bridged Local Area Networks”, IEEE, 2005.

 

[24] Qinqing Zhang, "Performance of Robust Header Compression for VoIP in 1xEV-DO

Revision A System",Global Telecommunications Conference, GLOBECOM '06. IEEENov.

27 2006-Dec.

[25] Howon Lee, Hyu-Dae Kimt and Dong-Ho Chol. "Extended-rtPS Considering

Characteristics of VoIP Codecs in Mobile WiMAX".Personal, Indoor and Mobile Radio

Communications, 2008.

 

[26] Max Riegel “WIMAX: A TECHNOLOGY UPDATE: Ethernet Services over Mobile

WiMAX”, Nokia Siemens Networks, IEEE Communications Magazine • October 2008

 

[27] Hung-Hui Juan, Hsiang-Chun Huang, ChingYao Huang, and Tihao Chiang." Scalable

Video Streaming over Mobile WiMAX"Circuits and Systems, 2007. ISCAS 2007. IEEE

International Symposium on27-30 May 2007.