Loading...
Search for: cdma-cellular-networks
0.004 seconds

    Effect of data traffic shaping on throughput and delay for VSG-CDMA cellular networks

    , Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 6-11 ; 1424410940 (ISBN); 9781424410941 (ISBN) Seyfi, A ; Ashtiani, F ; Sharif University of Technology
    2007
    Abstract
    In this paper, we analyze the effect of applying leaky bucket as a well known traffic shaper on data users in a variable spreading gain CDMA (VSG-CDMA) uplink wireless cellular network. To this end, we model the effect of leaky bucket mechanism on a typical data user, with a closed product form queueing network. Each node in this queueing network corresponds to a specific processing gain or equivalently transmission rate and power. By solving such a queueing network we obtain the steady state probability with which a typical data user will exist at each node. By aggregating the effects of all data users we compute the mean and variance of interference and obtain the throughput and average... 

    Interference modeling and generalized static capacity for uplink CDMA cellular networks

    , Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 17-22 ; 1424410940 (ISBN); 9781424410941 (ISBN) Faghih Imani, S ; Ashtiani, F ; Sharif University of Technology
    2007
    Abstract
    In this paper, we propose a new approach in computing interference distribution and outage probability for uplink CDMA cellular networks. In this approach, we model time-varying interference as a discrete-time Markov chain with flexible approximation and find its steady state distribution. Our approach is based on tracing the time variation of the effective factors in interference such as spatial locations, activity status, and shadowing status for the connected users. To this end, we approximate shadowing with several discrete levels by Lloyd algorithm. Moreover, we incorporate correlation properties of the shadowing status in our model. Then, we map the effective factors onto the...