Loading...
Search for: traffic-shaping
0.005 seconds

    Effect of leaky-bucket-based traffic shaping on capacity enhancement for VSG-CDMA cellular networks

    , Article 2007 IEEE Wireless Communications and Networking Conference, WCNC 2007, Kowloon, 11 March 2007 through 15 March 2007 ; June , 2007 , Pages 3695-3699 ; 15253511 (ISSN); 1424406595 (ISBN); 9781424406593 (ISBN) Seyfi, A ; Ashtiani, F ; Sharif University of Technology
    2007
    Abstract
    In this paper, we propose data traffic shaping via leaky bucket in order to reduce outage probability and enhance capacity of voice users for uplink variable spreading gain codedivision multiple-access (VSG-CDMA) cellular networks. In order to analyze the effect of leaky bucket mechanism, we employ a closed Jackson queueing network with arbitrary service time distributions to model different states of a typical traffic-shaped data user. By solving the concerned queueing network, we obtain the steady state probability with which a typical data user exist at each state. By aggregating the effects of all data and voice users we obtain mean and variance of interference and compute the outage... 

    Effect of data traffic shaping on throughput and delay for VSG-CDMA cellular networks

    , Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 6-11 ; 1424410940 (ISBN); 9781424410941 (ISBN) Seyfi, A ; Ashtiani, F ; Sharif University of Technology
    2007
    Abstract
    In this paper, we analyze the effect of applying leaky bucket as a well known traffic shaper on data users in a variable spreading gain CDMA (VSG-CDMA) uplink wireless cellular network. To this end, we model the effect of leaky bucket mechanism on a typical data user, with a closed product form queueing network. Each node in this queueing network corresponds to a specific processing gain or equivalently transmission rate and power. By solving such a queueing network we obtain the steady state probability with which a typical data user will exist at each node. By aggregating the effects of all data users we compute the mean and variance of interference and obtain the throughput and average...