35ubicc_35

download 35ubicc_35

of 9

Transcript of 35ubicc_35

  • 8/9/2019 35ubicc_35

    1/9

    DIFFERENT MAC PROTOCOLS FOR NEXT GENERATION

    WIRELESS ATM NETWORKS

    Sami A. El-DolilDept. of Electronic and Electrical Comm. Eng., Faculty of Electronic Eng, Menoufya Univ.

    [email protected]

    ABSTRACTThis paper presents a comparison between three proposed Medium Access Control

    (MAC) Protocols for next generation multimedia wireless ATM (WATM)networks. To support the ATM CBR, VBR, ABR services to end users, a MAC

    protocol must be able to provide bandwidth on demand with suitable performanceguarantee. The protocols have been proposed to efficiently integrate multiple ATMtraffics over the wireless channel while achieving high channel utilization. Theobjective of the comparison is to highlight the merits and demerits of the three

    proposed protocols.

    Keywords: Medium access control protocol and ATM network.

    1 INTRODUCTION

    Asynchronous transfer mode (ATM) was

    recommended by the InternationalTelecommunication Union (ITU-T) to be the transferprotocol of the broadband integrated services digitalnetwork (B-ISDN). The concept of wireless ATM(WATM) was introduced to extend the capabilities of

    ATM to wireless arena in [1].A major issue of WATM network is the

    selection of a medium access control (MAC)protocol that will efficiently allocate the scarce radioresources among the competing mobile stationswhile satisfying the QoS required for each admittedconnection.

    Several MAC protocols are proposed forwireless ATM network [2] [9]. In [2], a novelpredictive approach is used to estimate the currentrequirements for the connections. The variable bitrate (VBR) traffic is divided into guaranteed andbest effort traffic while the time to expiry algorithm

    is adapted for voice and VBR slot allocation. In [3],the leaky bucket algorithm with priority as well asthe cell train concept achieves a fair and efficientslot allocation. In [4], Packet Reservation MultipleAccess with Dynamic Allocation (PRMA/DA)MAC protocol adopts dynamic allocation algorithm

    in order to resolve the contention situation quicklyand avoid the waste of bandwidth that occurs whenthere are several unneeded request slots. Howeverthe drawback is that this protocol does not use mini-slots for the access request. In [6] the use of piggybacking information from VBR connectionimproves the slot allocation for VBR traffic and

    enhances the overall protocol performance.The current paper introduces a quantitative

    comparison of three proposed MAC Protocol for

    wireless ATM networks. The three protocols are as

    follow.1. Dynamic Allocation TDMA MAC Protocol for

    Wireless ATM Networks.2. An Intelligent MAC Protocol for next generation

    Wireless ATM Networks.3. Contention and Polling based Multiple Access

    Control with minimum Piggybacking for

    Wireless ATM Network.Three performance metrics, namely cell lossprobability, average cell delay, and throughput, areconsidered. Section II gives an overview anddescription of the proposed protocols. In section III,the source models are identified. Section IV,describes the resource allocation algorithm. An

    evaluation of the performance of the proposedprotocols is presented in section V. Finally, sectionVI concludes the paper.

    2 SYSTEM DESCRIPTION

    2.1 Air Interface Frame StructureThe proposed protocols use frequency division

    duplex (FDD) with a fixed frame length of2 m sec. used for the uplink (UL) and the downlink

    (DL) channel. Fig. 1 illustrates the frame structurefor the uplink channel. The channel bit rate is 4.9Mbps and the data slot size is 53 bytes. The numberof slots per frame is 24 slots. The uplink frame isdivided into control and data transmission periods,each consisting of integer number of slots. Slots

    assigned for control purpose are further subdividedinto four control mini-slots with each mini-slot

    accommodating reservation mini-packet.

    Ubiquitous Computing and Communication Journal 1

  • 8/9/2019 35ubicc_35

    2/9

    Control period Data Transmissionperiod

    In the uplink channel, control slots provide acommunication mechanism for a mobile station to

    send a reservation request during the contentionphase of the connection. The data slots are provided

    with contention-free mechanism during the datatransmission phase. An uplink control packet is sentwhenever a mobile station needs to inform the basestation with its traffic characteristics and source

    status.Feedback for the uplink control packets is sent in the

    downlink control packets.

    2.2 Contention Access SchemeThe first and second protocols use the same

    contention scheme and the length of the control period is dynamically adjusted as a function of

    contention traffic load. The control mini-slots areused by the mobile stations to send their reservationrequests in contention mode using slotted Aloha protocol. To reduce the access time of real-time

    connection, which greatly affects the QoS of thereal-time services, we separate the control mini-slots

    assigned to real-time and non real-time connections.

    The number of control mini-slots assigned to real-time and non real-time connections is adaptivelyallocated with the collision status. The total numberof uplink control mini-slots ranges from 4 to 12

    mini-slots. A priority is given to real-timeconnections by assigning their control mini-slotsfirst according to the number of collisions occurredin the previous frame.

    In the third protocol, the control period is furtherdivided into contention and polling periods. Control

    slots assigned in the control period are furthersubdivided into four control mini-slots, some of themused as contention mini-slots and the others used as

    polling mini-slots. A fixed number of control mini-slots are allocated for contention and polling access.The contention mini-slots are used by voice

    connections to send their reservation requests incontention mode at the beginning of talk-spurt, whilethe poling mini-slots are used by ABR connectionsto send their buffer length status to the base station.The number of polling mini-slots are chosen suchthat the polling period will be less than or equal to

    the average inter-arrival time of ABR data message(100 m-sec).

    Number of polling mini-slots int (number of ABR

    users * (TF/Tint)).

    Figure: 1 the frame structure.

    where,

    TF: Frame duration (2 m-sec).

    Tint: Average inter-arrival time of ABR data message(100 m-sec).

    Int: largest integer value.

    Contention period is set to a constant number ofcontrol mini-slots and this number is chosen to

    satisfy the required QoS for voice traffic. The

    contention process is divided to four stages:

    First Stage: When the connection becomes active it

    randomly selects one of the 4subsequent frames to send its requestduring the contention period.

    Second Stage: If the connection exhibits collision inthe first stage it randomly selects oneof the 3 subsequent frames to send itsrequest during the contention period.

    Third Stage: If the connection exhibits collision inthe second stage it randomly selects

    one of the 2 subsequent frames tosend its request during the contentionperiod.

    Fourth Stage: If the connection exhibits collision inthe third stage it sends its request inevery frame until the base station

    successfully receives its request.

    In every stage the connection randomly select one ofthe available contention mini-slots in the selected

    frame to send its reservation request. If theconnection request is correctly received during any

    stage the connection exit from the contention process

    and the base station periodically allocate slots to theconnection until the end of talk-spurt.

    The described contention process aims to reduce thecontention load during the contention period in eachframe, increase the probability of successfullyaccessing the network, decreasing the probability ofcollision, reduce the access delay time and at thesame time minimize the number of used contention

    mini-slots and utilize them efficiently. Decreasingthe number of available frames for selection in eachsubsequent stage aiming to reduce the access delaytime of the connections and hence reduce the cell

    loss probability.

    Ubiquitous Computing and Communication Journal 2

  • 8/9/2019 35ubicc_35

    3/9

    2.3 Traffic Integration Strategy

    As different wireless ATM services share the

    same resources, an effective interaction between theallocation algorithms is needed to maximize theutilization efficiency of the shared resources. In thefirst and second protocol , the voice connections

    have the highest priority and the VBR connectionshave the next higher priority. The ABR connections

    have the lowest priority.In the third protocol, the available transmission

    slots are assigned first to active voice connections,then a minimum assigned slots are allocated to ABRtraffic, then VBR traffic slots are allocated, andfinally, the remaining slots are distributed between

    ABR connections according to the buffer length ofeach connections.

    3 SOURCE MODELS

    3.1 Voice Source ModelA voice source generates a signal that follows a

    pattern of talk-spurts separated by silent gaps. A

    speech activity detector can be used to detect thispattern. Therefore, an ON/OFF model can describe avoice source: the source alternates between the ONstate where the source generates packets at rate 8

    kbps, and the OFF state where no packets aregenerated. Durations of talk-spurts and silent gaps

    are modelled as exponential distributions with meanvalues of 1 and 1.35 sec, respectively.

    If a voice packet is not sent within its maximumtransfer delay (MTD), it should be dropped TheMTD is set to be 16 m-sec.

    3.2 VBR Source ModelThe source rates are modelled as truncated

    Gaussian distribution between (128 384 kbps)with mean rate of 256 kbps. The rate of the sourcevaries every 33 m-sec (the duration of image frame)and the MTD of the VBR packet is set to be 50 m-

    sec.

    3.3 ABR Source ModelIt resembles a data source with messages of

    certain length. The length of the message isexponentially distributed with mean 2 k bit, and the

    inter-arrival time between messages is negativelyexponential distributed with mean of 100 m-sec.The MTD of the ABR packet is set to be 6 sec.

    4 BANDWIDTH ALLOCATION ALGORITHM

    The bandwidth allocation for uplinktransmission is only considered since the downlinktransmission can be scheduled in the same manneras in a wired ATM switch.

    4.1 Dynamic Allocation TDMA MAC Protocol for

    Wireless ATM Networks4.1.1 Slot Allocation Algorithm for VoicetrafficThe voice connections have the higher priority.

    At the beginning of a talk-spurt, the mobile sends a

    control packet. When the base station knows that theconnection becomes active the base station periodically allocates slots to the connection untilthe end of talk spurt. At the end of the talk-spurt, themobile sets a flag in the last voice packet to inform

    the base station that the connection is no longeractive.

    4.1.2 Slot Allocation Algorithm for VBR trafficVBR connections have the next highest priority.

    They only contend (send a control packet) at thesession beginning. Next, all the control information

    is piggybacking on the data packets, which reducesthe contention over the real-time mini-slots. At the

    base station, a token pool of certain size isintroduced for each VBR connection. Tokens aregenerated at a fixed rate that is equal to the meancell rate. A token is removed from the

    corresponding pool for every slot allocated to theconnection

    After slot allocation for voice connections the basestation allocates one slot for each VBR connectionto send one of their cells and also to piggyback thecurrent traffic parameter (e.g. buffer length, cell

    delay) of the connection. Then the base stationallocates slots for each connection .The number of

    slots allocated for a connection is the minimum of

    the buffer length and the number of tokens in thepool such as;

    Nv= min (Av, Bv) .

    whereNv : number of slots allocated for the VBR

    connection.Av : number of tokens in the pool.Bv : number of the packets in the mobile

    station buffer.

    Each connection cannot send greater than 12 cells inthe frame. Within the frame, priority is given to theconnection with minimum time-of-expiry to send

    their cells earlier.4.1.3 Slot Allocation Algorithm for ABR traffic

    The base station records the buffer length

    status of each connection using the controlinformation transmitted by the mobile. When amessage arrives at a mobile, it sends the number ofpackets in the new message either piggybacked to adata packet or in a control packet.Like VBR connections a token pool is introduced

    for each ABR connection. ABR connections havelower priority than voice and VBR connections. The

    number of slots allocated for a connection is theminimum of the buffer length and the number of

    tokens in the pool such as;

    Ubiquitous Computing and Communication Journal 3

  • 8/9/2019 35ubicc_35

    4/9

    Na= min (Aa , Ba).where,

    Na : number of slots allocated for the ABRconnection.

    Aa : number of tokens in the pool.

    Ba : number of the packets in the mobile

    station buffer.The connection with higher number of tokens in

    its pool sends their cells earlier within the frame. Ifthere are remaining slots inside the frame, the basestation allocates them fairly between ABR and VBR

    connections.

    4.2 An Intelligent MAC Protocol for next

    generation Wireless ATM Networks4.2.1 Slot Allocation Algorithm for Voice andCBR traffic

    The voice connections have the highestpriority. At the beginning of a talk-spurt, the mobile

    sends a control packet to inform the base station thatthe connection become active.At the base station, a token pool is introduced foreach active voice connection and each token is

    increased by a fixed amount equal to Tv every frameto indicate the number of cells generated in the

    mobile station buffer and decreased by one for everyslot allocated to the corresponding connection. Thenthe voice connections are arranged according to thecontent of its token and slots are allocated to the

    connection with higher value in its token first. Atthe end of the talk-spurt, the mobile sets a flag in the

    last voice cell to inform the base station that the

    connection is no longer active.Tv=Tf /Tpwhere,

    Tf : frame duration (2msec).

    Tp : packetization time of the ATM cell ofvoice connection (48m-sec).The number of slots allocated for voice connectionin each frame should not exceed Lv .whereLv = number of voice connection*( Tf / Tp).

    The token poll has two advantages:First: it indicates the number of packets

    generated at the mobile station buffer.Second: it indicates the amount of delay of the

    generated packet.

    This helps in deciding which voice connectionshould send its packet early and leads to reducingthe average delay of the voice connections.

    4.2.2 Slot Allocation Algorithm for VBR trafficVBR connections have the next higher priority.

    They only contend (send a control packet) at thesession beginning. Next, all the control information

    is piggybacking on the data packets, which reducesthe contention over the real-time mini-slots. At the

    base station, one token pool of certain size is

    introduced for all VBR connections. Tokens aregenerated at a fixed rate that is equal to the meancell rate per connection multiplied by the number ofVBR connections. A token is removed from thecorresponding pool for every slot allocated to any

    VBR connection. The cell delay is piggybacking on

    the data packets.The number of slots allocated for a VBR connectiondepends on the cell delay and the number of tokenin the pool such as;Nvj=int ( Kv* ( Dvj/Dv))

    whereNvj : number of slots allocated for the

    connection number jKv : number of tokens in the poolDvj : delay time of the last transmitted cellfrom connection number j

    Dv : total cell delay of all VBR connections

    4.2.3 Slot Allocation Algorithm for ABR trafficThe base station records the buffer length status

    of each connection using the control informationtransmitted by the mobile. When a message arrives

    at a mobile, it sends the number of packets in thenew message either piggybacked to a data packet or

    in a control packet.Like VBR connections one token pool is introducedfor all ABR connections. ABR connections havelower priority than voice and VBR connections. The

    number of slots allocated for an ABR connectiondepends on the buffer length and the number of

    token in the pool such as;

    Naj= Ka* ( Baj/Ba)Where

    Naj : number of slots allocated for theconnection number j.

    Ka : number of tokens in the pool.Baj : number of cells in the buffer of the

    connection (buffer length).Ba : summation of the buffer lengths of all

    ABR connections.If there are remaining slots inside the frame, the

    base station allocates them between ABR and VBRconnections such that % for VBR connections andthe rest for ABR connections where;

    = (

    oe

    avg

    T

    D)*100.

    whereDavg : average delay of VBR connections.Toe : time of expiry of VBR cells (50 m-sec).

    4.3 Contention and Polling based Multiple Access

    Control with minimum Piggybacking for

    Wireless ATM Network4.3.1 Slot Allocation Algorithm for Voice Traffic

    At the beginning of talk spurt the voice

    connection sends a reservation request through the

    Ubiquitous Computing and Communication Journal 4

  • 8/9/2019 35ubicc_35

    5/9

    contention mini-slot. When the base stationsuccessfully receives the request, it periodicallyallocates slots to the connection up to the end of talkspurt. At the end of talk spurt the connection set aone bit flag in the last transmitted cell to indicate that

    the connection is no longer active.

    4.3.2 Slot Allocation Algorithm for VBR Traffic

    Initially the base station allocates one slot foreach active VBR connection and then broadcast adelay threshold value to all VBR connections everyframe. One bit flag is used to indicate the delay

    status of the buffer and is piggybacked to the datapacket (cell). Each VBR connection checks its buffer

    and sets the flag to one when the packet delayexceeds the delay threshold, and to zero when thepacket delay is lower than the delay threshold. Theslot allocation procedures are performed as follow:

    The base station increases the assigned slots by onefor a VBR connection each time its

    packet delay is greater than the delay threshold(piggybacking flag equal to one).

    At the base station a counter is introduced. The

    counter incremented by one when the number ofslots allocated for VBR traffic in the frame is greaterthan Vmean and decremented by one when it is lowerthan Vmean.

    where; Vmean: the mean number of cellsgenerated from all VBR connections perframe according to the mean cell generation

    rate per connection.

    The delay threshold can be set to a fixed value ordynamically adjusted to control the slot allocationprocess for VBR traffic. The counter can be used todynamically adjust the delay threshold by increasing

    the delay threshold value when the counter value isincreased and decreasing the delay threshold valuewhen the counter is decreased. Since the increase inthe counter value indicates the increase in theallocated bandwidth (slots), so we need to reduce it byincreasing the delay threshold value which in turn

    decreases the piggybacking and hence decreases the

    number of allocated slots and vice versa. Table.1shows the dynamic delay threshold values using thedynamic adjustment.

    When some of the connection reserved slots are notused by the connection for transmitting its packets(number of generated packets become lower than thenumber of allocated slots) the base station release thisslot and decrement the number of the reserved slots

    for that connection in the subsequent frames by one.

    When the counter becomes greater than the upperlimit value (25) the base station release some of thereserved slots for the connections that have no

    piggybacking in the previous frame until the number

    of VBR allocated slots becomes lower than Vmean todecrease the counter.

    Each VBR connection could not havelower than one allocated slot per frame.

    As we suggested before the delay threshold can

    be set at a fixed value and its value have a significanteffect on the allocation process and the achievedQoS of VBR traffic. During the simulation at fixeddelay threshold we take its fixed value equals to 0.5maximum CTD of VBR cell (25msec) as anappropriate value and evaluate the performance of

    the allocation process in this case.

    Table 1: Dynamic adjustment of the delay threshold

    Counter Delay Threshold values

    (m-sec)

    Counter4 154 < counter 8 20

    8 < counter12 25

    12 < counter15 30

    15 < counter18 35

    18 < counter 20 40

    20 < counter 45

    4.3.3 Slot Allocation Algorithm for ABR Traffic

    Polling control mini-slots are used by ABRconnections to send their buffer length to the base

    station. The number of polling mini-slots is selectedsuch that the polling period should be lower than orequal to the inter-arrival time between ABR datamessages (100 m-sec) to enable the base station toefficiently monitor the buffer length status of eachconnection.

    Initially a minimum number of slots are allocatedto ABR traffic. So that, each ABR connection has anallocated bandwidth equivalent to 50 % of its

    average cell generation rate. The base station

    controls this minimum assigned bandwidth bymaintaining a leaky bucket for every ABRconnection. Tokens added to the bucket at constantrate equals to 50% of the average cell generation rate.Every time a slot is allocated to the connection, a

    token is removed from the bucket. So, in each framethe connection with non empty leaky bucket has

    allocated slots equal to the number of tokens in its bucket. After allocating the VBR traffic slots, theremaining slots are allocated to ABR connections.ABR connections are arranged according to their

    buffer length where the connection with higherbuffer length has its required slots allocated first.

    Ubiquitous Computing and Communication Journal 5

  • 8/9/2019 35ubicc_35

    6/9

    5 PERFORMANCE EVALUATION AND

    SIMULATION RESULTSA comparison has been made to evaluate the

    performance of the three proposed protocols using thesame simulation parameters.

    Fig. 2 through Fig. 7 illustrates the performance

    with integrated traffic. There are 30 voiceconnection and 12 VBR connections in the network,while the ABR connections are added gradually tothe network. All results are presented as a functionof the number of ABR connection.

    For voice traffic, Fig. 2 and Fig. 5 show that agood QoS is achieved by the three protocols in term of

    cell loss probability (lower than 10-4

    ) and average celldelay (lower than 5 m-sec). it is clear that,approximately, the first and the second proposedprotocols achieve better performance than the third one

    as they use the same contention access scheme, due tousing lower number of control mini-slots for

    contention access. It is worth to mention that the thirdprotocol uses 8.3% of the bandwidth (8 control mini-slots) for contention and polling access, while the firstand second protocol uses 4.45% of the bandwidth

    (approximately 4 control mini-slots) which make theavailable data transmission bandwidth for the third

    protocol lower by 3.85 % than that of the first andsecond protocol.

    For VBR traffic, Fig. 3 shows that with low VBRtraffic up to 45 connections, the second protocol

    achieves the best performance in term of cell lossprobability as its resource allocation algorithm depends

    on the cell delay at each connection buffer, so that the

    connection with higher delay allocated more slots thanthat with lower delay which leads to reduce the probability that the cell delay exceeds the maximumCTD (cell transfer delay) and then lost. This decreases

    the cell loss probability. On the other hand thisincreases the average cell delay that becomes higherthan the average cell delay caused by the first protocolas indicated in Fig. 6.The third protocol achieveshigher loss probability than the second protocol (Fig.3), and the highest average cell delay (Fig. 6) since the

    dynamic delay threshold adjustment process producesmore average delay than the other two protocols. Whenthe number of ABR connections becomes greater than

    45, the offered traffic becomes higher than theavailable bandwidth. The third protocol achieves thelowest cell loss probability and lower average cell

    delay than the second one since a considerable part ofABR slot allocation takes place after VBR slotallocation, and the VBR slot allocation is controlled bythe value of delay threshold which has upper limitvalue. So increasing the number of ABR connectionhas low significant effect on VBR slot allocation. The

    first protocol achieves the lowest performance in termsof cell loss probability (Fig. 3), while achieves the

    lowest average cell delay with all number of ABRconnections, (Fig. 6). This indicates that the efficiency

    of its VBR Resource allocation algorithm is lower thanthe other two protocols.

    For ABR traffic, Fig. 4 and Fig. 7 show that thereduction of data transmission bandwidth of the third protocol by 3.85% due to the contention and polling

    periods significantly reduces the available bandwidth

    for ABR traffic which make the cell losses start earlybefore 40 ABR connection and the average cell delaysignificantly increases with ABR connections since aconsiderable part of ABR resource allocations takesplace after VBR slot allocation. The first and second

    protocols achieve good QoS for ABR traffic but thefirst protocol achieve slightly better performance in

    term of cell loss probability and average cell delay.At 45 ABR connection the first and second

    protocol achieve approximately 94% data transmissionthroughput and 98.5% total channel utilization while

    providing the acceptable QoS required for each trafficcategory. For the third protocol, at 36 ABR connection

    91% data transmission throughput and 98.5% totalchannel utilization are achieved while preserving therequired QoS for each ATM traffic type.

    Figure 2: Cell loss probability of Voice connectionsas a function of the number of ABR connections (12VBR and 30 Voice connection)

    Figure 3: Cell loss probability of VBR connections as a function of

    the number of ABR connections (12 VBR and 30 Voice connection)

    Ubiquitous Computing and Communication Journal 6

  • 8/9/2019 35ubicc_35

    7/9

    The performance with real time traffic is illustrated inFig. 8 through Fig. 11. 12 VBR connections are presented while the voice connections are addedgradually to the system. For voice traffic, Fig. 8 andFig. 10 show that the performance is the same as with

    integrated traffic, where the first and second protocols

    perform better than the third one. For VBR traffic, Fig.9 and Fig. 11 show that the second protocol achievesthe lowest cell loss probability. The average cell delayof the first and second protocols is low with slightlydifferent values until 112 voice connection (97%

    channel utilization), after that, the average cell delay ofthe second protocol become significantly higher since

    the efficiency of its resource allocation algorithm inreducing cell loss probability results in increasing theaverage cell delay. The third protocol has lower celldelay than that with integrated traffic because in the

    absence of ABR traffic, any remaining slots will begiven to VBR connections.

    With the third protocol the average cell delay lowerthan with integrated traffic because in the absence ofABR traffic if there are remaining slots they will begiven to VBR connections.

    A cell loss probability of 10-3 for VBR traffic

    achieved by the first protocol at 106 voice connection

    (95% channel utilization), by the second protocol at112 voice connection (97% channel utilization), and bythe third protocol at 103 voice connection (94.7%channel utilization).

    Figure 6: Average cell delay of VBR connections as afunction of the number of ABR connections (12 VBR

    and 30 Voice connections).

    Figure 4: Cell loss probability of ABR connections as afunction of the number of ABR connections (12 VBRand 30 Voice connection)

    Figure 7: Average cell delay of ABR connections as afunction of the number of ABR connections (12 VBRand 30 Voice connections).

    Figure 5: Average cell delay of Voice connections as afunction of the number of ABR connections, (12 VBRand 30 Voice connections).

    Ubiquitous Computing and Communication Journal 7

  • 8/9/2019 35ubicc_35

    8/9

    These results indicate that the second protocol has themost efficient VBR slot allocation algorithm then thefirst protocol and finally the third protocol, but thethird protocol uses the lowest piggybacking overhead.

    6 CONCLUSION

    We have presented an extensive performancecomparison of three proposed MAC protocols tohighlight the merits and demerits of each of them.

    For voice traffic, a good QoS achieved by the three protocols. But, the first and second proposed

    protocols achieve better QoS than the third protocolwhile using lower number of control mini-slots forcontention access. For VBR traffic, the resultsindicate that the second protocol has the most

    efficient VBR slot allocation algorithm then the firstprotocol and finally the third protocol, but the third

    protocol uses the lowest piggybacking overhead. ForABR traffic, the reduction of data transmissionbandwidth of the third protocol by 3.85% reduce theavailable bandwidth for ABR traffic which make thecell losses and the average cell delay significantly

    increases with higher values than the other two

    protocol. Finally the three proposed protocolsachieve very high channel utilization ofapproximately 98% for the wireless ATM channelwhile respects the required QoS of multimedia ATMtraffic types.

    Figure 8: Cell loss probability of Voice connections asa function of the number of Voice connections (12 VBRConnection).

    Figure 10: Average cell delay of Voice connections asfunction of the number of voice connections (12 VB

    connections).

    Figure 9: Cell loss probability of VBR connections as afunction of the number of Voice connections (12 VBRConnection).

    Figure 11: Average cell delay of VBR connections asfunction of the number of voice connections (12 VB

    connection)

    Ubiquitous Computing and Communication Journal 8

  • 8/9/2019 35ubicc_35

    9/9

    REFERENCES

    [1] D. Raychandhuri and N. D. Wilson, ATM

    based transport architecture for multi-services wireless personal communicationnetworks IEEE J. Selected. Areas inCommunication, vol.12, no.80, pp. 1401-

    1414, Oct. 1994.

    [2] J.F. Frigon, H.C.B.Chan and V.C.M. leungDynamic reservation TDMA protocol forwireless ATM networks IEEE J. SelectedAreas in Communication, vol.19, no.2, pp370-383, Feb.2001.

    [3] N.Passas, S. Paskalis, D.Vali and L.MerakosQuality-of -Service Oriented Medium AccessControl for wireless ATM networks IEEECommunication Magazine, pp. 42-50, 1997.

    [4] J.Sanchez, R. Martnez, and M.W.Marcellin Asurvey of MAC Protocols Proposed forWireless ATM IEEE Networks, pp. 52-62,

    Nov. 1997.

    [5] H. Liu, U. Cliese and L. Dittmann Knowledge-based Multiple AccessProtocol in Broadband Wireless ATM Networks 50 th Veh. Tech. Conf., pp.

    1685-1689, Sept. 1999 . Amesterdam, theNtherlands.

    [6] S. Lee, Y. Song , D. Cho , Y. Dhong and J.Yang

    Wireless ATM MAC layer Protocol for NearOptimal Quality of Service Support GLOBECOM. 98 Sydney, Australia, pp. 2264-2269, Nov.1998 .

    [7] Y.Kwork and K.N.Lau A quantitativeComparison of Multiple Access Control Protocolsfor Wireless ATM IEEE Transaction onVehicular Technology, vol.50, no.3, MAY 2001.

    [8] R. Steele and L. Hanzo, Mobile RadioCommunications, Wiley and Sons, NewYork, 1999.

    [9] J. C.Chen , K.M.Sivalingam and R.Acharya

    Comparative Analysis of Wireless ATM ChannelAccess Protocols Baltzer Journals, Sept. 1997.

    [10] Sami A. EL-Dolil and Mohammed Abd Elnaby" Dynamic Allocation TDMA MAC Protocolfor Wireless ATM Networks" Proc. of theTwentieth National Radio Science Conference

    (20th NRSC 2003), March 18-20, Cairo,Egypt.

    [11] Sami A. EL-Dolil and Mohammed Abd Elnaby" An Intelligent Resource ManagementStrategy for Next Generation WATM PersonalCommunication Network," The Proc. of the

    46th

    IEEE International Midwest Symposium

    On Circuits & Systems (The 46th

    IEEE

    International MWSCAS), December 2003,Cairo, Egypt.

    [12] Sami A. EL-Dolil and Mohammed Abd Elnaby" Contention and Polling Based Multiple

    Access Control with Minimum Piggybacking

    for Wireless ATM Networks, " 21st

    NationalRadio Science Conference (21st NRSC 2004),March 16-18, Cairo, Egypt.

    Ubiquitous Computing and Communication Journal 9