
Advanced Wireless Networks - 4G Technologies
.pdf248 EFFECTIVE CAPACITY
queue length Q(t) could be nonzero. As already discussed in Section 8.1 [analogous to Equation (8.5)] or by using the theory of large deviations [14] , it can be shown that the probability of Q(t) exceeding a threshold B satisfies
t |
{ |
Q(t) |
≥ |
B |
} |
e−θB (r)B as B |
→ ∞ |
(8.23) |
sup Pr |
|
|
|
where f (x) ≈ g(x) means that limx→∞ f (x)/g(x) = 1. For smaller values of B, the following approximation, analogous to Equation (8.3), is more accurate [15]:
t |
{ |
Q(t) |
≥ |
B |
} ≈ |
γ (r)e−θB (r)B |
(8.24) |
sup Pr |
|
|
where both γ (r) and θB (r) are functions of channel capacity r. According to the theory,
γ (r) = Pr {Q(t) ≥ 0} is the probability that the buffer is nonempty for randomly chosen time t, while the QoS exponent θB is the solution of α(θB ) = r. Thus, the pair of functions {γ (r), θB (r)} model the source. Note that θB (r) is simply the inverse function corresponding to the effective bandwidth function α(u).
If the quantity of interest is the delay D(t) experienced by a source packet arriving at time t, then with same reasoning the probability of D(t) exceeding a delay bound Dmax satisfies
sup Pr |
{ |
D(t) |
≥ |
D |
max} ≈ |
γ (r)e−θ (r)Dmax |
(8.25) |
t |
|
|
|
|
where θ (r) = θB (r) × r [16]. Thus, the key point is that for a source modeled by the pair {γ (r), θ (r)}, which has a communication delay bound of Dmax, and can tolerate a delaybound violation probability of at most ε, the effective bandwidth concept shows that the constant channel capacity should be at least r, where r is the solution to ε = γ (r)e−θ (r)Dmax . In terms of the traffic envelope (t) (Figure 8.7), the slope λ(ss) = r and σ (s) = r Dmax.
In Section 8.1 a simple and efficient algorithm to estimate the source model functions γ (r) and θ (r) was discussed. In the following section, we use the duality between traffic modeling {γ (r), θ (r)}, and channel modeling to present an EC link model, specified by a pair of functions {γ (c)(μ), θ (c)(μ)}. The intention is to use {γ (c)(μ), θ (c)(μ)} as the channel duals of the source functions {γ (r), θ (r)}. Just as the constant channel rate r is used in source traffic modeling, we use the constant source traffic rate μ in modeling the channel. Furthermore, we adapt the source estimation algorithm from Section 8.1 to estimate the link model parameters {γ (c)(μ), θ (c)(μ)}.
8.2.2.2 Effective capacity link model |
|
|
˜ |
t |
r(τ ) dτ , which is |
Let r(t) be the instantaneous channel capacity at time t. Define S(t) = |
0 |
the service provided by the channel. Note that the channel service ˜ ( ) is different from the
S t
actual service ( ) received by the source; ˜ ( ) only depends on the instantaneous channel
S t S t
capacity and thus is independent of the arrival A(t). Paralleling the development of Equation (8.21) and (8.22) we assume that
|
1 |
|
˜ |
|
|
(c)(−u) = tlim |
|
|
log E |
e−u S(t) |
(8.26) |
|
t |
||||
→∞ |
|
|
|
|
|

EFFECTIVE LINK LAYER CAPACITY |
249 |
exists for all u ≥ 0. This assumption is valid, for example, for a stationary Markov-fading process r(t). Then, the EC function of r(t) is defined as
α(c)(u) |
= |
|
− (c)(−u) |
, |
|
u |
≥ |
0 |
(8.27) |
|
u |
||||||||||
|
|
|
|
|
|
Consider a queue of infinite buffer size supplied by a data source of constant data rate μ (see Figure 8.6). The theory of effective bandwidth can be easily adapted to this case. The difference is that, whereas in the previous case the source rate was variable while the channel capacity was constant, now the source rate is constant while the channel capacity is variable. Similar to Equation (8.25), it can be shown that the probability of D(t) exceeding a delay bound Dmax satisfies
sup Pr |
{ |
D(t) |
≥ |
D |
max} ≈ |
γ (c)(μ)e−θ (c)(μ)Dmax |
(8.28) |
t |
|
|
|
|
where {γ (c)(μ), θ (c)(μ)} are functions of source rate μ. This approximation is accurate for large Dmax, but we will see later in the simulation results, that this approximation is also accurate even for smaller values of Dmax.
For a given source rate μ, γ (c)(μ) = Pr {Q(t) ≥ 0} is again the probability that the buffer is nonempty at a randomly chosen time t, while the QoS exponent θ (c)(μ) is defined as θ (μ) = μα−1(μ), where α−1(·) is the inverse function of α(c)(u). Thus, the pair of functions {γ (c)(μ), θ (c)(μ)} model the link.
So, if a link that is modeled by the pair {γ (c)(μ), θ (c)(μ)} is used, a source that requires a communication delay bound of Dmax, and can tolerate a delay-bound violation probability of at most ε, needs to limit its data rate to a maximum of μ, where μ is the solution to
ε |
= |
γ (c)(μ)e−θ (c)(μ)Dmax . In terms of the SC (t) shown in Figure 8.7, the channel sustainable |
|||
|
(c) |
= μ and σ |
(c) |
= Dmax. |
|
rate |
λs |
|
If the channel-fading process r(t) is stationary and ergodic, then a simple algorithm to estimate the functions {γ (c)(μ), θ (c)(μ)} is similar to the one described in Section 8.1. Paralleling Equation (8.7) we have
γ (c)(μ) |
= E [D(t)] = τs(μ) + |
E [Q(t)] |
(8.29) |
θ (c)(μ) |
μ |
||
γ (c)(μ) = Pr {D(t) > 0} |
|
(8.30) |
where τs(μ) is the average remaining service time of a packet being served. Note that τs(μ) is zero for a fluid model (assuming infinitesimal packet size). Now, the delay D(t) is the sum of the delay incurred due to the packet already in service, and the delay in waiting for the queue Q(t) to clear which results in Equation (8.29), using Little’s theorem. Substituting Dmax = 0 in Equation (2.28) results in Equation (3.30). As in Section 8.1, solving Equation (8.29) for θ (c)(μ) gives similarly to Equation (8.8a)
θ (c)(μ) |
= |
γ (c)(μ) × μ |
(8.31) |
|
μ × τs (μ) + E [Q(t)] |
||||
|
|
According to Equation (8.30) and (8.31) , as in Section 8.1, the functions γ and θ can be estimated by estimating Pr {D(t) > 0} , τs(μ), and E [Q(t)]. The latter can be estimated by taking a number of samples, say N , over an interval of length T , and recording the following quantities at the nth sampling epoch: Sn the indicator of whether a packets is in service (Sn {0, 1}), Qn the number of bits in the queue (excluding the packet in service),

250 EFFECTIVE CAPACITY
and Tn the remaining service time of the packet in service (if there is one in service). Based on the same measurements, as in Section 8.1,
|
|
|
= |
|
N |
|
|
|
|
|
|
|
γˆ |
|
|
Sn /N |
|
|
|
||
|
|
|
|
|
n=1 |
|
|
|
||
|
|
|
= |
|
N |
|
|
|
|
|
|
|
qˆ |
|
|
Qn /N |
|
|
|
||
|
|
|
|
|
n=1 |
|
|
|
||
|
|
τˆs = |
|
N |
|
|
|
|
||
|
|
|
|
Tn /N |
|
|
|
|||
|
|
|
|
|
n=1 |
|
|
|
||
are computed and then, from Equation (8.31), we have |
|
|
||||||||
|
|
θˆ |
= |
|
|
γˆ × μ |
|
|
(8.32) |
|
|
|
|
μ × τˆs + qˆ |
|
|
|||||
|
|
|
|
|
|
|
||||
These parameters are used to predict the QoS by approximating Equation (8.28) with |
||||||||||
sup Pr |
|
D(t) |
|
|
D |
|
|
ˆ |
(8.33) |
|
{ |
≥ |
max} ≈ |
γˆ e−θ Dmax |
|||||||
t |
|
|
|
|
|
|
||||
If the ultimate objective of EC link modeling is to compute an appropriate SC |
(t), then, |
given the delay-bound Dmax and the target delay-bound violation probability ε of a connec-
tion, we can |
find (t) |
= { |
σ (c), λ(c) |
} |
by setting σ (c) |
= |
D |
max |
, solving Equation (8.33) for μ |
|
(c) |
= μ. |
s |
|
|
|
|||||
and setting λs |
|
|
|
|
|
|
|
|
8.2.3 Physical layer vs link-layer channel model
In Jack’s model of a Rayleigh flat-fading channel, the Doppler spectrum S( f ) is given as
S( f ) = |
1.5 |
(8.34) |
π fm 1 − (F/ fm)2 |
where fm is the maximum Doppler frequency, fc is the carrier frequency, and F = f − fc. Below we show how to calculate the EC for this channel [11].
Denote a sequence of N measurements of the channel gain, spaced at a time interval δ apart, by x = [x0, x1, · · · , xN −1], where {xn , n [0, N − 1]} are the complex-valued Gaussian distributed channel gains (|xn | are, therefore, Rayleigh distributed). For simplicity, the constant noise variance will be included in the definition of xn . The measurement xn is a realization of a random variable sequence denoted by Xn , which can be written as the vector X = [X0, X1, · · · , X N −1]. The pdf of a random vector X for the Rayleigh-fading channel is
fX(X) = |
1 |
e− |
xR−1xH |
(8.35) |
π N det(R) |
|
where R is the covariance matrix of the random vector X, det(R) the determinant of matrix R, and xH the conjugate transpose (Hermitan) of x. To calculate the EC, we start with
˜ |
exp −u |
|
t |
(a) |
−u |
N −1 |
|
E[e−u S(t)] = E |
0 |
r(τ ) dτ |
≈ |
exp |
δ × r(τn ) fx(x) dx |
||
|
|
|
|
|
|
|
n=0 |

|
EFFECTIVE LINK LAYER CAPACITY |
253 |
Rate = μ |
Data |
|
source |
|
|
|
|
|
Qn |
|
|
rn |
|
|
|
Transmitter |
|
|
Transmitted |
|
|
data |
|
Gain |
|
|
Noise |
Fading |
|
|
channel |
|
Received
signal
Receiver
Figure 8.8 Queueing model used for simulations.
8.2.4 Performance examples
The discrete-time system depicted in Figure 8.8 is simulated. The data source generates packets at a constant rate μ which are first sent to the (infinite) buffer at the transmitter, whose queue length is Qn , where n refers to the nth sample interval. The head-of-line packet in the queue is transmitted over the fading channel at data rate rn . The fading channel has a random channel gain xn (the noise variance is absorbed into xn ). We use a fluid model that is the size of a packet is infinitesimal. A perfect knowledge of the channel gain xn (the SNR, really) at the transmitter side is assumed. Therefore, as described in Chapter 4, it can use rate-adaptive transmissions and strong channel coding to transmit packets without errors. Thus, the transmission rate rn is equal to the instantaneous (time-varying) capacity of the fading channel, defined by the Shannon law, rn = Bc log2(1 + |xn |2) where Bc is the channel bandwidth.
The average SNR is fixed in each simulation run. We define rg as the capacity of an equivalent AWGN channel, which has the same average SNR, i.e. rg = Bc log2(1 + SNRavg) where SNRavg is the average SNR, i.e. E |xn |2. Then, rn /rg relation
r |
n = |
rawgn log2(1 + |xn |2) |
|
(8.45) |
|
log2(1 + SNRavg) |
|||||
|
|
Simulation parameters as in Wu and Negi [11] were used. Channel samples xn are generated by the following AR(1) (autoregressive) model: xn = kxn−1 + vn where the modeling error vn is zero-mean complex Gaussian with unit variance per dimension and is statistically independent of xn−1. The coefficient k can be determined by the following procedure:
(1) compute the coherence time Tc by Tc ≈ 9/16π fm, where the coherence time is defined as the time over which the time autocorrelation function of the fading process is above 0.5; (2)


256EFFECTIVE CAPACITY
[8]P.W. Glynn and W. Whitt, Logarithmic asymptotics for steadystate tail probabilities in a single-server queue, in Studies in Applied Probability, Papers in Honor of Lajos Takacs, J. Galambos and J. Gani, eds, Applied Probability Trust, 1994, pp. 131– 156.
[9]H. Kobayashi and Q. Ren, A diffusion approximation analysis of an ATM statistical multiplexer with multiple types of traffic, part I: equilibrium state solutions, in Proc. 1993 IEEE Int. Conf. Communications, Geneva, May 1993, vol. 2, pp. 1047–1053.
[10]B.L. Mark and G. Ramamurthy, Joint source-channel control for realtime VBR over ATM via dynamic UPC renegotiation, in Proc. IEEE Globecom’96, London, November, 1996, pp. 1726–1731.
[11]D. Wu, and R. Negi, Effective capacity: a wireless link model for support of quality of service, IEEE Trans. Wireless Commun., vol. 2, no. 4, 2003, pp. 630–643.
[12]R. Guerin and V. Peris, Quality-of-service in packet networks: Basic mechanisms and directions, Comput. Networks, ISDN, vol. 31, no. 3, 1999, pp. 169–179.
[13]S. Hanly and D. Tse, Multiaccess fading channels: Part II: Delay-limited capacities, IEEE Trans. Inform. Theory, vol. 44, 1998, pp. 2816–2831.
[14]C.-S. Chang and J.A. Thomas, Effective bandwidth in high-speed digital networks, IEEE J. Select. Areas Commun., vol. 13, 1995, pp. 1091–1100.
[15]G.L. Choudhury, D.M. Lucantoni and W. Whitt, Squeezing the most out of ATM, IEEE Trans. Commun., vol. 44, 1996, pp. 203–217.
[16]Z.-L. Zhang, End-to-end support for statistical quality-of-service guarantees in multimedia networks, Ph.D. dissertation, Department of Computer Science, University of Massachusetts, 1997.
[17]B. Jabbari, Teletraffic aspects of evolving and next-generation wireless communication networks, IEEE Pers. Commun., vol. 3, 1996, pp. 4–9.
[18]S. Chong and S. Li, (σ ; ρ)-characterization based connection control for guaranteed services in high speed networks, in Proc. IEEE INFOCOM’95, Boston, MA, April 1995, pp. 835–844.
[19]O. Yaron and M. Sidi, Performance and stability of communication networks via robust exponential bounds, IEEE/ACM Trans. Networking, vol. 1, 1993, pp. 372–385.
[20]T. Tedijanto and L. Gun, Effectiveness of dynamic bandwidth management in ATM networks, in Proc. INFOCOM’93, San Francisco, CA, March 1993, pp. 358–367.
[21]M. Grossglauser, S. Keshav, and D. Tse, RCBR: a simple and efficient service for multiple time-scale traffic, in Proc. ACM SigCom’95, Boston, MA, August 1995,
pp.219–230.
[22]D. Reininger, G. Ramamurthy and D. Raychaudhuri, VBR MPEG video coding with dynamic bandwidth renegotiation, in Proc. ICC’95, Seattle, WA, June 1995, pp. 1773– 1777.
[23]J. Abate, G.L. Choudhury, and W. Whitt, Asymptotics for steady-state tail probabilities in structured Markov queueing models, Stochastic Models, vol. 10, 1994, pp. 99–143.
[24]D.P. Heyman and T.V. Lakshman, What are the implications of long-range dependence for VBR-video traffic engineering? IEEE/ACM Trans. Networking, vol. 4, 1996,
pp.301–317.
[25]W. Whitt, Tail probabilities with statistical multiplexing and effective bandwidths in multi-class queues, Telecommun. Syst., vol. 2, 1993, pp. 71–107.
[26]D.E. Knuth, The Art of Computer Programming, Volume 2: Seminumerical Algorithms, 2nd edn. Addison-Wesley: Reading, MA, 1981.
REFERENCES 257
[27]A.I. Elwalid and D. Mitra, Effective bandwidth of general Markovian traffic sources and admission control of high speed networks, IEEE/ACM Trans. Networking, vol. 1, 1993, pp. 323–329.
[28]A.K. Parekh and R.G. Gallager, A generalized processor sharing approach to flow control in integrated services networks: The singlenode case, IEEE/ACM Trans. Networking, vol. 1, 1993, pp. 344–357.
[29]B.L. Mark and G. Ramamurthy, UPC-based traffic descriptors for ATM: How to determine, interpret and use them, Telecommun. Syst., vol. 5, 1996, pp. 109–122.