DOI QR코드

DOI QR Code

Performance Evaluation of the VoIP Services of the Cognitive Radio System, Based on DTMC

  • Habiba, Ummy (Department of Electronics and Communications Engineering, East West University) ;
  • Islam, Md. Imdadul (Department of Computer Science and Engineering, Jahangirnagar University) ;
  • Amin, M.R. (Department of Electronics and Communications Engineering, East West University)
  • Received : 2013.02.27
  • Accepted : 2013.08.25
  • Published : 2014.03.31

Abstract

In recent literature on traffic scheduling, the combination of the two-dimensional discrete-time Markov chain (DTMC) and the Markov modulated Poisson process (MMPP) is used to analyze the capacity of VoIP traffic in the cognitive radio system. The performance of the cognitive radio system solely depends on the accuracy of spectrum sensing techniques, the minimization of false alarms, and the scheduling of traffic channels. In this paper, we only emphasize the scheduling of traffic channels (i.e., traffic handling techniques for the primary user [PU] and the secondary user [SU]). We consider the following three different traffic models: the cross-layer analytical model, M/G/1(m) traffic, and the IEEE 802.16e/m scheduling approach to evaluate the performance of the VoIP services of the cognitive radio system from the context of blocking probability and throughput.

Keywords

1. INTRODUCTION

The increasing demand for high data rate wireless voice services over the Internet has led to numerous research initiatives in the field of wireless communication systems. The desired communication system should have enhanced computational intelligence along with higher access speeds, quality of service assurance, and the ability to successfully handle multiple users simultaneously. The growing demand of users has also brought the need for the flexible and efficient allocation of available spectrum resources. Spectrum regulatory entities have found that spectrum usage is currently concentrated over a certain portion of the spectrum and that most of the licensed radio frequency spectrum is inadequately utilized [1]. Improved utilization of the spectrum is one of the key drivers for the development of the cognitive radio (CR), which was first proposed by Mitola and Magure [2]. A CR can use an unused licensed spectrum as a secondary user (SU), which ensures that licensed primary users (PUs) are not interfered with by its transmission. For the successful transmission of secondary users, it is very important to determine the vacant radio frequency spectrum of the PU, which is also referred to as the spectrum hole. While determining the spectrum hole, the probability of a false alarm should be minimal and the level of interference towards the PUs should be at the acceptable level. If the CR detects that the level of interference towards the PUs has exceeded the threshold level, it releases the spectrum and switches to another spectrum for transmission. A CR system can support the multiuser environment efficiently with a limited number of spectrum holes. To overcome the challenge of the multiple access control in the CR system, an effective modulation strategy and traffic model that can adapt to the time varying conditions of the radio environment assuring the reliable communication [3] need to be chosen. For future communication systems, VoIP (Voice over IP) is one of the essential technologies that can provide users with satisfactory voice services at a lower cost. VoIP can support as many users as possible with a satisfactory quality of service. Therefore, the combination of VoIP technology with the CR system has the potential to provide reliable multimedia wireless services with the efficient use of the limited radio spectrum. In this case, the CR system should be able to support real time traffic with service satisfaction. The voice capacity of the CR system and the performance of the VoIP services also needs to be investigated. Hence, in this paper we have concentrated on the performance analysis of VoIP services within a CR system by using different types of traffic models. In the CR system, VoIP services can be modeled by choosing an efficient traffic model and modulation strategy. In [4], the VoIP capacity and the performance of VoIP services have been analyzed using the queuing model for the discrete-time Markov chain (DTMC) framework based on a Markov modulated Poisson process (MMPP) traffic model. However, the authors have concentrated more on finding the minimum target-detection and false alarm probabilities. A cross-layer analytical model has been proposed in [5] to ensure the quality of service for the secondary CRs.

In this paper, we consider the cross-layer analytical model for DTMC based VoIP services in the CR system. Furthermore, the traffic control schemes for M/G/1(m) traffic discussed in [6,7] have been analyzed in the context of a CR system. Here, we also investigate VoIP performance in the CR system using the scheduling algorithm with an adaptive multi rate (AMR) speech codec in IEEE 802.16e/m[8]. In this paper, we have made an effort to evaluate the performance of the VoIP services in the CR system for three different traffic models and to determine an efficient traffic model that can be implemented for the DTMC based secondary VoIP users of the CR system [9,10].

The remainder of the paper is organized as follows: Section 2 outlines the VoIP traffic and the system model along with the details of the three traffic models that we consider for the CR system, which are the cross-layer analytical model, M/G/1(m) traffic, and the IEEE802.16e/m traffic scheduling model. The results and analysis are presented in Section 3. Finally, Section 4 concludes the paper.

 

2. SYSTEM MODEL

2.1 VoIP Traffic using DTMC

VoIP traffic can be modeled using the discrete-time Markov chain (DTMC) by considering the following two parameters: (a) change in the number of queuing packets in two adjacent frames and (b) change in the number of unoccupied channels between two adjacent frames. Changes in the above two parameters are expressed by a transition matrix as [4]:

where Qmax is the maximum length of queue. Each element Ai,j of the matrix P is another matrix that represents that there are i packets in the queue in the duration of the current frame and it will change to j packets in the next frame. The matrix Ai,j is expressed in a generalized form as:

where each element B(i,m)(j,n) of the matrix Ai,j is another matrix of size 2×2 representing the change in the number of unoccupied channels from m to n when the number of packets in the queue changes from i to j . Here, N is the total number of channels.

Any element B(i,m)(j,n) of the matrix Ai,j is evaluated as:

where:

is the transition probability that indicates the number of unoccupied channels changes from m (current frame) to n (next frame), which are derived from the two-state MMPP model. Here, Ps (k|xc = m) represents the probability that a node serves k packets when the number of unoccupied channels is m and y′ = n − m + x′ . From the two-state discrete time MMPP model, the diagonal probability matrix D(k) and the transition probability matrix U are expressed respectively as [11]:

and:

where the transition rate matrix R and the Poisson arrival rate matrix Λ are expressed as follows:

and:

Here, λ1 and λ2 are the mean arrival rates, and are the mean sojourn times of the two-state MMPP, and Tf is the frame duration. Each element of the D( k ) matrix provides the probability of the arrival of k packets over a frame duration of Tf.

Now, the steady probability vector Π can be obtained using the relations ΠpP = Πp and Πpe =1 ; where e is a vector where all elements are 1. The dimension of the vector Πp is 1 by 2×( N +1)×(Qmax +1) .

The general expression of the relation ΠpP = Πp with Πpe =1 is derived as:

The probability of k packets waiting in queue is found as:

The steady probability vector of size 1 by (Qmax +1) is

The mean queue length is:

The average arrival rate is:

where Amax is the maximum number of packets that have arrived from a node during the interval [0, Tf ] and the vector s = [s1, s2 ] is obtained from the relations sU = s and s1 +s2 = 1 , where U is given by equation (5).

The average number of served VoIP packets under spectrum sensing statistics T( x ) is:

where R( pd , p f ) is the ratio of the number of successfully transmitted packets and the number of scheduled packets.

The average throughput is calculated as:

where lVoIP is the length of the packet data unit (PDU) of the VoIP. Finally, packet-blocking probability is calculated as:

2.2 VoIP Traffic under the Cross-Layer Analytical Model

A cross-layer analytical model of the Cognitive Radio is proposed in [5]. The traffic parameters of the PUs are the call arrival rate λp , and the call termination rate μp . The blocking probability of PU is evaluated using the M/M/N model.

Now, the probability of a channel is kept unoccupied by the PUs that are sensed by the SU, which is expressed as:

where Pf is the probability of false alarms sensed by the SU and 𝜂 is the channel utilization factor of the PUs, which is expressed as:

where Ap = λp/ μp is the offered traffic and Bp is the blocking probability of the PUs.

The probability of z channels being unoccupied and correctly determined as idle and remaining unoccupied during the spectrum-sensing period can be derived as:

where Tp is the spectrum-sensing period.

Now, the probability P(k | xc = m) that appears as in Equation (3) can be expressed as:

where:

and:

2.3 Connection Oriented Packet Switching of M/G/1(m) Traffic

Let λj , hj , Vj , and yj be the call arrival rate, mean call holding (connection) time, data speed, and the data activity rate for class j∈J, respectively. The input traffic load a and the utilization 𝘱co of the transmission line are then given by:

and:

respectively, where B is the call blocking probability, Lc is the cell length (53 bytes for ATM), Lp is the payload length (48 bytes for ATM), and c is the transmission speed.

We have Erlang’s loss formula:

where s is the number of virtual channels (VCs) assigned to the transmission line.

According to [6,7] for the M/G/1 system, we have:

where pj is the probability that j calls arrive during the service time.

The M/G/1(m) system, = 0 for j > m +1 and the equation (22) take the following recurrence form:

Taking, we get:

Let, with C0 = 1 and combining the above equations, we obtain:

The cell loss rate is then:

Here, the probability P( k | xc = m) can be expressed as:

with Y( m ) = P( m | n ) .

2.4 VoIP Traffic under IEEE 802.16e/m

In VoIP traffic, there is always a tradeoff between the efficient utilization of radio resources and the quality of service. In the IEEE 802.16e/m model, different algorithms are prevalent for the scheduling of resources to support the talk-spurt and silent-period of a user. One of the popular VoIP scheduling services under IEEE 802.16e/m is unsolicited grant service (UGS), where a base station (BS) grants a constant bandwidth (BW) to a subscriber station (SS) during the entire service time [11,12]. Here, BS periodically assigns a grant to a SS, irrespective of the state of the SS (i.e., its silent and talk-spurt states). During the silent-period any allocation of BW is simply a waste of the utilization of a channel. Therefore, the UGS algorithm is inefficient for the case of VoIP scheduling. The adaptive multi-rate (AMR) speech codec under the IEEE 802.16e/m system has overcome the above-mentioned waste of channel utilization. Here, a speech frame of 95-477 bits is generated periodically on every 20ms during the talk-spurt, while 40 bits of silence descriptor (SID) frames are generated every 160ms during the silent-period. For further improvement in the utilization of a channel for VoIP service over AMR speech codec, a new algorithm is proposed in [8]. According to that algorithm, SID is sent in a random access method, instead of via a periodic transmission during the silent-period. This is done to save the BW of the uplink. When the state of a SS changes from the silent-period to a talk-spurt state, the access technique is still maintained as random during the transition time since the duration of this transition time is unpredictable. Only during the talk-spurt time does the BS provide an allocation (grant) to the SS, where the grant size can vary according to the required data rate. Any SS can use the reserved bit and bandwidth-request (BR) field of the “bandwidth request and uplink sleep control” (BRUSC) to apprise the BS about the state of the SS and the required bytes. In this case, a SS need not to use a generic-MAC header. The above VoIP scheduling algorithm is depicted in Fig. 1. The AMR speech codec and the corresponding queuing method can be modeled by a one dimensional Markov chain, as shown in Fig. 2.

Fig. 1.VoIP scheduling algorithm

Here, we consider the voice traffic to be exponentially distributed with a mean on-time of 1/λ and a mean off-time of 1/μ . Taking the length of the queue to be k, and by applying cut equations on Fig. 2, we derive the steady probability states, blocking probability, and the probability of entering the queue.

The probability state is expressed as:

where:

The probability of entering queue is:

Fig. 2.Markov chain of VoIP users for the on-off system

The mean queue length is:

and the blocking probability is expressed as:

Based on the equations (27)-(30), the probability P( k | xc = m) of Equation (3) can be expressed as:

where:

and:

The first term indicates the probability of occupancy of m channels by the PU and the second term indicates the probability that k packets exist in the queue. Finally, we have:

 

3. RESULTS

For each of the traffic models, we have taken two sets of the matrix P : one for the Qmax = 3 and another is for Qmax = 10 . To form the matrix P for Qmax = 3 , we take 3 matrices of Ai,j where the size of each of Ai,j matrix is 8×8 . Thus, the size of the final P matrix becomes 24×24 . For Qmax =10 , the size of the matrix P becomes 80×80 with 10 matrices of Ai,j . Considering the total number of channels N = 3 , we obtain the 2× 2 matrix B(i,n)(j,m) and take some typical values of overloaded network like: P00 = 0.6 , P01 = 0.15 , P10 = 0.75 and P11 = 0.24 . To get the diagonal matrix D(k) and the transition probability matrix U , we assume that Tf = 1, λ1 = 0.656 , λ2 = 0.842 , r1 = 0.21 , and r2 = 0.12 (considering an adverse condition of the network that stays in an underloaded and overloaded state at 36% and 64% of the observation time, therefore, 0.36 = r1/(r1+r2) and 0.64 = r2/(r1+r2) hence r1 = 0.21 and r2 = 0.12) for the VoIP traffic under the cross-layer analytical model and IEEE 802.16e/m. For the VoIP traffic under the cross-layer analytical model and M/G/1(m) traffic, we chose Pf = 0.12 , λ p = 2 and Tp = 1.

For the VoIP traffic under cross-layer analytical model, we took Ap = 5 and As = 0.04 . In the case of M/G/1(m) traffic, we assumed that Ap = 50 , a =135 Erls, s = 144 , λ1 =1 , λ2 = 0.5 , y1 = 0.5 , y2 = 0.1 , V1 =1.5 , V2 =10 , h1 =100 , h2 = 50, Lc = 53 , and Lp = 48 . For VoIP traffic under IEEE 8012.16e/m, we took the number of users, M =125 , a = 0.03 , Pd = 0.85 , and m = 6 . The steady probability state vector Π obtained from the P matrix of the size 24× 24 for three different traffic models of Section II is plotted in Fig. 3. The profile of the probability states resembles to Poisson’s pdf in a repetitive manner in three different regions of channels. Among the three cases, the IEEE 802.16e/m traffic model shows the maximum variation of states.

Fig. 3.The steady probability states of three traffic models

Fig. 4.Variation of blocking probability against offered traffic: a) Qmax = 3 , b) Qmax = 10

Considering the above parameters, the variation of the blocking probability against offered traffic is plotted in Fig. 4(a). The IEEE 802.16e/m model reveals the best performance that satisfies the basic concept of packet traffic. A similar analysis is also shown in Fig. 4(b) considering Qmax = 10 , which can support more offered traffic, as visualized in Fig. 4(b). The performance of the cross-layer analytical model has improved with a wider margin.

Finally, considering Qmax= 3 the throughput is plotted against the length of the PDU for three cases in Fig. 5(a). Among these three cases, throughput is found maximum for the IEEE 802.16e/m case. Fig. 5(b) shows the profile for Qmax =10 , where the throughput is increased significantly for all of the traffic cases with an increment in the queue length.

Fig. 5.Variation of the throughput against the length of PDU: a) Qmax = 3 , b) Qmax=10

 

4. CONCLUSION

To meet the demand of wireless voice services, more dynamic and flexible technologies need to be designed to ensure the efficient utilization of spectrum resources. One such system model can be designed based on the DTMC traffic model to analyze the VoIP traffic on the CR system. In this paper, we have analyzed the performance of VoIP services using three different traffic models in terms of throughput, steady probability states, and blocking probability. By comparing the VoIP performance under the cross-layer analytical model, M/G/1(m), and the IEEE802.16e/m traffic model, we showed that the IEEE802.16e/m traffic model outperforms other cases in terms of blocking probability and throughput when we take Qmax = 3 and the cross-layer model yields the best if we consider Qmax = 10 . For all three cases throughput is increased with the increment of the queue length. Therefore, we can conclude that the relative performance of the three traffic models is sensitive to the length of the queue (i.e., Qmax ). It should be mentioned here that the proper detection of PU and the minimization of false alarms, which is another aspect of the CR system and that is related to the fading condition of the wireless channel and the detection techniques, is beyond the scope of this paper.

References

  1. FCC Spectrum Policy Task Force, "FCC Report of the Spectrum Efficiency Working Group," Nov. 2002 [Online] Available: http://www.fcc.gov/sptf/files/SEWGFinalReport1.pdf.
  2. J. Mitola III and G. Q. Maguire, "Cognitive radio: making software radios more personal," IEEE Personal Communications, vol. 6, no. 4, pp. 13-18, Aug. 1999. https://doi.org/10.1109/98.788210
  3. S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE J. Select. Areas Commun., vol. 23, pp. 201-220, Feb. 2005. https://doi.org/10.1109/JSAC.2004.839380
  4. Howon Lee and Dong-Ho Cho, "Capacity improvement and analysis of VoIP service in a cognitive radio system," IEEE transactions on Vehicular Technology, vol.59, no.4, pp. 1646-1651, May 2010. https://doi.org/10.1109/TVT.2009.2039503
  5. Yakim Y. Mihov, "Cross-layer QoS Provisioning in Cognitive Radio Networks", IEEE Communications Letters, vol. 16, no. 5, pp. 678-681, May 2012. https://doi.org/10.1109/LCOMM.2012.031212.120175
  6. H. Akimaru and K. Kawashhima, "Teletraffic-Theory and Applications", London, U.K. Springer- Verlag, 1993.
  7. Haruo Akimaru, Marion R. Finley and Kyoko Yamori, "A Practical Dimensioning Method for ATM Systems," IEEE Transactions on Communications, vol. 47, no. 2, pp.311-315, Feb. 1999. https://doi.org/10.1109/26.752137
  8. Sung-Min Oh, Sunghyun Cho, Jae-Hyun and Jonghyung Kwun, "VoIP Scheduling algorithm for AMR speech codec in IEEE 802.16e/m system," IEEE Communications Letters, Vol. 12, No. 5, pp. 374-376, May 2008. https://doi.org/10.1109/LCOMM.2008.072098
  9. J. O. Neel, "Analysis and Design of Cognitive Radio Networks and Distributed Radio Resource Management Algorithms", Doctor of Philosophy, Virginia Polytechnic Institute and State University, Blacksburg, VA, Sept. 2006.
  10. J. Mitola, "Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio", Doctor of Technology, Royal Inst. of Technology (KTH), Stockholm, Sweden, May 2000.
  11. J. So, "Performance analysis of VoIP services in the IEEE 802.16e OFDMA system with inband signaling," IEEE transactions on Vehicular Technology, vol.57, no.3, pp. 1876-1886, May 2008. https://doi.org/10.1109/TVT.2007.909261
  12. S. Oh, S. Cho, J. Kim, and J. Kwun "VoIP Scheduling Algorithm for AMR Speech Codec in IEEE 802.16e/m System," IEEE Communications Letters, vol. 12, no. 5, pp. 374-376, May 2008. https://doi.org/10.1109/LCOMM.2008.072098

Cited by

  1. Secure Cooperative Spectrum Sensing via a Novel User-Classification Scheme in Cognitive Radios for Future Communication Technologies vol.7, pp.2, 2015, https://doi.org/10.3390/sym7020675
  2. System level simulation platform for Cognitive LTE vol.72, pp.7, 2016, https://doi.org/10.1007/s11227-015-1537-2
  3. A Novel Approach for Optimal Multimedia Data Distribution in Mobile Cloud Computing vol.2014, 2014, https://doi.org/10.1155/2014/137296
  4. Secure Cooperative Spectrum Sensing for the Cognitive Radio Network Using Nonuniform Reliability vol.2014, 2014, https://doi.org/10.1155/2014/101809
  5. RFID-based scale model freight car system allowing realtime quantity checking vol.76, pp.4, 2017, https://doi.org/10.1007/s11042-015-2815-y
  6. The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks 2015, https://doi.org/10.3745/JIPS.03.0040