Cart (Loading....) | Create Account
Close category search window
 

Analysis of an access control mechanism for data traffic in an integrated voice/data wireless CDMA system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Sampath, Ashwin ; Wireless Inf. Network Lab., Rutgers Univ., Piscataway, NJ, USA ; Mandayam, Narayan B. ; Holtzman, J.M.

Mandayam and Boltzman (see MILCOM'95, San Diego, California, 1995) studied an access protocol for short data messages in an integrated voice/data CDMA system. It was assumed that voice traffic had priority and was less tolerant to delay than data traffic. Hence, the transmission of data traffic could be controlled to guarantee acceptable quality of service for voice. The data messages were of short duration and as a result, closed loop power control for them was not possible. The access protocol considered was an extension of a proposal by Viterbi (see Communications & Cryptography, p.42, 1994), which was for data-only systems. A slotted system was considered for data. At the end of every slot, the base station would control the transmission of data users by increasing/decreasing data permission probability. Measured QoS for voice was the criterion. An approximate model wherein a one-dimensional Markov chain of just the persistence state was considered and solved explicitly. Imperfect power control for voice was accounted for. In this work, the protocol is studied in greater detail. Stability of the protocol is investigated and critical data load values developed. The results also show that at high data loads additional admission control such as limited retries will be necessary to maintain stability. Simulation results show good agreement with the analysis, in the desirable operating regions

Published in:

Vehicular Technology Conference, 1996. Mobile Technology for the Human Race., IEEE 46th  (Volume:3 )

Date of Conference:

28 Apr-1 May 1996

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.