An enhanced VoIP scheduling with silence suppression in IEEE 802.16e/m systems

Li-Chun Wang*, Eulin Yen, Jane Hwa Huang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Thanks to silence suppression, the VoIP capacity can be improved. When the voice users are listening or thinking, the VoIP system does not need to allocate resources to them, thereby being able to accommodate more users. The main issue is how to immediately allocate resources to the user, when the user transits from the silence state to the talkspurt state. The IEEE 802.16e/m system provides two typical bandwidth request methods: unicast polling and multicast polling. The unicast-polling method can ensure the bandwidth request delay, but needs more slots for polling. Contrarily, the multicast-polling method needs fewer slots for polling, but the bandwidth request delay cannot be guaranteed. Therefore, we propose the hybrid-polling method, which combines the multicast and unicast polling. Simulation results demonstrate that by properly designing system parameters, the hybrid-polling method can achieve better tradeoff between the bandwidth request failure rate and the resources needed for polling. Moreover, the proposed hybrid-polling method can achieve comparable VoIP capacity as the multicast-polling method, with a guaranteed bandwidth request delay.

Original languageEnglish
Title of host publication2010 IEEE 72nd Vehicular Technology Conference Fall, VTC2010-Fall - Proceedings
DOIs
StatePublished - 1 Dec 2010
Event2010 IEEE 72nd Vehicular Technology Conference Fall, VTC2010-Fall - Ottawa, ON, Canada
Duration: 6 Sep 20109 Sep 2010

Publication series

NameIEEE Vehicular Technology Conference
ISSN (Print)1550-2252

Conference

Conference2010 IEEE 72nd Vehicular Technology Conference Fall, VTC2010-Fall
CountryCanada
CityOttawa, ON
Period6/09/109/09/10

Fingerprint Dive into the research topics of 'An enhanced VoIP scheduling with silence suppression in IEEE 802.16e/m systems'. Together they form a unique fingerprint.

Cite this