QoS Design for 3G Networks - Faculty Personal Homepage

King Fahad University of Petroleum & Minerals
Computer Engineering Department
COE-543 Mobile and Wireless Networks
Dr. Ashraf Sharif Hasan Mahmoud
Final Report
QoS Design for 3G Networks
Name: Abdullah Hamad Al-Subhi
ID # 913659
Date: May 20, 2003
1
Table of Content
1. Introduction ………………………….…………………………. 2
2. QoS in 3G Networks …………………………….……...…….. 5
2.1 UMTS ……………………………………………………. 5
2.2 CDMA2000………………………………………………. 8
3. 3G QoS Techniques ……………………………….…………. 10
3.1 Traffic shaping and policing ………………………...... 10
3.2 Traffic Scheduling Algorithm …………………………. 14
3.3 DIFFSERV based QoS Architecture ……………...
16
4. QoS Issues in the Converged 3G and Wired Networks
18
5. Conclusion …………………………….……………………….
21
References
2
Introduction
The goal of third generation (3G) mobile communication systems is the
delivery of multimedia services to the user in the mobile domain. This requires
the provision of user data rates that are substantially higher than those
provided by today’s second generation (2G) networks. In 2G, only data rates
of 9.6 kbit/s are currently supported. In 3G users will be provided with data
rates of up to 144 kbit/s in macrocellular environments, up to 384 kbit/s in
microcellular environments and up to 2 Mbit/s in indoor or picocellular
environments. These requirements address the limitations of 2G, which,
despite its enormous world-wide success was designed primarily for mobile
digital telephony with only a limited data capability.
3G Network enables provides high-speed wireless Internet access to mobile
users. The same network can be used to make voice calls using conventional
mobile phones. Moreover 3G networks are seen as the enabler of multimedia
services like videoconferencing, streaming audio and video etc. These
Networks must provide services to many different types of applications
without letting data from one application affect the services provided to
other types of applications. In other words, 3G Networks must provide
Support for Quality of Service.
In 3G wireless Internet, controlling QoS is not about throwing bandwidth at the
‘hot spots’; as a matter of fact, the hottest spot in the network is the radio
access portion, the most expensive part of the network. It is about making the
best use of available network resources to deliver QoS as required and
subscribed by the services and users. Applying policies to QoS control will
help to differentiate users and services, as well as to protect higher-tier users
and network resources.
The ability to control QoS offers operators ways to differentiate themselves
from other competitors by being able to launch new revenue-generating
services faster and to bundle service packages for different user segments.
Absence of this ability remains prevalent with most fixed and wireless ISPs
today, making them resort to “first come first served ”or “all you can use”’
service models.
What is Quality of Service?
Quality of Service carries different connotations for different people. It is the
end users who pay for the service, and whose perspectives matter most.
From an end user’s perspective, QoS defines the characteristics of service
delivery that impact most critically his/her perception of the service. The three
main characteristics of a network delivering QoS to an end user are as
follows:
3
Availability of the service: the service is immediately available or reasonably
delayed depending on user’s subscription status. The service availability is
faster for a higher-tier subscriber than that for a lower-tier subscriber.
Quality of information: the information is received uncorrupted and usable
without errors, as required by the type of the service.
Consistent delivery: The information is delivered throughout the session at a
perceivably consistent speed and quality, guaranteeing that the perception of
the user remains the same throughout.
At a technical level, QoS is characterized by a set of measurable parameters
such as:
• Service availability
• Delay
• Delay variation (jitter)
• Throughput
• Packet loss rate
Service availability can be further broken down into percentage of blocked
and dropped calls, as well as the duration of service outages. QoS enables a
network to deliver classes of service (CoS), i.e. different prioritized treatments
to different services or to different groups of users. QoS allocates network
capacity by type of traffic required by certain type of service, while CoS
provides preferred allocation of the network without guaranteeing any
measurable amount. CoS is implied in a QoS policy associated with a
subscriber. It is used by the network to provide differential QoS treatments to
different services subscribed by different users, that is, service and user
differentiation.
4
2. QoS in 3G Networks
2.1 UMTS
2.1.2 UMTS QoS Architecture
In order to have QoS functionality, it should be configured from the
source up to the destination. The traffic moves from Terminal Equipment (TE)
to another TE through all network services. The UMTS bearer services
consist of two parts: Radio Access Bearer (RAB) and Core Network Bearer
(CNB) services. These two services used to optimize the UMTS bearer
service in a network topology taking into consideration mobility and mobility
subscriber profiles [S1:1187].
The RAB service provides a secured transport of signaling and user
data between MT and CN edge with QoS adequate to negotiated UMTS
bearer service and with the default QoS for signaling. The RAB is based on
the radio interface behavior and maintained for moving MT [S1:1188].
UTRAN and MT have the ability to segment/resemble the user flow into
different sub-flow requested by the RAB service. The segmentation/resemble
is provided by the Service Data Unit play load format singled at the RAB
establishment. The radio bearer service handle the part of the user flow
belonging to one sub-flow based on sub-flow reliability requirements.
[S1:1188].
The CNB role is to efficiently control and use backbone network to
provide the contracted UMTS bearer service. The UMTS packet CN support
different backbone bearer services for different QoS [S1:1188].
The CN nearer service uses a generic network service. The backbone
network service covers the layer 1 and layer 2 functionality and is selected
according to operator’s choice to satisfy the QoS requirements of the CN
bearer service [S1:1188].
Figure 1. UMTS QoS Architecture
5
2.1.3 UMTS QoS Classes.
UMTS network should take care of different obstacles in providing
good services in the air and consider all limitations on that aspect. Some real
time application can’t afford much delay of packet data being transmitted to
have good quality services provided by such an operator. UMTS QoS defines
some classes which take care of limitations of the air interface. UMTS define
four different classes:
1.
2.
3.
4.
Conversational class.
Streaming class.
Interactive class.
Background.
The conversational and streaming classes are used to carry real-time
data or services. Delay is what distinguishes between them in how are they
sensitive to it. Conversational class is treated to be the most critical service
amonth them because it carry the voice and vido telephony [S1:1189].
The interactive and background classes are mainly used for traditional
services like email and FTP. These kinds of services do not need to be
delivered on time. They are less sensitive to delay where it accepts
reasonably long delay like telnet and some very long delay like email
[S1:1189].
Traffic class
Fundamental
characteristics
Conversational
class
Streaming
class
Interactive
class
Background
class
Real Time
Real Time
Best Effort
Best Effort
- Preserve time
relation
(variation)
between
information
entities of the
stream
- Preserve
time relation
(variation)
between
information
entities of
the stream
- Request
response
pattern
-Destination is
not expecting
the data within
a certain time
-Preserve
payload
content
-Preserve
payload
content
streaming
video
web browsing
telemetry,
emails
- Conversational
pattern
(stringent and
low delay )
Example of the
application
voice
Table 1 UMTS QoS Classes
6
2.1.3 QoS Management
The control plane QoS management functions include: [S1:1189].




Service manager coordinates the function of the control plane
for establishing modifying and maintaining the service.
Translation function performs conversion between UMTS
bearer services attributes and QoS parameters of external
network service control protocol.
Admission/capability control maintains information about all
available resources of the network entity and about all resources
allocated to UMTA bearer services.
Subscription Control checks the administrative rights of the
UMTS bearer service user to use requested service with
specified QoS attributes.
User Plane QoS management function maintains the signaling and
user data traffic within certain limits defined by the QoS attributes. It includes:
[S1:1189].




Mapping function provides each data unit with the specific
marking required to receive the intended QoS at the transfer by
a bearer service.
Classification function assigns data unites to the established
service at the MT according to the related QoS attributes if the
MT has multiple UMTS bearer services established.
Resource manager distribute the available resources among all
services sharing the same resource based on the required QoS.
Traffic conditioner provides performance between the
negotiated QoS for services and data unit traffic. It handles that
by using policing and traffic shaping techniques. The policing
function compares the data unit traffic with the related QoS
attributes. The traffic shaping form the data unit traffic according
to the QoS the service.
7
2.2 CDMA2000
2.2.1 QoS implementation
The architecture for provisioning QoS should take into account the
need for application and subscriber differentiation. The wireless network
should be able to handle various types of applications with vary QoS
objectives while optimizing the utilization of system resources. Applications
are classified into two types, the real-time and non-real-time application
[S2:45].
CDMA2000 define two modes of QoS:

Non-assured Mode QoS: The application with non-assured QoS
mode is characterized by the delivery of packets by mean of best effort
scheduler. There are no strict requirements on packet transfer delay
and data rate. “Priority” parameter is specified for QoS [S2:48].

Assured Mode QoS: Applications with assured QoS mode can assign
some parameters define the required packet transfer delay and
acceptable data rate. The QoS profile of this mode is characterized by
the following parameters: [S2:48].
o Priority.
o Data Rate: Mobile station can specify the data rate (8, 32,
64,144 and 384kbps).
o Data Lose Rate: Mobile station can specify the requested data
loss rate or acceptable data loss rate (1, 2, 5 and 10%).
o Maximum Delay: Mobile station can specify how long data
octets can be kept in the transmit buffer (40, 120 and 360%).
2.2.2 QoS architecture
The end-to end QoS architecture is designed such that the objective
specifying by the QoS profile of an application is implemented by utilizing the
following services:

Radio Bearer Service: The telecommunication segment between MS
and RAN. It supports multiple applications simultaneously. The QoS
parameters is defined such that to deliver user application
requirements. In this segment, the QoS relies on the efficient
implementation on some control techniques [S2:49].
o Power Control: The fast feedback power control with a channel
feedback at the rate 800Hz ensures a minimum transmission of
power, low level of user interference in the cell and very efficient
utilization of radio resources.
o Radio Admission Control: It checks if QoS requirements of the
new service instance can be met before it is accepted.
o Radio Resource Control (RRC): It establishes, maintains and
terminates radio resources for exchange of packets between the
MS and RCF. It maintains knowledge of radio resource status
and broadcast packet zone ID in the system overhead message.
8
o Scheduling: It schedules data packet in the forward link. Round
robin scheduling is the widely used algorithm.

R-P bearer Service: The telecommunication segment between RAN
and PDSN (Core Network). The PDSN first conducts authentication
and authorization for MS with the Home AAA. The PDSN retrieves the
QoS profile from HAAA through local AAA. The subscriber’s QoS
profile is mainly characterized by the following information: [S2:49].
o The differentiated service markings
o The Air-Link QoS attributes.
Call Admission Control: It is to admit and deny R-P connection. It is
based on the following criteria:
o Availability of sufficient RN resources for new connection.
o QoS requested by the user is within the limits sets by the user’s
QoS profile.
QoS Transport in R-P interface: The QoS requirements are specified
for each service instant independently. A single PPP session is
established between MS and PDSN for each R-P session where each
PPP/R-P session supports communication flows for multiple IP
addresses belong to the same MS [S2:49].

External Bearer Service: The telecommunication segment between
PDSN and the external private network. There is no CDMA2000
specific QoS implementation for external network where it relies on the
standard IP mechanisms [S2:50].
Figure 2 CDMA2000 QoS Architecture
9
2. QoS Techniques used in 3G Network
2.1 Traffic shaping and policing
2.1.1 Definition
Traffic conditioning provides conformance of input traffic to the
specifications agreed with the bearer service provider. A traffic conditioner
may achieve this by traffic shaping or/and traffic policing. The traffic
conditioner may be embodied both in a User Equipment (UE) and in the
gateway nodes [S3:139].
Two main traffic shaping algorithms are exist , namely Leaky Bucket
Algorithm defined by ATM Forum and Token Bucket (TB) Algorithm defined
by IETF respectively. TB has been adopted as a reference algorithm for traffic
conditioner in UMTS by 3GPP [S3:139].
2.1.2 System Model
A traffic conditioning-enabled Radio Network Subsystem (RNS), which
is composed of a RNC and one or more Node Bs is depicted in Fig. 1 as the
system model. The UEs are distributed within each cell with an
omnidirectional base station at the cell center. Each UE is expected to use
any one of the considered traffic classes. A traffic shaper is employed for
uplink traffic on each UE. The packets received at the Node Bs are forwarded
to the RNC where the traffic policing function is performed [S3:139].
Figure 3. System Model: Traffic Shaping and Policing in UMTS
10
Token Bucket Algorithm:
The token bucket algorithm regulates the bursty traffic in such a way
that over a long time period the average allowed rate approaches the desired
token rate r asymptotically and over a short time interval the burst size of the
traffic is upper bounded by bucket size b. The TB algorithm implementation is
illustrated in Fig. 4, where Token Bucket Counter (TBC) is an internal variable
used to record the number of the remaining tokens at any time. With this
implementation, three corresponding measures may be taken when a new
packet arrives [S3:140].
Figure 4. Token Bucket Algorithm
Case 1: conformed at arrival. The size of the incoming packet is smaller than
the TBC value in the bucket when the packet arrives. The packet is compliant
at arrival and is marked as a compliant packet [S3:140].
Case 2: non-conformed. A packet is deemed as noncompliant if its length is
larger than the bucket size. This type of packet is tagged as not-compliant and
will not be dropped at the UE, but left for preferential discarding at the traffic
policing point in case of channel congestion [S3:140].
Case 3: shaped to be conformed. The size of packet is not larger than the
bucket size, but larger than the TBC value at arriving instant. In this case, the
packet will be enforced to wait by the traffic shaper until there are enough
tokens in the bucket. This type of packet is shaped to be conformed and
marked as compliant after shaping [S3:140].
2.1.3 Traffic conditioning scheme in UMTS
Traffic conditioner provides conformance between the negotiated
QoS and the data unit traffic [S3:140].
11
Traffic Shaping at the UE
The traffic shaping scenario at the UE is shown in Fig. 5. The TB
shaper verifies the conformance of a packet according to corresponding token
bucket parameters, shaping the traffic when necessary. As a result, the
regulated traffic after shaping will be categorized into two types, either
compliant or noncompliant. They are left for further policing at the RNC
[S3:140].
The scenario will introduce traffic shaping delay which consumes part
of the total end-to-end delay budget of a service, but the regulated flow is
expected to have a lower packet loss ratio instead.
Figure 5. Traffic Shaping at the UE
Traffic Policing at the RNC
The traffic policing function compares the conformance of the user data
traffic with the QoS attributes. Within the capacity of the Bearer Service (BS)
manager, policy control is a logical policy decision element which is optional
to the UEs and required to the gateways. Traffic policing policy in practice is a
network operator choice. As depicted in Fig. 6, the policing function consists
of traffic classification and policing functionality and is embodied at the
RNC[S3:140].
The classification function checks the header of every received packet and
forwards the corresponding information for further policing, according to its
traffic class as well as conformance status [S3:140].
12
The policing element at the RNC will perform corresponding policies on
each individual packet. For non-compliant data packets, they will be
acknowledged only if the channel is not congested, i.e., the total interference
level by summing of all connections does not exceed the threshold. Otherwise
they will simply be discarded. For non-compliant data packets, the load
calculation will take into account both compliant and non-compliant packets at
first, if the load exceeds the threshold, the non-compliant packets will be
dropped preferentially. A conformed packet could also be discarded if there
are too many concurrent compliant packets on the channel [S3:141].
Figure 6. Traffic Policing at the RNC
13
2.2 Traffic Scheduling Algorithm.
2.2.1 Definition
In packet radio communication several issues of random nature make
this task especially difficult to achieve: packet generation from many sources
hat must be multiplexed within a limit set of share resources plus variable
propagation characteristics. The policy followed by the scheduling algorithm
should lead to a system behavior as close as possible to the desired one. The
soft-QoS requirement for delay sensitive services can be established in terms
of certain desired delay and threshold boundaries [S4:1082].
2.2.2 Scheduling Strategy
The Radio Resource Management (RRM) strategy can be split into
there different steps:
A. Prioritization
All user want to send data must be classified based on type of service
(1st priority level). If it is the same service then it is classified based on
QoS profile. QoS is defined here by the mean of amount of data to be
send and the time remaining to keep the delay below the desire one.
The smaller the deadline the higher position in the queue will be. RRM
based on this queue decide on which traffic to send first [S4:1083].
This expression assign higher priority to those
users with either much data to send or much
time already waiting for permission.
Li
TOi
Packet length remaining to be sent.
Time left until packet deadline for the consider service.
B. Capacity requirement
This step is performed by user from heist to lowest priority. In
order to satisfy the current user QoS requirement some system
capacity should be considered to this user as well as certain
transmission rate should be reserved for this user. It should be handled
smartly by the scheduler so that the overall system behaviors were as
optimum as possible [S4:1083].
For WWW-link services, there are many to be factors to consider
before a design about of capacity to be assigned to the user can be
taken. For example, making consistent the priority level to the radio link
quality required for data transmission, then a higher priority indicates
14
urgency to transmit that data. In this case a low Frame Error Rate
(FER) should be guaranteed to avoid as much as possible
retransmission which lead to more delay. The higher the higher the
priority level the lower the FER at the receiver side should be. FER
requirement should be limited otherwise one user could demand the
whole capacity of the system [S4:1083].
C. Availability check
Once the capacity requirement for the current user has been
decided, the scheduler must check that a feasible solution do exists to
satisfy at the same time both the current user requirement and those
other users with higher priority that have already been accepted for
transmission [S4:1084].
The scheduler should take the interference model into account
in order to devise the expected (E/N) for all users. For the uplink , the
scheduler evaluates the following equalities:
For the downlink, the scheduler evaluates the following equalities:
Pk
SFk
No
X
P
Kth user.
Kth user spread factor.
Thermal noise spectral density.
Inter-cell interference.
Orthogonal factor
Tc
(Eb/No)k,SFk
PT-max
PR
dk
Chip duration
Kth user requirment
Max transimted power
total recive power
distance from Kth user to BS
15
2.3 DIFFSERV based QoS Architecture.
Having as less as possible Delay-jitter is the main concern of
streaming services in #G network. Two approaches to achieve of this
goal. First, Streaming Proxy Agent should be used at the edge of 3G
core Network to smoothen the incoming traffic. This will make it
independent of service model used in the Internet. Second, a Probing
based approach is used to select minimum delay-jitter delivery path
through the DiffServ cloud.
Key components of the proposed
Architecture: [S5:1898].
A. Multicast Model [S5:1900].
IPIM-SM multicast routing scheme is proposed to model
mobility in the architecture. The mobile host assigned a
temporary multicast address within the domain. Since at a given
time there is only one receiver and one sender for a given
session in mobile environment. PIM-SM needs additional
message to disable forwarding of packets in passive branches.
Messages in the PIM-SM protocol:
o PIM Active Join.
o PIM Passive Join.
It can be easily implemented by associating an active/passive
flag with multicasting forwarding entry at intermediate routers
B. Mobile Proxy Agent [S5:1900].
It acts as a proxy for the mobile host to make sure that
data is delivered to the mobile host through the best
possible path. It performs the following functions:
o Initialize the connection for mobile host in its cell
by sending PIM active join to RP and prompts the
mobile proxy agents in the neighboring cells to
send PIM Passive Join message forwards RP.
o Implements a measurement based scheme that
that uses the information carried in probing packet
header to determine the delay characteristic for
different services class.
o Sends the periodic feedback to the source node
regarding the service class giving thee best delayjitter performance.
C. Streaming Proxy server agent [S5:1900].
It resides at an entry-level border router of the 3G
Network. It performs the following functions:
o To smooth the incoming streaming traffic to
remove delay-jitter accumulated as streaming
traffic traverses the rest of the internet.
o To perform the additional functionality of transcoding. It is need for example if a user from high
bandwidth network to low bandwidth network.
o To send probing packet mapped to different
services class to the Mobile Proxy Agent. Probing
packets carry the time-stamp, which helps the
Mobile Proxy Agents to calculate the delay-jitter for
different services classes and send feedback to
the SPS.
16
D. Seamless QoS using probing-based approach [S5:1901].
When the mobile moves to a new cell, a new data path is
established between SPS and the client. The new path
may have different delay characteristic for a giver service
class. When a streaming session is initialized in a cell,
the Mobile Proxy Agent of the current cell issues PIM
Active Join to the multicast tree and the mobile proxy
agent in the immediate neighbor cell issues PIM Passive
Join message toward the multicast tree.
17
4. QoS Issues in the Converged 3G and Wired Networks
4.1 Introduction
The wired networks have been developed long time ago and so many
design efforts has been spent to become with reliable and scalable
designs such that meet most of the required services which concern on
QoS. The wireless domain doesn’t have that much effort spend on and
it is very hot area. The QoS procedures are slightly different from wired
network because the air interface in case of wireless network play a
major role of signal degradation caused by different aspect like delay
and jitter where these can of aspects are not there in the case of wired
network[S6:44].
4.2 The RCL Architecture
The resource control layer (RCL), Figure 7, which is based on the
bandwidth broker (BB) concept. RCL is designed as a hierarchical and
distributed BB to overcome potential scalability problems. The three key
components of RCL are the resource control agent (RCA), the admission
control agent (ACA), and the end-user application toolkit (EAT) [S6:46].



The RCA represents the ultimate principle in an administrative domain
concerning the management of network resources Moreover, it has the
overall view of the policies enforced in a domain, and decides on the
router configuration and management of the bilateral service level
agreements (SLAs) between adjacent administrative domains[S6:46].
The ACA mainly performs user authentication and authorization,
reservation handling, and admission control. Policing and admission
control are made only at the edges of the network; therefore, the
corresponding ingress and egress points (ingress-egress ACAs) of the
flow are identified, and the resources are checked to ensure that the
new flow can be accommodated [S6:46].
Reservation requests are forwarded to the ACAs from the EAT, which
mediates between end users or applications and the network. The EAT
interacts with the ACA to be aware of the available network
services[S6:46].
Figure 7. The RCL architecture and main components.
18
4.3 Network Services and Traffic classes
In the RCL architecture five traffic classes have been defined: premium
constant bit rate (PCBR), premium variable bit rate (PVBR), premium
multimedia (PMM), premium mission critical (PMC) and best effort (BE).
Applications with similar requirements on the network in order to perform
effectively can be grouped into this relatively small number of classes. The
scheduling mechanism actually implemented is a combination of Priority
Queuing (PQ) and Weighted-Fair Queuing (WFQ), called PQWFQ. A
queue is dedicated to PCBR, which has strict priority over the others, while
the other traffic classes are scheduled with WFQ. A WFQ weight is
assigned to each traffic class, and each queue is managed by different
queuing strategy: Drop-Tail, Random Early Detection (RED), or Weighted
RED (WRED). A specific traffic profile is determined for each traffic class
that best characterizes the data source [S6:46].
4.4 Mapping QoS Traffic Classes
Table 1 contains the proposed mapping. Its justification is confirmed by
examining the characteristics and traffic attributes for these classes.
The conversational and streaming classes are associated one-to-one to
PCBR and PVBR, respectively. The main discrepancy stemming from the
table deals with the maximum bit rate and packet size, due to the strict
limits defined in RCL [S6:47].
Table 2. Mapping of UMTS QoS classes to RCL network services.
19
Table 3 proposes a possible transformation, although for some
attributes such transformation may not be necessary or possible. Attributes
like transfer delay and packet loss are redundant, because they are used only
for the selection of the appropriate traffic class. Moreover, there are attributes
of the UMTS BS that deal only with UMTS aspects, such as the source
statistics descriptor, which is used for calculating a statistical multiplex gain for
use in admission control. Such attributes are not used in the transformation
process [S6:48].
Table 3. Transformation of QoS service attributes.
4.5 Control and User Plane Internetworking
in order to establish and maintain the end-to-end service, the QoS
management functions of both networks at the control plane must be able
to interoperate. Typically, there are two general ways to accomplish that,
directly or indirectly [S6:49].

The direct way implies that their mechanisms are aware of the
details of each other, and the signaling protocol can be a
proprietary one. This scenario ensures that the mapping among the
traffic classes can be tuned to the best possible way [S6:49].

The indirect way neither makes use of a proprietary signaling
protocol nor requires the QoS management mechanisms to be
aware of each other. This scenario is most appropriate in the case
of independent service providers that do not have specific interdomain partners [S6:49].
20
5. Conclusion
UMTS classified traffics according to their sensitivity from delay and jitterdelay in case of real time services. Four such classes are defined to
distinguish between different types of traffic in order to treat them
according to their importance. QoS management also proposed to
manage shared resources among all users according to each user QoS
profile preferences. QoS define certain attributes to each class.
Two QoS modes are defined in CDMA2000 to handle classification of
traffic in the network for QoS purposes. A non-assured mode, which
characterized by packet delivery by mean of best effort scheduler. The
second mode is assured mode, which specify acceptable transfer packet
delay and data rate. Each part of the CDMA2000 network components has
its role in QoS to ensure QoS task effectively. It is handled in Radio
Access Network, the Core Network and External Network as well.
Some issues try to target some enhancement techniques to handle QoS in
3G warless network. Some existence techniques are modified to meet the
complexity of on the air services which doesn’t to be there for wire network
services. One of such technique is traffic shaping and policing which
address traffic conditioning by applying different proposed algorithms. In
3G network (UMTS) the traffic shaping done at the User Equipment and
the traffic policing done at the Radio Network Control.
Another technique address QoS in 3G Networks is scheduling algorithm
for soft-QoS. It is split into three main steps to guarantee soft-QoS. It
prioritizes the service traffics. Then it tries to carry out user by user from
highest to lowest priority according to the capacity requirements. Lastly, it
checks for resources availability for the user being processed.
Another technique also tries to differentiate between services and treat
critical application like streaming application accordingly. The main
purpose here to minimize jitter-delay delivery path to get better streaming
service in the network. The idea of streaming proxy server is proposed to
handle jitter-delay and provide smooth incoming streaming traffic.
21
References
1. Integrated QoS support in 3G UMTS networks, Garg, V.K.; Yu,
O.T.W.;Wireless Communications and Networking Conference,
2000. WCNC. 2000 IEEE , Volume: 3 , 2000 Page(s): 1187 -1192
vol.3
2. QoS implementation in CDMA2000,Rao Yallapragada; Personal
Wireless Communications, 2002 IEEE International Conference on ,
2002 Page(s): 45 -50
3. QoS provisioning using traffic shaping and policing in 3rdgeneration wireless networks,Frank Yong Li; Stol, N.; Wireless
Communications and Networking Conference, 2002. WCNC2002.
2002 IEEE , Volume: 1 , 17-21 Mar 2002 Page(s): 139 -143 vol.1
4. A scheduling algorithm for soft-QoS guarantee in 3G systems
Sallent, O.; Perez-Romero, J.; Agusti, R.; Casadevall, F.; Vehicular
Technology Conference, 2001. VTC 2001 Spring. IEEE VTS 53rd ,
Volume: 2 , 2001 Page(s): 1082 -1086 vol.2
5. Diffserv based QoS architecture to support streaming applications
in 3G mobile networks Venna, S.; Barnes, R.; Personal, Indoor and
Mobile Radio Communications, 2002. The 13th IEEE International
Symposium on , Volume: 4 , 2002 Page(s): 1898 -1903
6. QoS issues in the converged 3G wireless and wired networks
Maniatis, S.I.; Nikolouzou, E.G.; Venieris, I.S.; IEEE
Communications Magazine , Volume: 40 Issue: 8 , Aug 2002
Page(s): 44 -53
22