Performance Analysis of Scheduling Algorithms



Similar documents
Extended-rtPS Algorithm for VoIP Services in IEEE systems

The Advantages and Disadvantages of Extended Rtps (NLP)

IEEE C802.16e-04/522. IEEE Broadband Wireless Access Working Group <

Performance Analysis of Scheduling Algorithms. For VoIP Services in IEEE Systems

Improving ertps Grant Allocation for VoIP Traffic in Silence Duration

802.16e service with the full mobility support by public service providers.

Performance optimization of mobile WiMAX netwoks for VoIP streams

Measuring Data and VoIP Traffic in WiMAX Networks

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

VoIP Features Oriented Uplink Scheduling Scheme in Wireless Networks

Modelling Quality of Service in IEEE Networks

Multicast Polling and Efficient VoIP Connections in IEEE Networks

Simulative Investigation of QoS parameters for VoIP over WiMAX networks

Responses by TG1 ( ) included

Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance

WiMAX: Performance Analysis and Enhancement of Real-time Bandwidth Request

Priority-Coupling A Semi-Persistent MAC Scheduling Scheme for VoIP Traffic on 3G LTE

International Journal of Advance Engineering and Research Development. QoS Analysis of VOIP Traffic over WiMAX

A Framework for supporting VoIP Services over the Downlink of an OFDMA Network

Performance Evaluation of Quality of VoIP in WiMAX and UMTS

VoIP-Kapazität im Relay erweiterten IEEE System

VoIP over Wireless Opportunities and Challenges

A study of Skype over IEEE networks: voice quality and bandwidth usage

Inter-Cell Interference Coordination (ICIC) Technology

Triple Play Services over Mobile WiMAX

Performance Analysis of VoIP Codecs over BE WiMAX Network

Performance Analysis of VoIP Codecs over Wi-Fi and WiMAX Networks

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

Introduction VOIP in an Network VOIP 3

ANALYSIS OF VOICE OVER IP DURING VERTICAL HANDOVERS IN HETEROGENEOUS WIRELESS AND MOBILE NETWORKS

Keywords Wimax,Voip,Mobility Patterns, Codes,opnet

A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Deployment Aspects for VoIP Services over HSPA Networks

II. IEEE802.11e EDCA OVERVIEW

ALL-IP CELLULAR NETWORK ARCHITECTURE FOR EFFICIENT RESOURCE MANAGEMENT

Circuit-Switched Voice Services over HSPA

Comparative Assessments for Different WiMAX Scheduling Algorithms

Evaluation of VoIP Quality over WiBro

NSN White paper February Nokia Solutions and Networks Smart Scheduler

Aggregation of VoIP Streams in a 3G Mobile Network: A Teletraffic Perspective

The Advantages of SOFDMA for WiMAX

VoIP Session Capacity Expansion with Packet Transmission Suppression Control in Wireless LAN

Bluetooth voice and data performance in DS WLAN environment

Closed Loop Control Scheduling in Multihop Cellular Networks

COMPARISON FOR WIMAX SCHEDULING ALGORITHMS AND PROPOSAL QUALITY OF SERVICE IMPROVEMENT IN WIMAX NETWORKS

Comparison of LTE and WiMAX on the Basis of Qualities

Packet Scheduling with QoS and Fairness for Downlink Traffic in WiMAX Networks

Improving the VoIP Capacity in WiMAX Networks

Performance Evaluation of WIMAX Network with High QOS Services Incorporating Different Physical & Mac Layer Standards

Downlink resource allocation algorithm: Quality of Service

Choosing the Right Audio Codecs for VoIP over cdma2000 Networks:

Quality of Service Support in IEEE Networks

Scheduling for VoIP Service in cdma2000 1x EV-DO

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Bandwidth and Power Management in Broadband Wireless Networks

CDMA Network Planning

WiMAX and the IEEE m Air Interface Standard - April 2010

The future of mobile networking. David Kessens

Adaptive DCF of MAC for VoIP services using IEEE networks

Wireless Technologies for the 450 MHz band

Figure 1: Bandwidth and coverage of wireless technologies [2].

Application Aware Dynamic Modulation Selection for WiMAX System

An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA x EVDO and LTE Systems

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Comparative Study of VoIP over WiMax and WiFi

Study of the impact of UMTS Best Effort parameters on QoE of VoIP services

3GPP Wireless Standard

Usage. Wireless Broadband Networks. Need for Speed WMAN

IEEE E ENHANCEMENT FOR VOICE SERVICE

Performance Comparison of Control-less Scheduling Policies for VoIP in LTE UL

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks

Journal of Information

Comparative call Capacity analysis of VOIP in IEEE802.11b WLAN Environment

Comparing WiMAX and HSPA+ White Paper

An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink

Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight

VoIP over WiMAX: Quality of Experience Evaluation

IEEE Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the Air Interface Specification

An Opportunistic DRR (O-DRR) Uplink Scheduling Scheme for IEEE based Broadband Wireless Networks

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

IEEE Broadband Wireless Access Working Group <

Basic principles of Voice over IP

CS263: Wireless Communications and Sensor Networks

Analysis of Quality of Service (QoS) for Video Conferencing in WiMAX Networks

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

HO Policies for Combined WLAN/UMTS Networks

Performance Evaluation of VoIP in Mobile WiMAX; Simulation and Emulation studies

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

EETS 8316 Wireless Networks Fall 2013

LTE, WLAN, BLUETOOTHB

Performance Analysis of VoIP Traffic in WiMAX using various Service Classes

Improving Quality of VoIP over WiMAX

Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam

PERFORMANCE OF THE GPRS RLC/MAC PROTOCOLS WITH VOIP TRAFFIC

WiMAX System-Level Simulation for Application Performance Analysis

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS

REPORT ITU-R M Requirements related to technical performance for IMT-Advanced radio interface(s)

Transcription:

Performance Analysis of Scheduling Algorithms for VoIP Services in IEEE 82.1 6e Systems Howon Lee*, Taesoo Kwon*, Dong-Ho Cho*, Geunhwi Limt and Yong Changt *Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology (KAIST), Korea Email: {hwlee, tskwon8o} @comis.kaist.ac.kr, dhcho @ee.kaist.ac.kr ttelecommunication Systems Division, Samsung Electronics, Co., Ltd., Korea Email: {geunhwi.lim, yongchang} @ samsung.com Abstract- There are several scheduling algorithms for Voice over IP (VoIP) services in IEEE 82.16e systems, such as unsolicited grant service (), real-time polling service (), and extended real-time polling service (e). The e is a new scheduling algorithm for VoIP services with variable data rates and silence suppression, and this algorithm is recently proposed and accepted in the IEEE 82.16e standard. In this paper, we analyze and discuss the performance of the scheduling algorithms recommended in IEEE 82.16e systems including the e algorithm. Through the analysis of resource utilization efficiency and VoIP capacity, we show that the and algorithms have some problems, which are the waste of uplink resources in the algorithm, and additional access delay and MAC overhead due to bandwidth request process in the algorithm, to support the VoIP services. In addition, for analysis of VoIP capacity, we utilize OPNET simulation, and show that the e algorithm can support more 21% and 35% voice users compared with the and algorithms, respectively. I. INTRODUCTION T HE IEEE 82.16 standard is designed to satisfy various demands for higher capacity, higher data rate, and more advanced multimedia services to residential and small business customers [1], [2], [3], [4]. This standard has many advantages, such as rapid deployment, high speed data rate, high scalability, multimedia services, and lower maintenance and upgrade costs. Especially, the IEEE 82.16's Task Group (TG) d/e systems have proposed to make up for the weak points of 16a system, and support additional functionalities, such as mobility, Hybrid Automatic Repeat Request (HARQ), Band Adaptive Modulation Coding (AMC) scheme, and so on. In order to support multimedia services with variable requirements of qualify of service (QoS) in IEEE 82.16e systems, an efficient scheduling algorithm has to be provided. Particularly, an efficient uplink (UL) scheduling algorithm for voice services is required because voice services are delaysensitive and have an important portion in the multimedia services. As a leading technology for voice services in a packet oriented architecture, VoIP technology has been intensively investigated. There are five scheduling algorithms to support variable requirements of QoS in IEEE 82.16e systems, such as unsolicited grant service (), real-time polling service (), extended real-time polling service (e), non-realtime polling service (n), and best effort service (BE). The, and e algorithms are designed to support real-time services. So, these algorithms could be used for VoIP services. However, because the n and BE algorithms are designed to support non-realtime services, these algorithms are not suitable for VoIP services in IEEE 82.16e systems. Although IEEE 82.16a/d systems have the and algorithms for VoIP services, these algorithms are not proper as an uplink scheduling algorithm for VoIP services with variable data rates and silence suppression [5]. That is, these algorithms have some problems for the VoIP services, such as the waste of uplink resources in the algorithm and MAC overhead as well as additional access delay in the algorithm. Therefore, for efficient VoIP services, e is proposed and accepted as a new scheduling algorithm in IEEE 82.16e systems. In this paper, we analyze and discuss the performance of these scheduling algorithms (, and e) in IEEE 82.16e systems. TABLE I VOICE MODEL PARAMETERS L1 (Rate 1) 171 bits Packet size LI/2 (Rate 1/2) LI/4 (Rate 1/4) 8 bits 4 bits LI/8 (Rate 1/8) 16 bits In this paper, for performance analysis of scheduling algorithms in IEEE 82.16e systems, we assume that voice traffic follows Markov source model [6]. Definitely, we utilize Enhanced Variable Rate Codec (EVRC) with variable data rates and silence suppression. The frame duration of EVRC (TVC) is 2rms, and the voice activity factor is.43 with 29% full rate (Rate 1, pi), 4% half rate (Rate 1/2, Pi/2), 7% quarter rate (Rate 1/4, Pi/4), and 6% eighth rate (Rate 1/8, P1i8). Full/half/quarter rates are included in talk-spurt duration, and eighth rate is included in silence duration. Detailed voice model parameters are shown in Table I. The remainder of this paper is organized as follows: In Section II, we introduce and discuss several scheduling algorithms for VoIP services in IEEE 82.16e systems, such as,, and e. In Section III, we analyze resource utilization efficiency of these scheduling algorithms, and show the number of saved radio resources in the e algorithm compared -783-9392-9/6/$2. (c) 26 IEEE 1231

Dot line: Assigned resources Solid line : Used resources Rate 1 Dot line: Assigned resources Solid line: Used resources Rate 1 Rtate 112 Rate 112 * * Rate 114 Rate 1/4 lrate 1/8 Rate 118 Time OFF Data rate inerement Data rate OFF decrement Data rate increment Data rate deerement Fig. 1. Operation of algorithm Fig. 2. with the and algorithms. Also, in Section IV, we analyze VoIP capacity based on the packet transmission delay of these algorithms in IEEE 82.16e systems through OPNET simulation. Finally, in Section V, we make conclusions. data more efficiently than the algorithm. However, this bandwidth request process always causes MAC overhead and additional access delay. Hence, the algorithm has larger MAC overhead and access delay than the and e algorithms. In Fig. 2, the dot line and the solid line show the amount of assigned uplink resources by the BS and the amount of used uplink resources by the voice user, respectively. In this algorithm, since the user requests exact amount of uplink resources for transmitting his voice packet, the dot line and the solid line are nearly the same. To avoid the polling process in case of silence duration, we assume that minimum polling size is the size of voice packet generated by the minimum data rate of the voice codec. Thus, there is no polling process in the silence duration of the users. In the algorithm, the user can use the piggyback requests of the grant management subheader for VoIP services. But, since VoIP services are delay-sensitive and the usage of piggyback requests is not proper method for supporting service-flows that have periodic property, the use of piggyback requests is not a desirable method for VoIP services. By precise negotiation of the polling period in the initialization process, the use of piggyback requests may be avoided for VoIP services. SCHEDULING ALGORITHMS FOR VoIP SERVICES IN IEEE 82.16E SYSTEMS A. Algorithm The algorithm is designed to support real-time service flows that generate fixed-size data packets periodically [3]. The base station (BS) periodically assigns fixed-size grants to the voice user. These fixed-size grants are sufficient to send voice data packets. The grant size and grant period are negotiated in the initialization process of the voice session. Thus, this algorithm can minimize MAC overhead and uplink access delay caused by the bandwidth request process of the user to send voice packets. However, this algorithm has only a small capacity for VoIP services. Generally, voice users do not always have voice packets to send, because they have periods of silence [7]. In this algorithm, since the BS always assigns fixed-size grants that are sufficient to send voice packets to the voice user, it causes a waste of uplink resources, as shown in Fig. 1. In this figure, a dot line and a solid line show the amount of assigned uplink resources by the BS and the amount of used uplink resources by the user, respectively. The blank regions represent the waste of uplink resources. In summary, in case of the algorithm, since the BS always allocates the same amount of uplink resources to each user regardless of his voice status, it causes the waste of uplink resources. II. B. Algorithm The algorithm is designed to support real-time service flows that generate variable size data packets periodically [3]. The BS assigns uplink resources that are sufficient for unicast bandwidth requests to the voice user. This period is negotiated in the initialization process of the voice sessions. Generally, this process is called a bandwidth request process, or polling process. Because this algorithm always uses a bandwidth request process for suitable size grants, it transports Operation of algorithm C. e Algorithm The e algorithm is designed to support real-time service flows that generate variable size data packets on a periodic basis, such as VoIP services with silence suppression [4]. This algorithm is recently proposed and accepted in IEEE 82.16e standard. In order not only to reduce MAC overhead and access delay of the algorithm, but also to prevent the waste of uplink resources of the algorithm, the e algorithm assigns uplink resources according to the status of the voice users without MAC overhead. Here, we describe the detailed operation of the e algorithm as follows. Firstly, the voice user informs the BS of his voice status information using Grant Management subheader in case that the size of a voice data packet is decreased [4]. The user requests the bandwidth for sending the voice packets using 1232

Bandwidth request header Dot linte: Assigned resources Solid line: Used resources Rate I by the minimum data rate of the voice codec. Hence, there is also no polling process in the silence duration of the voice users. Grant Management subheader Rate 11 Time 1F Data rate increment Fig. 3. Data rate decrement Operation of e algorithm III. ANALYSIS OF RESOURCE UTILIZATION EFFICIENCY A. algorithm By using voice codec parameters in Table I and the size of generic MAC header (Lh, 6bytes) of IEEE 82.16e systems [4], the average amount of assigned uplink resources of the algorithm (R,9,gs) can be calculated by R = (Li + Lh) x (Pt + P1/2 + P1/4 + P1/8) 219 bits fr./user. (1) In this algorithm, the BS assigns R (219 bitslframe) to each voice user. In this paper, 'fr.' and 'frame' mean MAC frame in IEEE 82.16e systems. Since the BS always assigns fixed-size grants according to maximum data rate of EVRC to the voice users regardless of their voice status, the algorithm always allocates relatively a lot of uplink resources to the users compared with the and e algorithms. extended PBR (PiggyBack Request) bits of Grant Management subheader. In the e algorithm, to distinguish these extended PBR bits with general PBR bits, the user sets the MSB of PBR bits to 1. In this case, the BS assigns uplink resources according to the requested size periodically, until B. algorithm the voice user requests another size of the bandwidth. The average amount of assigned uplink resources of the Secondly, the voice user informs the BS of his voice status information using Bandwidth request header in case algorithm (R,tps) can be obtained as that the size of a voice data packet is increased [4]. The user Rrtps {(Ll + Lh) x p} + {(LI/2 + Lh) X P/2} requests the bandwidth for sending the voice packets using + {(Ll/4 + Lh)x P1/4} + {(Ll/8 + Lh)Ox Pl/} BR (Bandwidth Request) bits of Bandwidth request header. In the same way as the case of the data rate decrement, to + {(L1/8 + Lbh) x (P1 + P1/2 + Pi/4)} distinguish these BR bits with general BR bits, the user sets = 138.79 bits/fr./user. (2) the MSB of BR bits to 1. In this case, the BS assigns uplink resources according to the requested size periodically, until In equation (2), Lbh is the size of bandwidth request header the user requests another size of the bandwidth. The BS shall in IEEE 82.16e systems, 6 bytes [4]. In case of the provide the first bandwidth allocation to the next MAC frame algorithm, we assume a minimum polling size (L1/8 + Lbh) after this bandwidth request process. The second bandwidth as the size of voice packet generated by the minimum data allocation is done after the bandwidth allocation interval of rate of the voice codec for the users. However, if we assume the service flow based on the time which the BS allocated the minimum polling size as the size of the bandwidth request the bandwidth that used for the bandwidth request process, as header (Lbh), the polling process would be also executed in the silence duration of the voice user. Then, it could cause a waste shown in Fig. 3. In summary, in case of the VoIP services using this algo- of uplink resources and additional access delay in the silence rithm, the BS recognizes Grant Management subheader and duration of the user. So, it is not preferable. Consequently, in Bandwidth request header especially. In this algorithm, if the this algorithm, the BS assigns R,tps (138.79 bitslframe) to user requests the bandwidth for sending the voice packets, then each voice user. the BS shall change its polling size according to the bandwidth size requested by the user, and keeps its changed polling size C. e algorithm until the user sends another requests. In other words, the BS Similar to the and algorithms, the average amount may not change its polling size without any requests from the of assigned uplink resources of the e algorithm (R,,tps) voice users. Using this e algorithm, the BS can obtain can be represented as better data transport efficiency compared with the and algorithms. Rertps = {(L1 + Lh) x Pi} + {(L1/2 + Lh) X Pi/2} Fig. 3 shows the operation of the e algorithm when the + {(Ll/4 + Lh) x Pl/4} + {(Ll/8 + Lh) x Pl/8} voice user uses EVRC with variable data rates and silence = 113.19 bitslfr./user. (3) suppression [6]. In case that the voice data rate is decreased, since the user uses remained uplink resources assigned to In the e algorithm, the BS assigns Rertps (113.19 him for transmitting Grant Management subheader, there is no bits f rame) to each voice user. Contrary to the and waste of uplink resources. In this algorithm, we also assume algorithms, since the e algorithm can follow all data rates that minimum polling size is the size of voice packet generated of each user without MAC overhead, this algorithm has the 1233

TABLE II AVERAGE AMOUNT OF ASSIGNED UPLINK RESOURCES 3 - Ave. amount of assigned uplink res. / fr. / user 219 bitslfr.luser 138.79 bits1fr.1user 113.19 bits1fr.1user e, 25- W Number of saved uplink resources W Number of saved downlink resources rips a) n 25 CO 15 I smallest value (R,,tps) among these scheduling algorithms in IEEE 82.16e systems. We can show the average amount of assigned uplink resources of each algorithm in Table II. Also, in Table III, we can obtain the average amount of downlink (DL) and uplink saved resources in the e algorithm against the and algorithms. For example, when N users use VoIP services in one MAC frame, the e algorithm can save {(R - Rertps) x N} bits and {(Rrtps - Rertps) x N} bits of uplink resources compared with the and algorithms, respectively. When N = 2, the e algorithm can save 2116.2 bits (264.525 bytes) and 512 bits (64 bytes) of uplink resources, respectively. Besides, compared with the algorithm, the and e algorithms do not experience polling process for bandwidth requests of the voice users in talk-spurt (on) duration. Hence, these algorithms can save downlink resources for sending UL-MAP messages. The general size of UL-MAP message is 36 bits (4.5 bytes) in IEEE 82.16e systems [4]. When M users use only VoIP services in one MAC frame, the and e algorithms can save (36 x M) bits of downlink resources compared with the algorithm. If M = 2, these algorithms can save 72 bits (9 bytes) of downlink resources. Especially, since UL-MAP messages use very robust burst profile (QPSK modulation and 1/12 coding) compared with general data packets, a lot of downlink resources would be saved in the and e E 5 U. n 1 2 3 4 Number of VolP users Fig. 4. Total number of saved resources in e algorithm compared with and algorithms vs. number of VoIP users are transmitted by QPSK 1/2, and QPSK 1/12, respectively. Through this figure, we can show that a lot of downlink resources are wasted in the algorithm. Although the number of assigned uplink resources in the algorithm is larger than that of the algorithm, since a great number of downlink resources is wasted in the algorithm for transmitting of UL-MAP messages, the total number of wasted resources in the algorithm is larger than that of the algorithm. In case of the e algorithm, the wastes of downlink and uplink resources in the and algorithms do not occur. Therefore, the e algorithm can save a lot of uplink and downlink resources compared with the and algorithms, and these saved resources would be utilized for other unicast, multicast and broadcast services. algorithms. IV. ANALYSIS OF VoIP CAPACITY Fig. 4 shows the total number of saved resources in the erps algorithm compared with the and algorithms. Generally, VoIP capacity is restricted by packet transmission To obtain this figure, we assume an OFDMA system, and delay bound and radio resource saturation. In this paper, we define that one basic resource unit consists of 48 subcarriers. analyze the VoIP capacity of IEEE 82.16e systems with Also, we assume that voice packets and UL-MAP messages packet transmission delay of MAC SDUs (Service Data Units) for the,, and e algorithms. To obtain simulation results, we used an OPNET simulator TABLE III and assumed an OFDMA system. This system has various AVERAGE AMOUNT OF SAVED UPLINK RESOURCES IN THE ERTPS MCS levels, such as QPSK, 1/12, QPSK 1/8, QPSK 1/4, QPSK ALGORITHM COMPARED WITH THE AND RTPS ALGORITHMS 1/2, 16QAM 1/2, 16QAM 3/4, 64QAM 2/3, and 64QAM 5/6. To solve intercell interference problem, that is a major Ave. amount of saved UL res. / fr. / user] of all OFDMA systems, for cell-boundary voice problem Comp. Alg. no. users Downlink (bits/fr.) Uplink (bits/fr.) we utilized repetition scheme in case of 1/4, 1/8 and users, - 1 158.1 1/12 coding. By using an average SINR value of each voice - 2 2116.2 the BS decides the MCS level of each user. The voice user, - 3 3174.3 users are uniformly distributed in seven cells, and experience - 4 4232.4 interference from 1st-tier and 2nd-tier cells. In addition, we - 1 36 256 used an ITU-R pedestrian model for path-loss and frequency 512-2 72 selective Rayleigh fading. We assume that a MAC frame of - 3 18 768 IEEE 82.16e OFDMA systems consists of 36 symbols (Time 4 144 124 Domain) and 124 subcarriers (Frequency Domain), and the - 1234

O CD cn CU vo o U E U, c O cl.3.28.26.24.22.2.18.16.14.12.1.8.6.4.2. - -*-DL Delay -*-UL Delay -A- UL Delay -v- UL e Delay l e U(-S / rtps *@./p --- -- 2 4 8' 6 Number of VolP users Fig. 5. Packet transmission delay of MAC SDUs vs. '-1- number VoIP users r ratio of downlink and uplink subframe length is 2:1. Thus, total numbers of downlink and uplink resources are 384 and 14, respectively. One resource unit consists of 48 subcarriers and downlink and uplink resources are scheduled by roundrobin (RR) scheduler. In this simulation, if the number of voice users is increased, since the number of VoIP packets would be increased, the interference level of all users is augmented. Then, the average SINR values of the voice users are lowered and the voice users would use more robust MCS level that used before. Hence, the saturation of downlink and uplink resources occurs, and the transmission delay of voice packets is rapidly increased. In general, the maximum end-to-end delay bound of voice packet is assumed to 285ms by ITU-T [8]. Thus, in this paper, we assume that the delay bound for packet transmission of MAC SDUs is 6ms considering backbone delay, packet processing delay, handset playback buffer delay, and so on. As shown in Fig. 5, the maximum supportable numbers of voice users for the, and e algorithms are 68, 76 and 92, respectively. Since the e algorithm utilizes downlink and uplink resources more efficiently than any other algorithm in IEEE 82.16e systems, the packet transmission delay is the most slowly increased among these scheduling algorithms. In case of the algorithm, although the waste of uplink resources is larger than that of the algorithm, since the scheduler aggregates the voice packets within the inter-grant time, the VoIP capacity of the algorithm adaptively increases with system load. So, the VoIP capacity of the algorithm is larger than that of the algorithm. In summary, the e algorithm can support more 21% and 35% voice users compared with the and algorithms, respectively. We can show that the e algorithm has largest VoIP capacity in IEEE 82.16e systems. these scheduling algorithms, we used EVRC with variable data rates and silence suppression. Also, we have explained that the and algorithms have some problems for supporting the VoIP services, such as the waste of uplink resources in the algorithm, and additional access delay as well as MAC overhead owing to bandwidth request process in the algorithm, and shown that the e algorithm can solve these problems of the and algorithms. By using the analysis of resource utilization efficiency, we have demonstrated that the e algorithm can save a lot of downlink and uplink resources compared with the and algorithms. In addition, with the simulation results of packet transmission delay for voice packets, we have shown that the,, e algorithms can support 68, 76, 92 voice users, respectively. Consequently, through the performance analysis of resource utilization efficiency and VoIP capacity, we have proven that the e algorithm has the best resource utilization efficiency and the largest VoIP capacity among the various scheduling algorithms in IEEE 82.16e systems. The e algorithm could be used efficiently in any wireless communication systems that support VoIP services with variable data rates and silence suppression. REFERENCES [1] IEEE 82.16-21, "IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems," Apr. 8, 22. [2] IEEE 82.16a-23, "IEEE Standard for Local and Metropolitan Area Networks PPart 16: Air Interface for Fixed Broadband Wireless Access Systems - Amendment 2: Medium Access Control Modifications and Additional Physical Layer Specifications for 2-11 GHz," Apr. 1, 23. [3] IEEE 82.16-REVd/D5-24, "IEEE Standard for Local and Metropolitan Area Networks - Part 16: Air Interface for Fixed Broadband Wireless Access Systems," May. 13, 24. [4] IEEE 82.16e/D8-25, "IEEE Standard for Local and Metropolitan Area Networks - Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems - Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands," May 2, 25. [5] Howon Lee, Taesoo Kwon, Dong-Ho Cho, "An Enhanced Uplink Scheduling Algorithm Based on Voice Activity for VoIP Services in IEEE 82.16d/e System," IEEE Communications Letters, pp. 216-218, Aug. 25. [6] TIA/EIA/IS-127, "Enhanced variable rate codec, speech service option 3 for wideband spread spectrum digital systems," 1996. [7] P.T. Brady, "A Model for Generating ON-OFF Speech Patterns in TwoWay Conversations," Bell Syst. Technology Journal, vol. 48, no. 7, pp. 2445-2472, Sept., 1969. [8] ITU-T Recommendation G.1 14, "One-way transmission time," May 23. V. CONCLUSIONS In this paper, we have analyzed and discussed the performance of scheduling algorithms in IEEE 82.16e systems, such as,, and e. To analyze performance of 1235