https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • Microwave/RF
    • T&D World
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

content


Predicting radio channel capacity

Predicting radio channel capacity

Use patterns in a conventional two-way system affect channel capacity, which can be predicted using a voice message analogy similar to a data packet.
  • Written by Urgent Communications Administrator
  • 1st January 2000

Use patterns in a conventional two-way system affect channel capacity, which can be predicted using a voice message analogy similar to a data packet. User effects can then be modeled with an adaptive user-protocol concept.

Individuals involved in the design and support of conventional two-way radio systems may have asked themselves at one time or another, “What is the real capacity of this single radio channel anyway?” Over the years, figuring out the actual capacity of a single channel has seemed a bit elusive. Although single channel capacity is not constant, it is predictable. It’s no surprise that as more users try to access a system, it becomes congested. What is a surprise is another dimension to the problem that isn’t so obvious.

This article presents an approach to understanding why and how land mobile channels can get congested so quickly during periods of heavy use. This approach models the radio user as an “adaptive protocol machine.” Specifically, the user’s radio etiquette is treated as an analogy to protocol schemes that control communications channels. In the context of this article, “protocol” applies to the relaying of voice communications between two users on a single shared conventional channel (non-trunked).

Multiple-access channel The conventional land mobile radio is a shared, multiple-access medium with several users competing to use it. These users randomly capture the channel, one at a time, and fill it with voice messages of varying lengths, each separated by a random idle time. (See Figure 1 below.) Given this constant competition, a user’s radio etiquette, or protocol, can determine how effectively a single channel can be shared by many. The concept of a multiple-access communications medium is more popularly identified with packet radio or LANs. However, it can also apply to the conventional channel if the following analogies are made between parameters that define a packet data channel and a conventional voice channel: * Channel capacity: typically measured in data bits per second. The conventional channel analogy is voice messages per minute. * Packet: defined for data in bits per frame per transmitted packet. For the voice analogy it can be defined as seconds per message per PTT. * Collision vulnerability window: generally defined in data channels as propagation time vs. packet time. A voice channel analogy can be PTT activation time vs. idle time between messages. * Protocol: a tightly followed procedure programmed in data modems. The voice radio analogy can be thought of as a loosely followed radio behavior (etiquette) in humans. * Throughput delay: total time to successfully receive a complete message (consider these equal for both the data and the voice analogy). The mathematics for calculating the throughput capacity of a data channel can be scaled with these analogous channel parameters to calculate the expected throughput capacity of voice messages in the conventional channel. (Based on statistics of random events.)

Protocol A protocol is a set of rules governing the use of a communications medium. Protocols are programmed into several layers of a communications system to promote efficient use of the communications medium and to ensure optimum throughput. Generally, protocols are designed to ensure that most of the offered load (a transmitted message) becomes a successful throughput (a message successfully received and understood). Several types of multiple-access schemes exist, but only two are considered for this adaptive user definition-pure ALOHA (non-slotted), a transmit when ready scheme, and carrier-sense, multiple-access (CSMA), a transmit after listening scheme.

Adaptive user protocol concept To illustrate the adaptive user protocol concept, consider the typical user’s call behavior when using a conventional channel, and how it mimics the ALOHA or CSMA protocols previously described. The user will either: 1. Transmit immediately without regard to whether the channel is being used. 2. Listen until the channel is idle before transmitting. When the channel is idle, the user may (a) transmit immediately, (b) wait a random time before transmitting or (c) choose not to transmit at all and try later.

Each of these user choices represents a different type of multiple-access protocol scheme. The behavior in Case 1 illustrates pure ALOHA, with the user transmitting without regard as to whether the channel is busy. The Case 2 behavior is similar to a CSMA scheme with a listening action (carrier sensing) prior to transmission (access). Each subsequent transmit decision in Case 2 is defined by a range of probabilities that the user will transmit in the idle timeframe. This is referred to as the persistence probability and is represented by p, with values from 0 to 1.

For instance, the immediate transmit decision in Case 2a pertains to a 1-persistant CSMA, meaning there is a 100% chance that an immediate transmission will take place when the channel becomes idle. The Case 2b decision, waiting a random time before transmitting, represents p-persistent CSMA, reflecting the distributed probability of transmission among all users, some of whom may choose immediate transmission (p = 1), and some of whom may choose to wait a while (p < 1).

The choice to not transmit at all but to try again later, Case 2c, represents n-persistent CSMA (p ~ 0). Many conventional LMR systems have users falling in either the p-persistent CSMA or 1-persistent CSMA protocol category. The study on which this article is based assumed 1-persistent CSMA behavior by all users, choosing to transmit as soon as the channel is idle.

For normal (light to moderate) radio traffic, most users will exercise proper radio etiquette, resulting in channel stability, high potential channel throughput and minimum throughput delay times (no waiting, no message repeats). When a crisis occurs, more users attempt to communicate on the channel, resulting in more messages with fewer, shorter times between messages to gain access. This behavior increases the chance for message collisions, especially as users grow impatient from waiting a long time for the chance to transmit. In turn, this result increases the throughput delay because of wait times and repeated messages caused by collisions.

On a collision path Concerning collisions, it is important to note that in the conventional LMR channel, no immediate collision awareness exists because the receiver is muted during a transmission. Therefore, a user won’t know if another user is transmitting at the same moment. Consequently, these messages collide and both users continue talking, each assuming exclusively channel access. Both messages are unintelligible (because of distortion from radio heterodyne, in most cases).

During this collision, the channel is unusable to others and is actually blocked until both users finally release their PTTs. This situation further increases throughput delay and reduces channel availability for everyone. In extreme crisis situations, some users may forget their proper radio etiquette and become a bit selfish. More users may transmit without waiting for the channel to become idle and try to “punch through” the radio clutter. Such action causes many more message collisions and the channel starts sounding like a continuous stream of noise with no discernible communications.

Eventually, the effective throughput of the channel is reduced to nearly zero. Such anxious user behavior mirrors the pure ALOHA multiple-access protocol scheme. No listening is being done, and users are transmitting whenever they feel like it, just hoping to get through.

Protocol simulation To test the utility of this concept, an adaptable multiple-access algorithm was modeled with MATLAB to predict the channel capacity and to simulate how capacity is affected as users change behavior. To model behavior change, I used a variable, the collision vulnerability window, that made it possible to assess how the adaptive user protocol affects overall channel capacity. This variable measures the period of possible collision and can be universally applied in any random-access protocol.

The vulnerability window is the key to understanding how a change in user protocol can severely affect a radio’s channel capacity. The vulnerability window, a, was defined in the model as the ratio of human PTT activation time (Tptt ~ 0.2sec.) vs. the average idle time between messages (W ~ many sec.), with the equation:

A = Tptt/W

This illustrates to what degree a changing user protocol affects the channel capacity. Outputs from the adaptive user protocol model are graphed in Figure 2 on page 25.

Although an average five-second message length was used in this model, real message lengths vary randomly around that figure, some even lasting 15 seconds or more. In periods of low message load, W is quite large compared to Tptt, and the vulnerability window is nearly zero (a = 0), meaning almost no vulnerability period exists (no collisions). The tallest curve in Figure 2 shows the throughput characteristics of the 1-persistent CSMA protocol throughput with a = 0. The peak channel throughput is at Smax = 0.54, meaning that, at best, 54% of the offered load can be passed successfully through the channel. As the message traffic increases, W reduces significantly, and the vulnerability window value grows larger. The second curve, “1-p CSMA,” models a channel in an early phase of a high use with a = 0.4. The throughput drops to Smax = 0.38. Under heavy loads, a nearly continuous vulnerability period is present (many collisions). Consequently, as the load increases, the throughput eventually converges to the pure ALOHA value (dashed line), where the best throughput is only Smax = 0.18, with a maximum probability of collisions, and low throughput. This variable, as it turns out, is not so obvious. When radio users forget their good protocol behavior, it degrades the channel’s throughput potential. The channel not only suffers from a rise in users trying to get “on the air,” but the channel’s capacity to handle this increasing load is reduced by the many users who forget their etiquette out of frustration. This is why congestion occurs rapidly during periods of heavy use. It’s like standing on a hose when you’re trying to get more water through it.

A word about trunking In a trunked radio system, especially one with a central control channel, users have no direct impact on the channel capacity. The control channel manages the vulnerability window by providing a protocol buffer between the human operator and the channel. This buffer allows for full capacity use of the channel, minimum throughput delay and no message collisions, especially during heavy use. These are just some of the reasons why trunking provides a more efficient use of the spectrum by providing maximum throughput capacity of channels and preventing users from compromising capacity.

A useful concept The concept of creating an analogy between the conventional radio channel and a packet data channel, with the radio users as “adaptive protocol machines,” is helpful in calculating the maximum throughput capacity that can be expected from a conventional channel. It aids understanding of how maximum throughput of a single channel, during various channel loads, is affected by the adaptability of the users. The concept also illustrates why system users need to learn how to maintain their call etiquette during crisis situations.

The model is helpful in several other ways. It illustrates the underlying mechanisms of how users directly affect systems, and it is especially valuable in creating a model for predicting the actual changing load and capacity of a conventional multiple-access channel. It also illustrates how, by comparison, trunking can benefit channel efficiency. Finally, it shows that maximum theoretical throughput for a single channel to be about 54% of the offered load. This factor yields a maximum of about five to seven five-second user messages per minute that can be transmitted under a heavy offered user load of nine to 11 five-second messages per minute, which is an example of a busy channel. Beyond that, if users begin changing their protocol, channel throughput drops rapidly to zero.

So, how many users can a typical channel support? To find out, determine the parameters of maximum throughput and the probability of user access. With a maximum throughput of about six messages per minute, and a probability of user access of 0.08 (the chance of any user with one five-second message per minute, per user), a single channel could support as many as 75 users. That is:

# users = throughput/probability of user access * message length

or:

N = 30sec./0.08 * 5sec.

It is interesting to note that in the FCC guidelines (47 CFR Part 90.633a), the per-channel loading for non-SMR conventional channels is authorized for a minimum of 70 users. I guess I could have just looked it up.

Tags: content

Most Recent


  • Predicting radio channel capacity
    Newscan: Securing the Internet of Things is quite a challenge
    Also: EWA requests dismissal of 900 MHz applications; TIA names tech and policy priorities for 2014; IJIS Institute names Shumate Award winner; App makes bus waits more tolerable; a Blackberry comeback may be in the offing.
  • Predicting radio channel capacity
    Newscan: FCC certifies Carlson Wireless's white-space radio
    Also: Congress looks to revamp telecom law; Obama to place some restraints on surveillance; IEEE to study spectrum-occupancy sensing for white-spaces broadband; Major Swedish transport operator opts for Sepura TETRA radios; RFMD to partner on $70 million next-generation power grid project; NENA opens registratiuon for "911 Goes to Washington."
  • Predicting radio channel capacity
    Newscan: A look at the critical job of 911 dispatchers
    Also: NYC launches website for tracking 911 response times; Oregon implements 911 on pre-paid cell phones; LightSquared wants to keep spectrum assets; Harris receives multiple government orders; FCC extends rebanding financial reconciliation deadline; Zetron gear at core of communications system upgrade; Ritron debuts wireless access control system; EWA seeks policy review of VHF vehicular repeater system deployments.
  • Predicting radio channel capacity
    Newscan: Average peak data rates of 144 MB/s average realized in tests with CAT 4 LTE device
    Also: Verizon, T-Mobile to swap unused spectrum to improve coverage; Internet giants oppose surveillance--but only when the government does it; FCC Chairman says incentive auction will be delayed until middle of 2015; FCC chair announces staff appointments; Alcatel-Lucent names Tim Krause as chief marketing officer; New Jersey county deploys TriTech CAD system; Toronto airport deploys 26-position Zetron console system;

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • RugGear: Contributing to the future of mission-critical broadband communication review and market vision
  • Photo gallery: 2014 Communications Marketing Conference (CMC) in Tucson
  • Predicting radio channel capacity
    Top 5 Stories - Week of Sept. 22
  • Predicting radio channel capacity
    RCA plans to expand this year's Technical Symposium

Commentary


LTE and liability: Why the fire service must move forward with digital incident command

  • 2
6th May 2022

Partnership and collaboration must be the foundation for emergency communications

18th April 2022

FirstNet success means no hypothetical ‘shots’ need to be fired, Swenson says

22nd February 2022
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Sesame Solar leverages mobile solar, hydrogen to power efforts beyond the grid dlvr.it/ST8m3K

1st July 2022
UrgentComm

Newscan: On front lines, communications breakdowns prove costly for Ukraine dlvr.it/ST7fnC

30th June 2022
UrgentComm

China-backed APT pwns building-automation systems with ProxyLogon dlvr.it/ST6q7m

30th June 2022
UrgentComm

Samsung fills its 2G hole in new challenge to Ericsson and Nokia dlvr.it/ST6hBK

30th June 2022
UrgentComm

Militarized drone swarms coming dlvr.it/ST6dNz

30th June 2022
UrgentComm

Take American City & County’s budgeting survey dlvr.it/ST6Yxb

30th June 2022
UrgentComm

Final cases made about Airwave, ESN, before CMA issues provisional decision on Motorola Solutions dlvr.it/ST4Q6X

29th June 2022
UrgentComm

Polaris Wireless: Manlio Allegra talks 911 Z-axis tech, future IoT opportunities dlvr.it/ST1384

28th June 2022

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • Microwave/RF
  • T&D World
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X