Skip to main content

A Cross-Layer Approach for Evaluating the Impact of Single NEXT Interferer in DMT Based ADSL Systems

  • Conference paper
  • 1361 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4516))

Abstract

In this paper we aim to develop an analytical model of the cross-layer characteristics of a Near End Cross Talk (NEXT) limited ADSL channel and determine the effective channel capacity of such a system. The ADSL users often encounter impact of other users in the same cable system due to NEXT interference that reduces the transmission capacity of the ADSL link. At the same time, due to application behavior, the source traffic of the user introduces a level of uncertainty. This paper proposes a model for capturing the cross-layer dynamics of these two uncertainties of an ADSL system. The model provides a closed form analytical method for determining the effective capacity of the ADSL system limited by NEXT interference.

This work is supported by NSF ITR grant IIS-0326505.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kalet, I., Shamai, S.: On the capacity of a twisted-wire pair: Gaussian model. IEEE Transactions on Communications 38(3), 379–383 (1990)

    Article  Google Scholar 

  2. Galli, S., Kerpez, K.J.: Methods of Summing Crosstalk from Mixed Sources Part I: Theoretical Analysis. IEEE Transactions on Communications 50(3) (2002)

    Google Scholar 

  3. Shannon, C.E.: A mathematical theory of communication. Univ. of Illinois Press, Urbana (1949)

    Google Scholar 

  4. Kleinrock, L.: Queuing Systems Volume I: Theory. John Whiley and Sons Publications, New York (1974)

    Google Scholar 

  5. Anick, D., Mitra, D., Sondhi, M.M.: Stochastic theory of data handling system with multiple sources. Bell Syst. Tech. J. 61, 1871–1894 (1982)

    Google Scholar 

  6. Kim, J.G., Krunz, M.M.: Member. IEEE Bandwidth Allocation in Wireless Networks with Guaranteed Packet-Loss. Performance 8(3), 337–349 (2000)

    Google Scholar 

  7. Kundu, S.R., Basu, K., Das, S.K.: Finite State Markov Model for Effective Bandwidth Calculation in Wireless. In: Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, pp. 351-357 (2005)

    Google Scholar 

  8. Elwalid, A.I., Mitra, D.: Effective Bandwidth of general Markovian traffic sources and admission control of high speed networks. IEEE/ACM Transactions on Networking 1, 329–343 (1993)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Lorne Mason Tadeusz Drwiega James Yan

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ghosh, I., Basu, K., Kundu, S.R. (2007). A Cross-Layer Approach for Evaluating the Impact of Single NEXT Interferer in DMT Based ADSL Systems. In: Mason, L., Drwiega, T., Yan, J. (eds) Managing Traffic Performance in Converged Networks. ITC 2007. Lecture Notes in Computer Science, vol 4516. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72990-7_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72990-7_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72989-1

  • Online ISBN: 978-3-540-72990-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics