File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Throughput-optimized opportunistic scheduling for rate-guaranteed and best-effort users in wireless networks

TitleThroughput-optimized opportunistic scheduling for rate-guaranteed and best-effort users in wireless networks
Authors
KeywordsCross-layer optimization
Opportunistic scheduling
Rate-guaranteed users
Static scheduling policy
Issue Date2009
PublisherIEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1002526
Citation
The 3rd International Conference on New Technologies, Mobility and Security (NTMS 2009), Cairo, Egypt, 20-23 December 2009. In proceedings of the 3rd NTMS, 2009, p. 1-5 How to Cite?
AbstractWe study opportunistic scheduling algorithms in a wireless network with a central base station communicating with multiple users on a single shared channel using time division multiple access. We assume the coexistence of both rate guaranteed (RG) users and best effort (BE) users in the system. A RG user asks for a specific transmission rate and the system should provision the exact amount being asked. In this paper, we present an optimal opportunistic scheduler that maximizes the system throughput. An analytical model is constructed to evaluate its performance in a homogenous system. Closed form solutions for channel access delay, worst case delay and system throughput are derived. Extensive simulations in both homogeneous and heterogeneous systems are conducted to verify the effectiveness of our scheduler. ©2009 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/140248
ISBN
References

 

DC FieldValueLanguage
dc.contributor.authorHuang, Wen_HK
dc.contributor.authorYeung, KLen_HK
dc.date.accessioned2011-09-23T06:09:17Z-
dc.date.available2011-09-23T06:09:17Z-
dc.date.issued2009en_HK
dc.identifier.citationThe 3rd International Conference on New Technologies, Mobility and Security (NTMS 2009), Cairo, Egypt, 20-23 December 2009. In proceedings of the 3rd NTMS, 2009, p. 1-5en_HK
dc.identifier.isbn978-1-4244-6273-5-
dc.identifier.urihttp://hdl.handle.net/10722/140248-
dc.description.abstractWe study opportunistic scheduling algorithms in a wireless network with a central base station communicating with multiple users on a single shared channel using time division multiple access. We assume the coexistence of both rate guaranteed (RG) users and best effort (BE) users in the system. A RG user asks for a specific transmission rate and the system should provision the exact amount being asked. In this paper, we present an optimal opportunistic scheduler that maximizes the system throughput. An analytical model is constructed to evaluate its performance in a homogenous system. Closed form solutions for channel access delay, worst case delay and system throughput are derived. Extensive simulations in both homogeneous and heterogeneous systems are conducted to verify the effectiveness of our scheduler. ©2009 IEEE.en_HK
dc.languageengen_US
dc.publisherIEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1002526-
dc.relation.ispartofProceedings of the International Conference on New Technologies, Mobility and Security, NTMS 2009en_HK
dc.rightsCreative Commons: Attribution 3.0 Hong Kong License-
dc.rightsProceedings of the International Conference on New Technologies, Mobility and Security. Copyright © IEEE.-
dc.rights©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.-
dc.subjectCross-layer optimizationen_HK
dc.subjectOpportunistic schedulingen_HK
dc.subjectRate-guaranteed usersen_HK
dc.subjectStatic scheduling policyen_HK
dc.titleThroughput-optimized opportunistic scheduling for rate-guaranteed and best-effort users in wireless networksen_HK
dc.typeConference_Paperen_HK
dc.identifier.emailYeung, KL:kyeung@eee.hku.hken_HK
dc.identifier.authorityYeung, KL=rp00204en_HK
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.1109/NTMS.2009.5384786en_HK
dc.identifier.scopuseid_2-s2.0-77949862134en_HK
dc.identifier.hkuros195082en_US
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-77949862134&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.spage1-
dc.identifier.epage5-
dc.description.otherThe 3rd International Conference on New Technologies, Mobility and Security (NTMS 2009), Cairo, Egypt, 20-23 December 2009. In proceedings of the 3rd NTMS, 2009, p. 1-5-
dc.identifier.scopusauthoridHuang, W=36064157100en_HK
dc.identifier.scopusauthoridYeung, KL=7202424908en_HK

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats