File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/S0140-3664(00)00278-4
- Scopus: eid_2-s2.0-0035873290
- WOS: WOS:000169056100007
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Efficient multiple access control using a channel-adaptive protocol for a wireless ATM-based multimedia services network
Title | Efficient multiple access control using a channel-adaptive protocol for a wireless ATM-based multimedia services network |
---|---|
Authors | |
Keywords | Adaptive protocol Mobile computing Multiple access control Wireless ATM |
Issue Date | 2001 |
Publisher | Elsevier BV. The Journal's web site is located at http://www.elsevier.com/locate/comcom |
Citation | Computer Communications, 2001, v. 24 n. 10, p. 970-983 How to Cite? |
Abstract | As tetherless multimedia computing environments are becoming much desired, broadband wireless communication infrastructures such as wireless ATM will play an important role and thus, are expected to proliferate. However, despite much research efforts have been expended, the multiple access control of the precious bandwidth remains a challenging problem because of the existence of two common drawbacks in state-of-the-art protocols: (1) channel condition is ignored or not exploited, and (2) inflexible or biased time slots allocation algorithms are used. Indeed, existing protocols mostly ignore the burst errors due to fading and shadowing, which are inevitable in a mobile and wireless communication environment. A few protocols take into account the burst errors but just "handle" the errors in a passive manner. On the other hand, most of the existing protocols employ an inflexible or biased allocation algorithm such that over-provisioning may occur for a certain class of users at the expense of the poor service quality received by other users. In this paper, a new judicious MAC protocol, called SCAMA (synergistic channel adaptive multiple access) is proposed. The proposed protocol works closely with the underlying physical layer in that through observing the channel state information (CSI) of each mobile user, the MAC protocol first segregates a set of users with good CSI from requests gathered in the request contention phase of an uplink frame. The MAC protocol then judiciously allocates information time slots to the users according to the respective traffic types, CSI, urgency, and throughput, which are collectively represented by a novel and flexible priority function. Extensive simulation results indicate that the protocol is robust and considerably outperforms previous protocols. © 2001 Elsevier Science B.V. |
Persistent Identifier | http://hdl.handle.net/10722/73766 |
ISSN | 2023 Impact Factor: 4.5 2023 SCImago Journal Rankings: 1.402 |
ISI Accession Number ID | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kwok, YK | en_HK |
dc.contributor.author | Lau, VKN | en_HK |
dc.date.accessioned | 2010-09-06T06:54:33Z | - |
dc.date.available | 2010-09-06T06:54:33Z | - |
dc.date.issued | 2001 | en_HK |
dc.identifier.citation | Computer Communications, 2001, v. 24 n. 10, p. 970-983 | en_HK |
dc.identifier.issn | 0140-3664 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/73766 | - |
dc.description.abstract | As tetherless multimedia computing environments are becoming much desired, broadband wireless communication infrastructures such as wireless ATM will play an important role and thus, are expected to proliferate. However, despite much research efforts have been expended, the multiple access control of the precious bandwidth remains a challenging problem because of the existence of two common drawbacks in state-of-the-art protocols: (1) channel condition is ignored or not exploited, and (2) inflexible or biased time slots allocation algorithms are used. Indeed, existing protocols mostly ignore the burst errors due to fading and shadowing, which are inevitable in a mobile and wireless communication environment. A few protocols take into account the burst errors but just "handle" the errors in a passive manner. On the other hand, most of the existing protocols employ an inflexible or biased allocation algorithm such that over-provisioning may occur for a certain class of users at the expense of the poor service quality received by other users. In this paper, a new judicious MAC protocol, called SCAMA (synergistic channel adaptive multiple access) is proposed. The proposed protocol works closely with the underlying physical layer in that through observing the channel state information (CSI) of each mobile user, the MAC protocol first segregates a set of users with good CSI from requests gathered in the request contention phase of an uplink frame. The MAC protocol then judiciously allocates information time slots to the users according to the respective traffic types, CSI, urgency, and throughput, which are collectively represented by a novel and flexible priority function. Extensive simulation results indicate that the protocol is robust and considerably outperforms previous protocols. © 2001 Elsevier Science B.V. | en_HK |
dc.language | eng | en_HK |
dc.publisher | Elsevier BV. The Journal's web site is located at http://www.elsevier.com/locate/comcom | en_HK |
dc.relation.ispartof | Computer Communications | en_HK |
dc.rights | Computer Communications. Copyright © Elsevier BV. | en_HK |
dc.subject | Adaptive protocol | en_HK |
dc.subject | Mobile computing | en_HK |
dc.subject | Multiple access control | en_HK |
dc.subject | Wireless ATM | en_HK |
dc.title | Efficient multiple access control using a channel-adaptive protocol for a wireless ATM-based multimedia services network | en_HK |
dc.type | Article | en_HK |
dc.identifier.openurl | http://library.hku.hk:4550/resserv?sid=HKU:IR&issn=0140-3664&volume=24&issue=10&spage=970&epage=983&date=2001&atitle=Efficient+Multiple+Access+Control+Using+a+Channel-Adaptive+Protocol+for+a+Wireless+ATM-Based+Multimedia+Services+Network | en_HK |
dc.identifier.email | Kwok, YK:ykwok@eee.hku.hk | en_HK |
dc.identifier.authority | Kwok, YK=rp00128 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1016/S0140-3664(00)00278-4 | en_HK |
dc.identifier.scopus | eid_2-s2.0-0035873290 | en_HK |
dc.identifier.hkuros | 60799 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-0035873290&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 24 | en_HK |
dc.identifier.issue | 10 | en_HK |
dc.identifier.spage | 970 | en_HK |
dc.identifier.epage | 983 | en_HK |
dc.identifier.isi | WOS:000169056100007 | - |
dc.publisher.place | Netherlands | en_HK |
dc.identifier.scopusauthorid | Kwok, YK=7101857718 | en_HK |
dc.identifier.scopusauthorid | Lau, VKN=7005811464 | en_HK |
dc.identifier.issnl | 0140-3664 | - |