Mobile WiMAX Bandwidth Reservation Thresholds: A Heuristic Approach

Mobile WiMAX Bandwidth Reservation Thresholds: A Heuristic Approach

Sondes Khemiri, Khaled Boussetta, Nadjib Achir, Guy Pujolle
Copyright: © 2011 |Volume: 1 |Issue: 2 |Pages: 20
ISSN: 2155-6261|EISSN: 2155-627X|EISBN13: 9781613509807|DOI: 10.4018/ijwnbt.2011040105
Cite Article Cite Article

MLA

Khemiri, Sondes, et al. "Mobile WiMAX Bandwidth Reservation Thresholds: A Heuristic Approach." IJWNBT vol.1, no.2 2011: pp.42-61. http://doi.org/10.4018/ijwnbt.2011040105

APA

Khemiri, S., Boussetta, K., Achir, N., & Pujolle, G. (2011). Mobile WiMAX Bandwidth Reservation Thresholds: A Heuristic Approach. International Journal of Wireless Networks and Broadband Technologies (IJWNBT), 1(2), 42-61. http://doi.org/10.4018/ijwnbt.2011040105

Chicago

Khemiri, Sondes, et al. "Mobile WiMAX Bandwidth Reservation Thresholds: A Heuristic Approach," International Journal of Wireless Networks and Broadband Technologies (IJWNBT) 1, no.2: 42-61. http://doi.org/10.4018/ijwnbt.2011040105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper addresses the issue of wireless bandwidth partitioning of a Mobile WiMAX cell. The authors consider a Complete Partitioning strategy, where the wireless bandwidth capacity of a cell is divided into trunks. Each partition is strictly reserved to a particular type of connection. Four IEEE 802.16e 2005 service classes are distinguished: UGS, rtPS, nrtPS, and ErtPS. The authors consider mobility and differentiate new call request from handoffs. In addition, the authors take into consideration the Adaptive Modulation and Coding (AMC) scheme, through the partition of the cell into different areas associated to a particular modulation and coding scheme. The purpose of the paper is to determine, using an analytical model and a heuristic approach, the nearly optimal sizes of the partition sizes dedicated to each type of connection, which is characterized by its service class, type of request and modulation, and coding scheme.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.