An enhanced cross layer downlink scheduling algorithm for IEEE 802.16 networks

Arash Asadi*, Tan Su Wei

*Corresponding author for this work

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

4 Citations (SciVal)

Abstract

The ability to support quality of service (QoS) for a wide range of applications that exhibit different service requirements is a major competency of IEEE 802.16 networks. One of the keys to QoS provision is a scheduling algorithm that is able to determine the service ordering for packets from different service classes. This however is undefined in the standard to promote innovation by equipment vendors. In this paper, we propose an enhanced priority based cross layer scheduling algorithm. The algorithm improves the fairness towards lower priority connections as well as provides guarantees to real-time and non-real-time connections over an existing cross layer algorithm. Besides, our algorithm eliminates the need of configurable parameters, which is a major concern in the original algorithm. Through extensive simulations, we show that our algorithm performs better in several fronts as compared to six opportunistic and non-opportunistic scheduling algorithms.

Original languageEnglish
Title of host publicationInternational Conference on Information Networking 2011, ICOIN 2011
Pages212-217
Number of pages6
DOIs
Publication statusPublished - 2011
Externally publishedYes
EventInternational Conference on Information Networking 2011, ICOIN 2011 - Kuala Lumpur, Malaysia
Duration: 26 Jan 201128 Jan 2011

Publication series

NameInternational Conference on Information Networking 2011, ICOIN 2011

Conference

ConferenceInternational Conference on Information Networking 2011, ICOIN 2011
Country/TerritoryMalaysia
CityKuala Lumpur
Period26/01/1128/01/11

Keywords

  • IEEE 802.16
  • Scheduling algorithms
  • WiMAX

Fingerprint

Dive into the research topics of 'An enhanced cross layer downlink scheduling algorithm for IEEE 802.16 networks'. Together they form a unique fingerprint.

Cite this