• 沒有找到結果。

Chapter 5 Optimal Queue Management Algorithm for Real-Time Traffic

5.3. Packet-based Systems

In this section, we present two algorithms for packet-based systems. In these algorithms, we break a tie, if exists, arbitrarily. Without loss of generality, we assume that U { , ,...,f f1 2 fK} and

1 2 .... K

    .

Again, upon packets arrived, the way to decide if the data buffered in the multiplexer is schedulable is the same as that presented in the previous section. If not, we can obtain the loss amount by using equation (54) and one corresponding queue management is needed if there exists

one j such that Loss nj

 

0, 1 jK. Algorithm 1 is basically a generalization of the scheme proposed in [11] for systems which handle variable length packets. In this algorithm, t represents the length of the “discarded” packet.

Algorithm 1

The second algorithm slightly differs from the first one in the content to be minimized. In this algorithm, t represents the length of the oldest packet of k Queue . Note that it selects, k packet by packet, the queue that minimizes the maximum of normalized running packet loss probability.

5.4. Simulation Results

In this section, we evaluate the transient and steady-state performance of our proposed PL queue management algorithm and the two packet-based algorithms that can be implemented for real systems. We assume that there exist five traffic flows which can be generated by video trace files [54].

We adopt both interactive (parking and lecture camera) and non-interactive (Die Hard III, Mr.

Bean, and Starship Troopers) videos in the simulation. The traffic characteristics and the QoS requirements (including the required delay bound and packet loss probability) are summarized in Tables 5.2.

Table 5.2 Traffic characteristics and QoS requirements of the five flows generated from video trace files.

Traffic flow No. 1 2 3 4 5

Video name Parking Cam Lecture Cam Die Hard III Mr. Bean Starship Troopers Video type Interactive Interactive Non-interactive Non-interactive Non-interactive

Mean data rate (Kbps) 236 58 246 184 202

Peak data rate (Kbps) 1551 686 1632 1513 1453

Mean packet size (bytes) 1182 288 1232 919 1008

Delay bound (ms) 160 160 80 80 80

Packet loss probability 0.01 0.008 0.006 0.004 0.002

To investigate the steady-state performance, the simulation for flows generated video trace files is conducted by repeating the files for 20 times. The length of each time slot is assumed to be 80 ms. The proposed algorithm presented in Chapter 5.3 is referred to as the fluid-flow based algorithm. For performance comparisons, we let the system capacity equal the effective bandwidth under the fluid-flow based algorithm. Note that the effective bandwidth, which is defined as the minimum bandwidth to meet the QoS requirements of all traffic flows, can be found in advance by, say, the bisection method.

Fig. 5.4 shows the evolution of running packet loss probabilities of the five traffic flows. As one can see in Figs. 5.4(a), the steady-state loss probabilities meet the requirements for the fluid-flow based algorithm. The reason is simply because we used the effective bandwidths in both experiments. The loss probabilities are about 2.6 and 2.5 times of the desired upper bounds under the packet based algorithms I and II, respectively. Note that the fluid-flow based algorithm achieves the goal of maintaining the ratios of steady-state packet loss probabilities equal to those of the requested values, which can be seen from the results shown in Table 5.3. In this table, PL mean the steady-state loss probability, which becomes PL,norm after the normalizing it by the loss probability requirement. For the two packet-based algorithms, the PL,norm values of different flows fluctuate slightly due to the constraint of handling packets as data units.

Table 5.3 Steady-state (normalized) packet loss probability for flows generated from video trace files.

Traffic flow No. 1 2 3 4 5

PL algorithm (PL) 0.0100 0.0080 0.0060 0.0040 0.0020

Packet-based algorithm I (PL) 0.0266 0.0213 0.0159 0.0106 0.0053 Packet-based algorithm II (PL) 0.0252 0.0202 0.0151 0.0101 0.0050 PL algorithm (PL,norm) 1.0000 1.0000 1.0000 1.0000 1.0000 Packet-based algorithm I (PL,norm) 2.6582 2.6571 2.6569 2.6572 2.6569 Packet-based algorithm II (PL,norm) 2.5225 2.5205 2.5204 2.5206 2.5204

0 1 2 3 4 5 6 7 8 x 105 0

0.002 0.004 0.006 0.008 0.01 0.012 0.014

Time (slot)

Packet Loss Probability

Our proposed PL algorithm in video trace files

Flow 1 Flow 2 Flow 3 Flow 4 Flow 5

Fig. 5.4 (a)

0 1 2 3 4 5 6 7 8 x 105 0

0.005 0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045

Time (slot)

Packet Loss Probability

Packet-based algorithm I in video trace files

Flow 1 Flow 2 Flow 3 Flow 4 Flow 5

Fig. 5.4 (b)

0 1 2 3 4 5 6 7 8

Fig. 5 4 Sample Path of packet loss probability for video trace files with (a) our proposed PL queue management algorithm (b) Packet-based algorithm I (c) Packet-based algorithm II adopted.

Chapter 6 Conclusions

In this dissertation, we have studied the resource allocation technique for IEEE 802.11e HCCA, OFDMA-based systems and finally extended the results for real-time traffic to a general multiplexing system. The conclusions and future works are drawn below.

In IEEE 802.11e HCCA, we have presented an efficient static TXOP allocation algorithm, a proportional-loss fair service scheduler, and the associated admission control unit to provide QoS guarantee for VBR traffic flows with different packet loss probability and delay bound requirements.

Computer simulations are conducted to evaluate the performance of our proposed scheme. Results show that our proposed scheme is effective in QoS guarantee and, moreover, performs much better than previous works. Our proposed proportional-loss fair service scheduler can also be combined with dynamic TXOP allocation algorithms to provide better QoS support. In real systems, it is likely that there are only a limited number of possible applications. Therefore, one can pre-compute the QoS parameter of each type of application so that admission control can be

performed in real time. An interesting further research topic is to extend the results to different traffic models and other types of wireless networks.

In OFDMA-based systems, we have presented an efficient resource allocation scheme which tries to maximize system throughput while providing QoS support to real-time traffic flows. The basic idea of our proposed scheme is to calculate a dynamic minimum requested bandwidth for each traffic flow and use it as a constraint in an optimization problem which maximizes system throughput. The minimum requested bandwidth is a function of the pre-defined loss probability and the running loss probability. In addition, a user-level PL scheduler is proposed to determine the bandwidth share for multiple real-time flows attached to the same SS. A pre-processor is adopted to maximize the number of real-time flows attached to each SS which meet their QoS requirements, when the resource is not sufficient to provide every flow its minimum requested bandwidth.

Computer simulations were conducted to evaluate the performance of our proposed scheme.

Results show that the running loss probabilities of traffic flows attached to the same SS are effectively controlled to be proportional to their loss probability requirements. Besides, compared with previous designs, our proposed scheme achieves higher throughput while providing QoS support. Although we present our designs for long time average of loss probabilities, the idea can be applied to other measurements such as exponentially weighted moving average. How to design a pre-processor which meets user’s need is an interesting topic which can be further studied.

Evaluation of the impact to user perception of satisfaction for various performance measurements is

another potential further research topic.

Finally, we consider a general multiplexing system. We proposed a PL queue management algorithm for packet discarding. With combined with EDF service scheduler, we show that our proposed queue management algorithm is optimal in the sense that it minimizes the effective bandwidth under generalized space-conserving constraint. Two packet based algorithms were studied for real systems. One of them is a direct extension of a previous scheme which handles fixed-length packets. Another one is designed based on the proposed fluid-flow based algorithm.

Simulations results show that our designed packet based algorithm outperforms the direct extension.

An interesting but challenging further research topic is to develop an efficient queue management algorithm for systems with time-varying service capability.

Biography

[1] IEEE Std. 802.11e-2005, Part 11: Wireless LAN medium access control and physical layer specifications Amendment 8: medium access control (MAC) quality of service enhancements, Nov. 2005.

[2] IEEE 802.11 WG: IEEE Standard 802.11-2007, Part 11: Wireless LAN MAC and Physical Layer Specifications, Mar. 2007.

[3] S. Mangold, S. Choi, and G. R. Hiertz, “Analysis of IEEE 802.11e for QoS support in Wireless LANs,” IEEE Wireless Commun., vol. 10, no. 6, pp. 40-50, Dec. 2003.

[4] IEEE Standard for Local and metropolitan area networks-Part 16: Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std. 802.16-2009, May 2009.

[5] E. Dahlman, S. Parkvall, J. Sköld, and P. Beming, “3G HSPA and LTE for Mobile Broadband,” New York: Academic, 2007.

[6] C.L. Liu and J.W. Layland, “Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment," J. ACM, vol. 20, no. 1, pp. 46-61, 1973.

[7] A. K. Parekh and R.G. Gallager, “A Generalized Processor Sharing Approach to flow

control in Integrated Services Networks - The Single Node Case,” IEEE/ACM Trans. on

Networking, vol. 1, no.3, pp. 344-357, Jun. 1993.

[8] A. K. Parekh and R.G. Gallager, “A Generalized Processor Sharing Approach to flow control in Integrated Services Networks - The Multiple Node Case,” IEEE/ACM Trans.

on Networking, vol. 2, no.1, pp. 137-150, Apr. 1994.

[9] G. Hebuterne and A. Gravey, ”A Space Priority Queueing Mechanism for Multiplexing ATM Channels”, Computer Networks and ISDN system, vol. 20, pp. 37-43,1990.

[10] S. Sumita and T. Ozawa, ”Achievability of Performance Objectives in ATM Switching Nodes”, in Proc. International Seminar on Performance of Distributed and Parallel

Systems, pp.45-56, Dec. 1988.

[11] T. Yang, D. Tsang, and P. McCabe, "Cell scheduling and bandwidth allocation for heterogeneous VBR video conferencing traffic", in Proc. IEEE GLOBECOM’95, vol.1, pp. 371-377, Nov. 1995.

[12] T. Yang and J. Pan, ”A Measurement-Based Loss Scheduling Scheme,” in Proc. IEEE

INFOCOM’96, vol. 3, pp. 1062-1071, Mar. 1996.

[13] H. Kroner, “Comparative Performance Study of Space Priority Mechanisms for ATM networks,” in Proc. IEEE INFOCOM’90, vol.3, pp. 1136-1143, Jun. 1990.

[14] H. Kroner, G. Hebuterne, P. Boyer and A Gravey, “Priority Management in ATM Switching Nodes”, IEEE J. Select. Areas Commun. vol. 9, no.3 pp. 418-427, 1991.

[15] N. Lin, S. Li and T. Stern, “Congestion Control for Packet Voice by Selective Packet Discarding”, IEEE Trans. on Commun. vol. 38, no. 5, pp. 674-683, May 1990.

[16] W. F. Fan, D. Y. Gao, D. H. K. Tsang and B. Bensaou, ”Admission Control for variable bit rate traffic in IEEE 802.11e WLANs,” in Proc. IEEE LANMAN’04, pp. 61-66, Apr.

2004.

[17] Gao, D., Cai, J., and Chen, C. W., “ Admission control based on rate-variance envelop for VBR traffic over IEEE 802.11e HCCA WLANs”, IEEE Trans. on Vehicular Tech., vol. 57, no. 3, pp. 1778-1788, May 2008.

[18] Cicconetti, C., Lenzini, L., Mingozzi, E., and Stea, G., “An efficient cross layer scheduler for multimedia Traffic in Wireless Local Area Networks with IEEE 802.11e HCCA”, ACM Mobile Computing and Commun. Review, vol. 11, no. 3, pp. 31-46, Jul.

2007.

[19] Higuchi, Y., Foronda, A., Ohta, C., Yoshimoto M., and Okada,Y., “Delay guarantee and service interval optimization for HCCA in IEEE 802.11e WLANs,” in Proc. of IEEE

WCNC’07, pp. 2080-2085, Mar. 2007.

[20] Rashid, M. M., Hossain, E., and Bharggava, V. K., “Controlled channel access scheduling for guaranteed QoS in IEEE 802.11e-based WLANs,” IEEE Trans. Wireless

Commun. vol. 7, no. 4, pp.1287-1297, Apr. 2008.

[21] Bourawy, A. A., AbuAli, N. A., and Hassanein,H. S., “A selectivity function scheduler

for IEEE 802.11e”, in Proc. of ISCC’09, pp. 950-955, Jul. 2009.

[22] Huang,J. J., Chen, Y. H., and Chang, C.Y., “An MSI-based scheduler for IEEE 802.11e HCCA,” in Proc. of IEEE VTC-Fall’09, pp. 1-5, Sep. 2009.

[23] Luo H., and Shyu, M. L., “An optimized scheduling scheme to provide quality of service in 802.11e Wireless LANs”, in Proc. of IEEE ISM’09, pp. 651-656, Dec. 2009.

[24] Huang J. J., Chen Y. H. and Shiung D., “ A Four-Way–Polling QoS scheduler for IEEE 802.11e HCCA,” in Proc. of IEEE TENCON’10, pp. 1986-1991, Nov. 2009.

[25] Hantrakoon S. and Phonphoem A., 2010, “Priority based HCCA for IEEE 802.11e,” in

Proc. of CMC’10, pp.485-489, Apr. 2010

[26] M. Kaneko, P. Popovski and J. Dahl, “Proportional fairness in multi-carrier system with multi-slot frames: upper bound and user multiplexing algorithms,” IEEE Trans. on

Wireless Commun. vol. 7, no. 1, pp. 22-26, Jan. 2008.

[27] N. Ruangchaijatupon and Y. Ji, “Simple Proportional Fairness Scheduling for OFDMA-based Wireless Systems,” in Proc. IEEE WCNC’08, pp.1593-1597, Mar.

2008.

[28] N. Ruangchaijatupon and Y. Ji, “OFDMA Resource Allocation Based on Traffic Class-Oriented Optimization,” IEICE Trans. on Commun., vol. E92-B, no.1, pp. 93-101, Jan, 2009.

[29] N. Ruangchaijatupon and Y. Ji, “Integrated approach to proportional fair resource

allocation for multiclass services in an OFDMA system,” in Proc. IEEE

GLOBECOM’09, Dec. 2009.

[30] D. S. W. Hui, V. K. N. Lau and W. H. Lam, “Cross-layer design for OFDMA wireless systems with heterogeneous delay requirements,” IEEE Trans. on Wireless Commun.

vol. 6, no. 8, pp. 2872-2880, Aug. 2007.

[31] J. Jang and K. B. Lee, “Transmit power adaptation for multiuser OFDM system,” IEEE

J. Select. Areas in Commun., vol. 21, no. 12, pp. 171-178, Feb. 2003.

[32] S. Shakkottai and A. L. Stolyar, “A study of scheduling algorithms for a mixture of real and non-real time data in hdr,” Bell Laboratories, Lucent Technologies, Oct. 2000.

[33] M. Andrews, K. Kumaran, K. Ramanan, A. L. Stolyar, P. Whiting, and R. Vijayakumar,

“Providing quality of service over a shared wireless link,” IEEE Commun. Mag., vol. 39, no. 2, pp. 150–154, Feb. 2001.

[34] A. K. F. Khattab and K. M. F. Elsayed, “Opportunistic scheduling of delay sensitive traffic in OFDMA-based networks,” in Proc. IEEE WOWMOM’06, pp.109-114, Jun.

2006.

[35] X. Zhu, J. Huo, C. Xu and W. Ding,”QoS-guaranteed scheduling and resource allocation algorithm for IEEE 802.16 OFDMA system,” in Proc. IEEE ICC’08, pp.

3463-3468, May 2008.

[36] Y. Kim, K. Son and S. Chong, “QoS scheduling for heterogeneous traffic in

OFDMA-based wireless systems,” in Proc. IEEE GLOBECOM’09, Dec. 2009.

[37] R. Chipalkatti, J. Jurose, and D. Towsley, “Scheduling policies for real-time and non-real-time traffic in a statistical multiplexer,” in Proc. IEEE INFOCOM’89, pp.

774–783, Apr. 1989.

[38] R. Yang, C. Yuan, and K. Yang, “Cross Layer Resource Allocation of Delay Sensitive Service in OFDMA Wireless Systems,” in Proc. IEEE ICCSC’08, pp. 862–866, May 2008.

[39] V. Huang and W. Zhuang, “QoS-Oriented Packet Scheduling for Wireless Multimedia CDMA Communications,” IEEE Trans. Mobile Computing, pp. 73–85, Jan. 2004.

[40] A. Frank, “On Kuhn’s Hungarian Method - A tribute from Hungary,” Naval Research

Logistics, vol. 52, no. 1, pp. 2–5, Dec. 2005.

[41] J. Mo and J. Walrand, “Fair end-to-end window-based congestion control,” IEEE/ACM

Trans. Networking, vol. 8, no. 5, pp. 556–567, Oct. 2000.

[42] C. Dovrolis and P. Ramanathann, “A Case for Relative Differentiated Services and the Proportional Differentiation Model”, IEEE Network, vol. 13, no. 5, pp. 26-34, Oct.

1999.

[43] C. Dovrolis, D. Stiliadis and P. Ramanathann, “Proportional Proportional differentiated services: delay differentiation and packet scheduling”, ACM SIGCOMM Computer

Commun. Review, vol. 29, no. 4, pp. 109-120, Oct. 1999.

[44] C. Dovrolis, D. Stiliadis and P. Ramanathann, “Proportional differentiated services:

delay differentiation and packet scheduling”, IEEE/ACM Trans. on Networking, vol. 10, no. 1, pp. 12-26, Feb. 2002.

[45] C. Dovrolis and P. Ramanathann, “Proportional Differentiated Services, Part II: Loss Rate Differentiation and Packet Dropping,” in Proc. IEEE IWQoS’00, pp.53-61, Jun.

2000.

[46] U. Bobin, A. Jonsson, O. Schelen, “On creating proportional loss-rate differentiation:

predictability and performance”, Lecture Notes in Computer Science 2092 (2001) 372-379.

[47] J. Zeng and N. Ansari, “An Enhanced Dropping Scheme for Proportional Differentiated Services,” in Proc. IEEE ICC’03, vol.3, pp.1897-1901, May 2003.

[48] Y. C. Lai and Y. C. Szu, ”Achieving Proportional Loss Rate Differentiation in A Wireless Network with A Multi-State Link,” Computer Commun., vol. 31 no. 10, Jun.

2008.

[49] Y. Xie and T. Yang, “Cell Discarding Policies Supporting Multiple Delay and Loss Requirements in ATM Networks,” in Proc. IEEE GLOBECOM’97, vol.2, pp.

1075-1080, Nov. 1997.

[50] H. S. Kim and N. B. Shroff, “Loss probability calculations and asymptotic analysis for finite buffer multiplexers,” IEEE/ACM Trans. Networking, vol. 9, no. 6, pp. 755-768,

Dec. 2001.

[51] Y. W. Huang, T. H. Lee and J. R. Hsieh, ”Gaussian approximation based admission control for variable bit rate traffic in IEEE 802.11e WLANs,” in Proc. IEEE WCNC’07, pp. 3768-3773, Mar. 2007.

[52] B. S. Kim, S. Kim, Y. Fang, and T.F. Wong, “Two-step multipolling MAC protocol for wireless LANs,” IEEE J. Select. Areas in Commun., vol. 23, no. 6, pp. 1276-1286, June 2005.

[53] L. Georgiadis, R. Guerin, A. Parekh, “Optimal multiplexing on a single link: delay and buffer requirements”, IEEE Trans. Inform. Theory, vol. 43, no. 5, pp.1518-1535, Sep.

1997.

[54] MPEG-4 and H.263 video traces for network performance evaluation, http://www.tkn.tu-berlin.de/research/trace/trace.html, Oct. 2006.

[55] J. E. Beasley, ”Advances in linear and integer Programming,” Oxford Science, 1996.

[56] A. Schrijver, “Theory of linear and integer programming”, Wiley, 1986.

Appendix A

Derivations of all equations and

proofs of all lemmas and theorems

Proof of Theorem 3.1

Assume that li j,

 

nli j,

 

n for some

 

,i j . According to equation (20), we have

   

, ,

a b a b

lnl n for any

 

a b, U . As a result, it holds that

 , ,

 

 , ,

 

 , active ,

 

,

 

 , active ,

 

,

 

m

a b a b a b r s a b r s

a bUlna bUl na bU l nl na bU l nQ n

   

Loss n

 

.

This contradicts equation (21). Therefore, Theorem 3.1 is true.

Proof of Theorem 3.3

It is clear that the solution of the last iteration falls in Case 1. Let M denote the size of U in that iteration. We shall prove that the loss computation algorithm takes at most 2 N M

iterations to find the feasible solution if MN or one iteration if MN. The case of MN is obviously true. We prove the case of MN by mathematical induction. For simplicity, we

use Sub-case i (i1, 2) to represent Sub-case i of Case 4 in this proof.

For N 2, we have M  . Since 1 MN , we know that the solution of the first iteration cannot fall in Case 1. By tracing the algorithm, one can see that the number of iterations required to find the feasible solution is equal to 2 2 N M

. Assume that the statement is true for

NH and M 1, 2,...,H  (Hypothesis I). Consider the case of 1 NH1. If Sub-case 2 is never visited, then the number of iterations required is at most NM  1 2

NM

because at least one queue is removed from Uactive in each iteration before the last one. Assume that Sub-case 2 was visited before the feasible solution is found. If the solution of the first iteration does not fall in Sub-case 2, then the size of U in the second iteration is at most H. According to Hypothesis I, the maximum number of iterations required to find the feasible solution, starting from

iteration 2, is equal to 2 H M

. As a result, the total number of iterations is upper bounded by

   

2 HM  1 2 NM .

Assume that the solution of the first iteration falls in Sub-case 2. Let V1i and V2j with i  . Further, let j N k represent the number of queues added to V when iteration 1 2 resumes its execution. The total number of iterations required is at most 1B i k

  

, 2 j k M

,

where B i k

 

, represents the maximum number of iterations required before iteration 1 resumes its execution and 2 j k M

 

denotes the upper bound of the number of iterations required to find

the feasible solution for the updated V , according to Hypothesis I. Theorem 3.3 is true if 2

  

, 2

1

B i kik  . We shall prove this by mathematical induction.

By tracing the algorithm one can see that it is true for i2 and k0 or 1. Assume that it is true for i and p k0,1,...,p (Hypothesis II). Consider the case of 1 i  . If p 1 Sub-case 2 is not visited again before iteration 1 resumes its execution, then we have B i k

 

,  i k.

Note that if k0, then Case 2 is not visited. If k0, then there are 0 to

i k 1

times of

Sub-case 1 followed by a Case 2. Since k  i 1, we have B i k

  

, 2 ik

1. Assume that, before Sub-case 1 resumes its execution, Sub-case 2 is visited for the second time in iteration r.

This implies the solutions of iterations 2, …, and r all fall in Sub-case 1 and, therefore, at least 1 2

As defined in Chapter 3.3, the running packet loss probability of fi,j, namely, Pi,j[n], can be written as

     

After substituting the above equation into equation (17), we get

   

which implies According to equation (18), it holds that

       

Proof of Lemma 4.2

Let Rn k,

 

t and Pn k,

 

t be, respectively, the bandwidth allocated to and the resulting running loss probability of fn k, under our proposed PL scheduler. Further, let Rn k,

 

t and Pn k,

 

t be the same variables under some other scheduler. Assume that ,

 

,

1

Assume that there exists a scheduler which can guarantee the loss probability requirements of all the Kn traffic flows. In other words, it holds that Pn k,

 

t Pn k, 1, 1 k Kn, where Pn k,

 

t is the loss probability of flow fn k, at the end of the t frame, under the considered scheduler. Let th

,

 

Lemma 4.4 can be easily verified with the calculation results shown in Table 4.1.

Proof of Theorem 4.5

proves Theorem 4.5.

Appendix B

Pseudo codes of the proposed algorithms

 Loss computation of the proportional-loss service scheduler Algorithm: Loss computation

l n i j U LossComputation Loss U

   

10. LossLoss li j,

 

n

48. end if 49. end for

50. LossComputation Loss V

, 2

51. else

52. for all

 

,i jV2

53. li j,

 

n 0 54. end for 55. exit 56. end if 57. end if 58. end if

PL scheduler

25 endwhile

Vita

Yu-Wen Huang (黃郁文) was born in Gangshan District, Kaohsiung City, Taiwan, in 1982.

He received the B.S. and M.S. degree in communication engineering from National Chiao Tung University, Hsinchu, Taiwan, in 2004 and 2006, respectively. Currently, he is pursing his Ph.D.

degree at the same university. His current research interests include resource allocation, power management and communication protocols in wireless networks.

Publication List

Journal Paper (Published or accept)

[J1] T. H. Lee and Y. W. Huang, "Effective Transmission Opportunity Allocation Scheme for Real-Time VBR Traffic Flows with Different Delay Bounds," IET Commun., 2008, Vol.

2, No. 4, pp.598-608

[J2] T. H. Lee and Y. W. Huang, "Resource Allocation Achieving High System Throughput with QoS Support in OFDMA-based Systems," IEEE Trans. on Commun.. (accepted on Nov. 4, 2011)

[J3] T. H. Lee and Y. W. Huang, ”Quality of Service Guarantee for VBR Traffic Flows with

[J3] T. H. Lee and Y. W. Huang, ”Quality of Service Guarantee for VBR Traffic Flows with

相關文件