2012 IEEE 75th Vehicular Technology Conference (VTC Spring) 2012
DOI: 10.1109/vetecs.2012.6239881
|View full text |Cite
|
Sign up to set email alerts
|

A Data Mapping Algorithm for Two-Level Requests in WiMAX Systems

Abstract: The IEEE 802.16e standard known as Mobile WiMAX has recently been introduced. It is considered as one of the most promising wireless access technologies supporting high data throughput with low cost of deployment. Mobile WiMAX makes use of Orthogonal Frequency-Division Multiple Access (OFDMA) digital modulation scheme as the transmission method. With the constraint requires that all requests have to be mapped as a rectangle, it is shown that finding an optimum mapping solution is an NP-complete problem. Many b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…The algorithms in [2]- [4] deals with the mapping problem under the PUSC permutation where the MCS of a user is the same among all subchannels. To explore the multiuser gain under frequency selective channels, the AMC mode, where a subchannel consists of contiguous subcarriers, is often used to improve spectrum efficiency.…”
Section: System Model and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The algorithms in [2]- [4] deals with the mapping problem under the PUSC permutation where the MCS of a user is the same among all subchannels. To explore the multiuser gain under frequency selective channels, the AMC mode, where a subchannel consists of contiguous subcarriers, is often used to improve spectrum efficiency.…”
Section: System Model and Related Workmentioning
confidence: 99%
“…Several heuristic algorithms [2] - [7] have been proposed to allocate resource in IEEE 802.16 networks. The algorithms in [2]- [4] consider the PUSC permutation where the MCS of all subchannels are the same for a MS. Though the algorithms in [5]- [7] deal with the AMC permutation, traffic differentiation is not considered.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, bandwidth assignment should follow certain rules and comply with constraints imposed by the OFDMA technique [4]. Specifically, the available bandwidth is structured as a two-dimensional rectangular shaped allocation bin, having one dimension associated with frequency (height) and the other with time (width) [5]. Moreover, each downlink request (or a set of requests that share common PHY characteristics, referred to as burst [6]) must comply with the rectangular shape.…”
Section: Introductionmentioning
confidence: 99%