Computer and Modernization ›› 2016, Vol. 0 ›› Issue (9): 25-29+34.doi: 10.3969/j.issn.1006-2475.2016.09.006
Previous Articles Next Articles
Received:
2016-03-24
Online:
2016-09-12
Published:
2016-09-13
CLC Number:
SUN Ya-nan, PAN Zhong-qiang. Effective Bandwidth Allocation Mechanism of Supporting QoS in IEEE 802.16 Standard[J]. Computer and Modernization, 2016, 0(9): 25-29+34.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2016.09.006
[1]IEEE Standard 802.16-2004, IEEE Standard for Local and Metropolitan Area Networks, Part16: Air Interface for Fixed Broadband Wireless Access Systems[S]. [2] 伸桂林,张新有. WiMAX Mesh网络中一种集中式QoS调度算法[J]. 计算机应用研究, 2012,29(11):4269-4272. [3] 张波,张春业,马小强,等. IEEE 802.16中改进的QoS调度算法设计[J]. 计算机工程与研究, 2011,47(19):97-100. [4] IEEE STD 802.16TM-2004, IEEE Standard for Local and Metropolitan Area Networks Part16: Air Interface for Fixed Broadband Wireless Access Systems[S]. [5] IEEE STD 802.16eTM-2005 and IEEE STD 802.16TM-2004/Cor1-2005, IEEE Standard for Local and Metropolitan Area Networks Part16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems[S]. [6] 白铂,曹志刚,陈巍,等. IEEE 802.16网络中保障QoS的多用户业务调度算法[J]. 通信学报, 2009,30(11):37-47. [7] Guo Zirong, Zeng Huaxin. Simulation and analysis of weighted fair queuing algorithms in OPNET[C]// Porceedings of the 2009 International Conference on Computer Modeling and Simulation. 2009:114-118. [8] Wongthavarawat K, Ganz A. Packet scheduling for QoS support in IEEE 802.16 broadband wireless access systems[J]. International Journal of Communication Systems, 2003,16(1):81-96. [9] Maheshwari S, Lyer S, Paul K. An Efficient QoS Scheduling Architecture for IEEE 802.16 Wireless MANs[R]. Indian Institute of Technology, 2005. [10]Ghosh A, Wolter D R, Andrews J G. Broadband wireless access with WiMax/8O2.16: Current performance benchmarks and future potential[J]. IEEE Communications Magazine, 2005,43(2):129-136. [11]Kwon Taesoo, Lee Howon, Choi Sik, et al. Design and implementation of a simulator based on a cross-layer protocol between MAC and PHY Layers in a WiBro compatible IEEE 802.16e OFDMA system[J]. Communications Magazine, 2005,43(12):136-146. [12]程远,张源,高西奇. WiMAX中的多业务接入性能分析[J]. 电路与系统学报, 2010,15(2):95-99. [13]胡致远,常颖华. 一种基于WiMAX mesh网络的区分服务调度方案[J]. 传感器与微系统, 2012,31(1):38-41. [14]陈婷,李建东,钟绍波,等. 一种面向公平保证QoS的WiMAX二级调度方案[J]. 计算机研究与发展, 2009,46(7):1094-1101. [15]Georgiadis L, Guerin R, Parekh A. Optimal multiplexing on a single link: Delay and buffer requirements[J]. IEEE Tranctions on Information Theory, 1997,43(5):1518-1535. |
[1] | LYU Meijing1, NIAN Mei1, ZHANG Jun1, 2, FU Lusen1. Anomaly Detection of Network Traffic Based on Autoencoder [J]. Computer and Modernization, 2024, 0(12): 40-44. |
[2] | XIAO Junbi, QIU Yi. SDN Failure Detection and Recovery Scheme Based on State-aware Data Plane [J]. Computer and Modernization, 2024, 0(12): 116-123. |
[3] | ZHANG Tai1, YAN Zihao2, DUAN Jie2, ZHANG Zhihong2. Information Forwarding Strategy of Internet of Vehicles in Named Data Network [J]. Computer and Modernization, 2024, 0(11): 19-27. |
[4] | DONG Chongchong, ZHAO Cong, WU You, ZHANG Lei, ZHANG Jiawen, LI Zhihao. Zero-trust Dynamic Evaluation Method for IoT Terminals [J]. Computer and Modernization, 2024, 0(11): 41-45. |
[5] | WANG Cong1, YANG Wenjuan1, DING Xingwang2. An Aggregation Model of Historical Archive Resources Based on Multimodal#br# Information Fusion [J]. Computer and Modernization, 2024, 0(10): 120-126. |
[6] | MA Huiping1, LI Peng1, 2, HU Sujun1. Security Game Analysis Model of RFID System Based on Bayesian Attack Graph [J]. Computer and Modernization, 2024, 0(07): 93-99. |
[7] | ZHAO Wenbo1, XIANG Dong1, WANG Jiubin2, DENG Yuehui3, ZHANG Wei1, KANG Qian1, LI Yujie1. Infrared Image Segmentation of Electrical Equipment Based on Improved Slime Mould Algorithm and Tsallis Entropy [J]. Computer and Modernization, 2024, 0(06): 70-75. |
[8] | LI Shuang1, 2, YE Ning1, 2, XU Kang1, 2, WANG Su1, WANG Ruchuan1, 2. Edge Computing Unloading Method for Intelligent Elderly Care [J]. Computer and Modernization, 2024, 0(06): 95-102. |
[9] | SU Kaixuan . Network Intrusion Detection Based on Improved XGBoost Model [J]. Computer and Modernization, 2024, 0(06): 109-114. |
[10] | YUAN Hongwei1, CHANG Lijun1, HAO Jianhuan2, FAN Na2, WANG Chao2, LUO Chuang2, ZHANG Zehui2. Trajectory Interest Points Mining Based on Label Propagation and Privacy Protection [J]. Computer and Modernization, 2024, 0(05): 46-54. |
[11] | WANG Dongyue, LIU Hao. Multi-agent Genetic Algorithm Based Cloud Platform Anti-fake Data Injection Attack Method [J]. Computer and Modernization, 2024, 0(04): 21-26. |
[12] | YOU Jiajing1, 2, HE Yueshun1, HE Linlin1, ZHONG Hailong1, 2. Encryption Traffic Classification Method Based on AHP-CNN [J]. Computer and Modernization, 2024, 0(04): 83-87. |
[13] | ZHU Yong-shi, YANG Zi-yi, ZHAO Liang-ju, YAO Rui-chu. Volume-hiding Dynamic Encrypted Multi-maps [J]. Computer and Modernization, 0, (): 114-120. |
[14] | WANG Hong-jie, XU Sheng-chao, YANG Bo, MAO Ming-yang, JIANG Jin-ling. Automatic Arrangement Method of Cloud Network Security Service Chain Based on SRv6 Technology [J]. Computer and Modernization, 2024, 0(01): 1-5. |
[15] | HU Chong-jia, LIU Jin-zhou, FANG Li. Unsupervised Domain Adaptation for Outdoor Point Cloud Semantic Segmentation [J]. Computer and Modernization, 2024, 0(01): 74-79. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||