A Study on Radio Access Technology Selection Algorithms by Leijia Wu, Kumbesan Sandrasegaran

By Leijia Wu, Kumbesan Sandrasegaran

This booklet discusses the fundamental notion of universal Radio source administration (CRRM), in particular at the Radio entry applied sciences choice a part of CRRM. It introduces interplay capabilities (information reporting functionality and RRM selection help functionality) and 4 interplay levels (from low to very excessive) of CRRM. 4 attainable CRRM topologies (CRRM server, built-in CRRM, Hierarchical CRRM, and CRRM in consumer terminals) are defined. The publication offers diverse Radio entry applied sciences choice algorithms, together with unmarried criterion and a number of standards established algorithms are awarded and compares them. ultimately, the ebook analyses the benefits and drawbacks of different choice algorithms.

Show description

Read Online or Download A Study on Radio Access Technology Selection Algorithms PDF

Best radio books

Wrestle Radio U.S.A.: Grapplers Speak

Those interviews with greater than 30 wrestling performers, carried out among 1992 and 1997, supply firsthand debts stretching way back to the Nineteen Thirties and supply a glimpse into the lives of grapplers and people desirous about the at the present time. The personalities and their tales are wide-ranging-from announcer Jim Ross and his first activity in wrestling doing play-by-play statement with a blind colour announcer to wrestler Sherri Martel and the politics that arose from being a lady performer within the enterprise.

Formeln und Tabellen aus dem Gebiete der Funktechnik

Formeln Und Tabellen Aus Dem Gebiete Der Funktechnik

Newnes Radio and Electronics Engineer's Pocket Book. Revised by the Editorial Staff of Electronics Today International

Newnes Radio and Electronics Engineer's notebook, 15th version offers reference of the knowledge appropriate in radio and electronics engineering. The booklet provides tables, illustrations, and diagrams of varied information utilized in radio and electronics engineering. The assurance of the textual content contains abbreviations and emblems, electric equations, and code conversions.

Making the Local News: Local Journalism in Context

First released in 1998. Routledge is an imprint of Taylor & Francis, an informa corporation.

Additional resources for A Study on Radio Access Technology Selection Algorithms

Example text

The fuzzy logic based control component has four fuzzy logic based subsystems considering four user selection criteria separately: reliability, security, battery power, and price. The inputs of the four subsystems are the user preferred price, user preferred reliability, user preferred security, and the importance of battery power for the user respectively, and each subsystem has three outputs: the probabilities of acceptance for the user in WWAN, WMAN, and WLAN respectively. The MCDM component uses the outputs of the fuzzy logic based control component as inputs and works out ranking values for the three RATs by allocating a weighting factor on each criterion.

In [16], the proposed adaptive algorithm is compared with the “Always WWAN” and “WLAN if coverage” algorithms in terms of call blocking probability. Simulation results in [16] prove that the performance of Hasib’s algorithm is better than the other two in terms of new call blocking probability because it allocates users according to a number of criteria rather than just allocates users in a predefined order. However, it is more complex and requires more information. A challenge of this algorithm is that it relies on the location prediction information, which may be hard to be obtained in practice.

For example, during busy hours, the IN*VG*Load algorithm can be used while the second algorithm can be used at other times. 4 kbps? 2 Variations of NCCB Algorithm Two variations of the NCCB algorithm were introduced in [7]. One is called NCCBvoice, where the NCCB policy is only applied for voice users while interactive users follow the VG policy. Another is called VG-NCCB, where the low path loss users follow the VG policy and high path loss users are always allocated to GERAN first. Simulation results in [7] prove that the NCCB algorithm performs better than NCCBvoice and VG-NCCB algorithms in terms of uplink BLER.

Download PDF sample

Rated 4.00 of 5 – based on 30 votes