Figure 5From: Two-dimensional downlink burst construction in IEEE 802.16 networksAn example of throughput anomaly. (a) Construct B(h = 2); (b) Construct B(h = 3).Back to article page