Skip to main content

Dynamic admission control and bandwidth reservation for IEEE 802.16e mobile WiMAX networks

Abstract

The article presents a dynamic connection admission control (CAC) and bandwidth reservation (BR) scheme for IEEE 802.16e Broadband Wireless Access networks to simultaneously improve the utilization efficiency of network resources and guarantee QoS for admitted connections. The proposed CAC algorithm dynamically determines the admission criteria according to network loads and adopts an adaptive QoS strategy to improve the utilization efficiency of network resources. After new or handoff connections enter the networks based on current admission criteria, the proposed adaptive BR scheme adjusts the amount of reserved bandwidth for handoffs according to the arrival distributions of new and handoff connections in order to increase the admission opportunities of new connections and provide handoff QoS as well. We conduct simulations to compare the performance of our proposed CAC algorithm and BR scheme with that of other approaches. The results illustrate that our approach can effectively improve the network efficiency in terms of granting more connections by as large as about 22% in comparison with other schemes, and can also guarantee adaptive QoS for admitted new and handoff connections.

1. Introduction

Broadband wireless access networks have rapidly been growing in these years to support the increasing demands of wireless multimedia services, like streaming audio/video, Internet Protocol TV, and video conferencing. Mobile Worldwide Interoperability for Microwave Access (WiMAX), which has been standardized by IEEE 802.16e [1], is one of the most promising solutions to provide ubiquitous wireless access with high data rates, high mobility, and wide coverage. The IEEE 802.16e Media Access Control (MAC) layer provides differential Quality of service (QoS) for various classes of scheduling services, which are Unsolicited Grant Service (UGS), Extended Real-Time Polling Service (ertPS), Real-Time Polling Service (rtPS), Non-real-time Polling Service (nrtPS), and Best Effort (BE). Each scheduling class is associated with a set of QoS parameters for quantifying its bandwidth requirement, e.g., maximum/minimum data rates and maximum delays. The radio resources (i.e., time slots and frequency spectrums) for different scheduling services are centrally controlled by the base station (BS). To provide QoS for data transmissions in WiMAX networks, BS generally applies a Connection Admission Control (CAC) scheme which determines whether a new connection should be established according to the available network resources. Essentially, the effectiveness of CAC schemes can be critical to both the performances of QoS for admitted connections and the utilization efficiency of network resources. However, the IEEE 802.16e standards do not specify how to implement CAC mechanisms and remain that as open issues.

On the other hand, a bandwidth reservation (BR) mechanism is also important to the provisioning of QoS for some prioritized users like users in a handoff process. Handoff occurs when mobile station (MS) transfers its connection from the original serving BS with worse and worse link qualities to a neighboring BS with better qualities. In general, a handoff user will be prioritized over a new incoming user in order to provide better user-perceived satisfaction especially when it is with real-time applications which have specific QoS requirements, e.g., throughput demands and delay/jitter constraints. Since the reserved bandwidth cannot be taken by a new coming user, the design of BR mechanisms can significantly affect the performance of handoff QoS and also the utilization efficiency of network resources.

The CAC and BR problems have largely been investigated in previous study [2–20]. The authors of [2, 3] propose to adopt minimum bandwidth requirements as the admission criteria for all classes of scheduling services. The approach can provide more connections admitted into networks but may cause a relatively low QoS performance. The authors of [10] propose to divide the scheduling services into two groups: one group consists of UGS, ertPS, and rtPS which adopt maximum bandwidth requirements for the admission criteria, while another group consists of nrtPS and BE which adopt minimum bandwidth requirements. The approach may over favor the higher-class services and cause a starvation of lower-class services. Instead of using fixed criteria for an admission control as described above, the studies in [11, 12] propose to dynamically determine the admission criteria by using a game-theoretic approach. However, it does not take the network load into consideration and may introduce great computational complexities.

With regard to the BR schemes, a fixed guard channel scheme [13] is proposed to reserve a certain amount of bandwidth for upcoming handoff connections to assure seamless handoff processes. When the total bandwidth utilization of existing users reaches the threshold, no more new connections can be admitted into the network. Nevertheless, when a fixed amount of bandwidth can never be used for new connections, a certain portion of network resources may be wasted. The study [10] proposes to dynamically adjust the quantity of reserved bandwidth based on the arrival and departure behavior of handoff connections to make the resource utilization more efficient. However, if handoff connections occur infrequently, the quantity of reserved bandwidth for handoffs is almost fixed and this approach would be similar to the fixed guard channel scheme and cause a waste of network resources as well.

Both CAC schemes and BR mechanisms are important research issues in wireless networks due to scarce radio resources, dynamic channel qualities, and diverse user demands. However, to the best of authors' knowledge, most efforts tackle one of the two problems individually while little work considers the joint design of the two mechanisms. We are thus motivated to present a joint design of CAC and BR mechanisms which aim at simultaneously improving the utilization efficiency of network resources and guaranteeing QoS for admitted new connections and handoff connections. The proposed CAC scheme dynamically determines the admission criteria according to network loads and adopts an adaptive QoS strategy to increase the amount of admitted connections for the network efficiency. The key idea of our CAC scheme is based on the fact that most scheduling services are with adaptive QoS requirements, e.g., maximum and minimum rates. Therefore, the admission criteria can be determined according to the amount of available wireless resources for increasing the number of admitted connections with adaptive QoS. For example, if the network capacity is adequate or sufficient, bandwidth requirements for higher QoS might be adopted as the admission criteria. Alternatively, if the network load is quite heavy, the admission criteria may be degraded to meet lower QoS requirements. After the admission criteria are determined, the proposed BR scheme dynamically adjusts the amount of reserved bandwidth for handoffs according to the arrival distributions of new/handoff connections to increase the connection admission opportunities and also guarantee the bandwidth requirements for handoff QoS. The basic idea of our adaptive BR scheme is a rational inference that generally the occurrences of new incoming connections may be much more frequent than that of handoff connections [21–24]. This observation originates from common BS deployment that the overlap areas of a given BS between its neighboring stations are parts of its coverage area. Since handoffs arise only when users cross through the overlap areas, it is a general situation to observe more new connections occurring than handoff connections. Thus, the optimal BR should take into account the arrival behavior of not only handoff connections, but also new connections in order to avoid a waste of network resource as possible.

We conduct simulations of 802.16e transmission scenarios to evaluate and compare the performances of the proposed CAC algorithm and BR scheme with that of other approaches. Simulations results illustrate that our approach can effectively improve the network efficiency in terms of increasing the number of granted connections by as large as about 22% in comparison with other schemes, and also can guarantee adaptive QoS for admitted new and handoff connections. The remainder of this article is organized as follow. In Section 2, we briefly illustrate the QoS architecture and resource allocation mechanism of IEEE 802.16e networks. Section 3 presents the proposed CAC algorithm and BR scheme. In Section 4, we construct simulation scenarios to demonstrate the effectiveness of our approach. Section 5 draws our conclusions.

2. IEEE 802.16e QoS architecture and resource allocation mechanism

2.1 IEEE 802.16e QoS architecture

The IEEE 802.16e MAC layer provides QoS differentiation for various categories of scheduling services. The IEEE802.16e uplink scheduling framework is shown in Figure 1. The scheduling of uplink packet transmissions is centrally controlled in the BS. The IEEE 802.16e standards adopt a connection-oriented MAC protocol, i.e., each connection is associated with a connection ID. When a service flow generated at the application layer arrives at the MAC layer, the MS first sends a connection establishment request to the BS. The admission control mechanism at BS then estimates whether the remaining bandwidth can support the QoS requirements of new connections without violating existing users' QoS. If the connection request is accepted, the BS replies with a connection response which indicates the connection IDs for each direction of this connection. After the process of connection establishment is finished, the MS can issue a bandwidth request. The connection classifier then classifies the service data units into different scheduling classes according to their service flow identifier and connection identifier. The uplink bandwidth requests by users are performed on a per connection basis, whereas the BS grants bandwidth on a per subscriber station basis (GPSS). After the BS allocates a certain amount of bandwidth to each of the MSs, the packet scheduler at each MS will redistribute the bandwidth to the corresponding connection. By means of the connection-admission-control mechanism and request-grant bandwidth-allocation scheme, QoS for different scheduling classes can be guaranteed.

Figure 1
figure 1

IEEE802.16e uplink scheduling framework.

The IEEE 802.16e standard divides all service flows into five scheduling classes, each of which is associated with a set of QoS parameters for quantifying its bandwidth requirement. The five scheduling classes are described as follows.

  1. (1)

    UGS: UGS is designed to support real-time service flows with fixed-size packets generated at periodic intervals (i.e., constant bit rate--CBR), such as T1 services and voice-over-Internet-Protocol (VoIP) applications without silence suppression. This service can grant a fixed amount of bandwidth for CBR real-time applications without any requests.

  2. (2)

    rtPS: rtPS is designed to support real-time service flows with variable-size packets generated at periodic intervals (i.e., variable bit rate--VBR), such as Motion Pictures Experts Group (MPEG) video. Based on a polling mechanism to request bandwidth periodically, this service can guarantee QoS such as the minimum data rate and maximum latency for VBR real-time applications.

  3. (3)

    ertPS: The characteristic of this service class is between UGS and rtPS. On detecting that the allocated bandwidth is either insufficient or excessive, ertPS can send a request to change the amount of allocated bandwidth like rtPS does. Otherwise, if the bandwidth demand remains unchanged, ertPS behaves as UGS. ertPS is designed to support VBR real-time data services such as VoIP applications with silence suppression.

  4. (4)

    nrtPS: This service class is to support non-real-time VBR services which require minimum-data-rate guarantees but can be tolerant to delay, such as File-Transfer-Protocol (FTP) applications.

  5. (5)

    BE: The BE service is designed for best-effort applications which have no explicit QoS requirements, e.g., web services or e-mail.

The QoS parameters and the supporting application types associated with each of the IEEE 802.16e scheduling classes are shown in Table 1.

Table 1 IEEE802.16e QoS classes

2.2. Bandwidth allocation mechanism

The IEEE 802.16e physical layer (PHY) adopts an Orthogonal Frequency Division Multiple Access (OFDMA) slot as the minimum possible resource. The IEEE 802.16e PHY supports Frequency Division Duplex (FDD) and Time Division Duplex (TDD) for bandwidth allocation mechanisms. In FDD mode, the uplink (UL) and downlink (DL) channels are located on split frequencies, with which a fixed duration frame is used for both UL and DL transmissions. In TDD mode, the UL and DL transmissions are arranged at different time periods using the same frequency. In this article, we focus on the TDD mode for the IEEE 802.16e bandwidth allocation mechanism.

In TDD mode, Time Division Multiplexing (TDM) is used for DL transmissions and Time Division Multiple Access (TDMA) is used for UL transmissions. As shown in Figure 2, a TDD frame has a fixed duration and contains one DL subframe and one UL subframe whose durations can adapt to the traffic loads of UL and DL transmissions. The DL subframe consists of a preamble, Frame Control Header (FCH), and a number of data bursts. The FCH specifies the profiles of the DL bursts that immediately follow it. The broadcast messages including downlink map (DL-MAP), uplink map (UL-MAP), DL Channel Descriptor (DCD), UL Channel Descriptor (UCD), etc., are sent at the beginning of these DL bursts. The UL subframe contains a contention interval for initial ranging and bandwidth request and UL PHY protocol data units (PDUs) from different MSs. The DL connections are scheduled by BS in a broadcast manner, while the UL connections apply a request-grant mechanism for bandwidth allocation in a shared manner. The UL bandwidth requests are performed on a per connection basis, whereas the BS grants bandwidth on a per subscriber station basis (GPSS). After the BS allocates a certain amount of bandwidth to each of the MSs, each MS will redistribute the bandwidth to the corresponding connection. The information about bandwidth allocations for DL and UL transmissions is broadcast to the MSs through DL-MAP and UL-MAP messages at the beginning of each frame. Therefore, each MS can receive from and transmit data to BS in the predefined OFDMA slots.

Figure 2
figure 2

The TDD frame architecture ( Source : IEEE [1]).

2.3. Packet scheduling mechanism

As shown in Section 2.1, the IEEE 802.16e standard defines five scheduling classes. However, it does not specify the scheduling mechanism for the five classes and the design is left for researchers [25]. The design of a scheduling mechanism must take into account the specific QoS constraints of different applications, e.g. the maximum allowable delay and minimum data rate [3]. A feasible solution is to decide on a service class first according to the characteristics of each class and next choose an appropriate user in the selected class [26]. In the second phase, the packet scheduling of different users among a given class may consider some performance metrics such as throughput and fairness, while the maximum rate scheduling (greedy algorithm) and Proportional Fairness (PF) scheduling can be applied, respectively. The maximum rate scheduling is effective to advance the overall system throughput as it allocates resources to users with relatively good channel qualities among them [27]. On the other hand, the PF scheduling can improve the fairness of channel utilization among users as it distributes resources among them with consideration of their previous records of utilization [28–30].

Throughput and fairness, however, are conflicting performance metrics [31]. To maximize system throughput, more resources should be allocated to the users in good channel conditions. This may cause most radio resources monopolized by a small number of users, leading to unfairness. On the contrary, if resources are allocated in a fair manner, resources may be allocated to the users with weak channel conditions. This can result in the degradation of system throughput. To escape from the "throughput-fairness" dilemma, we can consider "utility" for packet scheduling. Utilities are a performance metric which can fully represent the degree of user satisfaction for a given application [32, 33]. Thus, it is a more appropriate metric for packet scheduling since even users with the same service class actually are with various demands for network resources due to their specific characteristics. This fact implies that resources should be allocated to users according to the application performance metric of "satisfaction" rather than network performance metrics such as "throughput" or "fairness" [34].

In this article, we focus on the problems of CAC and BR for mobile WiMAX networks and do not discuss the design of packet scheduling. In the following section, we will propose a joint design of CAC and BR mechanisms as a solution of the addressed problems.

3. Proposed CAC algorithm and BR scheme

3.1. Dynamic CAC algorithm

We design a dynamic CAC algorithm which adjusts the admission criteria depending on the network loads and uses an adaptive QoS provisioning strategy in order to increase the efficiency of bandwidth utilization. The key idea of our dynamic CAC scheme is based on the fact that most scheduling services are with adaptive QoS requirements, e.g., maximum and minimum rates. Therefore, the admission criteria can be adjusted with the amount of available wireless resources to increase the number of admitted connections with adaptive QoS. For example, if the network capacity is adequate or sufficient, higher QoS requirements could be adopted as the admission criteria. Alternatively, if the network load is rather heavy, the admission criteria may level down for lower QoS.

We can take into account several approaches to design the admission criteria according to network loads. A simple way, as shown in Figure 3a, is to adopt the maximum or minimum bandwidth requirement alternatively as the admission criterion depending on the network load nl with respect to a threshold, γ. That is

Figure 3
figure 3

Several functions to adjust the admission criteria according to the network load. (a) Hard-decision function. (b) Linear function. (c) Quantized-step function.

b i = b i , max , n l < γ b i , min , n l ≥ γ ,
(1)

where b i is the admission criteria for connection i; bi, maxand bi, minare the maximum and minimum bandwidth requirements corresponding to the highest and lowest QoS, respectively, for connection i. Furthermore, we can consider a linear adaptation approach which smoothly regulates the admission criteria b i in proportion to the change of network load nl as shown in Figure 3b. Accordingly, b i can be expressed as

b i = α b i , max + ( 1 - α ) b i , min , where α = 1 , n l < n l th min n l th max - n l n l th max - n l th min , n l th min ≤ n l < n l th max 0 , n l ≥ n l th max
(2)

where n l th min and n l th max refers to the minimum and maximum threshold of network loads respectively. If nl is less than n l th min , the weighted factor α will be set as 1 and bi, maxwould be adopted as the admission criterion to provide the best QoS. On the other hand, if nl is equal to or larger than n l th max , α will be set as 0 and bi, minwould be used to provide the lowest QoS. If nl is within the range of [ n l th min , n l th max ), b i will be linearly regulated in proportion to the change of nl to provide an adequate QoS. In general, n l th min and n l th max can be varied with the network bandwidth B and each type of service. With a given B, n l th min and n l th max for a higher service class should be larger in order to provide differential QoS among various service classes. A feasible approach to determine the values of n l th min and n l th max with regard to each service class is to set different ratios of n l th min and n l th max to B appropriately. For example, in the simulations we consider the following setting of ( n l th min /B, n l th max /B): (3/6, 5/6), (2/5, 4/5), (2/6, 4/6), (1/5, 3/5), and (1/6, 3/6), respectively, for UGS, rtPS, ertPS, nrtPS, and BE in order. Finally, as shown in Figure 3c, this approach is to quantize the bandwidth within [bi, min, bi, max] with N + 1 levels, each of which refers to a feasible admission criteria. The adaptive criteria b i can be expressed as

b i = b i 0 ( b i , max ) , n l < n l th 0 ( n l th min ) b i n , n l th n - 1 ≤ n l < n l th n , 1 ≤ n ≤ N - 1 b i N ( b i , min ) , n l ≥ n l th N - 1 ( n l th max )
(3)

where n l th n refers to the n th threshold of network load (1 ≤ n ≤ N - 2). In particular, n l th 0 and n l th N - 1 refer to the minimum and maximum thresholds of network loads, n l th min and n l th max , respectively. Here, b i k (1 ≤ k ≤ N - 1) refers to the k th feasible admission criteria as the network load nl is within the range of [ n l th k - 1 , n l th k ). In particular, b i 0 corresponds to bi, maxas nl < n l th 0 , and b i N corresponds to bi, minas nl ≥ n l th N - 1 , respectively. The value of N + 1 refers to the number of quantization levels. When N is 1 in particular, the quantized step function has two levels and is equal to the hard-decision function as shown in Figure 3a. In contrast, if N is infinite, the quantized step function has countless levels and is equal to the linear adaptation approach as shown in Figure 3b. Normally, the value of N can be determined considering a reasonable number of adaptive criteria b i between bi, minand bi, max, (e.g., N = 5-15 in general). When the value of N is determined, the unknown values of n l th n (1 ≤ n ≤ N - 2) and b i k (1 ≤ k ≤ N - 1) can therefore be obtained by using a uniform quantizer which equally partitions the region within ( b i 0 , b i N ) and ( n l th 0 , n l th N - 1 ). In this article, we consider the linear adaptation approach as shown in Figure 3b for our CAC algorithm and use it for performance evaluations in the following section.

Denote the bandwidth allocated to existing new connections and handoff connections as b n and b h , respectively. A handoff connection will be accepted in the network as long as the bandwidth available can satisfy the bandwidth requirement. Thus, the condition to accept a handoff connection is

ho_accepted = ( b i , ho + b n + b h ) ≤ B ,
(4)

where bi, hois the admission criterion of handoff connection i determined in Equation (2). A new connection will be accepted when the following condition is satisfied:

new_accepted = ( ( b i , new + b n ) ≤ t h ad ) ∩ ( ( b i , new + b n + b h ) ≤ t h max ) ,
(5)

where bi, newis the admission criterion of new connection i provided in Equation (2). The first term in the rhs of Equation (5) aims for increasing the admitting opportunities for new connections when it only determines whether the resources allocated to new connections exceed the threshold. The last term in the rhs aims for ensuring a minimum BR for handoff (i.e. B - thmax). In Section 3.3 we will have a more detailed illustration for the criteria considered in Equation (5).

3.2. Estimation of system capacity

The system capacity B may be dynamic as the IEEE 802.16e standards on PHY support multiple transmission rates by using adaptive modulation and coding (AMC) schemes. The transmitter will determine one from various modulation and coding schemes (MCSs) available according to the channel conditions of packet delivery to provide reliable link qualities, large network coverage, and high data rates as possible. The modulation types supported in the IEEE 802.16e standards include Binary Phase-Shift Keying (BPSK), Quadrature Phase-Shift Keying (QPSK), 16-Quadrature Amplitude Modulation (16-QAM), and 64-QAM. With the Convolutional Turbo Code (CTC) and different code rates, the MCSs provided for WiMAX with 5 and 10 MHz channels are summarized in Table 2[35]. In a DL transmission for example, each MS informs its current perceived channel quality to the BS periodically, and then the BS will choose a specific MCS corresponding to this channel condition. The transmission data rate with a given MCS can be evaluated as

R MC S i = ( n Data_SC / T S ) * b MC S i ,
(6)

where nData_SC is the number data sub-carriers; TS is symbol period, and b MC S i is the amount of information bits per symbol with respect to the i th MCS, MCS i . In addition, adopting a Multiple-Input and Multiple-Output (MIMO) mechanism can further increase the transmission data rates to several-fold the original amount.

Table 2 The mobile WiMAX PHY data rates (Source: WiMAX Forum [35])

Here, our CAC scheme estimates the current system capacity B by consideration of the proportion of used MCSs [36, 37]. Take an example for the capacity estimation as follows. Consider a 10-MHz channel spectrum with a 2 × 2 MIMO mechanism in the downlink transmission. Assume the proportion of used MCSs is QPSK 3/4 = 25%, 16-QAM 1/2 = 25%, and 64-QAM 5/6 = 50%. Thus, the estimated system bandwidth B in this case will be (9.5*2)*25% + (12.67*2)*25% + (31.68*2)*50% = 42.77 Mbps. In general, B in the downlink can range from 2.12 to 63.36 Mbps widely with AMC in different channel situations. Based on the number of supported users with respect to each MCS and the proportion of adopted MCSs, our CAC scheme can estimate the current system capacity and network load and update the information periodically every frame period in the BS site.

3.3. Adaptive BR scheme

We propose an adaptive BR scheme which dynamically adjusts the amount of reserved bandwidth for handoffs according to the arrival distributions of both handoff and new connections. The objective of our scheme is to simultaneously increase the admission opportunities for new coming users and guarantee QoS for handoff users. The basic idea of our adaptive BR scheme is a rational inference that generally the occurrences of new incoming connections may be much more frequent than that of handoff connections [22–24]. Thus, the optimal BR should take into account the arrival behavior of not only handoff connections, but also new connections in order to avoid a waste of network resource as possible.

The scheme considers two thresholds for BRs, thmin and thmax, which refer to the minimum and maximum thresholds of reserved bandwidth, respectively. The adaptive threshold of BR, thad, is initially set as (thmin + thmax)/2, and will be dynamically adjusted within the range [thmin, thmax] according to the arrival behavior of new connections and handoff connections to control the reserved bandwidth for handoff connections. When the condition shown in Equation (4) is met and a handoff connection is accepted, the adaptive threshold thad will be decreased with the amount of allocated resources for the handoff connection without going below thmin. That is

t h ad  = min (t h ad - b i ,ho , t h min )
(7)

Alternatively, when the condition shown in Equation (5) is met and a new connection is accepted, thad will be increased with the amount of allocated resources for the new connection without exceeding thmax. That is

t h ad  = max (t h ad  +  b i ,new , t h max )
(8)

To more clearly illustrate the characteristics of our proposed BR scheme, we conduct a simplified transmission scenario to provide a preliminary performance comparison between our scheme and the fixed threshold (FT) and dynamic threshold (DT) schemes [10]. With the FT scheme, the threshold of reserved bandwidth, thfixed, is fixed; the new connection would be accepted only if (bi, new+ b n + b h ) ≤ thfixed. With the DT scheme, the threshold of reserved bandwidth, thdyn, will be adjusted within the range [thmin, thmax] depending on the arrival and departure of handoff connections as follows: when a handoff connection is accepted, the threshold thdyn will be increased with the amount of resources allocated to the handoff user; when an existing handoff connection terminates, thdyn will be decreased with the amount of released resources. The new connection will be accepted only when (bi, new+ b n + b h ) ≤ thdyn. With regard to handoff connections, all the three algorithms have the same admission strategy that a handoff connection will be accepted as long as the amount of bandwidth available can meet its requirement, i.e. (bi, ho+ b n + b h ) ≤ B.

We exploit the following simplified scenario to compare the performances of the three BR schemes. Assume that the total amount of network resources B is 100 units. Consider that the network is empty in the beginning. Assume that 80 new connections, 5 handoff connections, and 5 new connections arrive sequentially. Assume that each of the arrival connections requests a unit of resources. For the FT scheme, thfixed is set as 80 units. In the DT scheme, thmin and thmax are 80 and 90 units, respectively, and thdyn is set as 80 units initially. In our scheme, thmin and thmax are 0 and 90 units, respectively, and consequently the initial value of thad is 45 units.

Figure 4 shows the process of connection admissions with the three schemes, respectively. It is shown that with the FT scheme, the first 85 connections (80 new and 5 handoff connections) are accepted. But, the last five new connections are rejected due to a fixed reservation manner that a certain amount of bandwidth can never be used by new connections. The DT scheme has the same performance as the FT scheme that the last five new connections are blocked. The reason is that the DT scheme adjusts the reserved bandwidth according to the arrival and departure behavior of handoff connections only. Thus, when the occurrence of handoff connections is relatively infrequent as the scenario shown above, the DT scheme will be similar to the FT scheme and can cause a waste of network resources as well. With our scheme, the 90 connections totally can be granted into the network. Note that our scheme can still be effective in the situations when the number of new connections is nearly equal to or less than that of handoff connections (this will be further examined in the following section). It is shown that the proposed scheme outperforms the two schemes in terms of increasing the number of admitted connections.

Figure 4
figure 4

The process of connection admissions with the three BR schemes, respectively.

Although the DT scheme and our proposed scheme both apply an adaptive manner for their BR strategies, there are two essential differences which lead to their dissimilar performances. One difference is between their criteria for accepting new connections. For the DT scheme, the new connection will be accepted if the amount of its bandwidth requirement and the bandwidth allocated to existing connections would not exceed the threshold, i.e. (bi, new+ b n + b h ) ≤ thdyn. In our scheme, one criterion for accepting a new connection as shown in the first term of the rhs in Equation (5) only examines whether the amount of the requirement and the bandwidth allocated to existing "new connections" does not exceed the threshold, i.e. (bi, new+ b n ) ≤ thad. Thus, with our scheme, the existing handoff connections will not lessen the resource for an incoming new connection. That is, when the DT scheme and our proposed scheme are with the same amount of reserved bandwidth (thdyn = thad), our scheme can increase a resource space of b h for accepting more new connections. Meanwhile, our BR scheme can guarantee QoS for handoff connections because of another condition for accepting a new connection as shown in the last term of the rhs in Equation (5). That is, the total amount of required bandwidth for a new connection and allocated bandwidth for existing connections would not exceed the amount of guarded bandwidth for handoff, thmax, i.e. (bi, new+ b n + b h ) ≤ thmax. Thus, at last the B - thmax bandwidth amount can be reserved for handoff users.

Another difference is between their adjustment strategies for the threshold of BR, thdyn and thad. With the DT scheme, thdyn is increased or decreased when a handoff connection is established or terminated respectively, and will remain constant whether a new connection concludes or runs its course. When the occurrence of handoff connections is relatively infrequent as the scenario shown above, the DT scheme will be similar to the FT scheme and can cause a waste of network resources too. In our scheme, thad is increased or decreased when a new or handoff connection is admitted and runs its course, respectively, and will remain constant whether a new or handoff connection concludes. Note that a lower threshold of BR advances the acceptance rate of handoff users whereas a higher threshold increases the admission opportunities for new connections. In the sense, our scheme has potential to grant more new connections into networks especially when the occurrences of new connections are much more than that of handoff connections. As aforementioned, our scheme would not sacrifice handoff QoS for favoring new connections when no less than the bandwidth amount of B - thmax will be reserved for handoff users. Thus, the proposed adaptive BR scheme can simultaneously improve the network efficiency by granting more new connections and also guarantee handoff QoS.

To summarize, Figure 5 presents the joint design of the proposed CAC algorithm and BR scheme, and Figure 6 shows the corresponding pseudocodes. The block diagram in Figure 5 contains the following three steps.

Figure 5
figure 5

The proposed dynamic CAC algorithm and adaptive BR scheme.

Figure 6
figure 6

Proposed CAC and BR algorithm.

  1. (1)

    When a new connection or handoff connection arrives, it will inform the BS of its highest and lowest bandwidth requirements (i.e., b i, maxand b i, min). The proposed dynamic CAC scheme will adjust the admission criterion using Equation (2) according to the currently estimated system capacity and network load.

  2. (2)

    When the admission criterion is determined, the proposed adaptive BR scheme will accept or reject this handoff or new connection depending on the criterion in Equation (4) or Equation (5), respectively.

  3. (3)

    If a handoff connection is established, thad will be decreased with the amount of allocated resources as Equation (7) shows; if a new connection is granted, thad will be increased with the amount of allocated resources as Equation (8) shows.

The implementation of the proposed CAC and BR schemes in practice can involve the overheads as follows.

  1. (1)

    The estimate of system capacity: The system capacity can be evaluated at the BS with the specific PHY characteristics like channel spectrum, the amount of data sub-carriers, supported MCSs, used MIMO mechanisms, etc. The estimation of system capacity can be obtained in the initial phase of a network built-up.

  2. (2)

    The estimate of network loads: In general, the network loads can be evaluated at the BS with the information of currently adopted MCSs and the number of supported users with respect to each MCS. This part may need the exchanges of some context information between BS and SSs periodically, e.g., currently channel condition and used modulation.

  3. (3)

    The determination of admission criteria for incoming connections: When a connection arrives and requests for an admission, it will inform the BS of its specific QoS requirements, e.g., maximum and minimum data rates. Based on the estimated system capacity and network loads and QoS parameters, the BS will compute the admission criteria for the incoming connection with its specific QoS parameters.

  4. (4)

    The adaptation of BR for handoff connections: If a connection is admitted in the network, the BS will therefore adapt the BR threshold depending on the type of connection, i.e., new or handoff.

4. Performance evaluations and results

In this section, we conduct simulations of 802.16e transmission scenarios to demonstrate the effectiveness of the proposed CAC algorithm and BR scheme. The simulator is constructed in C and followed the IEEE 802.16e standard closely [35, 38]. The channel spectrum is 10 MHz. The MAC frame duration is 5 ms, which consists of 1024 OFDM subcarriers (840 data and pilot subcarriers). One MAC frame includes 48 OFDM symbols, while the first symbol is used for a preamble. The ratio of the symbols of the uplink subframe to those of the downlink subframe is 18:29. In the uplink, three symbols are used for control signaling, and there are 44 OFDM symbols used for data transmissions in the uplink and downlink in total. The simulation set-up considers a 2 × 2 MIMO mechanism and the AMC schemes. We used the following distribution for MCS levels: QPSK 1/12 = 3.71%, QPSK 1/8 = 12.01%, QPSK 1/4 = 29.10%, QPSK 1/2 = 29.67%, QPSK 3/4 = 9.23%, 16-QAM 1/2 = 12.51%, 64-QAM 1/2 = 0.75%, and 64-QAM 3/4 = 3.02% [39, 40]. The OFDMA PHY parameters and their values are listed in Table 2.

We provide different simulation scenarios to examine the proposed CAC algorithm and BR scheme individually or jointly to clearly show the performance effects with the two schemes. For each of the scenarios, we assume the connection arrivals and departures are with the Poisson process with a mean arrival rate λ and a mean departure rate equal to one-tenth of the arrival rate. We assume that the BS is aware of the amount of connections with regard to each kind of MCS and the bandwidth requirement of each connection. The BS can therefore exploit this knowledge to estimate the current system capacity and also network loads. Generally, the system capacity and network loads can therefore be estimated for our scheme with the information of currently adopted MCSs and the number of supported users with respect to each MCS. The total simulation period is 1000 s while the results are provided with the average values over 20 times of simulations.

4.1. The connection blocking rates and achieved throughput with different CAC schemes

In this section, we examine the performance of our CAC algorithm individually by the comparisons with that of other CAC schemes. Here, we do not take into account the reserved bandwidth for handoff users. Thus, each of the incoming connections will be admitted into the network as long as the bandwidth available can satisfy the admission criteria determined by various CAC schemes. The simulation set-up for this scenario considers three types of traffic classes which are rtPS, ertPS, and nrtPS. To clearly examine the achieved QoS performances regarding the three types of service classes with different schemes, we separately evaluate the performance for each class with its specific QoS requirement, i.e., maximum and minimum data rates as shown in Table 3.

Table 3 The maximum and minimum rates associated with different scheduling services

We compare the performance of our CAC algorithm with that of the static maximum (Static-max), static minimum (Static-min), and bandwidth adaptation (Adapt) scheme considered in [11, 12]. The Static-max and Static-min schemes adopt the highest and lowest QoS requirements, respectively, as the admission criteria. The Adapt scheme considers the highest QoS criteria for a new coming user. If the resources available are insufficient to meet the bandwidth requirement of a new connection, the bandwidth allocated to existing users will be decreased to satisfy the QoS requirement of the new connection. In our scheme, we consider a linear adaptation approach as shown in Figure 3b which adjusts the admission criteria according to the variation of network loads. We use the following ratios of ( n l th min /B, n l th max /B): (2/5, 4/5), (2/6, 4/6), and (1/5, 3/5), for rtPS, ertPS, and nrtPS, respectively, as we consider in Section 3.1. Then, the minimum and maximum thresholds of network loads ( n l th min , n l th max ) in Equation (2) for rtPS, ertPS, and nrtPS can be derived, respectively, depending on the currently estimated system capacity B. The performances are indexed as the connection blocking rate and the achieved QoS in terms of per-flow throughput, i.e., the average data rates supported per established connection.

Figure 7 presents the average connection blocking rates of the rtPS, ertPS, and nrtPS flows with different CAC schemes. It is shown that the blocking rates rise with the increase of connection arrival rates λ for all schemes except the Adapt scheme. The blocking rate with the Adapt scheme is almost 0 steadily, which is the lowest among all schemes when the incoming connections will always be established regardless of the amount of bandwidth available. The blocking rate with the Static-max scheme is the highest among all due to its strictest admission criterion. With the proposed scheme, the blocking rate is between that with the Static-max and Static-min schemes since the admission criteria are dynamically adjusted according to network loads (i.e., connection arrival rates).

Figure 7
figure 7

The average connection blocking rates of the rtPS, ertPS, and nrtPS traffic flows with different CAC schemes.

Figures 8, 9, and 10 show the achieved per-flow throughput of the rtPS, ertPS, and nrtPS service classes, respectively, with different CAC schemes. It is shown in these figures that the Static-max and Static-min schemes provide steady throughput corresponding to the highest-fidelity and minimum QoS, respectively. It is shown from Figures 7, 8, 9, and 10 that the Static-max and Static-min schemes cannot properly balance the tradeoff between network efficiency and user-perceived QoS due to using fixed admission criteria without the consideration of traffic loads. Consider the case of ertPS traffic as shown in Figure 9 for example. With the Adapt scheme, the per-flow throughput keeps at the highest level when the network load is relatively light (λ is less than 0.2); but, it degrades rapidly as the traffic loads get heavier (λ is larger than 0.2) because the resources allocated to existing users are taken away to satisfy new connections' QoS requirements. As the traffic load get much heavier such that λ is larger than about 0.5, the achieved throughput can no more keep above the value for the lowest QoS (25 kbps). With the proposed scheme, the achieved throughput is varying from 38 to 66 kbps around with the change of network loads, and remains at about 38 kbps when λ is larger than 0.3. It is shown that the per-flow throughput can keep higher than the minimum QoS level. In Figures 8 and 10, we have similar observations regarding the rtPS and nrtPS traffic classes. The results demonstrate that the proposed dynamic CAC algorithm can efficiently improve utilization of network resources and also assure adaptive QoS above the minimum requirements for admitted connections.

Figure 8
figure 8

The achieved throughput of the rtPS traffic class with different CAC schemes.

Figure 9
figure 9

The achieved throughput of the ertPS traffic class with different CAC schemes.

Figure 10
figure 10

The achieved throughput of the nrtPS traffic class with different CAC schemes.

4.2. The new connection blocking rate and handoff dropping rate with different BR schemes

In this section, we conduct simulation scenarios which consider new connections and handoff connections to examine the performance of the proposed BR scheme without CAC. The compared BR schemes for performance evaluations are the FT and DT schemes [10] described in Section 3.2. The simulation set-up in this scenario considers five classes of scheduling services, UGS, rtPS, ertPS, nrtPS, and BE, each of which is associated with specific maximum rates and minimum rates as shown in Table 3. To simply and fairly compare the performances of different BR schemes, our approach here considers the same fixed admission criteria as that used by the FT and DT schemes: the maximum rate is adopted as the admission criteria for UGS, rtPS, and ertPS, and the minimum rate is adopted for nrtPS and BE [10]. Assume that the occurrences of the five scheduling services are with uniform probabilities, with which the arrival rates of new connections and handoff connections are λ n and λ h , respectively. We refer to [10] and adopt the following threshold setting. For the FT scheme, thfixed/B is equal to 80%. In the DT scheme, thmin/B and thmax/B are set as 80 and 90%, respectively; thdyn/B is set as 80% initially. In our scheme, thmin/B and thmax/B are equal to 0 and 90%, respectively, and consequently the initial value of thad/B is 45%. We examine the performance of different BR schemes with different ratios of handoff arrival rates to new-connection arrival rates which can be 1:1 or 1:20 in particular. The performance metrics are indexed as the new connection blocking rates and handoff dropping rates.

Figure 11a, b shows the new-connection blocking rate and handoff dropping rate, respectively, with different BR schemes as the ratio of handoff arrival rates λ h to new-connection arrival rates λ n is 1:1 (the total connection arrival rate λ = λ h + λ n ). It is shown that the FT scheme provides the lowest handoff dropping probability and highest blocking rate when it adopts an FT for the BR. The DT scheme and our proposed scheme have similar performances in terms of both blocking and dropping rates as they determine the BR in an adaptive sense. Generally, the total amount of admitted connections with the three schemes is nearly the same. By comparison, our proposed scheme can admit a few more connections into networks than the FT and DT schemes as its increasing number of new connections is slightly larger than the decreasing amount of handoff connections. For example, when the arrival rate λ is equal to 0.8 (λ n = λ h = 0.4) in particular, the total number of admitted new and handoff connections with FT, DT, and the proposed scheme is 219, 218, and 225, respectively. In general with various values of arrival rates λ, our proposed scheme averagely can slightly increase the network efficiency by 0.75 and 1.47% in comparison with the FT and DT schemes, respectively.

Figure 11
figure 11

As λ h :λ n is 1:1, (a) the blocking rates of new connections and (b) the dropping rates of handoff connections with respect to different BR schemes. In comparison with the FT and DT schemes, respectively, the proposed scheme slightly increases the network efficiency by 0.75 and 1.47%.

Figure 12a, b shows the new-connection blocking rate and handoff dropping rate, respectively, when the ratio of handoff arrival rates λ h to new-connection arrival rates λ n is 1:20. The performance of the FT scheme is similar to that shown in Figure 11a, b that it has the lowest dropping and highest blocking rate among all. With regard to the DT scheme and our proposed scheme, it is shown that their performances are quite dissimilar here, unlike what is shown in Figure 11a, b. We can observe that our proposed scheme provides a much lower blocking probability and a slightly higher handoff dropping rate than the FT and DT schemes (notice that the scales of the vertical axes in Figure 12a, b are different). Regarding this transmission scenario in which the occurrences of new connections are much more frequent than those of handoff connections, the proposed scheme can significantly outperform the two schemes in terms of the amount of admitted connections. For example, when the arrival rate λ is equal to 0.8 (λ n = λ h = 0.4) in particular, the blocking rate with FT, DT, and the proposed scheme is about 0.54, 0.53, and 0.47, respectively, while the dropping rate with the three schemes is about 0, 0.007, and 0.009, respectively. Consequently, the total number of admitted new and handoff connections with FT, DT, and the proposed scheme is 387, 399, and 442, respectively. The DT scheme grants 12 connections more than the FT scheme, providing a slight increase of network efficiency by 3.20% over the FT scheme. It is shown that the DT scheme provides a rather marginal improvement over the FT scheme when the occurrences of handoff connections are relatively sparse. In this situation, the DT scheme may cause a waste of network resources as much as the FT scheme does. With the proposed scheme, the number of granted handoff connections is almost equal to that of the FT and DT schemes since a bandwidth guard is used in our scheme to ensure a minimum BR for handoff users. On the other hand, the number of admitted new connections with the proposed scheme is much more than that with the FT and DT schemes. Totally, our scheme can grant 55 and 43 connections more than the FT and DT schemes, providing a significant improvement of network efficiency by as large as 14.15 and 10.61% over the FT and DT schemes, respectively. In general when the arrival rates λ (λ = λ h + λ n ) varies from 0.4 to 0.9, our proposed scheme averagely can increase the network efficiency by 13.09 and 7.93% in comparison with the FT and DT schemes, respectively. The simulations demonstrate that our adaptive BR scheme can simultaneously grant more new connections to improve utilization efficiency of network resources and also guarantee BRs for handoff users.

Figure 12
figure 12

As λ h :λ n is 1:20, (a) the blocking rates of new connections and (b) the dropping rates of handoff connections with respect to different BR schemes. When the arrival rates λ (λ = λ h + λ n ) varies from 0.4 to 0.9, the proposed scheme averagely improve the network utilization by 13.09 and 7.93% in comparison with the FT and DT schemes, respectively.

4.3. The new connection blocking rate and hadoff dropping rate with different CAC and BR schemes

In this section, we conduct simulation scenarios to examine the joint performance of our dynamic CAC algorithm and adaptive BR scheme. The simulation set-up for this scenario is similar to that described in Section 4.2, except that our scheme further adopts the proposed CAC algorithm to dynamically adjust the admission criteria for the five scheduling classes. We use the following ratios of ( n l th min /B, n l th max /B): (3/6, 5/6), (2/5, 4/5), (2/6, 4/6), (1/5, 3/5) and (1/6, 3/6), for UGS, rtPS, ertPS, nrtPS, and BE, respectively, as we consider in Section 3.1. Then, the minimum and maximum thresholds of network loads ( n l th min , n l th max ) in Equation (2) for UGS, rtPS, ertPS, nrtPS, and BE can be derived, respectively, depending on the currently estimated system capacity B. The FT and DT schemes use the same admission strategy aforementioned that the scheduling classes of UGS, rtPS, and ertPS adopt the maximum rate for the admission criteria while the nrtPS and BE classes use the minimum rate for that.

Figure 13a, b presents the new-connection blocking and handoff dropping rate, respectively, when the ratio of handoff arrival rates λ h to new-connection arrival rates λ n is 1:1. It is shown that the performance of blocking rates using our approach is much better than that with the FT and DT scheme, while the handoff dropping rate with our scheme is not far from that with the other two schemes. In particular, we compare the performances of our approach shown in Figure 11a with that shown in Figure 13a here (both in which the ratio of handoff arrivals to new-connection arrivals is 1:1), and it is observed that the later provides a great improvement over the former (as the blocking rate is decreased by 46.10% in average). The performance improvement is contributed by the joint use of the proposed CAC algorithm which dynamically determines the admission criteria depending on network loads to increase the connection admission opportunities. As a result, our approach (dynamic CAC algorithm and adaptive BR scheme) averagely can increase the network efficiency by as large as 19.71 and 19.95% over the FT and DT schemes, respectively, with various values of arrival rates.

Figure 13
figure 13

As λ h :λ n is 1:1, (a) the blocking rates of new connections and (b) the dropping rates of handoff connections with respect to different CAC and BR schemes. The proposed dynamic CAC algorithm plus adaptive BR scheme averagely increase the network efficiency by 19.71 and 19.95% over the FT and DT schemes, respectively.

Finally, Figure 14a, b presents the blocking and dropping rate, respectively, when the ratio of handoff arrival rates λ h to new-connection arrival rates λ n is 1:20. Similarly, we can clearly observe the performance improvement with the joint design of our CAC algorithm by comparing the results shown in Figures 12a and 14a particularly (both in which the ratio of handoff arrivals to new-connection arrivals is 1:20). It is shown in Figure 14a, b that our approach can significantly improve the network utilization by totally admitting 22.45 and 17.32% connections more than the FT and DT schemes, respectively. From the results shown in Figures 13 and 14, we can observe that our approach generally performs better in the latter where the occurrences of new connections are much more frequent than that of handoff connections. The performance improvement is attributed to our adaptive BR scheme which increases the network efficiency by dynamically adjusting the amount of reserved bandwidth for handoff users according to the arrival distributions of both handoff and new connections. The simulation results demonstrate the effectiveness of our dynamic CAC algorithm and adaptive BR scheme to increase the network efficiency in terms of granting more connections and also guarantee adaptive QoS for admitted new and handoff connections.

Figure 14
figure 14

As λ h :λ n is 1:20, (a) the blocking rates of new connections and (b) the dropping rates of handoff connections with respect to different CAC and BR schemes. The proposed dynamic CAC algorithm plus adaptive BR scheme improve the network utilization by admitting 22.45 and 17.32% connections more than the FT and DT schemes, respectively.

5. Conclusion

The mechanisms of CAC and BR are important research issues in wireless networks due to scarce radio resources, dynamic channel qualities, and diverse user demands. The article presents a dynamic CAC algorithm and an adaptive BR scheme for IEEE 802.16e mobile WiMAX networks to simultaneously improve the utilization efficiency of network resources and guarantee QoS for admitted new connections and handoff connections. Our CAC algorithm dynamically determines the admission criteria according to network loads to provide adaptive QoS for admitted users and improve the utilization efficiency of networks. When new connections and handoff connections enter the network based on the adaptive admission criteria, the proposed BR scheme further dynamically adjusts the amount of reserved bandwidth for handoffs according to the arrival distributions of new/handoff connections to increase the connection admission opportunities and also guarantee the bandwidth requirements for handoff QoS. Simulations results demonstrate that our approach can simultaneously improve the efficiency of resource utilization by granting more connections in the network and provide adaptive QoS for admitted new and handoff connections.

References

  1. IEEE 802.16 WG: IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems. Amendment 2, IEEE 2005.

    Google Scholar 

  2. Lo S-C, Hong Y-Y: A novel QoS scheduling approach for IEEE 802.16 BWA systems. In Proceedings of the 11th IEEE International Conference on Communication Technology (ICCT). Hangzhou, China; 2008:46-49.

    Google Scholar 

  3. Sayenko A, Alanen O, Karhula J, Hamalainen T: Ensuring the QoS requirements in 802.16 scheduling. In Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems (MSWIM). Torremolinos, Malaga, Spain; 2006:108-117.

    Google Scholar 

  4. Rong B, Qian Y, Lu K, Chen H-H, Guizani M: Call admission control optimization in WiMAX networks. IEEE Trans Veh Technol 2008, 57(4):2509-2522.

    Article  Google Scholar 

  5. Rong B, Qian Y, Chen H-H: Adaptive power allocation and call admission control in multiservice WiMAX access network. IEEE Wirel Commun 2007, 14(1):14-19.

    Article  Google Scholar 

  6. Jeon WS, Jeong DG: Call admission control for mobile multimedia communications with traffic asymmetry between uplink and downlink. IEEE Trans Veh Technol 2001, 50(1):59-66. 10.1109/25.917873

    Article  Google Scholar 

  7. Niyato D, Hossain E: Call admission control for QoS provisioning in 4G wireless networks: issues and approaches. IEEE Netw 2005, 19(5):5-11. 10.1109/MNET.2005.1509946

    Article  Google Scholar 

  8. Rong B, Qian Y, Lu K: Integrated downlink resource management for multiservice WiMAX networks. IEEE Trans Mob Comput 2007, 6(6):621-632.

    Article  Google Scholar 

  9. Chen X, Li B, Fang Y: A dynamic multiple-threshold bandwidth reservation (DMTBR) scheme for QoS provisioning in multimedia wireless networks. IEEE Trans Wirel Commun 2005, 4(2):583-592.

    Article  Google Scholar 

  10. Chaudhry SB, Guha RK: Adaptive connection admission control and packet scheduling for QoS provisioning in mobile WiMAX. In Proceedings of IEEE International Conference on Signal Processing and Communication (ICSPC). Dubai, United Arab Emirates; 2007:1355-1358.

    Google Scholar 

  11. Niyato D, Hossain E: A game-theoretic approach to bandwidth allocation and admission control for polling services in IEEE 802.16 broadband wireless networks. In Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks (QShine'06). Waterloo, Ontario, Canada; 2006.

    Google Scholar 

  12. Niyato D, Hossain E: Radio resource management games in wireless networks: an approach to bandwidth allocation and admission control for polling service in IEEE 802.16. IEEE Wirel Commun 2007, 14(1):72-83.

    Article  MATH  Google Scholar 

  13. Wang L, Liu F, Ji Y, Ruang-chaijatupon N: Admission control for non-preprovisioned service flow in wireless metropolitan area networks. In Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN'07). Toulouse, France; 2007:243-249.

    Chapter  Google Scholar 

  14. Yu K, Wang X, Sun S, Zhang L, Wu X: A statistical connection admission control mechanism for multiservice IEEE 802.16 network. In Proceedings of IEEE Vehicular Technology Conference (VTC 2009-Spring). Barcelona, Spain; 2009:1-5.

    Google Scholar 

  15. Wang H, Lei W, Agrawal DP: Dynamic admission control and QoS for 802.16 wireless MAN. In Proceedings of the Wireless Telecommunications Symposium (WTS2005). Cal Poly Pomona, CA, USA; 2005:60-66.

    Chapter  Google Scholar 

  16. Tsai TC, Jiang CH, Wang CY: CAC and packet scheduling using token bucket for IEEE 802.16 networks. J Commun 2006, 1(2):30-37.

    Article  Google Scholar 

  17. Niyato D, Hossain E: Queue-aware uplink bandwidth allocation and rate control for polling service in IEEE 802.16 broadband wireless access networks. IEEE Trans Mob Comput 2006, 5(6):668-679.

    Article  Google Scholar 

  18. Shu'aibu DS, Syed-Yusof SK, Fisal N: Partition-based bandwidth managements for mobile WiMAX IEEE802.16e. Int Rev Comput Softw (IReCoS) 2010, 5(4):445-452.

    Google Scholar 

  19. Park E-C, Kim H, Kim J-Y, Kim H-S: Dynamic bandwidth request-allocation algorithm for real-time services in IEEE 802.16 broadband wireless access networks. In Proceedings of IEEE INFOCOM 08. Phoenix, Arizona, USA; 2008:1526-1534.

    Google Scholar 

  20. Park E-C: Efficient uplink bandwidth request with delay regulation for real-time service in mobile WiMAX networks. IEEE Trans Mob Comput 2009, 8(9):1235-1249.

    Article  Google Scholar 

  21. Zhang Y, Liu D: An adaptive algorithm for call admission control in wireless networks. In Proceedings of the IEEE Global Communication Conference (GLOBECOM). San Antonio, TX, USA; 2001:3628-3632.

    Google Scholar 

  22. Choi J, Kwon T, Choi Y, Naghshineh M: Call admission control for multimedia services in mobile cellular networks: a Markov decision approach. In Proceedings of IEEE ISCC. Antibes, France; 2000:594-599.

    Google Scholar 

  23. Ramjee R, Nagarajan R, Towsley D: On optimal call admission control in cellular networks. In Proceedings of IEEE INFOCOM '96. San Francisco, CA, USA; 1996:43-50.

    Chapter  Google Scholar 

  24. Fang Y, Zhang Y: Call admission control schemes and performance analysis in wireless mobile networks. IEEE Trans Veh Technol 2002, 51(2):371-382. 10.1109/25.994812

    Article  MathSciNet  Google Scholar 

  25. Nazari S, Beigy H: A new distributed uplink packet scheduling algorithm in WiMAX networks. In Proceedings of IEEE ICFCC. Wuhan, China; 2010:232-236.

    Google Scholar 

  26. Lee Eunyoung, Park Hyung-Kun: Packet scheduling scheme for multiple services in mobile WiMAX system. In Proceedings of 2nd International Conference on Computer and Network Technology (ICCNT). Bangkok, Thailand; 2010:60-63.

    Google Scholar 

  27. Al-Manthari B, Nasser N, Hassanein H: Packet scheduling in 3.5 G high speed downlink packet access networks: breadth and depth. IEEE Netw Mag 2007, 21(1):41-46.

    Article  Google Scholar 

  28. Nicolaou M, Doufexi A, Armour S, Sun Y: Scheduling techniques for improving call capacity for VoIP traffic in MIMO-OFDMA networks. In Proceedings of IEEE Vehicular Technology Conference (VTC 2009-Fall). Anchorage, Alaska, USA; 2009:1-5.

    Chapter  Google Scholar 

  29. Bonald T: A score-based opportunistic scheduler for fading radio channels. In Proceedings of the European Wireless Conference(EWC '04). Barcelona, Spain; 2004:283-292.

    Google Scholar 

  30. Holtzman J, Barriac G: Introducing Delay Sensitivity into the Proportional Fair Algorithm for CDMA Downlink Scheduling. In Proceedings of IEEE Seventh International Symposium on Spread Spectrum Techniques and Applications(ISSSTA). Parsippany, NJ, USA; 2002:652-656.

    Google Scholar 

  31. Kuo W-H, Liao W: Utility-based resource allocation in wireless networks. IEEE Trans Wirel Commun 2007, 6(10):3600-3606.

    Article  Google Scholar 

  32. Kelly FP: Charging and rate control for elastic traffic. Eur Trans Telecommun 1997, 8(1):33-37. 10.1002/ett.4460080106

    Article  Google Scholar 

  33. Kelly FP, Maulloo AK, Tan DHK: The rate control for communication networks: shadow prices, proportional fairness and stability. J Oper Res Soc 1998, 409: 237-252.

    Article  MATH  Google Scholar 

  34. Song G, Li Y: Utility-based resource allocation and scheduling in OFDM-based wireless broadband networks. IEEE Commun Mag 2005, 43(12):127-134.

    Article  MathSciNet  Google Scholar 

  35. Forumâ„¢ WiMAX: Mobile WiMAX - Part I: A Technical Overview and Performance Evaluation.2006. [http://www.wimaxforum.org/technology/downloads/Mobile_WiMAX_Part1_Overview_and_Performance.pdf]

    Google Scholar 

  36. Ashayeri MR, Taheri H: Mobile WiMAX capacity estimation in various conditions. In Proceedings of IEEE Iranian Conference on Electrical Engineering (ICEE). Isfahan, Iran; 2010:483-488.

    Google Scholar 

  37. Belghith A, Nuaymi L: WiMAX capacity estimations and simulation results. In Proceedings of IEEE Vehicular Technology Conference (VTC 2008-Spring). Marina Bay, Singapore; 2008:1741-1745.

    Chapter  Google Scholar 

  38. IEEE 802.16e 2005: IEEE Standard for local and metropolitan area networks. Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems. 2006.

    Google Scholar 

  39. IEEE C802.16e-04/16: Coverage/capacity simulations for OFDMA PHY in ITU-T channel model including MRC, STC, AAS results. 2004.

    Google Scholar 

  40. Lee H, Kim H-D, Cho D-H: Smart resource allocation algorithm considering voice activity for VoIP services in mobile-WiMAX system. IEEE Trans Wirel Commun 2009, 8(9):4688-4697.

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by Taiwan National Science Council under Grant 99-2221-E-003-005 and 100-2221-E-003-020.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chiapin Wang.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Wang, C., Yan, WJ. & Lo, HK. Dynamic admission control and bandwidth reservation for IEEE 802.16e mobile WiMAX networks. J Wireless Com Network 2012, 143 (2012). https://doi.org/10.1186/1687-1499-2012-143

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2012-143

Keywords