2010
DOI: 10.5121/ijdps.2010.1104
|View full text |Cite
|
Sign up to set email alerts
|

A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in Wireless Networks

Abstract: The key concern on the bandwidth allocation and scheduling for non real time traffic are the fulfillment of its minimum throughput requirement and improvement of bandwidth utilization with acceptable delay. This paper proposes a simple and efficient scheduling framework for allocating bandwidth to non real time polling service (nrtPS) users in IEEE 802.16 networks. In this framework, jointly selective repeat ARQ at the MAC layer and adaptive modulation and coding techniques at the physical are considered. Nume… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2013
2013

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…• Desynchronization: This is an active attack in which a malicious adversary tries to cause the tag and the reader to update inconsistent values and make tag disabled [11]. In recent years, many researchers have tried to propose lightweight and secure authentication protocols [12,13,14,15,16,17,18,19,20,21,22,23,24], but unfortunately many vulnerabilities have been found in their schemes [25,26,27,28,29,30,31,32,33,34,35,36,37,38]. Recently Fu et al [39] proposed a scalable RFID mutual authentication and Li et al [40] suggested a mutual authentication protocol for RFID communication.…”
Section: Introductionmentioning
confidence: 99%
“…• Desynchronization: This is an active attack in which a malicious adversary tries to cause the tag and the reader to update inconsistent values and make tag disabled [11]. In recent years, many researchers have tried to propose lightweight and secure authentication protocols [12,13,14,15,16,17,18,19,20,21,22,23,24], but unfortunately many vulnerabilities have been found in their schemes [25,26,27,28,29,30,31,32,33,34,35,36,37,38]. Recently Fu et al [39] proposed a scalable RFID mutual authentication and Li et al [40] suggested a mutual authentication protocol for RFID communication.…”
Section: Introductionmentioning
confidence: 99%