Performance Evaluation of Cross Layer QoS scheduling for Long Term Evolution Network
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.2, No. 5)Publication Date: 2012-09-27
Authors : D. Vinayagam; R. Kurinjimalar; D. Srinivasan;
Page : 75-83
Keywords : Cross layer based Two-way Scheduling Algorithm (CTSA); multi-service scheduling; LTE-Sim; cross layer; Priority based Two-way Scheduling Algorithm; QoS; LTE; 3.9G.;
Abstract
The Cross layer based Two-way scheduling Algorithm (CTSA) is proposed for scheduling both Real Time (RT) and Non-Real Time (NRT) services. The advantage of the complimentary characteristics of both RT and NRT services is utilized in CTSA to achieve a significant cell user throughput, a low delay, normalized fairness and a low packet loss ratio. The CTSA is the adaptation of the two scheduling algorithm supporting RT and NRT for effective utilization of channel. The LTE-Sim simulation tool is used to simulate the CTSA under multi-cell scenario environment for scheduling in the LTE (Long Term Evolution) network. The performances of the CTSA using Proportional Fair (PF), Modified Long Weighted Delay First (M-LWDF) and Exponential Proportional Fair (EXP/PF) schedulers are studied in terms of throughput, packet loss ratio, delay and cell spectral efficiency and fairness index. The simulation based comparison indicates that M-LWDF and EXP/PF scheduler outperforms PF scheduler especially during RT service. The PF scheduler has high throughput for NRT service. In all the simulations, the performance level of EXP/PF scheduling algorithm for multi-service scheduling seems to be an optimal solution for guaranteeing required QoS (Quality of Service).
Other Latest Articles
- Comparison and Analysis of an efficient Image Compression Technique Based on Discrete 2-D wavelet transforms with Arithmetic Coding
- Location Privacy Using User Anonymity and Dummy Locations
- A Review of Content Based Image Classification using Machine Learning Approach
- Prevention of Cross-Site Scripting Vulnerabilities using Dynamic Hash Generation Technique on the Server Side
- Medical Image Protection using steganography by crypto-image as cover Image
Last modified: 2014-11-25 18:12:25