Theoretical analysis of PF scheduling with bursty traffic model in OFDMA systems

  • Guowei Zhang
  • , Jing Xu
  • , Ligang Liu
  • , Yang Yang
  • , Qiang Li
  • , Matti Hamalainen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

Existing researches on the theoretical analysis for Proportional Fair (PF) scheduling are mostly based on the full buffer assumption while the user always has a bursty traffic in reality. In this paper, an analytical framework for PF scheduling in an Orthogonal Frequency Division Multiple Access (OFDMA) wireless network is proposed, and the user traffic is set to follow a poisson arrival process. Detailed analysis for each user's Resource Block (RB) competition status is carried out, and an M/M/1 queuing model is adopted for the packet transmission process of each user, with which the analytical expressions for user throughput and packet latency are obtained. Simulation in a single-cell OFDMA network is carried out and the comparision between simulation and analysis results confirms the accuracy of our analysis.

Original languageEnglish
Title of host publication2017 IEEE International Conference on Communications, ICC 2017
EditorsMerouane Debbah, David Gesbert, Abdelhamid Mellouk
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467389990
DOIs
StatePublished - 28 Jul 2017
Externally publishedYes
Event2017 IEEE International Conference on Communications, ICC 2017 - Paris, France
Duration: 21 May 201725 May 2017

Publication series

NameIEEE International Conference on Communications
ISSN (Print)1550-3607

Conference

Conference2017 IEEE International Conference on Communications, ICC 2017
Country/TerritoryFrance
CityParis
Period21/05/1725/05/17

Keywords

  • Bursty traffic
  • Orthogonal Frequency Division Multiple Access (OFDMA)
  • Packet latency
  • Proportional fair (PF) scheduling

Fingerprint

Dive into the research topics of 'Theoretical analysis of PF scheduling with bursty traffic model in OFDMA systems'. Together they form a unique fingerprint.

Cite this