By Topic

Random access for elastic and inelastic traffic in WLANs

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Man Hon Cheung ; Dept. of Electr. & Comput. Eng., Univ. of British Columbia, Vancouver, BC, Canada ; Mohsenian-Rad, A.-H. ; Wong, V.W.S. ; Schober, R.

In this paper, we consider the problem of random access in wireless local area networks (WLANs) with each station generating either elastic or inelastic traffic. Elastic traffic is usually non-real-time, while inelastic traffic is usually coming from real-time applications. We formulate a network utility maximization (NUM) problem, where the optimization variables are the persistent probabilities of the stations and the utilities are either concave or sigmoidal functions. Sigmoidal utility functions can better represent inelastic traffic sources compared to concave utility functions commonly used in the existing random access literature. However, they lead to non-convex NUM problems which are not easy to solve in general. By applying the dual decomposition method, we propose a subgradient algorithm to solve the formulated NUM problem. We also develop closed-form solutions for the dual subproblems involving sigmoidal functions that have to be solved in each iteration of the proposed algorithm. Furthermore, we obtain a sufficient condition on the link capacities which guarantees achieving the global optimal solution when our proposed algorithm is being used. If this condition is not satisfied, then we can still guarantee that the optimal value of the objective function is within some lower and upper bounds. We perform various simulations to validate our analytical models when the available link capacities meet or do not meet the sufficient optimality condition.

Published in:

Wireless Communications, IEEE Transactions on  (Volume:9 ,  Issue: 6 )