Vis enkel innførsel

dc.contributor.authorKhloussy, Elissar
dc.contributor.authorJiang, Yuming
dc.date.accessioned2019-02-15T14:07:50Z
dc.date.available2019-02-15T14:07:50Z
dc.date.created2018-10-26T09:50:56Z
dc.date.issued2018
dc.identifier.citationWireless Communications & Mobile Computing. 2018, 2018 1-9.nb_NO
dc.identifier.issn1530-8669
dc.identifier.urihttp://hdl.handle.net/11250/2585757
dc.description.abstractThe net neutrality principle states that users should have equal access to all Internet content and that Internet Service Providers (ISPs) should not practice differentiated treatment on any of the Internet traffic. While net neutrality aims to restrain any kind of discrimination, it also grants exemption to a certain category of traffic known as specialized services (SS), by allowing the ISP to dedicate part of the resources for the latter. In this work, we consider a heterogeneous LTE/WiFi wireless network and we investigate revenue-maximizing Radio Access Technology (RAT) selection strategies that are net neutrality-compliant, with exemption granted to SS traffic. Our objective is to find out how the bandwidth reservation for SS traffic would be made in a way that allows maximizing the revenue while being in compliance with net neutrality and how the choice of the ratio of reserved bandwidth would affect the revenue. The results show that reserving bandwidth for SS traffic in one RAT (LTE) can achieve higher revenue. On the other hand, when the capacity is reserved across both LTE and WiFi, higher social benefit in terms of number of admitted users can be realized, as well as lower blocking probability for the Internet access traffic.nb_NO
dc.language.isoengnb_NO
dc.publisherHindawi Publishing Corporationnb_NO
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleRevenue-Maximizing Radio Access Technology Selection with Net Neutrality Compliance in Heterogeneous Wireless Networksnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionpublishedVersionnb_NO
dc.source.pagenumber1-9nb_NO
dc.source.volume2018nb_NO
dc.source.journalWireless Communications & Mobile Computingnb_NO
dc.identifier.doi10.1155/2018/9706813
dc.identifier.cristin1623781
dc.description.localcodeCopyright © 2018 Elissar Khloussy and Yuming Jiang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal