Mobile Networks and Management. Second International ICST Conference, MONAMI 2010, Santander, Spain, September 22-24, 2010, Revised Selected Papers

Research Article

Optimum Selection of Access Networks within Heterogeneous Wireless Environments Based on Linear Programming Techniques

Download
459 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-21444-8_13,
        author={Johnny Choque and Ram\^{o}n Ag\'{y}ero and Eva-Mar\^{\i}a Hortig\'{y}ela and Luis Mu\`{o}oz},
        title={Optimum Selection of Access Networks within Heterogeneous Wireless Environments Based on Linear Programming Techniques},
        proceedings={Mobile Networks and Management. Second International ICST Conference, MONAMI 2010, Santander, Spain, September 22-24, 2010, Revised Selected Papers},
        proceedings_a={MONAMI},
        year={2012},
        month={5},
        keywords={},
        doi={10.1007/978-3-642-21444-8_13}
    }
    
  • Johnny Choque
    Ramón Agüero
    Eva-María Hortigüela
    Luis Muñoz
    Year: 2012
    Optimum Selection of Access Networks within Heterogeneous Wireless Environments Based on Linear Programming Techniques
    MONAMI
    Springer
    DOI: 10.1007/978-3-642-21444-8_13
Johnny Choque1,*, Ramón Agüero1, Eva-María Hortigüela1, Luis Muñoz1
  • 1: University of Cantabria
*Contact email: jchoque@tlmat.unican.es

Abstract

In this work we analyze the possibilities which are brought about by the use of linear programming techniques in the framework of access selection procedures within heterogeneous wireless network environments. We present a tool which has been designed and implemented (based on the package) to tackle this problem. This tool, starting from a particular network model, can be used to retrieve the optimum assignment of access elements. To fulfil this goal, we introduce a flexible cost () function, which allows modulating the relevance given to the different aspects which could be taken into consideration while deciding the access alternative to be used: connection with a preferred operator, minimizing the number of handovers, or link quality, amongst others. Afterwards, the tools is used to study a set of canonical access selection strategies, so as to establish the combination of parameters which might lead to better performances.