About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Mobile Networks and Management. Second International ICST Conference, MONAMI 2010, Santander, Spain, September 22-24, 2010, Revised Selected Papers

Research Article

Optimum Selection of Access Networks within Heterogeneous Wireless Environments Based on Linear Programming Techniques

Download(Requires a free EAI acccount)
578 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-21444-8_13,
        author={Johnny Choque and Ram\^{o}n Ag\'{y}ero and Eva-Mar\^{\i}a Hortig\'{y}ela and Luis Mu\`{o}oz},
        title={Optimum Selection of Access Networks within Heterogeneous Wireless Environments Based on Linear Programming Techniques},
        proceedings={Mobile Networks and Management. Second International ICST Conference, MONAMI 2010, Santander, Spain, September 22-24, 2010, Revised Selected Papers},
        proceedings_a={MONAMI},
        year={2012},
        month={5},
        keywords={},
        doi={10.1007/978-3-642-21444-8_13}
    }
    
  • Johnny Choque
    Ramón Agüero
    Eva-María Hortigüela
    Luis Muñoz
    Year: 2012
    Optimum Selection of Access Networks within Heterogeneous Wireless Environments Based on Linear Programming Techniques
    MONAMI
    Springer
    DOI: 10.1007/978-3-642-21444-8_13
Johnny Choque1,*, Ramón Agüero1, Eva-María Hortigüela1, Luis Muñoz1
  • 1: University of Cantabria
*Contact email: jchoque@tlmat.unican.es

Abstract

In this work we analyze the possibilities which are brought about by the use of linear programming techniques in the framework of access selection procedures within heterogeneous wireless network environments. We present a tool which has been designed and implemented (based on the package) to tackle this problem. This tool, starting from a particular network model, can be used to retrieve the optimum assignment of access elements. To fulfil this goal, we introduce a flexible cost () function, which allows modulating the relevance given to the different aspects which could be taken into consideration while deciding the access alternative to be used: connection with a preferred operator, minimizing the number of handovers, or link quality, amongst others. Afterwards, the tools is used to study a set of canonical access selection strategies, so as to establish the combination of parameters which might lead to better performances.

Published
2012-05-28
http://dx.doi.org/10.1007/978-3-642-21444-8_13
Copyright © 2010–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL