Performance analysis and comparison of sleep mode operation for IEEE 802.16m advanced broadband wireless networks

Chun Yu Chen*, Chung Hsien Hsu, Kai-Ten Feng

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

The IEEE 802.16m standard is developed to support advanced services with high data rate and high mobility for the next generation broadband wireless access networks. A novel sleep mode operation is specified in the standard to conserve the energy of mobile devices. In this paper, a concise analytical model for the sleep mode operation of the IEEE 802.16m is proposed. The effects of both downlink and uplink traffic are properly considered in the proposed model. The power-saving efficiency and mean waiting time are utilized as the metrics for performance analysis. Simulations are performed in order to validate the effectiveness of the proposed system model. Moreover, the performance comparisons between the IEEE 802.16m and IEEE 802.16e are also conducted in the simulations.

Original languageEnglish
Title of host publication2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC 2010
Pages1425-1430
Number of pages6
DOIs
StatePublished - 1 Dec 2010
Event2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC 2010 - Istanbul, Turkey
Duration: 26 Sep 201030 Sep 2010

Publication series

NameIEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC

Conference

Conference2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC 2010
CountryTurkey
CityIstanbul
Period26/09/1030/09/10

Keywords

  • IEEE 802.16m standard
  • Mean waiting time
  • Performance analysis
  • Power-saving
  • Sleep mode operation

Fingerprint Dive into the research topics of 'Performance analysis and comparison of sleep mode operation for IEEE 802.16m advanced broadband wireless networks'. Together they form a unique fingerprint.

Cite this