Intelligent Resource Management in Vehicular Networks by Haixia Peng & Qiang Ye & Xuemin Sherman Shen
Author:Haixia Peng & Qiang Ye & Xuemin Sherman Shen
Language: eng
Format: epub
ISBN: 9783030965075
Publisher: Springer International Publishing
3.2.2 Vehicle-Level Spectrum Reservation
To accommodate situations with high density AVs, a linear network utility function is considered in spectrum allocating among AVs associated with the same BS. For given slicing ratios β 1, β 2, and β w, and transmit power of each Wi-Fi AP, a network throughput maximization problem can be formulated as
(3.9)
where and are the association pattern matrices between eNBs and AVs, and between Wi-Fi APs and AVs, respectively; L n and λ n are the corresponding packet size and the arrival rate for delay-tolerant service requests; / (or /) are the set/number of AVs only within the coverage of eNB S j and requesting for delay-sensitive (or delay-tolerant) services; / (or /) are the set/number of AVs within the coverage of Wi-Fi AP W i and requesting for delay-sensitive (or delay-tolerant) services.
In problem (P2), the first five constraints are the same as in problem (P1) and are used to demonstrate the required spectrum for each AV allocated by its associated BS. Constraints (3.9f)â(3.9h) indicate that each AV is associated with either the eNB or the Wi-Fi AP close to it. Constraints (3.9i)â(3.9l) ensure the service rates from either eNBs or Wi-Fi APs to guarantee the delay requirements of delay-sensitive services. For AVs with delay-tolerant requests, constraints (3.9m)â(3.9p) indicate that the service rate from an eNB or a Wi-Fi AP should be not less than the periodic data traffic arrival rate at that eNB or Wi-Fi AP. Via solving problem (P2), the optimal association pattern matrices X â and X ââ² and local spectrum allocation matrices R â and R ââ² can be obtained, which maximize the network throughput with guaranteed QoS for different AV applications.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(7665)
Robo-Advisor with Python by Aki Ranin(7560)
Offensive Shellcode from Scratch by Rishalin Pillay(6076)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(4964)
Ego Is the Enemy by Ryan Holiday(4942)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
Python for ArcGIS Pro by Silas Toms Bill Parker(4154)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3852)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3581)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3282)
Speed Up Your Python with Rust by Maxwell Flitton(3229)
Liar's Poker by Michael Lewis(3215)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3189)
Extreme DAX by Michiel Rozema & Henk Vlootman(3169)
Agile Security Operations by Hinne Hettema(3119)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3108)
Essential Cryptography for JavaScript Developers by Alessandro Segala(3081)
Cryptography Algorithms by Massimo Bertaccini(3001)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2980)
