Method for controlling resource allocation in a wireless communication system
First Claim
1. A method of controlling resource allocation in a wireless communication system, comprising:
- determining whether at least one user is a hogger based on a timeslot usage; and
suspending target QoS requirement enforcement for said at least one user if said at least one user is determined to be a hogger.
12 Assignments
0 Petitions
Accused Products
Abstract
A resource allocation algorithm identifies a resource hogger in a wireless communication system data sharing arrangement and control shared resource overuse by the resource hogger. In one embodiment, the base station for a given sector in the system tracks the time-slot usage of each active user in the sector. If the usage for any user reaches a predetermined hogger threshold, normal target QoS enforcement is suspended for that user to allow more time slots to be allocated to the other, non-hogger users. When the resource hogger user'"'"'s usage falls below the threshold, target QoS enforcement is returned to that user. Temporarily suspending target QoS enforcement for resource hoggers and allocating the remaining resources to other users prevents resource hoggers from deteriorating performance of the entire system.
59 Citations
18 Claims
-
1. A method of controlling resource allocation in a wireless communication system, comprising:
-
determining whether at least one user is a hogger based on a timeslot usage; and
suspending target QoS requirement enforcement for said at least one user if said at least one user is determined to be a hogger. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of controlling resource allocation in a wireless communication system having a plurality of users, comprising:
-
determining whether at least one user is a hogger based on a timeslot usage;
enforcing target QoS requirements for at least one of said plurality of user that is not identified as the hogger;
suspending target QoS requirement enforcement for the hogger; and
updating a user-realized performance for said at least one of plurality of users not identified as the hogger. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification